Reportcoin: A novel blockchain-based incentive anonymous reporting system S Zou, J Xi, S Wang, Y Lu, G Xu IEEE access 7, 65544-65559, 2019 | 49 | 2019 |
A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu Sensors 18 (7), 2394, 2018 | 46 | 2018 |
Detecting sensitive information of unstructured text using convolutional neural network G Xu, C Qi, H Yu, S Xu, C Zhao, J Yuan 2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019 | 37 | 2019 |
A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure F Wang, G Xu, G Xu, Y Wang, J Peng Wireless Communications and Mobile Computing 2020 (1), 3805058, 2020 | 36 | 2020 |
A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map F Wang, G Xu, G Xu IEEe Access 7, 101596-101608, 2019 | 36 | 2019 |
Multi‐scale classification network for road crack detection H Feng, G Xu, Y Guo IET Intelligent Transport Systems 13 (2), 398-405, 2019 | 34 | 2019 |
An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 978-1002, 2019 | 29 | 2019 |
Ensemble strategy for insider threat detection from user activity logs S Zou, H Sun, G Xu, R Quan Computers, Materials and Continua, 2020 | 21 | 2020 |
Intrusion Detection Method for In‐Vehicle CAN Bus Based on Message and Time Transfer Matrix Z Bi, G Xu, G Xu, M Tian, R Jiang, S Zhang Security and Communication Networks 2022 (1), 2554280, 2022 | 20 | 2022 |
A semi-supervised ensemble approach for mining data streams J Liu, G Xu, D Xiao, LZ Gu, XX Niu Journal of Computers 8 (11), 2873-2880, 2013 | 16 | 2013 |
Sensitive information detection based on convolution neural network and bi-directional LSTM Y Lin, G Xu, G Xu, Y Chen, D Sun 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 14 | 2020 |
Data streams classification with ensemble model based on decision-feedback LIU Jing, G Xu, S Zheng, X Da, L Gu The Journal of China Universities of Posts and Telecommunications 21 (1), 79-85, 2014 | 14 | 2014 |
An ID-based blind signature from bilinear pairing with unlinkability G Xu, G Xu 2013 3rd International Conference on Consumer Electronics, Communications …, 2013 | 14 | 2013 |
A blockchain dynamic sharding scheme based on hidden Markov model in collaborative IoT J Xi, G Xu, S Zou, Y Lu, G Li, J Xu, R Wang IEEE Internet of Things Journal, 2023 | 13 | 2023 |
Bit-level automotive controller area network message reverse framework based on linear regression Z Bi, G Xu, G Xu, C Wang, S Zhang Sensors 22 (3), 981, 2022 | 13 | 2022 |
Digger: Detecting copyright content mis-usage in large language model training H Li, G Deng, Y Liu, K Wang, Y Li, T Zhang, Y Liu, G Xu, G Xu, H Wang arXiv preprint arXiv:2401.00676, 2024 | 12 | 2024 |
Android malware detection based on feature selection and weight measurement H Sun, G Xu, Z Wu, R Quan Intelligent Automation and Soft Computing, 2022 | 12 | 2022 |
Deep reinforcement learning-based intelligent security forwarding strategy for VANET B Liu, G Xu, G Xu, C Wang, P Zuo Sensors 23 (3), 1204, 2023 | 11 | 2023 |
Anonymous authentication protocol based on physical unclonable function and elliptic curve cryptography for smart grid H Ma, C Wang, G Xu, Q Cao, G Xu, L Duan IEEE Systems Journal, 2023 | 10 | 2023 |
Robust app clone detection based on similarity of ui structure Y Hu, G Xu, B Zhang, K Lai, G Xu, M Zhang IEEE Access 8, 77142-77155, 2020 | 10 | 2020 |