default search action
Xiaofen Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Xiaofen Wang:
Automatic Alignment of Ring-Grid Laser Images based on an Improved Classical Iterative Algorithm. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 32(4): 433-452 (2024) - [j39]Tao Chen, Xiaofen Wang, Hong-Ning Dai, Haomiao Yang:
A Dropout-Tolerated Privacy-Preserving Method for Decentralized Crowdsourced Federated Learning. IEEE Internet Things J. 11(2): 1788-1799 (2024) - [j38]Yanping Wang, Xiaosong Zhang, Ruidong Chen, Hong-Ning Dai, Xiaofen Wang, Leo Yu Zhang, Ming Li:
Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing. IEEE Internet Things J. 11(5): 8401-8413 (2024) - [j37]Xiaofen Wang, Haodong Shi, Xiaotong Zhang, Yadong Wan, Peng Wang:
MicEMD: Open-source toolbox for electromagnetic modeling, inversion, and classification in underground metal target detection. SoftwareX 27: 101812 (2024) - [c22]Tao Chen, Xiaofen Wang, Hong-Ning Dai:
R-PPDFL: A Robust and Privacy-Preserving Decentralized Federated Learning System. ACISP (3) 2024: 158-173 - [c21]Zijie Liu, Qinglin Zhao, Shuhan Qi, Li Feng, Xiaofen Wang, Sun Yi:
A Performance Study of Block Proposing Mechanism in Ethereum 2.0. Blockchain 2024: 520-525 - [c20]Yuanbing Ouyang, Yiming Luo, Ran Ji, Di Wu, Ding Wang, Xiaofen Wang, Hao Wang, Yushan Pan:
AIoT and VR-Based Technology for Robots Control in Critical Safety Environments: Challenges and Opportunities. ICIT 2024: 1-6 - 2023
- [j36]Xiaofen Wang, Peng Wang, Xiaotong Zhang, Yadong Wan, Wen Liu, Haodong Shi:
Efficient and robust Levenberg-Marquardt Algorithm based on damping parameters for parameter inversion in underground metal target detection. Comput. Geosci. 176: 105354 (2023) - [j35]Yanping Wang, Xiaofen Wang, Hong-Ning Dai, Xiaosong Zhang, Muhammad Imran:
A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems. IEEE Trans. Ind. Informatics 19(6): 7835-7847 (2023) - [c19]Yubo Peng, Xiong Li, Shuai Shang, Xiaofen Wang, Xiaosong Zhang:
Low-overhead Privacy-preserving Location-based Skyline Query. ISPA/BDCloud/SocialCom/SustainCom 2023: 344-351 - [c18]Jin Chen, Jun Chen, Xiaofen Wang, Dongshu Xu, Chao Liang, Zhen Han:
Learning Degradation for Real-World Face Super-Resolution. CGI 2023: 120-131 - 2022
- [j34]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Hong-Ning Dai, Mingzhe Liu:
Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT. IEEE Internet Things J. 9(18): 17098-17109 (2022) - [j33]Hang Zhu, Weina Niu, Xuhan Liao, Xiaosong Zhang, Xiaofen Wang, Beibei Li, Zheyuan He:
Attacker Traceability on Ethereum through Graph Analysis. Secur. Commun. Networks 2022: 3448950:1-3448950:12 (2022) - [j32]Xiaofen Wang, Jun Chen, Zhen Han, Qikui Zhu, Weijian Ruan:
Real-Time Video Deraining via Global Motion Compensation and Hybrid Multi-Scale Temporal Correlations. IEEE Signal Process. Lett. 29: 672-676 (2022) - [c17]Ruiheng Lu, Xiaofen Wang, Mengyu Ge, Jiasheng Li, Haomiao Yang:
Secure SVM Services with Multiple Service Providers and Subscribers in the Cloud. HPCC/DSS/SmartCity/DependSys 2022: 1473-1479 - [c16]Junwei Zhang, Zhao Li, Hao Peng, Ming Li, Xiaofen Wang:
Feedforward Neural Network Reconstructed from High-order Quantum Systems. IJCNN 2022: 1-8 - [c15]Dongwen Chai, Xiaofen Wang, Xiaosong Zhang, Haomiao Yang, Tao Chen:
An intrusion detection system based on multiple interpretation methods. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1304-1309 - 2021
- [j31]Lu An, Wenjing Zhou, Menghua Ou, Gang Li, Chuanming Yu, Xiaofen Wang:
Measuring and profiling the topical influence and sentiment contagion of public event stakeholders. Int. J. Inf. Manag. 58: 102327 (2021) - [j30]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Nadra Guizani, Xiaojiang Du:
Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities. IEEE Internet Things J. 8(8): 6425-6436 (2021) - [j29]Kui Jiang, Zhongyuan Wang, Peng Yi, Chen Chen, Xiaofen Wang, Junjun Jiang, Zixiang Xiong:
Multi-Level Memory Compensation Network for Rain Removal via Divide-and-Conquer Strategy. IEEE J. Sel. Top. Signal Process. 15(2): 216-228 (2021) - [j28]Ke Zhang, Jiahuan Long, Xiaofen Wang, Hong-Ning Dai, Kaitai Liang, Muhammad Imran:
Lightweight Searchable Encryption Protocol for Industrial Internet of Things. IEEE Trans. Ind. Informatics 17(6): 4248-4259 (2021) - 2020
- [j27]Yalin Liu, Hong-Ning Dai, Hao Wang, Muhammad Imran, Xiaofen Wang, Muhammad Shoaib:
UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things. Comput. Commun. 155: 184-196 (2020) - [j26]Xiaofen Wang, Jun Chen, Kui Jiang, Zhen Han, Weijian Ruan, Zhongyuan Wang, Chao Liang:
Single image de-raining via clique recursive feedback mechanism. Neurocomputing 417: 142-154 (2020) - [j25]Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaofen Wang, Jingwei Li, Qi Xia, Jing Qin:
EVA: Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud. IEEE Internet Things J. 7(2): 882-892 (2020) - [j24]Hong Jin, Xinyan Fu, Xinyi Cao, Mingxia Sun, Xiaofen Wang, Yuhong Zhong, Suwen Yang, Chao Qi, Bo Peng, Xin He, Fei He, Yongfang Jiang, Haiyan Gao, Shun Li, Zhen Huang, Qiang Li, Fengqi Fang, Jun Zhang:
Developing and Preliminary Validating an Automatic Cell Classification System for Bone Marrow Smears: a Pilot Study. J. Medical Syst. 44(10): 184 (2020) - [j23]Eric Affum, Xiasong Zhang, Xiaofen Wang, John Bosco Ansuura:
Efficient Lattice CP-ABE AC Scheme Supporting Reduced-OBDD Structure for CCN/NDN. Symmetry 12(1): 166 (2020) - [j22]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Yi Mu, Fatemeh Rezaeibagha, Guangquan Xu, Hao Wang, Xi Zheng, Guomin Yang, Qi Xia, Xiaojiang Du:
HUCDO: A Hybrid User-centric Data Outsourcing Scheme. ACM Trans. Cyber Phys. Syst. 4(3): 35:1-35:23 (2020) - [c14]Xiaodan Ma, Xiaofen Wang:
Construction of User Portrait Based on Alipay Big Data. ATCI 2020: 467-472 - [c13]Yanping Wang, Xiaofen Wang, Pan Wen, Teng Hu, Xiaosong Zhang:
A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities. CSoNet 2020: 283-294
2010 – 2019
- 2019
- [j21]Xiaofen Wang, Hong-Ning Dai, Ke Zhang:
Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system. Future Gener. Comput. Syst. 99: 177-185 (2019) - [j20]Fatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure (Broadcast) Homomorphic Signcryption. Int. J. Found. Comput. Sci. 30(4): 511-529 (2019) - [j19]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Hao Wang, Yulei Wu:
Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things. Inf. Sci. 491: 251-264 (2019) - [j18]Haomiao Yang, Xiaofen Wang, Chun Yang, Xin Cong, You Zhang:
Securing content-centric networks with content-based encryption. J. Netw. Comput. Appl. 128: 21-32 (2019) - [j17]Ke Huang, Xiaosong Zhang, Yi Mu, Xiaofen Wang, Guomin Yang, Xiaojiang Du, Fatemeh Rezaeibagha, Qi Xia, Mohsen Guizani:
Building Redactable Consortium Blockchain for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 15(6): 3670-3679 (2019) - [c12]Xiaofen Wang, Jun Chen, Zhen Han, Mingfu Xiong, Chao Liang, Qi Zheng, Zhongyuan Wang:
Rain Streak Removal via Multi-scale Mixture Exponential Power Model. ICASSP 2019: 1767-1771 - [c11]Jiahuan Long, Ke Zhang, Xiaofen Wang, Hong-Ning Dai:
Lightweight Distributed Attribute Based Keyword Search System for Internet of Things. SpaCCS Workshops 2019: 253-264 - 2018
- [j16]Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model. Int. J. Netw. Secur. 20(2): 345-358 (2018) - [j15]Rang Zhou, Xiaosong Zhang, Xiaojiang Du, Xiaofen Wang, Guowu Yang, Mohsen Guizani:
File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3648-3658 (2018) - [c10]Rang Zhou, Xiaosong Zhang, Xiaofen Wang, Guowu Yang, Wanpeng Li:
Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data. ICA3PP (4) 2018: 288-302 - 2017
- [j14]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-preserving data search and sharing protocol for social networks through wireless applications. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j13]Xiaofen Wang, Yi Mu, Rongmao Chen:
Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication. Wirel. Pers. Commun. 95(4): 3509-3537 (2017) - [c9]Shiwei Zhang, Yi Mu, Guomin Yang, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. ACISP (1) 2017: 23-43 - [c8]Ke Huang, Xiaosong Zhang, Xiaofen Wang, Xiaojiang Du, Ruonan Zhang:
EBD-MLE: Enabling Block Dynamics under BL-MLE for Ubiquitous Data. ISPA/IUCC 2017: 1281-1288 - [c7]Fatemeh Rezaeibagha, Yi Mu, Shiwei Zhang, Xiaofen Wang:
Provably Secure Homomorphic Signcryption. ProvSec 2017: 349-360 - 2016
- [j12]Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. Comput. J. 59(7): 955-969 (2016) - [j11]Yong Yu, Jianbing Ni, Qi Xia, Xiaofen Wang, Haomiao Yang, Xiaosong Zhang:
SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds. Concurr. Comput. Pract. Exp. 28(10): 2877-2888 (2016) - [j10]Xiaojuan Chen, Yi Mu, Xiaofen Wang, Runhua Shi:
Privacy-enhanced distance computation with applications. Int. J. Electron. Secur. Digit. Forensics 8(3): 234-249 (2016) - [j9]Xiaofen Wang:
One-round secure fair meeting location determination based on homomorphic encryption. Inf. Sci. 372: 758-772 (2016) - [j8]Xiaofen Wang, Yi Mu, Rongmao Chen, Xiaosong Zhang:
Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group. J. Comput. Sci. Technol. 31(5): 1012-1027 (2016) - [j7]Xiaofen Wang, Yi Mu, Rongmao Chen:
An efficient privacy-preserving aggregation and billing protocol for smart grid. Secur. Commun. Networks 9(17): 4536-4547 (2016) - [j6]Peng Jiang, Yi Mu, Fuchun Guo, Xiaofen Wang, Jianchang Lai:
Centralized keyword search on encrypted data for cloud applications. Secur. Commun. Networks 9(18): 5064-5084 (2016) - [j5]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 11(4): 789-798 (2016) - [j4]Xiaofen Wang, Yi Mu, Rongmao Chen:
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications. IEEE Trans. Inf. Forensics Secur. 11(8): 1712-1721 (2016) - [j3]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xinyi Huang, Xiaofen Wang, Yongjun Wang:
Server-Aided Public Key Encryption With Keyword Search. IEEE Trans. Inf. Forensics Secur. 11(12): 2833-2842 (2016) - [c6]Xiaofen Wang, Yi Mu:
Content-Based Encryption. ACISP (2) 2016: 57-72 - [c5]Peng Jiang, Xiaofen Wang, Jianchang Lai, Fuchun Guo, Rongmao Chen:
Oblivious Keyword Search with Authorization. ProvSec 2016: 173-190 - [i1]Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem. IACR Cryptol. ePrint Arch. 2016: 388 (2016) - 2015
- [c4]Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. ACISP 2015: 59-76 - [c3]Mojahed Mohamed, Xiaofen Wang, Xiaosong Zhang:
Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem. CollaborateCom 2015: 243-256 - [c2]Xiaofen Wang, Xiaosong Zhang, Yi Mu:
Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud. SmartCity 2015: 1024-1031 - 2014
- [c1]Ying Li, Yan Li, Xiaofen Wang:
Study on Orthogonal Basis NN-Based Storage Modelling for Lake Hume of Upper Murray River, Australia. ICMLC (CCIS volume) 2014: 431-441 - 2013
- [j2]Haomiao Yang, Hyunsung Kim, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Somewhat HE scheme over Integers and Its Variation. KSII Trans. Internet Inf. Syst. 7(10): 2497-2513 (2013) - [j1]Haomiao Yang, Hyunsung Kim, Hongwei Li, Eunjun Yoon, Xiaofen Wang, Xuefeng Ding:
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages. KSII Trans. Internet Inf. Syst. 7(10): 2544-2560 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint