default search action
Xiaofeng Wang 0002
Person information
- affiliation (PhD 2009): National University of Defense Technology, School of Computer Science, Changsha, China
Other persons with the same name
- Xiaofeng Wang (aka: Xiao-Feng Wang) — disambiguation page
- Xiaofeng Wang 0001 — Free University of Bozen-Bolzano, Faculty of Computer Science, Italy
- Xiaofeng Wang 0003 — Bohai University, School of Mathematics and Physics, Jinzhou, China (and 1 more)
- Xiaofeng Wang 0004 — Shanghai Jiao Tong University, School of Eectronic Information and Electrical Engineering, China
- Xiaofeng Wang 0005 — Louisiana Tech University, Department of Mathematics, Ruston, LA, USA (and 2 more)
- XiaoFeng Wang 0001 (aka: Xiaofeng Wang 0006) — Indiana University Bloomington, School of Informatics and Computing, IN, USA
- Xiaofeng Wang 0007 — University of South Carolina, Department of Electrical Engineering, Columbia, SC, USA (and 2 more)
- Xiaofeng Wang 0008 — Ryerson University, Department of Electrical and Computer Engineering, Toronto, ON, Canada
- Xiaofeng Wang 0009 (aka: Xiao-Feng Wang 0009) — Hefei University, Big Data Technology Application for Urban Infrastructure, School of Artificial Intelligence and Big Data, China
- Xiaofeng Wang 0010 — University of South Carolina, Columbia, SC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j25]Pengkun Li, Jinshu Su, Xiaofeng Wang, Qianqian Xing:
DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability. Secur. Commun. Networks 2021: 1974493:1-1974493:17 (2021) - 2020
- [j24]Wenzheng Liu, Xiaofeng Wang, Wei Peng:
Secure Remote Multi-Factor Authentication Scheme Based on Chaotic Map Zero-Knowledge Proof for Crowdsourcing Internet of Things. IEEE Access 8: 8754-8767 (2020) - [j23]Wenzheng Liu, Xiaofeng Wang, Wei Peng:
State of the Art: Secure Mobile Payment. IEEE Access 8: 13898-13914 (2020) - [j22]Jie Li, Rongmao Chen, Jinshu Su, Xinyi Huang, Xiaofeng Wang:
ME-TLS: Middlebox-Enhanced TLS for Internet-of-Things Devices. IEEE Internet Things J. 7(2): 1216-1229 (2020) - [j21]Pengkun Li, Jinshu Su, Xiaofeng Wang:
iTLS: Lightweight Transport-Layer Security Protocol for IoT With Minimal Latency and Perfect Forward Secrecy. IEEE Internet Things J. 7(8): 6828-6841 (2020) - 2019
- [j20]Wenzheng Liu, Xiaofeng Wang, Wei Peng, Qianqian Xing:
Center-Less Single Sign-On With Privacy-Preserving Remote Biometric-Based ID-MAKA Scheme for Mobile Cloud Computing Services. IEEE Access 7: 137770-137783 (2019) - [j19]Jie Li, Jinshu Su, Rongmao Chen, Xiaofeng Wang, Shuhui Chen:
Practical privacy-preserving deep packet inspection outsourcing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j18]Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You:
Toward efficient authentication for space-air-ground integrated Internet of things. Int. J. Distributed Sens. Networks 15(7) (2019) - [j17]Lin Liu, Jinshu Su, Ximeng Liu, Rongmao Chen, Kai Huang, Robert H. Deng, Xiaofeng Wang:
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data. IEEE Internet Things J. 6(6): 9841-9852 (2019) - 2018
- [j16]Qianqian Xing, Baosheng Wang, Xiaofeng Wang:
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution. Symmetry 10(9): 408 (2018) - 2017
- [j15]Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Bo-Feng Zhang, Wei Hu:
RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks. IEICE Trans. Inf. Syst. 100-D(3): 496-510 (2017) - [j14]Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Bo-Feng Zhang:
A keyed-hashing based self-synchronization mechanism for port address hopping communication. Frontiers Inf. Technol. Electron. Eng. 18(5): 719-728 (2017) - [j13]Hao Sun, Xiaofeng Wang, Rajkumar Buyya, Jinshu Su:
CloudEyes: Cloud-based malware detection with reversible sketch for resource-constrained internet of things (IoT) devices. Softw. Pract. Exp. 47(3): 421-441 (2017) - 2016
- [j12]Peixin Chen, Yilun Wu, Jinshu Su, Xiaofeng Wang:
Comparing Performance of Hierarchical Identity-Based Signature Schemes. IEICE Trans. Inf. Syst. 99-D(12): 3181-3184 (2016) - [j11]Peixin Chen, Jinshu Su, Baokang Zhao, Xiaofeng Wang, Ilsun You:
An escrow-free online/offline HIBS scheme for privacy protection of people-centric sensing. Secur. Commun. Networks 9(14): 2302-2312 (2016) - 2015
- [j10]Xiaofeng Wang, Jinshu Su, Baosheng Wang, Guojun Wang, Ho-fung Leung:
Trust Description and Propagation System: Semantics and axiomatization. Knowl. Based Syst. 90: 81-91 (2015) - [j9]Jinshu Su, Xiaofeng Wang, Weisong Shi, Indrakshi Ray:
Security, trust, and resilience of distributed networks and systems. Secur. Commun. Networks 8(10): 1829-1830 (2015) - 2014
- [j8]Jinshu Su, Dan Cao, Baokang Zhao, Xiaofeng Wang, Ilsun You:
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Future Gener. Comput. Syst. 33: 11-18 (2014) - [j7]Yanpeng Ma, Xiaofeng Wang, Jinshu Su, Chunqing Wu, Wanrong Yu, Baokang Zhao:
A Multicast Routing Algorithm for Datagram Service in Delta LEO Satellite Constellation Networks. J. Networks 9(4): 896-907 (2014) - 2013
- [j6]Huabiao Lu, Xiaofeng Wang, Baokang Zhao, Fei Wang, Jinshu Su:
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences. Math. Comput. Model. 58(5-6): 1140-1154 (2013) - [j5]Dan Cao, Baokang Zhao, Jinshu Su, Baosheng Wang, Xiaofeng Wang:
A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing. Math. Comput. Model. 58(5-6): 1175-1188 (2013) - 2012
- [j4]Fei Wang, Hailong Wang, Xiaofeng Wang, Jinshu Su:
A new multistage approach to detect subtle DDoS attacks. Math. Comput. Model. 55(1-2): 198-213 (2012) - [j3]Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su:
Flexible multi-authority attribute-based signature schemes for expressive policy. Mob. Inf. Syst. 8(3): 255-274 (2012) - [j2]Xiaofeng Wang, Ling Liu, Jinshu Su:
RLM: A General Model for Trust Representation and Aggregation. IEEE Trans. Serv. Comput. 5(1): 131-143 (2012) - 2011
- [j1]Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su:
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm. Future Gener. Comput. Syst. 27(8): 1124-1134 (2011)
Conference and Workshop Papers
- 2022
- [c38]Xiaoyan Wu, Xiaofeng Wang, Qianqian Xing:
Identity-Based Authentication Protocol for Trustworthy IP Address. ICCNS 2022: 58-63 - 2020
- [c37]Wenzheng Liu, Xiaofeng Wang, Wei Peng:
NCZKP Based Privacy-Preserving Authentication Scheme for the Untrusted Gateway Node Smart Home Environment. ISCC 2020: 1-6 - 2019
- [c36]Pengkun Li, Jinshu Su, Xiaofeng Wang:
iTLS/iDTLS: Lightweight End-to-End Security Protocol for IoT Through Minimal Latency. SIGCOMM Posters and Demos 2019: 166-168 - 2018
- [c35]Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. ACISP 2018: 431-451 - 2017
- [c34]Hao Sun, Jinshu Su, Xiaofeng Wang, Rongmao Chen, Yujing Liu, Qiaolin Hu:
PriMal: Cloud-Based Privacy-Preserving Malware Detection. ACISP (2) 2017: 153-172 - [c33]Qianqian Xing, Baosheng Wang, Xiaofeng Wang:
POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security. CCS 2017: 2591-2593 - [c32]Jie Li, Jinshu Su, Xiaofeng Wang, Hao Sun, Shuhui Chen:
CloudDPI: Cloud-Based Privacy-Preserving Deep Packet Inspection via Reversible Sketch. CSS 2017: 119-134 - [c31]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Yong Tang, Yi Wang:
Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters. GLOBECOM 2017: 1-6 - [c30]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu:
A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks. TrustCom/BigDataSE/ICESS 2017: 89-95 - 2016
- [c29]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Peixin Chen, Bo Yu, Yong Tang, Xianming Gao:
Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security. HPCC/SmartCity/DSS 2016: 430-437 - 2015
- [c28]Peixin Chen, Xiaofeng Wang, Baokang Zhao, Hao Sun, Jinshu Su, Ilsun You:
An Escrow-Free Hierarchical Identity-Based Signature Scheme from Composite Order Bilinear Groups. BWCCA 2015: 364-369 - [c27]Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou:
POSTER: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol. CCS 2015: 1632-1634 - [c26]Peixin Chen, Xiaofeng Wang, Jinshu Su:
A Hierarchical Identity-Based Signature from Composite Order Bilinear Groups. ICA3PP (Workshops and Symposiums) 2015: 46-56 - [c25]Chengcheng Xu, Shuhui Chen, Xiaofeng Wang, Jinshu Su:
An Efficient Pre-filter to Accelerate Regular Expression Matching. ICA3PP (Workshops and Symposiums) 2015: 111-119 - [c24]Peixin Chen, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Ilsun You:
Removing Key Escrow from the LW-HIBE Scheme. ICA3PP (Workshops and Symposiums) 2015: 593-605 - [c23]Peixin Chen, Xiaofeng Wang, Jinshu Su:
An Escrow-Free Hierarchical Identity-Based Signature Model for Cloud Storage. ICA3PP (Workshops and Symposiums) 2015: 633-647 - [c22]Peige Ren, Xiaofeng Wang, Hao Sun, Fen Xu, Baokang Zhao, Chunqing Wu:
An Efficient Unsavory Data Detection Method for Internet Big Data. ICT-EurAsia/CONFENIS 2015: 213-220 - [c21]Peige Ren, Xiaofeng Wang, Baokang Zhao, Chunqing Wu, Hao Sun:
OpenSRN: A software-defined semantic routing network architecture. INFOCOM Workshops 2015: 101-102 - [c20]Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen:
RScam: Cloud-Based Anti-Malware via Reversible Sketch. SecureComm 2015: 157-174 - [c19]Peixin Chen, Xiaofeng Wang, Jinshu Su:
T-HIBE: A Trustworthy HIBE Scheme for the OSN Privacy Protection. SocialSec 2015: 72-79 - [c18]Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Xiao-Feng Hu, Gui-Lin Cai, Hao Sun:
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries. TrustCom/BigDataSE/ISPA (1) 2015: 263-270 - 2014
- [c17]Xiaofeng Wang, Huan Zhou, Jinshu Su, Bofeng Zhang, Fan Yang:
POSTER: T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP. CCS 2014: 1520-1522 - [c16]Peige Ren, Xiaofeng Wang, Chunqing Wu, Baokang Zhao, Hao Sun:
A Semantic-Based Malware Detection System Design Based on Channels. ICT-EurAsia 2014: 653-662 - [c15]Peige Ren, Xiaofeng Wang, Hao Sun, Baokang Zhao, Chunqing Wu:
An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources. ICT-EurAsia 2014: 663-673 - 2013
- [c14]Huabiao Lu, Baokang Zhao, Xiaofeng Wang, Jinshu Su:
DiffSig: Resource Differentiation Based Malware Behavioral Concise Signature Generation. ICT-EurAsia 2013: 271-284 - [c13]Dan Zhao, Chunqing Wu, Xiaofeng Hu, Xiaofeng Wang, Baokang Zhao:
Characterization of OSPF Convergence with Correlated Failures. TrustCom/ISPA/IUCC 2013: 1351-1356 - [c12]Yanpeng Ma, Wei Peng, Xiaofeng Wang, Baokang Zhao, Jinshu Su, Chunqing Wu:
A Location Management Algorithm for LEO Satellite Networks. TrustCom/ISPA/IUCC 2013: 1362-1366 - 2012
- [c11]Yanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, Baokang Zhao, Xiaofeng Hu:
A Distribute and Geographic Information Based Routing Algorithm for LEO Satellite Constellation Networks. IMIS 2012: 433-438 - [c10]Zilong Han, Xiaofeng Wang, Fei Wang, Yongjun Wang:
Collaborative detection of DDoS attacks based on chord protocol. MASS Workshops 2012: 1-4 - [c9]Fei Wang, Xiaofeng Wang, Xiaofeng Hu, Jinshu Su:
Bitwise sketch for lightweight reverse IP reconstruction in network anomaly detection. MASS Workshops 2012: 1-4 - [c8]Yanpeng Ma, Jinshu Su, Chunqing Wu, Xiaofeng Wang, Wanrong Yu, Baokang Zhao, Xiaofeng Hu:
A Source-Based Share-Tree Like Multicast Routing in Satellite Constellation Networks. MUSIC 2012: 240-245 - [c7]Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao:
VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. TrustCom 2012: 215-222 - 2011
- [c6]Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su, Guofei Ji:
Multi-authority Attribute-Based Signature. INCoS 2011: 668-672 - [c5]Dan Cao, Baokang Zhao, Xiaofeng Wang, Jinshu Su, Yijiao Chen:
Authenticating with Attributes in Online Social Networks. NBiS 2011: 607-611 - 2010
- [c4]Jie Yu, Liming Lu, Zhoujun Li, Xiaofeng Wang, Jinshu Su:
A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks. ICPP 2010: 680-689 - 2009
- [c3]Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su:
Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. AINA 2009: 411-418 - [c2]Xiaofeng Wang, Rajkumar Buyya, Jinshu Su:
Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy. CCGRID 2009: 108-115 - [c1]Wei Ou, Xiaofeng Wang, Wenbao Han, Yongjun Wang:
Research on Trust Evaluation Model Based on TPM. FCST 2009: 593-597
Editorship
- 2013
- [e1]Jinshu Su, Baokang Zhao, Zhigang Sun, Xiaofeng Wang, Fei Wang, Ke Xu:
Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected Papers. Communications in Computer and Information Science 401, Springer 2013, ISBN 978-3-642-53958-9 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint