Guangquan Xu
Cited by
Cited by
Swift trust in a virtual temporary system: A model based on the Dempster-Shafer theory of belief functions
G Xu, Z Feng, H Wu, D Zhao
International Journal of Electronic Commerce 12 (1), 93-126, 2007
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks
DZ Sun, JX Li, ZY Feng, ZF Cao, GQ Xu
Personal and ubiquitous computing 17 (5), 895-905, 2013
E-AUA: An efficient anonymous user authentication protocol for mobile IoT
X Zeng, G Xu, X Zheng, Y Xiang, W Zhou
IEEE Internet of Things Journal 6 (2), 1506-1519, 2018
Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things
G Xu, Y Cao, Y Ren, X Li, Z Feng
IEEE Access 5, 21046-21056, 2017
A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks
G Xu, J Liu, Y Lu, X Zeng, Y Zhang, X Li
Journal of Network and Computer Applications 107, 83-92, 2018
CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems
G Xu, Y Zhang, AK Sangaiah, X Li, A Castiglione, X Zheng
Information Sciences 476, 505-515, 2019
Energy-efficient and trustworthy data collection protocol based on mobile fog computing in Internet of Things
T Wang, L Qiu, AK Sangaiah, G Xu, A Liu
IEEE Transactions on Industrial Informatics 16 (5), 3531-3539, 2019
AMTS: Adaptive multi-objective task scheduling strategy in cloud computing
H He, G Xu, S Pang, Z Zhao
China Communications 13 (4), 162-171, 2016
Attack tree based android malware detection with hybrid analysis
S Zhao, X Li, G Xu, L Zhang, Z Feng
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies
HN Dai, H Wang, G Xu, J Wan, M Imran
Enterprise Information Systems, 1-25, 2019
Constructing features for detecting android malicious applications: issues, taxonomy and directions
W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li, X Zhang
IEEE Access 7, 67602-67631, 2019
TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting
R Wang, G Xu, X Zeng, X Li, Z Feng
Journal of Parallel and Distributed Computing 118, 100-106, 2018
Application of image fusion in intelligent transport system
X Ding, G Xu, Z Wang, J Wu, A Yang, Z Xue
International Journal of Digital Content Technology and its Applications 6 …, 2012
Dynamic trust evaluation of wireless sensor networks based on multi-factor
J Song, X Li, J Hu, G Xu, Z Feng
2015 IEEE Trustcom/BigDataSE/ISPA 1, 33-40, 2015
An algorithm on fairness verification of mobile sink routing in wireless sensor network
G Xu, W Li, R Xu, Y Xiao, H Gao, X Li, Z Feng, J Mei
Personal and ubiquitous computing 17 (5), 851-864, 2013
EdgeLaaS: Edge learning as a service for knowledge-centric connected healthcare
G Li, G Xu, AK Sangaiah, J Wu, J Li
IEEE Network 33 (6), 37-43, 2019
A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems
L Li, G Xu, L Jiao, X Li, H Wang, J Hu, H Xian, W Lian, H Gao
IEEE Transactions on Industrial Informatics 16 (3), 2091-2101, 2019
MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks
Q Guo, X Li, G Xu, Z Feng
Future Generation Computer Systems 70, 42-47, 2017
Exploring intracity taxi mobility during the holidays for location-based marketing
W Wang, X Li, P Jiao, G Xu, N Yuan, W Yu
Mobile Information Systems 2017, 2017
TRM: computing reputation score by mining reviews
G Xu, Y Cao, Y Zhang, G Zhang, X Li, Z Feng
Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016
The system can't perform the operation now. Try again later.
Articles 1–20