Xiao Zhang

Affiliations:
  • Beihang University, School of Mathematics and Systems Science, Beijing, China


According to our database1, Xiao Zhang authored at least 20 papers between 2012 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Mean-Field Game Control for Large-Scale Swarm Formation Flight in Dense Environments.
Sensors, 2022

Labrador: towards fair and auditable data sharing in cloud computing with long-term privacy.
Sci. China Inf. Sci., 2022

Cooperative attack-defense evolution of large-scale agents: a multi-population high-dimensional mean-field game approach.
Proceedings of the GECCO '22: Genetic and Evolutionary Computation Conference, Companion Volume, Boston, Massachusetts, USA, July 9, 2022

2021
Fine-Grained Intra-domain Bandwidth Allocation Against DDoS Attack.
Proceedings of the Security and Privacy in Communication Networks, 2021

2020
Spatio-temporal heterogeneous bandwidth allocation mechanism against DDoS attack.
J. Netw. Comput. Appl., 2020

2019
Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing.
Multim. Tools Appl., 2019

Identity-based proxy signature over NTRU lattice.
Int. J. Commun. Syst., 2019

Multi-authority attribute-based encryption scheme with constant-size ciphertexts and user revocation.
Concurr. Comput. Pract. Exp., 2019

Requester-Centric CP-ABE Combining Removing Escrow and Outsourcing Decryption.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems.
Multim. Tools Appl., 2017

An efficient image encryption algorithm based on a novel chaotic map.
Multim. Tools Appl., 2017

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism.
KSII Trans. Internet Inf. Syst., 2017

Efficient Bloom filter for network protocols using AES instruction set.
IET Commun., 2017

TRIP: A Tussle-Resistant Internet Pricing Mechanism.
IEEE Commun. Lett., 2017

An Efficient Lattice-Based Proxy Signature with Message Recovery.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
Construction of Boolean functions with excellent cryptographic criteria using bivariate polynomial representation.
Int. J. Comput. Math., 2016

DRDP: A DDoS-Resilient Data Pricing Mechanism.
IEEE Commun. Lett., 2016

2015
A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System.
Proceedings of the 9th International Conference on Next Generation Mobile Applications, 2015

2012
Optimized statistical analysis of software trustworthiness attributes.
Sci. China Inf. Sci., 2012


  Loading...