Xiaoyan Zhu

Orcid: 0000-0003-3741-9158

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
  • Xidian University, School of Telecommunications Engineering, Xi'an, China


According to our database1, Xiaoyan Zhu authored at least 87 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Spatio-Temporal Identity Multi-Graph Convolutional Network for Traffic Prediction in the Metaverse.
IEEE J. Sel. Areas Commun., March, 2024

IoT Route Planning Based on Spatiotemporal Interactive Attention Neural Network.
IEEE Internet Things J., 2024

2023
MSTL-GLTP: A Global-Local Decomposition and Prediction Framework for Wireless Traffic.
IEEE Internet Things J., 2023

A Survey on the Security of the Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

Social Networks Based Robust Federated Learning for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023

2021
Joint Connection and Content Embedding for Link Prediction in Social Networks.
Proceedings of the IEEE Global Communications Conference, 2021

Attention-aware Multi-encoder for Session-based Recommendation.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Medical Privacy-preserving Service Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

2019
Publicly Verifiable Boolean Query Over Outsourced Encrypted Data.
IEEE Trans. Cloud Comput., 2019

Differentially Privacy-preserving Social IoT.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Privacy-Preserving Pedestrian Detection for Smart City with Edge Computing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

A Novel User Membership Leakage Attack in Collaborative Deep Learning.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Deep Learning Based Customer Churn Analysis.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Edge Weight Differential Privacy Based Spectral Query Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Semantic-Based Dummy Generation Strategy for Location Privacy.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Research on Resolution Limit of Community Detection in Location-Based Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Time-Aware Dummy-Based Privacy Protection for Continuous LBSs.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Collective Influence Based Privacy Preservation for Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Topology Based Differential Privacy Scheme for Average Path Length Query.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Verification Code Recognition Based on Active and Deep Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Collaborative Deep Learning for Medical Image Analysis with Differential Privacy.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins.
IEEE Trans. Veh. Technol., 2017

2016
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.
IEEE Trans. Intell. Transp. Syst., 2016

Cooperative downloading with privacy preservation and access control for value-added services in VANETs.
Int. J. Grid Util. Comput., 2016

Context-aware location recommendations with tensor factorization.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Personalized Location Recommendations with Local Feature Awareness.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
Sensors, 2015

A novel attack to spatial cloaking schemes in location-based services.
Future Gener. Comput. Syst., 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

G2G: Privacy-preserving group matching for proximity-based mobile social networks.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Privacy-preserving use of genomic data on mobile devices.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Cloud-assisted privacy-preserving genetic paternity test.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Protecting router cache privacy in named data networking.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Efficient private matching based on blind signature for proximity-based mobile social networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Verification of Boolean Queries over Outsourced Encrypted Data Based on Counting Bloom Filter.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wirel. Pers. Commun., 2014

Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2014

Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Efficient Weight-based Private Matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

Using dynamic pseudo-IDs to protect privacy in location-based services.
Proceedings of the IEEE International Conference on Communications, 2014

Two-party and multi-party private matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer.
Wirel. Networks, 2012

Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

CPTT: A high-throughput coding-aware routing metric for multi-hop wireless networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue.
IEEE J. Sel. Areas Commun., 2011

Efficient trust based information sharing schemes over distributed collaborative networks.
Proceedings of the MILCOM 2011, 2011

C4: A new paradigm for providing incentives in multi-hop wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network.
Proceedings of the Global Communications Conference, 2011

A Multi-Hop Privacy-Preserving Reputation Scheme in Online Social Networks.
Proceedings of the Global Communications Conference, 2011

Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
How to secure multi-domain wireless mesh networks.
Wirel. Networks, 2010

Privacy and emergency response in e-healthcare leveraging wireless body sensor networks.
IEEE Wirel. Commun., 2010

Threshold optimization for rate adaptation algorithms in IEEE 802.11 WLANs.
IEEE Trans. Wirel. Commun., 2010

MABS: Multicast Authentication Based on Batch Signature.
IEEE Trans. Mob. Comput., 2010

Privacy and security for online social networks: challenges and opportunities.
IEEE Netw., 2010

A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks.
Proceedings of the Global Communications Conference, 2010

2009
A batched network coding scheme for wireless networks.
Wirel. Networks, 2009

Securing resource-constrained wireless ad hoc networks.
IEEE Wirel. Commun., 2009

Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure.
IEEE Trans. Veh. Technol., 2009

On the improvement of scaling laws for large-scale MANETs with network coding.
IEEE J. Sel. Areas Commun., 2009

Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Rethinking Thresholds-Based Rate Adaptation Algorithms: A Reverse Engineering Perspective.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

C and M: A New Network Coding Scheme for Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...