Xuanxia Yao

Orcid: 0000-0002-1901-8388

According to our database1, Xuanxia Yao authored at least 32 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Design and implementation of trusted boot based on a new trusted computing dual-architecture.
Comput. Secur., April, 2023

Android malware detection based on sensitive features combination.
Concurr. Comput. Pract. Exp., 2023

2021
Security and privacy issues of physical objects in the IoT: Challenges and opportunities.
Digit. Commun. Networks, 2021

A Hybrid Recommender System based on DeepCF and Wide Linear Model for K12 Online Education.
Proceedings of the AICCC 2021: 4th Artificial Intelligence and Cloud Computing Conference, Kyoto, Japan, December 17, 2021

2020
Advances in Position Based Routing Towards ITS Enabled FoG-Oriented VANET-A Survey.
IEEE Trans. Intell. Transp. Syst., 2020

2019
An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing.
IEEE Trans. Ind. Informatics, 2019

User stateless privacy-preserving TPA auditing scheme for cloud storage.
J. Netw. Comput. Appl., 2019

Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks.
IEEE Internet Things J., 2019

Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health.
IEEE Internet Things J., 2019

Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage.
Int. J. Netw. Secur., 2019

An improved clustering algorithm and its application in IoT data analysis.
Comput. Networks, 2019

A semantic-based inference control algorithm for OWL repository privacy protection.
Comput. Networks, 2019

Using Deep Learning in Semantic Classification for Point Cloud Data.
IEEE Access, 2019

A Privacy Aware Architecture for IoT Enabled Systems.
Proceedings of the 2019 IEEE SmartWorld, 2019

Access Control for Physical Objects in Internet of Things.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
Consistent Data Collection and Assortment in the Progression of Continuous Objects in IoT.
IEEE Access, 2018

GRE: An Adaptive and Personalized Exercise Model for K-12 Online Education.
Proceedings of the 2018 2nd International Conference on Education and E-Learning, 2018

2017
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things.
IEEE Internet Things J., 2017

Using trust model to ensure reliable data acquisition in VANETs.
Ad Hoc Networks, 2017

An Improved Clustering Algorithm and Its Application in WeChat Sports Users Analysis.
Proceedings of the 2017 International Conference on Identification, 2017

2016
Physical Unclonable Function Based Authentication Protocol for Unit IoT and Ubiquitous IoT.
Proceedings of the International Conference on Identification, 2016

2015
A lightweight attribute-based encryption scheme for the Internet of Things.
Future Gener. Comput. Syst., 2015

Anonymous Credential-Based Access Control Scheme for Clouds.
IEEE Cloud Comput., 2015

RFID System Mutual Authentication Protocols Based on ECC.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
A lightweight access control mechanism for mobile cloud computing.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

A light-weight certificate-less public key cryptography scheme based on ECC.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A lightweight dynamic multicast authentication scheme.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2013
A Task Scheduling Algorithm for Multi-core Processors.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013

2008
A Hexagon-based Key Pre-distribution Scheme for Large Scale Static Wireless Sensor Networks.
J. Commun., 2008

A Secure Routing Scheme Based on Multiple Criteria Decision Making in Wireless Sensor Networks.
Proceedings of the PACIIA 2008, 2008

A Secure Routing Scheme for Static Wireless Sensor Networks.
Proceedings of the PACIIA 2008, 2008

A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...