Xin Huang

Orcid: 0000-0002-1668-9696

Affiliations:
  • Taiyuan University of Technology, China
  • Xi'an Jiaotong-Liverpool University, Department of Computer Science and Software Engineering, Suzhou, China
  • University of Oxford, Department of Computer Science, UK (PhD 2014)
  • Mid Sweden University, ITM/IKS, Sundsvall, Sweden


According to our database1, Xin Huang authored at least 49 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
SFIOT: Software-Defined Function for the IoT.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

2021
Leakage-Resilient Authenticated Key Exchange for Edge Artificial Intelligence.
IEEE Trans. Dependable Secur. Comput., 2021

OpenFunction for Software Defined IoT.
Proceedings of the International Symposium on Networks, Computers and Communications, 2021

Improve Transparency and Credibility of Students' Educational Records using School Operated Blockchain System.
Proceedings of the 4th International Conference on Information and Computer Technologies, 2021

2020
Grade Setting of a Timber Logistics Center Based on a Complex Network: A Case Study of 47 Timber Trading Markets in China.
Inf., 2020

Formal Analysis of Smart Contract Based on Colored Petri Nets.
IEEE Intell. Syst., 2020

2019
A Survey on an Emerging Area: Deep Learning for Smart City Data.
IEEE Trans. Emerg. Top. Comput. Intell., 2019

Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios.
IEEE Internet Things J., 2019

Semi-Unsupervised Lifelong Learning for Sentiment Classification: Less Manual Data Annotation and More Self-Studying.
Proceedings of the 2019 3rd High Performance Computing and Cluster Technologies Conference (HPCCT 2019) and of the 2nd International Conference on Big Data and Artificial Intelligence (BDAI 2019), Guangzhou, China, June 22, 2019

2018
Identification of Location Spoofing in Wireless Sensor Networks in Non-Line-of-Sight Conditions.
IEEE Trans. Ind. Informatics, 2018

Improve Blockchain Performance using Graph Data Structure and Parallel Mining.
CoRR, 2018

A Handshake Protocol With Unbalanced Cost for Wireless Updating.
IEEE Access, 2018

Formal Verification of Smart Contracts from the Perspective of Concurrency.
Proceedings of the Smart Blockchain - First International Conference, 2018

Boost Blockchain Broadcast Propagation with Tree Routing.
Proceedings of the Smart Blockchain - First International Conference, 2018

A Blockchain Based Data Management System for Energy Trade.
Proceedings of the Smart Blockchain - First International Conference, 2018

Session Key Agreement for End-to-End Security in Time-Synchronized Networks.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Support Context-Adaptation in the Constrained Application Protocol (CoAP).
Proceedings of the Service-Oriented Computing - ICSOC 2018 Workshops, 2018

Lifelong Machine Learning: Outlook and Direction.
Proceedings of the 2nd International Conference on Big Data Research, 2018

Contexts-States-Aware Access Control for Internet of Things.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Predicting Seminal Quality Using Back-Propagation Neural Networks with Optimal Feature Subsets.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018

2017
Distributed sensor data computing in smart city applications.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

A Role-Based Access Control System for Intelligent Buildings.
Proceedings of the Network and System Security - 11th International Conference, 2017

A Denial of Service Attack Method for IoT System in Photovoltaic Energy System.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Localizing Multiple Objects Using Radio Tomographic Imaging Technology.
IEEE Trans. Veh. Technol., 2016

An Improved Protocol for the Password Authenticated Association of IEEE 802.15.6 Standard That Alleviates Computational Burden on the Node.
Symmetry, 2016

SecIoT: a security framework for the Internet of Things.
Secur. Commun. Networks, 2016

Security protocols in body sensor networks using visible light communications.
Int. J. Commun. Syst., 2016

A Secure System For Pervasive Social Network-Based Healthcare.
IEEE Access, 2016

S2Net: A Security Framework for Software Defined Intelligent Building Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

POSTER: A Framework for IoT Reprogramming.
Proceedings of the Security and Privacy in Communication Networks, 2016

An Access Control System for Intelligent Buildings.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

Linear programming algorithms for sensor networks node localization.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

2015
Software Defined Intelligent Building.
Int. J. Inf. Secur. Priv., 2015

A Study of IEEE 802.15.6 Association Protocols.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Study on the Reliability of Software Defined Wireless Sensor Network.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

An improved IEEE 802.15.6 password authenticated association protocol.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Identity-Based Association Protocols for Wireless Personal Area Networks.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

Pervasive Information Visualization: Toward an Information Visualization Design Methodology for Multi-device Co-located Synchronous Collaboration.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

The Mobile Tree Browser: A Space Filling Information Visualization for Browsing Labelled Hierarchies on Mobile Devices.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Multi-channel security protocols in personal networks.
PhD thesis, 2014

Usable Security Mechanisms in Smart Building.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Human interactive secure key and identity exchange protocols in body sensor networks.
IET Inf. Secur., 2013

2012
Human Interactive Secure ID Management in Body Sensor Networks.
J. Networks, 2012

Bootstrapping body sensor networks using human controlled LED-camera channels.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

User interactive Internet of things privacy preserved access control.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Improving RSS-Based Ranging in LOS-NLOS Scenario Using GMMs.
IEEE Commun. Lett., 2011

Body sensor network key distribution using human interactive channels.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

2010
Sensor Aided Authentication.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

2009
Privacy of Value-Added Context-Aware Service Cloud.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009


  Loading...