Xiaochun Cheng

Orcid: 0000-0003-0371-9646

Affiliations:
  • Swansea University, Computer Science Department, UK
  • Middlesex University, Department of Computer Science, London, UK (former)
  • University of Reading, Department of Computer Science, UK (former)
  • Jilin University, Department of Computer Science, Changchun, China (PhD 1996)


According to our database1, Xiaochun Cheng authored at least 152 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PRAY So You Don't Become Prey.
SN Comput. Sci., March, 2024

2023
Lightweight and Bilateral Controllable Data Sharing for Secure Autonomous Vehicles Platooning Service.
IEEE Trans. Veh. Technol., November, 2023

Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV.
IEEE Trans. Intell. Transp. Syst., November, 2023

PIGNUS: A Deep Learning model for IDS in industrial internet-of-things.
Comput. Secur., September, 2023

Machine learning-based diffusion model for prediction of coronavirus-19 outbreak.
Neural Comput. Appl., July, 2023

Privacy-preserving and fine-grained data sharing for resource-constrained healthcare CPS devices.
Expert Syst. J. Knowl. Eng., July, 2023

Cooperative Conflict Detection and Resolution and Safety Assessment for 6G Enabled Unmanned Aerial Vehicles.
IEEE Trans. Intell. Transp. Syst., February, 2023

A Non-invasive Approach to Identify Insulin Resistance with Triglycerides and HDL-c Ratio Using Machine learning.
Neural Process. Lett., February, 2023

Generative Recorrupted-to-Recorrupted: An Unsupervised Image Denoising Network for Arbitrary Noise Distribution.
Remote. Sens., January, 2023

Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems.
IEEE Trans. Intell. Transp. Syst., 2023

A C-V2X Compatible Massive Data Download Scheme Based on Heterogeneous Vehicular Network.
IEEE Trans. Consumer Electron., 2023

Android-IoT Malware Classification and Detection Approach Using Deep URL Features Analysis.
J. Database Manag., 2023

Predict Market Fluctuations Based on the TSI and the Sentiment of Financial Video News Sites via Machine Learning.
Proceedings of the 15th International Conference on Computer and Automation Engineering, 2023

2022
Prediction of IIoT traffic using a modified whale optimization approach integrated with random forest classifier.
J. Supercomput., 2022

CNN supported framework for automatic extraction and evaluation of dermoscopy images.
J. Supercomput., 2022

RFAP: A Revocable Fine-Grained Access Control Mechanism for Autonomous Vehicle Platoon.
IEEE Trans. Intell. Transp. Syst., 2022

Large-Size Data Distribution in IoV Based on 5G/6G Compatible Heterogeneous Network.
IEEE Trans. Intell. Transp. Syst., 2022

Efficient, Revocable, and Privacy-Preserving Fine-Grained Data Sharing With Keyword Search for the Cloud-Assisted Medical IoT System.
IEEE J. Biomed. Health Informatics, 2022

Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022

Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud framework.
Sustain. Comput. Informatics Syst., 2022

Individual recommendation method of college physical education resources based on cognitive diagnosis model.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

Cyber-Threat Detection System Using a Hybrid Approach of Transfer Learning and Multi-Model Image Representation.
Sensors, 2022

An Empirical Study on Retinex Methods for Low-Light Image Enhancement.
Remote. Sens., 2022

Design of a Conflict Prediction Algorithm for Industrial Robot Automatic Cooperation.
Mob. Networks Appl., 2022

SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles.
J. Parallel Distributed Comput., 2022

Wireless Multimedia Sensor Network QoS Bottleneck Alert Mechanism Based on Fuzzy Logic.
J. Circuits Syst. Comput., 2022

A Deep Convolutional Neural Network Stacked Ensemble for Malware Threat Classification in Internet of Things.
J. Circuits Syst. Comput., 2022

On Shielding Android's Pending Intent from Malware Apps Using a Novel Ownership-Based Authentication.
J. Circuits Syst. Comput., 2022

An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches.
J. Cloud Comput., 2022

A differentiated learning environment in domain model for learning disabled learners.
J. Comput. High. Educ., 2022

Secure and Lightweight Fine-Grained Searchable Data Sharing for IoT-Oriented and Cloud-Assisted Smart Healthcare System.
IEEE Internet Things J., 2022

CroLSSim: Cross-language software similarity detector using hybrid approach of LSA-based AST-MDrep features and CNN-LSTM model.
Int. J. Intell. Syst., 2022

MobiScan: An enhanced invisible screen-camera communication system for IoT applications.
Trans. Emerg. Telecommun. Technol., 2022

Secure smart contracts for cloud-based manufacturing using Ethereum blockchain.
Trans. Emerg. Telecommun. Technol., 2022

Editorial: Security of cloud service for the manufacturing industry.
Trans. Emerg. Telecommun. Technol., 2022

Intrusion detection and prevention system for an IoT environment.
Digit. Commun. Networks, 2022

Improved Density Peaking Algorithm for Community Detection Based on Graph Representation Learning.
Comput. Syst. Sci. Eng., 2022

A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022

Adaptive weighted dynamic differential evolution algorithm for emergency material allocation and scheduling.
Comput. Intell., 2022

Remodeled chaotic compressive sensing scheme for secure and energy-efficient data forwarding in body-to-body network.
Comput. Electr. Eng., 2022

Guest editorial introduction to the special section on bio-inspired computing - emerging theories and industry applications.
Comput. Electr. Eng., 2022

Taxi demand forecasting based on the temporal multimodal information fusion graph neural network.
Appl. Intell., 2022

Predict Market Movements Based on the Sentiment of Financial Video News Sites.
Proceedings of the 16th IEEE International Conference on Semantic Computing, 2022

2021
A Privacy-Preserving Federated Learning for Multiparty Data Sharing in Social IoTs.
IEEE Trans. Netw. Sci. Eng., 2021

Deep Learning-Enabled Sparse Industrial Crowdsensing and Prediction.
IEEE Trans. Ind. Informatics, 2021

A Fuzzy Adaptive Dynamic NSGA-II With Fuzzy-Based Borda Ranking Method and its Application to Multimedia Data Analysis.
IEEE Trans. Fuzzy Syst., 2021

A Mobile Malware Detection Method Based on Malicious Subgraphs Mining.
Secur. Commun. Networks, 2021

ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM.
Mob. Networks Appl., 2021

Reduced PAPR Model Predictive Control based FBMC/OQAM signal for NB-IoT paradigm.
Int. J. Mach. Learn. Cybern., 2021

Editorial: deep learning for 5G IoT systems.
Int. J. Mach. Learn. Cybern., 2021

Cross-domain access control based on trusted third-party and attribute mapping center.
J. Syst. Archit., 2021

Power Grid-Oriented Cascading Failure Vulnerability Identifying Method Based on Wireless Sensors.
J. Sensors, 2021

A new wavelet-based multi-focus image fusion technique using method noise and anisotropic diffusion for real-time surveillance application.
J. Real Time Image Process., 2021

Offline signature verification using deep neural network with application to computer vision.
J. Electronic Imaging, 2021

Correction to: Multilayered-quality education ecosystem (MQEE): an intelligent education modal for sustainable quality education.
J. Comput. High. Educ., 2021

Multilayered-quality education ecosystem (MQEE): an intelligent education modal for sustainable quality education.
J. Comput. High. Educ., 2021

Al-SPSD: Anti-leakage smart Ponzi schemes detection in blockchain.
Inf. Process. Manag., 2021

Efficient and Fine-Grained Signature for IIoT With Resistance to Key Exposure.
IEEE Internet Things J., 2021

Task bundling in worker-centric mobile crowdsensing.
Int. J. Intell. Syst., 2021

Fuzzy decision trees embedded with evolutionary fuzzy clustering for locating users using wireless signal strength in an indoor environment.
Int. J. Intell. Syst., 2021

Human Body Multiple Parts Parsing for Person Reidentification Based on Xception.
Int. J. Comput. Intell. Syst., 2021

An efficient identity-based proxy signcryption using lattice.
Future Gener. Comput. Syst., 2021

Secure and energy-efficient smart building architecture with emerging technology IoT.
Comput. Commun., 2021

An ultra light weight and secure RFID batch authentication scheme for IoMT.
Comput. Commun., 2021

Multi-level graph neural network for text sentiment analysis.
Comput. Electr. Eng., 2021

IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments.
IEEE Access, 2021

Learning Outfit Compatibility with Graph Attention Network and Visual-Semantic Embedding.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Trend Analysis and Countermeasure Research of DDoS Attack Under 5G Network.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

Robust Electronic Nose in Industrial Cyber Physical Systems based on Domain Adaptive Subspace Transfer Model.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

2020
Learning Context-Aware Outfit Recommendation.
Symmetry, 2020

An Android Inline Hooking Framework for the Securing Transmitted Data.
Sensors, 2020

Imbalanced big data classification based on virtual reality in cloud computing.
Multim. Tools Appl., 2020

Local Statistics-based Speckle Reducing Bilateral Filter for Medical Ultrasound Images.
Mob. Networks Appl., 2020

Recent Advancement in Hybrid Big Data Processing.
Mob. Networks Appl., 2020

VGG16-T: A Novel Deep Convolutional Neural Network with Boosting to Identify Pathological Type of Lung Cancer in Early Stage by CT Images.
Int. J. Comput. Intell. Syst., 2020

Unbalanced private set intersection cardinality protocol with low communication cost.
Future Gener. Comput. Syst., 2020

BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs.
IEEE Commun. Mag., 2020

A game theoretic analysis of resource mining in blockchain.
Clust. Comput., 2020

Hybridization of cognitive computing for food services.
Appl. Soft Comput., 2020

Annual and Non-Monsoon Rainfall Prediction Modelling Using SVR-MLP: An Empirical Study From Odisha.
IEEE Access, 2020

Behavior Modeling and Individual Recognition of Sonar Transmitter for Secure Communication in UASNs.
IEEE Access, 2020

A Data-Driven Approach for Collision Risk Early Warning in Vessel Encounter Situations Using Attention-BiLSTM.
IEEE Access, 2020

A Sparse Bayesian Learning Method for Structural Equation Model-Based Gene Regulatory Network Inference.
IEEE Access, 2020

A Multi-Component Conical Spring Model of Soft Tissue in Virtual Surgery.
IEEE Access, 2020

Image Denoising With Generative Adversarial Networks and its Application to Cell Image Enhancement.
IEEE Access, 2020

Pair-Wise Convolution Network with Transformers for Sequential Recommendation.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Dynamic Graph Attention-Aware Networks for Session-Based Recommendation.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Low-Speed Injection Attack Detection on CAN Bus.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Random Forest Parameter Optimization Method Based on Fireworks Algorithm.
Proceedings of the EBIMCS 2020: 3rd International Conference on E-Business, 2020

Adversarial DGA Domain Examples Generation and Detection.
Proceedings of the CCRIS 2020: International Conference on Control, 2020

2019
Micro-Distortion Detection of Lidar Scanning Signals Based on Geometric Analysis.
Symmetry, 2019

Introduction of Key Problems in Long-Distance Learning and Training.
Mob. Networks Appl., 2019

Incremental Association Rule Mining Based on Matrix Compression for Edge Computing.
IEEE Access, 2019

Facial Landmark Detection via Attention-Adaptive Deep Network.
IEEE Access, 2019

Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface.
IEEE Access, 2019

An Authentication Scheme to Defend Against UDP DrDoS Attacks in 5G Networks.
IEEE Access, 2019

Implementing Fingerprint Recognition on One-Time Password Device to Enhance User Authentication.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Intrusion Detection Traps within Live Network Environment.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Security Solution Based on Raspberry PI and IoT.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Accurate Sybil Attack Detection Based on Fine-Grained Physical Channel Information.
Sensors, 2018

Introduction of Recent Advanced Hybrid Information Processing.
Mob. Networks Appl., 2018

Channel State Information-Based Detection of Sybil Attacks in Wireless Networks.
J. Internet Serv. Inf. Secur., 2018

DivORAM: Towards a practical oblivious RAM with variable block size.
Inf. Sci., 2018

Introduction to the special section on Quality, Reliability and Resilience in Hybrid Information Systems.
Comput. Electr. Eng., 2018

A Distributed Anomaly Detection System for In-Vehicle Network Using HTM.
IEEE Access, 2018

Data Provenance With Retention of Reference Relations.
IEEE Access, 2018

M-SSE: An Effective Searchable Symmetric Encryption With Enhanced Security for Mobile Devices.
IEEE Access, 2018

2016
Degradation and encryption for outsourced PNG images in cloud storage.
Int. J. Grid Util. Comput., 2016

Trust-Driven and PSO-SFLA based job scheduling algorithm on Cloud.
Intell. Autom. Soft Comput., 2016

Maximizing coding gain in wireless networks with decodable network coding.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Network coding and coding-aware scheduling for multicast in wireless networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Local Semantic Indexing for Resource Discovery on Overlay Network Using Mobile Agents.
Int. J. Comput. Intell. Syst., 2014

Numeric characteristics of generalized M-set with its asymptote.
Appl. Math. Comput., 2014

2013
Fractal property of generalized M-set with rational number exponent.
Appl. Math. Comput., 2013

DNSsec in Isabelle - Replay Attack and Origin Authentication.
Proceedings of the IEEE International Conference on Systems, 2013

Detection of Application Layer DDoS Attacks with Clustering and Bayes Factors.
Proceedings of the IEEE International Conference on Systems, 2013

Simultaneous routing and multiplexing in ad hoc networks with MIMO links.
Proceedings of IEEE International Conference on Communications, 2013

Detection of application layer DDoS attack with clustering and likelihood analysis.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

Multi-user Searchable Encryption with Coarser-Grained Access Control in Hybrid Cloud.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Format Compliant Degradation for PNG Image.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
A cooperative particle swarm optimizer with statistical variable interdependence learning.
Inf. Sci., 2012

Detection of HTTP-GET Attack with Clustering and Information Theoretic Measurements.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

2010
Efficient Identity-based Broadcast Encryption without Random Oracles.
J. Comput., 2010

Solving Job Shop Scheduling Problem Using Genetic Algorithm with Penalty Function.
Int. J. Intell. Inf. Process., 2010

Survey of Grid Resource Monitoring and Prediction Strategies.
Int. J. Intell. Inf. Process., 2010

Bandwidth Prediction based on Nu-Support Vector Regression and Parallel Hybrid Particle Swarm Optimization.
Int. J. Comput. Intell. Syst., 2010

Resource Discovery Using Mobile Agents.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

2009
New e-Learning system architecture based on knowledge engineering technology.
Proceedings of the IEEE International Conference on Systems, 2009

Ubiquitous E-learning System for Dynamic Mini-courseware Assemblying and Delivering to Mobile Terminals.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Resource Discovery Using Mobile Agents.
Proceedings of the Semantic Mining Technologies for Multimedia Databases., 2009

2008
Verifying security protocols by knowledge analysis.
Int. J. Secur. Networks, 2008

Semantic-Oriented Ubiquitous Learning Object Management System SULOMS.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Semantic Resource Management for Research Community.
Proceedings of the Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25, 2007

2006
Verifying and Fixing Password Authentication Protocol.
Proceedings of the Seventh International Conference on Software Engineering, 2006

Programming of Informatized Instructional Design Platform for Physics.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

Using Instruction Strategy for a Web-Based Intelligent Tutoring System.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

A Comparative Study on Text Clustering Methods.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

2005
An improved model-based method to test circuit faults.
Theor. Comput. Sci., 2005

Programming Style Based Program Partition.
Int. J. Softw. Eng. Knowl. Eng., 2005

Formal verification of the Merchant Registration phase of the SET protocol.
Int. J. Autom. Comput., 2005

Index conditions of resolution.
Int. J. Autom. Comput., 2005

Proving secure properties of cryptographic protocols with knowledge based approach.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Knowledge Based Approach for Mechanically Verifying Security Protocols.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

A Mobile Agent Based Spam Filter System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

An Agent Based Education Resource Purvey System.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Topology Control of Ad Hoc Wireless Networks for Energy Efficiency.
IEEE Trans. Computers, 2004

Functional magnetic resonance imaging based on Wiener filter over wavelet domain.
Proceedings of the IEEE International Conference on Systems, 2004

Research of independent component analysis.
Proceedings of the IEEE International Conference on Systems, 2004

2001
Abstraction and Refinement in Higher Order Logic.
Proceedings of the Theorem Proving in Higher Order Logics, 14th International Conference, 2001

1998
Operator Fuzzy Logic Based on Argumentation.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1996
The global properties of valid formulas in modal logic K.
J. Comput. Sci. Technol., 1996

1995
The Rationality and Decidability of Fuzzy Implications.
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, 1995


  Loading...