Xinguang Peng

Orcid: 0000-0001-5996-024X

According to our database1, Xinguang Peng authored at least 25 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
One More Accuracy k-Anonymity Framework for LBS.
Mob. Inf. Syst., 2019

Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks.
Int. J. Netw. Secur., 2019

2018
Joint classification of complementary features based on multitask compressive sensing with application to synthetic aperture radar automatic target recognition.
J. Electronic Imaging, 2018

2017
A novel active contour model for image segmentation using local and global region-based information.
Mach. Vis. Appl., 2017

Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage.
Int. J. Netw. Secur., 2017

A framework of cloud service selection based on trust mechanism.
Int. J. Ad Hoc Ubiquitous Comput., 2017

2016
Unbalanced tree-formed verification data for trusted platforms.
Secur. Commun. Networks, 2016

A Chaotic Maps-Based Authentication Scheme for Wireless Body Area Networks.
Int. J. Distributed Sens. Networks, 2016

2015
主观信任评估模型与决策方法的研究 (Research of Subjective Trust Evaluation Model and Decision-making).
计算机科学, 2015

Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information.
J. Intell. Fuzzy Syst., 2015

Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing.
J. High Speed Networks, 2015

Trust-Based Scheduling Strategy for Cloud Workflow Applications.
Informatica, 2015

Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards.
Int. J. Netw. Secur., 2015

Trusted Validation for Geolocation of Cloud Data.
Comput. J., 2015

2014
Computer Crime Forensics Based on Improved Decision Tree Algorithm.
J. Networks, 2014

An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks.
Int. J. Distributed Sens. Networks, 2014

2013
Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment.
Proceedings of the Eighth International Conference on P2P, 2013

2011
Model of Trusted Dynamic Measurement Based on System Calls.
Proceedings of the Emerging Research in Web Information Systems and Mining, 2011

Web Application Security Based on Trusted Network Connection.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

The Research and Implementation of Heterogeneous Data Integration under Ontology Mapping Mechanism.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

2009
Trustworthy Web Service Security Risk Assessment Research.
Proceedings of the International Forum on Information Technology and Applications, 2009

2008
Robust Host Anomaly Detector Using Strong Isolation.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2006
Program Detection with Context Dependency for Collaborative Services.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2005
Anomaly Detection with High Deviations for System Security.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Anomaly detection of privileged program based on fuzzy segments.
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005


  Loading...