Xiaochao Wei

Orcid: 0000-0003-1394-2729

According to our database1, Xiaochao Wei authored at least 33 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Over-threshold multi-party private set operation protocols for lightweight clients.
Comput. Stand. Interfaces, March, 2024

Qualitative Cusp Catastrophe Multi-Agent Simulation Model to Explore Abrupt Changes in Online Impulsive Buying Behavior.
J. Assoc. Inf. Syst., 2024

2023
Mobile value chain collaboration for product diffusion: Role of the lifecycle.
Expert Syst. Appl., April, 2023

Quantitative cusp catastrophe model to explore abrupt changes in collaborative regulation behavior of e-commerce platforms.
Inf. Sci., 2023

Product diffusion in dynamic online social networks: A multi-agent simulation based on gravity theory.
Expert Syst. Appl., 2023

2022
SWMQ: Secure wildcard pattern matching with query.
Int. J. Intell. Syst., 2022

Secure approximate pattern matching protocol via Boolean threshold private set intersection.
Int. J. Intell. Syst., 2022

Privacy-preserving CNN feature extraction and retrieval over medical images.
Int. J. Intell. Syst., 2022

Effect of Overconfidence on Product Diffusion in Online Social Networks: A Multiagent Simulation Based on Evolutionary Game and Overconfidence Theory.
Complex., 2022

SMTWM: Secure Multiple Types Wildcard Pattern Matching Protocol from Oblivious Transfer.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

2021
Substring-searchable attribute-based encryption and its application for IoT devices.
Digit. Commun. Networks, 2021

Online Social Network Information Dissemination Integrating Overconfidence and Evolutionary Game Theory.
IEEE Access, 2021

2020
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer.
Inf. Sci., 2020

Blockchain-based fair payment smart contract for public cloud storage auditing.
Inf. Sci., 2020

Permutable Cut-and-Choose Oblivious Transfer and Its Application.
IEEE Access, 2020

2019
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud.
Secur. Commun. Networks, 2019

QoS-aware cloud service composition: A systematic mapping study from the perspective of computational intelligence.
Expert Syst. Appl., 2019

Face Detection for Privacy Protected Images.
IEEE Access, 2019

Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications.
IEEE Access, 2019

2018
Efficient and secure outsourced approximate pattern matching protocol.
Soft Comput., 2018

An ORAM-based privacy preserving data sharing scheme for cloud storage.
J. Inf. Secur. Appl., 2018

2017
k-out-of-n oblivious transfer protocol with security against malicious adversaries.
Comput. Syst. Sci. Eng., 2017

2016
A Decision Method to Maximize Service Quality under Budget Constraints: The Kano Study of a Chinese Machinery Manufacturer.
Sci. Program., 2016

A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Practical Server-Aided k-out-of-n Oblivious Transfer Protocol.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

2015
Several Oblivious Transfer Variants in Cut-and-Choose Scenario.
Int. J. Inf. Secur. Priv., 2015

Cut-and-Choose Bilateral Oblivious Transfer and Its Application.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Efficient ORAM Based on Binary Tree without Data Overflow and Evictions.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015

2014
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2014

2013
Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption.
J. Artif. Soc. Soc. Simul., 2013

2005
Protect Interactive 3D Models via Vertex Shader Programming.
Proceedings of the Entertainment Computing, 2005

Geometric model reconstruction from streams of DirectX 3D game application.
Proceedings of the International Conference on Advances in Computer Entertainment Technology, 2005


  Loading...