Xiaofeng Wang

Orcid: 0000-0002-3583-369X

Affiliations:
  • National University of Defense Technology, School of Computer Science, Changsha, China (PhD 2009)


According to our database1, Xiaofeng Wang authored at least 63 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Identity-Based Authentication Protocol for Trustworthy IP Address.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability.
Secur. Commun. Networks, 2021

2020
iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy.
IEEE Internet Things J., 2020

ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices.
IEEE Internet Things J., 2020

State of the Art: Secure Mobile Payment.
IEEE Access, 2020

Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things.
IEEE Access, 2020

NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

2019
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019

Toward efficient authentication for space-air-ground integrated Internet of things.
Int. J. Distributed Sens. Networks, 2019

Practical privacy-preserving deep packet inspection outsourcing.
Concurr. Comput. Pract. Exp., 2019

Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services.
IEEE Access, 2019

iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency.
Proceedings of the ACM SIGCOMM 2019 Conference Posters and Demos, 2019

2018
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution.
Symmetry, 2018

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices.
Softw. Pract. Exp., 2017

A keyed-hashing based self-synchronization mechanism for port address hopping communication.
Frontiers Inf. Technol. Electron. Eng., 2017

RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks.
IEICE Trans. Inf. Syst., 2017

A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

PriMal: Cloud-Based Privacy-Preserving Malware Detection.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing.
Secur. Commun. Networks, 2016

Comparing Performance of Hierarchical Identity-Based Signature Schemes.
IEICE Trans. Inf. Syst., 2016

Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Security, trust, and resilience of distributed networks and systems.
Secur. Commun. Networks, 2015

Trust Description and Propagation System: Semantics and axiomatization.
Knowl. Based Syst., 2015

RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

RScam: Cloud-Based Anti-Malware via Reversible Sketch.
Proceedings of the Security and Privacy in Communication Networks, 2015

OpenSRN: A software-defined semantic routing network architecture.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

An Efficient Unsavory Data Detection Method for Internet Big Data.
Proceedings of the Information and Communication Technology, 2015

An Efficient Pre-filter to Accelerate Regular Expression Matching.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Removing Key Escrow from the LW-HIBE Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks.
J. Networks, 2014

ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things.
Future Gener. Comput. Syst., 2014

A Semantic-Based Malware Detection System Design Based on Channels.
Proceedings of the Information and Communication Technology, 2014

An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources.
Proceedings of the Information and Communication Technology, 2014

POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences.
Math. Comput. Model., 2013

A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing.
Math. Comput. Model., 2013

Characterization of OSPF Convergence with Correlated Failures.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Location Management Algorithm for LEO Satellite Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
RLM: A General Model for Trust Representation and Aggregation.
IEEE Trans. Serv. Comput., 2012

Flexible multi-authority attribute-based signature schemes for expressive policy.
Mob. Inf. Syst., 2012

A new multistage approach to detect subtle DDoS attacks.
Math. Comput. Model., 2012

VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks.
Proceedings of the Third FTRA International Conference on Mobile, 2012

Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Collaborative detection of DDoS attacks based on chord protocol.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

2011
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm.
Future Gener. Comput. Syst., 2011

Authenticating with Attributes in Online Social Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

Multi-authority Attribute-Based Signature.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2010
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks.
Proceedings of the 39th International Conference on Parallel Processing, 2010

2009
Research on Trust Evaluation Model Based on TPM.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009


  Loading...