Xiaofeng Wang

According to our database1, Xiaofeng Wang authored at least 53 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Toward efficient authentication for space-air-ground integrated Internet of things.
IJDSN, 2019

iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

2018
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution.
Symmetry, 2018

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices.
Softw., Pract. Exper., 2017

A keyed-hashing based self-synchronization mechanism for port address hopping communication.
Frontiers of IT & EE, 2017

RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks.
IEICE Transactions, 2017

A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

PriMal: Cloud-Based Privacy-Preserving Malware Detection.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Security and Communication Networks, 2016

Comparing Performance of Hierarchical Identity-Based Signature Schemes.
IEICE Transactions, 2016

Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Security, trust, and resilience of distributed networks and systems.
Security and Communication Networks, 2015

Trust Description and Propagation System: Semantics and axiomatization.
Knowl.-Based Syst., 2015

RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

RScam: Cloud-Based Anti-Malware via Reversible Sketch.
Proceedings of the Security and Privacy in Communication Networks, 2015

OpenSRN: A software-defined semantic routing network architecture.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Efficient Unsavory Data Detection Method for Internet Big Data.
Proceedings of the Information and Communication Technology, 2015

An Efficient Pre-filter to Accelerate Regular Expression Matching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
JNW, 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Generation Comp. Syst., 2014

A Semantic-Based Malware Detection System Design Based on Channels.
Proceedings of the Information and Communication Technology, 2014

An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources.
Proceedings of the Information and Communication Technology, 2014

POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Mathematical and Computer Modelling, 2013

A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Mathematical and Computer Modelling, 2013

Characterization of OSPF Convergence with Correlated Failures.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Location Management Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
RLM: A General Model for Trust Representation and Aggregation.
IEEE Trans. Services Computing, 2012

Flexible multi-authority attribute-based signature schemes for expressive policy.
Mobile Information Systems, 2012

A new multistage approach to detect subtle DDoS attacks.
Mathematical and Computer Modelling, 2012

VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Collaborative detection of DDoS attacks based on chord protocol.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm.
Future Generation Comp. Syst., 2011

Authenticating with Attributes in Online Social Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Multi-authority Attribute-Based Signature.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

2009
Research on Trust Evaluation Model Based on TPM.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009


  Loading...