Xi Zheng

According to our database1, Xi Zheng authored at least 76 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Big Data Cleaning Based on Mobile Edge Computing in Industrial Sensor-Cloud.
IEEE Trans. Industrial Informatics, 2020

Guest Editorial: Special Section on Emerging Privacy and Security Issues Brought by Artificial Intelligence in Industrial Informatics.
IEEE Trans. Industrial Informatics, 2020

Edge-based differential privacy computing for sensor-cloud systems.
J. Parallel Distrib. Comput., 2020

Rate-Adaptive Fog Service Platform for Heterogeneous IoT Applications.
IEEE Internet of Things Journal, 2020

An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models.
CoRR, 2020

Beyond Age: Urgency of Information for Timeliness Guarantee in Status Update Systems.
CoRR, 2020

Am I eclipsed? A smart detector of eclipse attacks for Ethereum.
Computers & Security, 2020

SmartVM: a SLA-aware microservice deployment framework.
World Wide Web, 2019

Closed-Form Analysis of Non-Linear Age of Information in Status Updates With an Energy Harvesting Transmitter.
IEEE Trans. Wireless Communications, 2019

Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing.
ACM TIST, 2019

Using Sparse Representation to Detect Anomalies in Complex WSNs.
ACM TIST, 2019

When Sensor-Cloud Meets Mobile Edge Computing.
Sensors, 2019

CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.
Inf. Sci., 2019

E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT.
IEEE Internet of Things Journal, 2019

Timely Status Update in Wireless Uplinks: Analytical Solutions With Asymptotic Optimality.
IEEE Internet of Things Journal, 2019

Target detection of hyperspectral image based on spectral saliency.
IET Image Processing, 2019

Context-Aware Information Lapse for Timely Status Updates in Remote Control Systems.
CoRR, 2019

An Overview of Attacks and Defences on Intelligent Connected Vehicles.
CoRR, 2019

Real-Time Simulation in Real-Time Systems: Current Status, Research Challenges and A Way Forward.
CoRR, 2019

A survey of security and privacy issues in the Internet of Things from the layered context.
CoRR, 2019

A survey on security issues in services communication of Microservices-enabled fog applications.
Concurrency and Computation: Practice and Experience, 2019

When Road Information Meets Data Mining: Precision Detection for Heading and Width of Roads.
IEEE Access, 2019

Driver Drowsiness Detection Using Multi-Channel Second Order Blind Identifications.
IEEE Access, 2019

APDP: Attack-Proof Personalized Differential Privacy Model for a Smart Home.
IEEE Access, 2019

Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones.
IEEE Access, 2019

Detecting Difference Between Process Models Using Edge Network.
IEEE Access, 2019

A QPR-Based Low-Complexity Input Current Control Strategy for the Indirect Matrix Converters With Unity Grid Power Factor.
IEEE Access, 2019

MFE-HAR: multiscale feature engineering for human activity recognition using wearable sensors.
Proceedings of the MobiQuitous 2019, 2019

ESDA: An Energy-Saving Data Analytics Fog Service Platform.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019

Verification of Microservices Using Metamorphic Testing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Detection of Smoking Events from Confounding Activities of Daily Living.
Proceedings of the Australasian Computer Science Week Multiconference, 2019

A Hybrid Method Combining Markov Prediction and Fuzzy Classification for Driving Condition Recognition.
IEEE Trans. Vehicular Technology, 2018

Efficient and Scalable Runtime Monitoring for Cyber-Physical System.
IEEE Systems Journal, 2018

Hyperspectral image classification based on joint spectrum of spatial space and spectral space.
Multimedia Tools Appl., 2018

Object localisation through clustering unreliable ultrasonic range sensors.
IJSNet, 2018

Investigating Key User Experiencing Engineering Aspects in Software-as-a-Service Service Delivery Model.
CoRR, 2018

Database as a Service - Current Issues and Its Future.
CoRR, 2018

Timely Status Update in Massive IoT Systems: Decentralized Scheduling for Wireless Uplinks.
CoRR, 2018

COMEC: Computation Offloading for Video-Based Heart Rate Detection APP in Mobile Edge Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Decentralized Status Update for Age-of-Information Optimization in Wireless Multiaccess Channels.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

DAliM: Machine Learning Based Intelligent Lucky Money Determination for Large-Scale E-Commerce Businesses.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

SoProtector: Securing Native C/C++ Libraries for Mobile Applications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

A Formal Machine-Learning Approach to Generating Human-Machine Interfaces From Task Models.
IEEE Trans. Human-Machine Systems, 2017

A Wait-and-See Two-Threshold Optimal Sleeping Policy for a Single Server With Bursty Traffic.
TGCN, 2017

Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems.
ACM Trans. Embedded Comput. Syst., 2017

Perceptions on the State of the Art in Verification and Validation in Cyber-Physical Systems.
IEEE Systems Journal, 2017

Big data storage and management in SaaS applications.
J. Comm. Inform. Networks, 2017

Cyber security attacks to modern vehicular systems.
J. Inf. Sec. Appl., 2017

Improving the scalability of formal human-automation interaction verification analyses that use task-analytic models.
ISSE, 2017

Proactive Content Push in Heterogeneous Networks with Multiple Energy Harvesting Small Cells.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

A Testbed for Security Analysis of Modern Vehicle Systems.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

SmartVM: A Multi-Layer Microservice-Based Platform for Deploying SaaS.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Service2vec: A Vector Representation for Web Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

PaaS - black or white: an investigation into software development model for building retail industry SaaS.
Proceedings of the 39th International Conference on Software Engineering, 2017

Non-invasive sensor based automated smoking activity detection.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

BigVM: A Multi-Layer-Microservice-Based Platform for Deploying SaaS.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

Security analysis of modern mission critical android mobile applications.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Bullseye: structured passage retrieval and document highlighting for scholarly search.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

Statistical tracking behavior of affine projection algorithm for unity step size.
Applied Mathematics and Computation, 2016

On the online minimization of completion time in an energy harvesting system.
Proceedings of the 14th International Symposium on Modeling and Optimization in Mobile, 2016

Investigating Security Vulnerabilities in Modern Vehicle Systems.
Proceedings of the Applications and Techniques in Information Security, 2016

Bargaining models in opinion dynamics.
Applied Mathematics and Computation, 2015

BraceAssertion: Runtime Verification of Cyber-Physical Systems.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Verification and Validation in Cyber Physical Systems: Research Challenges and a Way Forward.
Proceedings of the 1st IEEE/ACM International Workshop on Software Engineering for Smart Cyber-Physical Systems, 2015

HyCell: Enabling GREEN base station operations in software-defined radio access networks.
Proceedings of the IEEE International Conference on Communication, 2015

A simulation study of hyper-cellular architecture with dynamic temporal and spatial traffic.
Proceedings of the 21st Asia-Pacific Conference on Communications, 2015

An evidential game theory framework in multi-criteria decision making process.
Applied Mathematics and Computation, 2014

Physically informed assertions for cyber physical systems development and debugging.
Proceedings of the 2014 IEEE International Conference on Pervasive Computing and Communication Workshops, 2014

BraceForce: a middleware to enable sensing integration in mobile applications for novice programmers.
Proceedings of the 1st International Conference on Mobile Software Engineering and Systems, 2014

WiP abstract: BraceForce: Software engineering support for sensing in CPS applications.
Proceedings of the ACM/IEEE International Conference on Cyber-Physical Systems, 2014

A dynamic hybrid UXP/ARQ method for scalable video transmission.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Quasi Monte Carlo localization for mobile robots.
Proceedings of the 12th International Conference on Control Automation Robotics & Vision, 2012

An Improved Software Reliability Model Considering Fault Correction Rate.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Multi-level Frequent Pattern Mining.
Proceedings of the Database Systems for Advanced Applications, 2009