default search action
Xingwen Zhao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Jiayin Cai, Hongjie Zhang, Zhilin Duo, Xuan Wang, Xingwen Zhao:
A Multi-Group-Supporting Policy Hidden Fine-Grained Data Sharing Scheme in 5G-Enabled IoT With Edge Computing. IEEE Access 12: 46362-46378 (2024) - [j22]Tianyu Zheng, Bingyu Gong, Xiangdong Li, Xingwen Zhao, Yanbo Zhang:
A Novel Method for Measuring the Attitude Angles of the Artillery Barrel Based on Monocular Vision. IEEE Access 12: 155125-155135 (2024) - [j21]Xingwen Zhao, Han Zhang, Hui Li, Xuangui Chen:
Open set identification of malicious encrypted traffic based on multi-feature fusion. Comput. Networks 254: 110824 (2024) - [j20]Kai Fan, Jingtao Hong, Wenjie Li, Xingwen Zhao, Hui Li, Yintang Yang:
FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning. IEEE Internet Things J. 11(2): 1816-1826 (2024) - [j19]Xingwen Zhao, Luhui Gan, Kai Fan:
Privacy-Preserving Spatial Keyword Search With Lightweight Access Control in Cloud Environments. IEEE Internet Things J. 11(7): 12377-12387 (2024) - [j18]Xuefei Cao, Lanjun Dang, Kai Fan, Xingwen Zhao, Yulong Fu, Yingzi Luan:
A Dynamic and Efficient Self-Certified Authenticated Group Key Agreement Protocol for VANET. IEEE Internet Things J. 11(17): 29146-29156 (2024) - [j17]Haonan Yan, Xiaoguang Li, Wenjing Zhang, Rui Wang, Hui Li, Xingwen Zhao, Fenghua Li, Xiaodong Lin:
Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems. IEEE Trans. Dependable Secur. Comput. 21(1): 153-167 (2024) - 2023
- [j16]Xingwen Zhao, Dexin Li:
A Lightweight User Authentication Scheme for Multi-Gateway Based Wireless Sensor Networks Using Rabin Cryptosystem. IEEE Access 11: 79874-79889 (2023) - 2022
- [j15]Haonan Yan, Xiaoguang Li, Rui Dai, Hui Li, Xingwen Zhao, Fenghua Li:
MARS: Automated Protocol Analysis Framework for Internet of Things. IEEE Internet Things J. 9(19): 18333-18345 (2022) - [j14]Xinyin Xiang, Xingwen Zhao:
Blockchain-assisted searchable attribute-based encryption for e-health systems. J. Syst. Archit. 124: 102417 (2022) - [j13]Xingwen Zhao, Dexin Li, Hui Li:
Practical Three-Factor Authentication Protocol Based on Elliptic Curve Cryptography for Industrial Internet of Things. Sensors 22(19): 7510 (2022) - [c11]Xinxin Zhang, Yanbo Zhang, Xiangdong Li, Xingwen Zhao, Guang Yan:
Research on Range Profile Target Detection Algorithm of Stepped-Frequency Ground Penetrating Radar. EITCE 2022: 1878-1881 - [c10]Liang Yin, Zhilin Duo, Haoyang Yu, Xingwen Zhao:
Certificate-based Enterprise Privacy Analysis and Anomaly Discovery. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2333-2339
2010 – 2019
- 2019
- [c9]Haonan Yan, Hui Li, Mingchi Xiao, Rui Dai, Xianchun Zheng, Xingwen Zhao, Fenghua Li:
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis. GLOBECOM 2019: 1-6 - 2018
- [j12]Xinyin Xiang, Xingwen Zhao:
Continuous leakage-resilient IBE in cloud computing. Int. J. Commun. Syst. 31(10) (2018) - 2017
- [j11]Xingwen Zhao, Hui Li:
Privacy Preserving Data-Sharing Scheme in Content-Centric Networks Against Collusion Name Guessing Attacks. IEEE Access 5: 23182-23189 (2017) - [j10]Xingwen Zhao, Jiaping Lin, Hui Li:
Privacy-Preserving Billing Scheme against Free-Riders for Wireless Charging Electric Vehicles. Mob. Inf. Syst. 2017: 1325698:1-1325698:9 (2017) - [c8]Jiaping Lin, Xingwen Zhao, Hui Li:
Target: category-based android malware detection revisited. ACSW 2017: 74:1-74:9 - [c7]Xingwen Zhao, Hui Li:
Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service. CSS 2017: 396-410 - [c6]Lin Zhang, Tianying Chang, Xingwen Zhao, Yanbo Zhang, Hong-Liang Cui:
Research on the remote assistance system of through-the-wall radar based on wireless network security communication. ICAIT 2017: 270-274 - 2016
- [j9]Xinyin Xiang, Hui Li, Mingyu Wang, Xingwen Zhao:
Efficient multi-party concurrent signature from lattices. Inf. Process. Lett. 116(8): 497-502 (2016) - 2014
- [j8]Xingwen Zhao, Hui Li:
Achieving dynamic privileges in secure data sharing on cloud storage. Secur. Commun. Networks 7(11): 2211-2224 (2014) - [c5]Xingwen Zhao, Gaofei Zhao, Hui Li:
Generic Codes Based Traitor Tracing and Revoking Scheme from Attribute-Based Encryption. CIT 2014: 299-306 - 2012
- [j7]Xingwen Zhao, Fangguo Zhang:
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. Comput. Secur. 31(1): 59-69 (2012) - [j6]Xingwen Zhao:
Amendment to Trace and Revoke Systems with Short Ciphertexts. Int. J. Netw. Secur. 14(5): 251-256 (2012) - [j5]Xingwen Zhao, Fangguo Zhang:
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature. Informatica (Slovenia) 36(1): 75-82 (2012) - [j4]Xingwen Zhao, Fangguo Zhang:
Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J. Syst. Softw. 85(3): 708-716 (2012) - [c4]Xingwen Zhao, Hui Li:
Codes Based Tracing and Revoking Scheme with Constant Ciphertext. ProvSec 2012: 318-335 - 2011
- [j3]Xingwen Zhao, Fangguo Zhang, Haibo Tian:
Dynamic asymmetric group key agreement for ad hoc networks. Ad Hoc Networks 9(5): 928-939 (2011) - [j2]Xingwen Zhao, Fangguo Zhang:
A New Type of ID-based Encryption System and Its Application to Pay-TV Systems. Int. J. Netw. Secur. 13(3): 161-166 (2011) - [j1]Xingwen Zhao, Fangguo Zhang:
Analysis on Hu et al.'s Identity-based Broadcast Encryption. Int. J. Netw. Secur. 13(3): 178-180 (2011) - [c3]Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration. ISPEC 2011: 302-316 - [i1]Xingwen Zhao, Fangguo Zhang:
Traitor Tracing against Public Collaboration (Full Version). IACR Cryptol. ePrint Arch. 2011: 84 (2011)
2000 – 2009
- 2009
- [c2]Xingwen Zhao, Lili Jiang, Xiaoying Xi, Muzhi Li:
Heuristic Optimization Algorithm for Task Assignment in Collaborative Project Based on CITIS. CAR 2009: 481-484 - [c1]Fangguo Zhang, Xingwen Zhao, Xiaofeng Chen:
ID-Based Adaptive Oblivious Transfer. WISA 2009: 133-147
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint