Xiaomei Dong

According to our database1, Xiaomei Dong authored at least 16 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Mutual Aid Service Scheme Based on Blockchain and Attribute-Based Encryption in Time Bank.
Proceedings of the Web Information Systems and Applications, 2023

Will Data Sharing Scheme Based on Blockchain and Weighted Attribute-Based Encryption.
Proceedings of the Web Information Systems and Applications, 2023

Short Repudiable Ring Signature: Constant Size and Less Overhead.
Proceedings of the Web Information Systems and Applications, 2023

2022
Patient-Friendly Medical Data Security Sharing Scheme Based on Blockchain and Proxy Re-encryption.
Proceedings of the Web Information Systems and Applications, 2022

A Blockchain-Based Scheme for Efficient Medical Data Sharing with Attribute-Based Hierarchical Encryption.
Proceedings of the Web Information Systems and Applications, 2022

2020
Solving a Class of Variational Inequality Problems with a New Inexact Strategy.
Asia Pac. J. Oper. Res., 2020

2019
A Cache Based Countermeasure Against DDoS Attacks in Xen.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

2013
Malicious code forensics based on data mining.
Proceedings of the 10th International Conference on Fuzzy Systems and Knowledge Discovery, 2013

2011
A Secure Data Aggregation Approach Based on Monitoring in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

2010
Online Botnet Detection Based on Incremental Discrete Fourier Transform.
J. Networks, 2010

A novel Bot detection algorithm based on API call correlation.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

2009
An Immune Based Relational Database Intrusion Detection Algorithm.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

2005
Correlating Alerts with a Data Mining Based Approach.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange.
Proceedings of the Pacific Asia Conference on Information Systems, 2004

A Hybrid Machine Learning/Statistical Model of Grid Security.
Proceedings of the Grid and Cooperative Computing, 2004

2000
A Virtual Private Network for Virtual Enterprise Information Systems.
Proceedings of the Web-Age Information Management, First International Conference, 2000


  Loading...