Shujiang Xu
Orcid: 0000-0001-9151-2834
According to our database1,
Shujiang Xu
authored at least 37 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IEEE Internet Things J., 2025
Distributed privacy-preserving keyword querying for integrated data in IoT networks via function secret sharing.
Inf. Fusion, 2025
Blockchain-based secure data sharing with overlapping clustering and searchable encryption.
Comput. Stand. Interfaces, 2025
DBC-MulBiLSTM: A DistilBERT-CNN Feature Fusion Framework enhanced by multi-head self-attention and BiLSTM for smart contract vulnerability detection.
Comput. Electr. Eng., 2025
An Integer Erasure Correction Coding and Its Application for Security Enhancement of Encryption.
IEEE Access, 2025
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
Cross-Chain Identity Authentication Protocol based on Group Signature and Zero-Knowledge Proof.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
A Decentralized Federated Learning Framework with Enhanced Privacy and Optimized Fairness.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
A Lightweight Identity Privacy Protection Scheme For Electric Vehicles Based On Consortium Blockchain.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025
2024
Connect. Sci., December, 2024
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
Symmetry, 2024
Comput. Electr. Eng., 2024
2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023
Symmetry, February, 2023
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT.
Symmetry, February, 2023
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE Trans. Circuits Syst. Video Technol., 2022
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks.
Symmetry, 2022
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel.
Symmetry, 2022
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors.
Entropy, 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
J. Inf. Secur. Appl., 2021
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021
2020
Secur. Commun. Networks, 2020
Inf. Sci., 2020
2019
Recognizing roles of online illegal gambling participants: An ensemble learning approach.
Comput. Secur., 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
2018
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Proceedings of the IEEE International Conference on Information and Automation, 2016
2008
Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008