default search action
Xiaochao Wei
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Yao Li, Xiaochao Wei, Guopeng Cai, Hao Wang:
Privacy-preserving multi-source content-based image retrieval for IoT in cloud computing. Ann. des Télécommunications 79(7-8): 553-565 (2024) - [j25]Liju Ma, Hao Wang, Ziyu Niu, Zhi Li, Lei Wu, Xiaochao Wei, Ye Su:
Over-threshold multi-party private set operation protocols for lightweight clients. Comput. Stand. Interfaces 88: 103781 (2024) - [j24]Xiaochao Wei, Yanfei Zhang, Xin (Robert) Luo:
Modeling the evolution of collective overreaction in dynamic online product diffusion networks. Decis. Support Syst. 181: 114232 (2024) - [j23]Xiaochao Wei, Yanfei Zhang, Xin (Robert) Luo, Gangmei Pan, Guihua Nie:
Qualitative Cusp Catastrophe Multi-Agent Simulation Model to Explore Abrupt Changes in Online Impulsive Buying Behavior. J. Assoc. Inf. Syst. 25(2): 6 (2024) - 2023
- [j22]Xiaochao Wei, Haobo Gong, Lin Song:
Product diffusion in dynamic online social networks: A multi-agent simulation based on gravity theory. Expert Syst. Appl. 213(Part): 119008 (2023) - [j21]Xiaochao Wei, Jennifer Shang:
Mobile value chain collaboration for product diffusion: Role of the lifecycle. Expert Syst. Appl. 215: 119346 (2023) - [j20]Xiaochao Wei, Qiping She:
Quantitative cusp catastrophe model to explore abrupt changes in collaborative regulation behavior of e-commerce platforms. Inf. Sci. 642: 119127 (2023) - 2022
- [j19]Xiaochao Wei, Qi Liao, Yanfei Zhang, Guihua Nie:
Effect of Overconfidence on Product Diffusion in Online Social Networks: A Multiagent Simulation Based on Evolutionary Game and Overconfidence Theory. Complex. 2022: 1516419:1-1516419:22 (2022) - [j18]Lin Xu, Xiaochao Wei, Guopeng Cai, Yao Li, Hao Wang:
SWMQ: Secure wildcard pattern matching with query. Int. J. Intell. Syst. 37(9): 6262-6282 (2022) - [j17]Xiaochao Wei, Lin Xu, Guopeng Cai, Hao Wang:
Secure approximate pattern matching protocol via Boolean threshold private set intersection. Int. J. Intell. Syst. 37(11): 9245-9266 (2022) - [j16]Guopeng Cai, Xiaochao Wei, Yao Li:
Privacy-preserving CNN feature extraction and retrieval over medical images. Int. J. Intell. Syst. 37(11): 9267-9289 (2022) - [c8]Shuang Ding, Xiaochao Wei, Lin Xu, Hao Wang:
SMTWM: Secure Multiple Types Wildcard Pattern Matching Protocol from Oblivious Transfer. ICA3PP 2022: 471-489 - 2021
- [j15]Xiaochao Wei, Yanfei Zhang, Yuyao Fan, Guihua Nie:
Online Social Network Information Dissemination Integrating Overconfidence and Evolutionary Game Theory. IEEE Access 9: 90061-90074 (2021) - [j14]Xi Sun, Hao Wang, Xiu Fu, Hong Qin, Mei Jiang, Likun Xue, Xiaochao Wei:
Substring-searchable attribute-based encryption and its application for IoT devices. Digit. Commun. Networks 7(2): 277-283 (2021) - 2020
- [j13]Xiaochao Wei, Lin Xu, Hao Wang, Zhihua Zheng:
Permutable Cut-and-Choose Oblivious Transfer and Its Application. IEEE Access 8: 17378-17389 (2020) - [j12]Hao Wang, Hong Qin, Minghao Zhao, Xiaochao Wei, Hua Shen, Willy Susilo:
Blockchain-based fair payment smart contract for public cloud storage auditing. Inf. Sci. 519: 348-362 (2020) - [j11]Xiaochao Wei, Lin Xu, Minghao Zhao, Hao Wang:
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer. Inf. Sci. 529: 132-140 (2020)
2010 – 2019
- 2019
- [j10]Qizheng Wang, Ling Gao, Hao Wang, Xiaochao Wei:
Face Detection for Privacy Protected Images. IEEE Access 7: 3918-3927 (2019) - [j9]Hong Qin, Hao Wang, Xiaochao Wei, Likun Xue, Lei Wu:
Privacy-Preserving Wildcards Pattern Matching Protocol for IoT Applications. IEEE Access 7: 36094-36102 (2019) - [j8]Qiping She, Xiaochao Wei, Guihua Nie, Donglin Chen:
QoS-aware cloud service composition: A systematic mapping study from the perspective of computational intelligence. Expert Syst. Appl. 138 (2019) - [j7]Yujiao Song, Hao Wang, Xiaochao Wei, Lei Wu:
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud. Secur. Commun. Networks 2019: 3249726:1-3249726:9 (2019) - 2018
- [j6]Dandan Yuan, Xiangfu Song, Qiuliang Xu, Minghao Zhao, Xiaochao Wei, Hao Wang, Han Jiang:
An ORAM-based privacy preserving data sharing scheme for cloud storage. J. Inf. Secur. Appl. 39: 1-9 (2018) - [j5]Xiaochao Wei, Minghao Zhao, Qiuliang Xu:
Efficient and secure outsourced approximate pattern matching protocol. Soft Comput. 22(4): 1175-1187 (2018) - 2017
- [j4]Xiaochao Wei, Qiuliang Xu, Yi Tang:
k-out-of-n oblivious transfer protocol with security against malicious adversaries. Comput. Syst. Sci. Eng. 32(2) (2017) - 2016
- [j3]Qingliang Meng, Xiaochao Wei, Wen Meng:
A Decision Method to Maximize Service Quality under Budget Constraints: The Kano Study of a Chinese Machinery Manufacturer. Sci. Program. 2016: 7291582:1-7291582:12 (2016) - [c7]Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang:
Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. GPC 2016: 261-277 - [c6]Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. Trustcom/BigDataSE/ISPA 2016: 418-425 - [c5]Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. Trustcom/BigDataSE/ISPA 2016: 670-677 - 2015
- [j2]Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang:
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. Int. J. Inf. Secur. Priv. 9(2): 1-12 (2015) - [c4]Shufeng Li, Minghao Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei:
Efficient ORAM Based on Binary Tree without Data Overflow and Evictions. ISICA 2015: 596-607 - [c3]Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application. TrustCom/BigDataSE/ISPA (1) 2015: 384-391 - 2014
- [i1]Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation. IACR Cryptol. ePrint Arch. 2014: 768 (2014) - 2013
- [j1]Xiaochao Wei, Bin Hu, Kathleen M. Carley:
Combination of Empirical Study with Qualitative Simulation for Optimization Problem in Mobile Banking Adoption. J. Artif. Soc. Soc. Simul. 16(3) (2013)
2000 – 2009
- 2005
- [c2]Zhigeng Pan, Xiaochao Wei, Jian Yang:
Geometric model reconstruction from streams of DirectX 3D game application. Advances in Computer Entertainment Technology 2005: 242-245 - [c1]Zhigeng Pan, Shusen Sun, Jian Yang, Xiaochao Wei:
Protect Interactive 3D Models via Vertex Shader Programming. ICEC 2005: 59-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint