default search action
Guosheng Xu 0001
Person information
- affiliation: Beijing University of Posts and Telecommunications, Beijing, China
Other persons with the same name
- Guosheng Xu 0002 — Harbin Institute of Technology, Harbin, China
- Guosheng Xu 0003 — National Key Laboratory of Scattering and Radiation, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. FORGE 2024: 12-23 - [c19]Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang:
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty. ICSE 2024: 150:1-150:13 - [c18]Jinquan Hou, Yuqiu Jian, Guosheng Xu, Qiang Cao, Guoai Xu:
Secure and Negotiate Scheme for Vehicle-to-Vehicle Communications in an IoV. Intelligent Information Processing (1) 2024: 345-354 - [c17]Zikan Dong, Tianming Liu, Jiapeng Deng, Haoyu Wang, Li Li, Minghui Yang, Meng Wang, Guosheng Xu, Guoai Xu:
Exploring Covert Third-party Identifiers through External Storage in the Android New Era. USENIX Security Symposium 2024 - [i5]Haodong Li, Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu, Guoai Xu, Guosheng Xu, Haoyu Wang:
Digger: Detecting Copyright Content Mis-usage in Large Language Model Training. CoRR abs/2401.00676 (2024) - [i4]Guanyu Wang, Yuekang Li, Yi Liu, Gelei Deng, Tianlin Li, Guosheng Xu, Yang Liu, Haoyu Wang, Kailong Wang:
MeTMaP: Metamorphic Testing for Detecting False Vector Matching Problems in LLM Augmented Generation. CoRR abs/2402.14480 (2024) - [i3]Wangchenlu Huang, Shenao Wang, Yanjie Zhao, Guosheng Xu, Haoyu Wang:
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards. CoRR abs/2405.10758 (2024) - [i2]Zikan Dong, Yanjie Zhao, Tianming Liu, Chao Wang, Guosheng Xu, Guoai Xu, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. CoRR abs/2406.09807 (2024) - 2023
- [j19]Jinwen Xi, Guosheng Xu, Shihong Zou, Yueming Lu, Guoqiang Li, Jiuyun Xu, Ruisheng Wang:
A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT. IEEE Internet Things J. 10(16): 14896-14907 (2023) - [j18]Boya Liu, Guoai Xu, Guosheng Xu, Chenyu Wang, Peiliang Zuo:
Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET. Sensors 23(3): 1204 (2023) - [j17]Kaijun Liu, Guosheng Xu, Qiang Cao, Chenyu Wang, Jingjing Jia, Yuan Gao, Guoai Xu:
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks. Sensors 23(21): 8992 (2023) - [j16]Huanhuan Ma, Chenyu Wang, Guosheng Xu, Qiang Cao, Guoai Xu, Li Duan:
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid. IEEE Syst. J. 17(4): 6425-6436 (2023) - [c16]Guosheng Xu, Xinyu Wang, Cheng Yu, Haoran Zhao, Yanhui Guo, Jinghong Guo, Chenyu Wang:
Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination. AAIA 2023: 364-373 - [c15]Guosheng Xu, Guoai Xu:
Using A CNN to Solve the Problem of Asphalt Pavement Crack Detection. ICMLC 2023: 290-297 - [c14]Yuanchen Gao, Guosheng Xu, Guoai Xu:
WELID: A Weighted Ensemble Learning Method for Network Intrusion Detection. ISCC 2023: 399-404 - [c13]Yuxin Zhao, Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu:
Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles. LCN 2023: 1-4 - 2022
- [j15]Yan Lin, Hongliang Zhu, Guoai Xu, Guosheng Xu:
Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations. Int. J. Distributed Sens. Networks 18(3): 155013292210887 (2022) - [j14]Guoai Xu, Boya Liu, Guosheng Xu, Peiliang Zuo:
A Diversified Message Type Forwarding Strategy Based on Reinforcement Learning in VANET. KSII Trans. Internet Inf. Syst. 16(9): 3104-3123 (2022) - [j13]Zixiang Bi, Guoai Xu, Guosheng Xu, Chenyu Wang, Sutao Zhang:
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression. Sensors 22(3): 981 (2022) - [c12]Baijun Cheng, Yanhui Guo, Yan Ren, Gang Yang, Guosheng Xu:
MSDetector: A Static PHP Webshell Detection System Based on Deep-Learning. TASE 2022: 155-172 - [c11]Kaixuan Zheng, Shihong Zou, Guosheng Xu, Zixiang Bi:
Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint. WoWMoM 2022: 450-456 - [c10]Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu, Haoyu Wang:
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. WWW 2022: 3327-3335 - 2021
- [j12]Guoai Xu, Jiangtao Yuan, Guosheng Xu, Xingxing Jia:
A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier. Inf. Technol. Control. 50(2): 236-246 (2021) - [j11]Guoai Xu, Jiangtao Yuan, Guosheng Xu, Zhongkai Dang:
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. Secur. Commun. Networks 2021: 5566179:1-5566179:8 (2021) - [c9]Chunhao Qi, Shuai Shao, Yanhui Guo, Junhao Peng, Guosheng Xu:
An Efficient Method for Analyzing Widget Intent of Android System. ICCBN 2021: 78-85 - [c8]Wenqing Yang, Meilin Wang, Shihong Zou, Junhao Peng, Guosheng Xu:
An Implicit Identity Authentication Method Based on Deep Connected Attention CNN for Wild Environment. ICCBN 2021: 94-100 - [c7]Yan Lin, Guosheng Xu, Guoai Xu, Siyi Li, Jie Deng, Jiankun Cao:
Intelligent Preprocessing Selection for Pavement Crack Detection based on Deep Reinforcement Learning. SEKE 2021: 458-463 - 2020
- [j10]Yangyu Hu, Guosheng Xu, Bowen Zhang, Kun Lai, Guoai Xu, Miao Zhang:
Robust App Clone Detection Based on Similarity of UI Structure. IEEE Access 8: 77142-77155 (2020) - [j9]Feifei Wang, Guosheng Xu, Guoai Xu, Yuejie Wang, Junhao Peng:
A Robust IoT-Based Three-Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure. Wirel. Commun. Mob. Comput. 2020: 3805058:1-3805058:15 (2020) - [c6]Renyi Chen, Guosheng Xu, Yan Lin, Guoai Xu, Miao Zhang:
Recognition Method of Road Cracks with Lane Lines Based on Deep Learning. ICMLC 2020: 379-383 - [c5]Yan Lin, Guosheng Xu, Guoai Xu, Yudong Chen, Dawei Sun:
Sensitive Information Detection based on Convolution Neural Network and Bi-directional LSTM. TrustCom 2020: 1614-1621 - [i1]Jiangtao Yuan, Guoai Xu, Guosheng Xu:
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. IACR Cryptol. ePrint Arch. 2020: 1615 (2020)
2010 – 2019
- 2019
- [j8]Shihong Zou, Jinwen Xi, Siyuan Wang, Yueming Lu, Guosheng Xu:
Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System. IEEE Access 7: 65544-65559 (2019) - [j7]Feifei Wang, Guoai Xu, Guosheng Xu:
A Provably Secure Anonymous Biometrics-Based Authentication Scheme for Wireless Sensor Networks Using Chaotic Map. IEEE Access 7: 101596-101608 (2019) - [j6]Shuming Qiu, Guosheng Xu, Haseeb Ahmad, Guoai Xu, Xinping Qiu, Hong Xu:
An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography. KSII Trans. Internet Inf. Syst. 13(2): 978-1002 (2019) - [c4]Guosheng Xu, Chunhao Qi, Hai Yu, Shengwei Xu, Chunlu Zhao, Jing Yuan:
Detecting Sensitive Information of Unstructured Text Using Convolutional Neural Network. CyberC 2019: 474-479 - [c3]Guosheng Xu, Zhimin Wu, Chengze Li, Jinghua Yan, Jing Yuan, Zhiyong Wang, Lu Wang:
Method of Deep Web Collection for Mobile Application Store Based on Category Keyword Searching. SpaCCS 2019: 325-335 - 2018
- [j5]Mao Wang, Zege Wu, Wendong Ma, Huaichuan Hu, Jianqiang Feng, Yong Yang, Liang Liu, Lianmin Zhao, Hua Jia, Liang Zhu, Miaohui Li, Taian Zhou, Min Cheng, Li Xu, Qingquan Yang, Guosheng Xu, Bojiang Ding, Jiafang Shan, Fukun Liu:
Power Modulation System and Experiments of Lower Hybrid Wave on EAST. IEEE Access 6: 37413-37417 (2018) - [j4]Guosheng Xu, Shuming Qiu, Haseeb Ahmad, Guoai Xu, Yanhui Guo, Miao Zhang, Hong Xu:
A Multi-Server Two-Factor Authentication Scheme with Un-Traceability Using Elliptic Curve Cryptography. Sensors 18(7): 2394 (2018) - 2013
- [j3]Guosheng Xu:
The Hardware Design of Parameter-Adjustable FIR Filter System. J. Comput. 8(5): 1371-1375 (2013) - [j2]Guosheng Xu:
A Reconfigurable FIR Filter System. J. Comput. 8(7): 1841-1846 (2013) - [j1]Jing Liu, Guosheng Xu, Da Xiao, Lize Gu, Xinxin Niu:
A Semi-supervised Ensemble Approach for Mining Data Streams. J. Comput. 8(11): 2873-2879 (2013) - 2012
- [c2]Jing Liu, Lize Gu, Guosheng Xu, Xinxin Niu:
A correlation analysis method of network security events based on rough set theory. IC-NIDC 2012: 517-520
2000 – 2009
- 2007
- [c1]Guosheng Xu, Yixian Yang, Lize Gu, Xinxin Niu:
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. Web Intelligence/IAT Workshops 2007: 315-318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint