A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu Sensors 18 (7), 2394, 2018 | 38 | 2018 |
Reportcoin: A novel blockchain-based incentive anonymous reporting system S Zou, J Xi, S Wang, Y Lu, G Xu IEEE access 7, 65544-65559, 2019 | 35 | 2019 |
A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure F Wang, G Xu, G Xu, Y Wang, J Peng Wireless Communications and Mobile Computing 2020, 1-15, 2020 | 28 | 2020 |
Multi‐scale classification network for road crack detection H Feng, G Xu, Y Guo IET Intelligent Transport Systems 13 (2), 398-405, 2019 | 24 | 2019 |
Detecting sensitive information of unstructured text using convolutional neural network G Xu, C Qi, H Yu, S Xu, C Zhao, J Yuan 2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019 | 23 | 2019 |
An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 978-1002, 2019 | 22 | 2019 |
A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map F Wang, G Xu, G Xu IEEE Access 7, 101596-101608, 2019 | 20 | 2019 |
Ensemble strategy for insider threat detection from user activity logs S Zou, H Sun, G Xu, R Quan Computers, Materials and Continua, 2020 | 14 | 2020 |
An ID-based blind signature from bilinear pairing with unlinkability G Xu, G Xu 2013 3rd International Conference on Consumer Electronics, Communications …, 2013 | 13 | 2013 |
Data streams classification with ensemble model based on decision-feedback LIU Jing, G Xu, S Zheng, X Da, L Gu The Journal of China Universities of Posts and Telecommunications 21 (1), 79-85, 2014 | 12 | 2014 |
A semi-supervised ensemble approach for mining data streams J Liu, G Xu, D Xiao, LZ Gu, XX Niu Journal of Computers 8 (11), 2873-2880, 2013 | 12 | 2013 |
Sensitive information detection based on convolution neural network and bi-directional lstm Y Lin, G Xu, G Xu, Y Chen, D Sun 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 10 | 2020 |
Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix Z Bi, G Xu, G Xu, M Tian, R Jiang, S Zhang Security and Communication Networks 2022, 2022 | 7 | 2022 |
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression Z Bi, G Xu, G Xu, C Wang, S Zhang Sensors 22 (3), 981, 2022 | 7 | 2022 |
ID-based multi-proxy sequential signature system from bilinear pairing G Xu, Y Yang, L Gu, X Niu Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web …, 2007 | 6 | 2007 |
Robust app clone detection based on similarity of ui structure Y Hu, G Xu, B Zhang, K Lai, G Xu, M Zhang IEEE Access 8, 77142-77155, 2020 | 5 | 2020 |
PerHelper: helping developers make better decisions on permission uses in Android apps G Xu, S Xu, C Gao, B Wang, G Xu Applied Sciences 9 (18), 3699, 2019 | 5 | 2019 |
A new restrictive partially blind signature with designated verifier G Xu 2008 International Conference on Computer Science and Information Technology …, 2008 | 5 | 2008 |
Network security analysis based on host-security-group Z Shang-Qi, XU Guo-Qing, YAO Wen-Bin, Y Xi-Xian Journal of Beijing University of Posts and Telecommunications 35 (1), 19, 2012 | 4 | 2012 |
Android malware detection based on feature selection and weight measurement H Sun, G Xu, Z Wu, R Quan Intelligent Automation & Soft Computing 33 (1), 2022 | 3 | 2022 |