Xiaoding Wang

Orcid: 0000-0001-9793-8203

According to our database1, Xiaoding Wang authored at least 59 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A dynamic state sharding blockchain architecture for scalable and secure crowdsourcing systems.
J. Netw. Comput. Appl., February, 2024

A multi-modal spatial-temporal model for accurate motion forecasting with visual fusion.
Inf. Fusion, February, 2024

2023
Federated Learning-Empowered Disease Diagnosis Mechanism in the Internet of Medical Things: From the Privacy-Preservation Perspective.
IEEE Trans. Ind. Informatics, July, 2023

Communication-Efficient Personalized Federated Meta-Learning in Edge Networks.
IEEE Trans. Netw. Serv. Manag., June, 2023

AI-Empowered Trajectory Anomaly Detection for Intelligent Transportation Systems: A Hierarchical Federated Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023

A Privacy-Enhanced Multiarea Task Allocation Strategy for Healthcare 4.0.
IEEE Trans. Ind. Informatics, March, 2023

Heterogeneous Blockchain and AI-Driven Hierarchical Trust Evaluation for 5G-Enabled Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Intelligent Anomaly Detection of Trajectories for IoT Empowered Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

D2MIF: A Malicious Model Detection Mechanism for Federated-Learning-Empowered Artificial Intelligence of Things.
IEEE Internet Things J., February, 2023

Privacy-Aware Access Control in IoT-Enabled Healthcare: A Federated Deep Learning Approach.
IEEE Internet Things J., February, 2023

Spatiotemporal Prediction Based Intelligent Task Allocation for Secure Spatial Crowdsourcing in Industrial IoT.
IEEE Trans. Netw. Sci. Eng., 2023

A Deep Learning Approach for Hardware Trojan Detection Based on Ensemble Learning.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

Actuation Sequence Tampering Attack Detection on Field-Level Micro-Electrode Dot Arrays Based on 2-Layer Authentication.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

A Graph Generation Network with Privacy Preserving Capabilities.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Efficient and Reliable Federated Recommendation System in Temporal Scenarios.
Proceedings of the Green, Pervasive, and Cloud Computing - 18th International Conference, 2023

2022
QoS and Privacy-Aware Routing for 5G-Enabled Industrial Internet of Things: A Federated Reinforcement Learning Approach.
IEEE Trans. Ind. Informatics, 2022

A Secure Data Aggregation Strategy in Edge Computing and Blockchain-Empowered Internet of Things.
IEEE Internet Things J., 2022

Toward Accurate Anomaly Detection in Industrial Internet of Things Using Hierarchical Federated Learning.
IEEE Internet Things J., 2022

Data fusion and transfer learning empowered granular trust evaluation for Internet of Things.
Inf. Fusion, 2022

Hierarchical cognize framework for the multi-fault diagnosis of the interconnected system based on domain knowledge and data fusion.
Expert Syst. Appl., 2022

An intelligent and privacy-enhanced data sharing strategy for blockchain-empowered Internet of Things.
Digit. Commun. Networks, 2022

Blockchain-empowered secure federated learning system: Architecture and applications.
Comput. Commun., 2022

2021
Intelligent Drone-Assisted Fault Diagnosis for B5G-Enabled Space-Air-Ground-Space Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Enabling Secure Authentication in Industrial IoT With Transfer Learning Empowered Blockchain.
IEEE Trans. Ind. Informatics, 2021

Toward Secure Data Fusion in Industrial IoT Using Transfer Learning.
IEEE Trans. Ind. Informatics, 2021

Graph partition based privacy-preserving scheme in social networks.
J. Netw. Comput. Appl., 2021

PPCS: An Intelligent Privacy-Preserving Mobile-Edge Crowdsensing Strategy for Industrial IoT.
IEEE Internet Things J., 2021

Privacy-Enhanced Data Fusion for COVID-19 Applications in Intelligent Internet of Medical Things.
IEEE Internet Things J., 2021

An Intelligent UAV based Data Aggregation Algorithm for 5G-enabled Internet of Things.
Comput. Networks, 2021

Federated deep reinforcement learning based secure data sharing for Internet of Things.
Comput. Networks, 2021

A Privacy-Enhanced Mobile Crowdsensing Strategy for Blockchain Empowered Internet of Medical Things.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Blockchain-based Access Control Model to Preserve Privacy for Students' Credit Information.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

A Novel Cross-domain Access Control Protocol in Mobile Edge Computing.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Restricted connectivity and good-neighbor diagnosability of split-star networks.
Theor. Comput. Sci., 2020

Rollout algorithm for light-weight physical-layer authentication in cognitive radio networks.
IET Commun., 2020

A Novel Low-Complexity Fault Diagnosis Algorithm for Energy Internet in Smart Cities.
Future Internet, 2020

A Machine Learning Based Connectivity Restoration Strategy for Industrial IoTs.
IEEE Access, 2020

Affine Projection Algorithm Based on Least Mean Fourth Algorithm for System Identification.
IEEE Access, 2020

Learning-Based IoT Data Aggregation for Disaster Scenarios.
IEEE Access, 2020

De-anonymizing Social Networks with Edge-Neighborhood Graph Attacks.
Proceedings of the Security and Privacy in Digital Economy, 2020

An intelligent UAV based data aggregation strategy for IoT after disaster scenarios.
Proceedings of the DroneCom '20: Proceedings of the 2nd ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2020

A cross-blockchain based distributed crowdsouring system for Internet of Things.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Multi-layer Access Control Mechanism based on Blockchain for Mobile Edge Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
Extra diagnosability and good-neighbor diagnosability of <i>n</i>-dimensional alternating group graph <i>AG</i><sub><i>n</i></sub> under the PMC model.
Theor. Comput. Sci., 2019

Resource-Efficient NOMA Transmission via Joint Bandwidth and Rate Allocations.
IEEE Commun. Lett., 2019

Affine Projection Algorithm by Employing Maximum Correntropy Criterion for System Identification of Mixed Noise.
IEEE Access, 2019

2018
The (t, k) -Diagnosability of Balanced Hypercube under the PMC Model.
Int. J. Comput. Math. Comput. Syst. Theory, 2018

Optimal User Grouping and Resource Allocation for Downlink Non-Orthogonal Multiple Access Systems.
Proceedings of the Machine Learning and Intelligent Communications, 2018

2017
Hybrid Recovery Strategy Based on Random Terrain in Wireless Sensor Networks.
Sci. Program., 2017

A Straight Skeleton Based Connectivity Restoration Strategy in the Presence of Obstacles for WSNs.
Sensors, 2017

2016
A Privacy-Preserving Approach Based on Graph Partition for Uncertain Trajectory Publishing.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

2015
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks.
J. Univers. Comput. Sci., 2015

Restoration Strategy Based on Optimal Relay Node Placement in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2012
Physical-Layer Network Coding and Connected Dominating Set Based Routing Protocol in Wireless Multi-hop Network.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Analysing firm performance in Chinese IT industry: DEA Malmquist productivity measure.
Int. J. Inf. Technol. Manag., 2011

2010
Credit risk measurement and early warning of SMEs: An empirical study of listed SMEs in China.
Decis. Support Syst., 2010

2008
A Cooperative Secure Routing Protocol based on Reputation System for Ad Hoc Networks.
J. Commun., 2008

Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network.
J. Commun., 2008

A New Security Mechanism Based on SIP in Wireless LAN-3G Integration.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...