Xizhao Luo

Orcid: 0000-0002-4294-1365

According to our database1, Xizhao Luo authored at least 27 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PAM<sup>3</sup>S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
IEEE/ACM Trans. Netw., February, 2024

MCHFormer: A Multi-Cross Hybrid Former of Point-Image for 3D Object Detection.
IEEE Trans. Intell. Veh., January, 2024

Accelerating Point-Voxel Representation of 3-D Object Detection for Automatic Driving.
IEEE Trans. Artif. Intell., January, 2024

Enabling Secure and Flexible Streaming Media With Blockchain Incentive.
IEEE Internet Things J., January, 2024

2023
An efficient 3D object detection method based on Fast Guided Anchor Stereo RCNN.
Adv. Eng. Informatics, August, 2023

F-PVNet: Frustum-Level 3-D Object Detection on Point-Voxel Feature Representation for Autonomous Driving.
IEEE Internet Things J., 2023

2022
Dynamic Multitarget Detection Algorithm of Voxel Point Cloud Fusion Based on PointRCNN.
IEEE Trans. Intell. Transp. Syst., 2022

A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

PIPC: Privacy- and Integrity-Preserving Clustering Analysis for Load Profiling in Smart Grids.
IEEE Internet Things J., 2022

2021
Multi-View Gait Image Generation for Cross-View Gait Recognition.
IEEE Trans. Image Process., 2021

Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System.
IEEE Trans. Ind. Informatics, 2021

Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns.
IEEE Internet Things J., 2021

Generating Audio Adversarial Examples with Ensemble Substituted Models.
Proceedings of the ICC 2021, 2021

2020
An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks.
IEEE Trans. Veh. Technol., 2020

Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020

Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence.
IEEE Trans. Ind. Informatics, 2020

Cecoin: A decentralized PKI mitigating MitM attacks.
Future Gener. Comput. Syst., 2020

Achieving Privacy-preserving Federated Learning with Irrelevant Updates over E-Health Applications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Fully distributed certificateless threshold signature without random oracles.
Sci. China Inf. Sci., 2018

A Social-Network-Based Cryptocurrency Wallet-Management Scheme.
IEEE Access, 2018

2015
Multilength Optical Orthogonal Codes: New Upper Bounds and Optimal Constructions.
IEEE Trans. Inf. Theory, 2015

2014
Multi-user Searchable Encryption with Coarser-Grained Access Control without Key Sharing.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

2010
Leakage-resilient identity-based encryption scheme.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2008
Trust Mechanism in Distributed Access Control Model of P2P Networks.
Proceedings of the 7th IEEE/ACIS International Conference on Computer and Information Science, 2008


  Loading...