![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Shujiang Xu
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Shujiang Xu
, Lulu Zhang
, Lianhai Wang, Miodrag J. Mihaljevic
, Shuhui Zhang
, Wei Shao, Qizheng Wang:
Relay network-based cross-chain data interaction protocol with integrity audit. Comput. Electr. Eng. 117: 109262 (2024) - [j16]Shuhui Zhang, Hanwen Tian, Lianhai Wang, Shujiang Xu, Wei Shao:
A reputation-based dynamic reorganization scheme for blockchain network sharding. Connect. Sci. 36(1) (2024) - [j15]Lianhai Wang
, Xiaoqian Liu, Wei Shao, Chenxi Guan, Qihao Huang, Shujiang Xu, Shuhui Zhang
:
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates. Symmetry 16(1): 89 (2024) - [j14]Yinbin Miao
, Xinru Yan
, Xinghua Li
, Shujiang Xu
, Ximeng Liu
, Hongwei Li
, Robert H. Deng
:
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack. IEEE Trans. Inf. Forensics Secur. 19: 5814-5827 (2024) - [j13]Yinbin Miao
, Da Kuang
, Xinghua Li
, Shujiang Xu
, Hongwei Li
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings. IEEE Trans. Inf. Forensics Secur. 19: 5828-5841 (2024) - 2023
- [j12]Shujiang Xu
, Jinrong Zhong
, Lianhai Wang, Debiao He, Shuhui Zhang, Wei Shao:
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth. Connect. Sci. 35(1) (2023) - [j11]Wei Shao
, Jinpeng Wang
, Lianhai Wang
, Chunfu Jia
, Shujiang Xu
, Shuhui Zhang
:
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT. IEEE Internet Things J. 10(24): 21322-21336 (2023) - [j10]Miodrag J. Mihaljevic
, Milica Knezevic
, Dragan Urosevic
, Lianhai Wang
, Shujiang Xu
:
An Approach for Blockchain and Symmetric Keys Broadcast Encryption Based Access Control in IoT. Symmetry 15(2): 299 (2023) - [j9]Shuhui Zhang
, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic
, Shujiang Xu, Tian Lan:
A Malware Detection Approach Based on Deep Learning and Memory Forensics. Symmetry 15(3): 758 (2023) - [c11]Shujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang:
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE. ISPA/BDCloud/SocialCom/SustainCom 2023: 447-455 - 2022
- [j8]Miodrag J. Mihaljevic
, Lianhai Wang, Shujiang Xu:
An Approach for Security Enhancement of Certain Encryption Schemes Employing Error Correction Coding and Simulated Synchronization Errors. Entropy 24(3): 406 (2022) - [j7]Miodrag J. Mihaljevic
, Aleksandar Radonjic
, Lianhai Wang, Shujiang Xu
:
Security Enhanced Symmetric Key Encryption Employing an Integer Code for the Erasure Channel. Symmetry 14(8): 1709 (2022) - [j6]Miodrag J. Mihaljevic
, Lianhai Wang, Shujiang Xu
, Milan Todorovic:
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks. Symmetry 14(8): 1711 (2022) - [j5]Chunpeng Wang
, Qixian Hao
, Shujiang Xu
, Bin Ma
, Zhiqiu Xia
, Qi Li
, Jian Li, Yun-Qing Shi:
RD-IWAN: Residual Dense Based Imperceptible Watermark Attack Network. IEEE Trans. Circuits Syst. Video Technol. 32(11): 7460-7472 (2022) - [c10]Shujiang Xu, Fansheng Wang, Lianhai Wang, Xu Chang, Tongfeng Yang, Weijun Yang:
A Method of Traceless File Deletion for NTFS File System. CSS 2022: 109-117 - [c9]Shujiang Xu
, Chaoyang Zhang, Lianhai Wang, Shuhui Zhang, Wei Shao:
A Cross Data Center Access Control Model by Constructing GAS on Blockchain. ICPADS 2022: 312-321 - 2021
- [j4]Wei Wang
, Lianhai Wang
, Peijun Zhang
, Shujiang Xu
, Kunlun Fu, Lianxin Song, Shanshan Hu
:
A privacy protection scheme for telemedicine diagnosis based on double blockchain. J. Inf. Secur. Appl. 61: 102845 (2021) - [c8]Shujiang Xu, Fengkai Liu, Lingyun Meng, Lianhai Wang, Xu Chang, Weijun Yang:
A Scheme of Traceless File Deletion for Windows FAT32 File System. ICEA 2021: 89-93 - [c7]Kunlun Fu, Lianhai Wang, Wei Shao, Wei Wang, Shuhui Zhang, Shujiang Xu, Shanshan Hu:
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature. ICEA 2021: 223-228 - 2020
- [j3]Liang Fang, Guozhen Shi, Lianhai Wang, Yongjun Li, Shujiang Xu
, Yunchuan Guo:
Incentive mechanism for cooperative authentication: An evolutionary game approach. Inf. Sci. 527: 369-381 (2020) - [j2]Shujiang Xu, Qixian Hao, Bin Ma
, Chunpeng Wang
, Jian Li
:
Accurate Computation of Fractional-Order Exponential Moments. Secur. Commun. Networks 2020: 8822126:1-8822126:16 (2020)
2010 – 2019
- 2019
- [j1]Xiaohui Han
, Lianhai Wang, Shujiang Xu
, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. Comput. Secur. 87 (2019) - [c6]Shuhui Zhang, Lianhai Wang, Lijuan Xu, Shujiang Xu, Xiaohui Han, Shumian Yang:
Virtual Machine Memory Forensics Method for XenServer Platform. NaNA 2019: 302-308 - 2018
- [c5]Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data. ICICS 2018: 584-597 - 2017
- [c4]Shujiang Xu, Lianhai Wang, Guangqi Liu, Xiaohui Han, Dawei Zhao, Lijuan Xu:
The Categories of Quantum Information Hiding Protocol. ICCCS (1) 2017: 143-152 - [c3]Xiaohui Han, Lianhai Wang, Shujiang Xu, Guangqi Liu, Dawei Zhao:
Linking social network accounts by modeling user spatiotemporal habits. ISI 2017: 19-24 - 2016
- [c2]Guangqi Liu, Lianhai Wang, Shujiang Xu, Dawei Zhao, Shumian Yang:
Video forensics research based on authenticity and integrity. ICIA 2016: 1223-1226
2000 – 2009
- 2008
- [c1]Shujiang Xu, Yinglong Wang, Jizhi Wang, Min Tian:
Cryptanalysis of Two Chaotic Image Encryption Schemes Based on Permutation and XOR Operations. CIS (2) 2008: 433-437
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint