Xixiang Lv

Orcid: 0000-0003-2879-241X

According to our database1, Xixiang Lv authored at least 30 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
VerFHS: Verifiable Image Retrieval on Forward Privacy in Blockchain-Enabled IoT.
IEEE Internet Things J., October, 2023

AFL: Attention-Based Byzantine-Robust Federated Learning with Vector Filter.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Message-Locked Searchable Encryption: A New Versatile Tool for Secure Cloud Storage.
IEEE Trans. Serv. Comput., 2022

2021
SPChain: Blockchain-based medical data sharing and privacy-preserving eHealth system.
Inf. Process. Manag., 2021

2020
Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes.
Secur. Commun. Networks, 2020

BCMIX: A Dynamic Self-organizing Blockchain-based Mix Anonymous System.
CoRR, 2020

Beam Management for Cellular-Connected UAVs: A Fast Link Recovery Approach.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

An Enhanced Handover Scheme for Cellular-Connected UAVs.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Blockchain-based photo forensics with permissible transformations.
Comput. Secur., 2019

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019

Malicious Web Request Detection Using Character-Level CNN.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Physical Layer Security of OFDM Communication Using Artificial Pilot Noise.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
2P-DNN : Privacy-Preserving Deep Neural Networks Based on Homomorphic Cryptosystem.
CoRR, 2018

2015
Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs.
IEEE Trans. Dependable Secur. Comput., 2015

Key management for Smart Grid based on asymmetric key-wrapping.
Int. J. Comput. Math., 2015

2014
Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs.
IEEE Trans. Inf. Forensics Secur., 2014

Indistinguishable against adaptive chosen ciphertext attack secure public key cryptosystem with double trapdoor decryption mechanism.
Secur. Commun. Networks, 2014

Loss-tolerant authentication with digital signatures.
Secur. Commun. Networks, 2014

Authenticated asymmetric group key agreement based on certificateless cryptosystem.
Int. J. Comput. Math., 2014

Error- and loss-tolerant bundle fragment authentication for space DTNs.
Frontiers Comput. Sci., 2014

2013
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
Secur. Commun. Networks, 2013

Key distribution for heterogeneous public-key cryptosystems.
J. Commun. Networks, 2013

Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks.
IET Inf. Secur., 2013

2012
Group key agreement for secure group communication in dynamic peer systems.
J. Parallel Distributed Comput., 2012

Group Key Agreement From Signcryption.
KSII Trans. Internet Inf. Syst., 2012

2011
Identity-based key distribution for mobile Ad Hoc networks.
Frontiers Comput. Sci. China, 2011

2010
ID-based authenticated group key agreement from bilinear maps.
Frontiers Comput. Sci. China, 2010

2005
Efficient Traitor Tracing Scheme Based On NTRU.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Broadcast Encryption Using Identity-Based Public-Key Cryptosystem.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...