关注
Guosheng Xu
Guosheng Xu
Bejing Unversity of Posts and Telecommunications
在 bupt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography
G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu
Sensors 18 (7), 2394, 2018
382018
Reportcoin: A novel blockchain-based incentive anonymous reporting system
S Zou, J Xi, S Wang, Y Lu, G Xu
IEEE access 7, 65544-65559, 2019
352019
A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure
F Wang, G Xu, G Xu, Y Wang, J Peng
Wireless Communications and Mobile Computing 2020, 1-15, 2020
282020
Multi‐scale classification network for road crack detection
H Feng, G Xu, Y Guo
IET Intelligent Transport Systems 13 (2), 398-405, 2019
242019
Detecting sensitive information of unstructured text using convolutional neural network
G Xu, C Qi, H Yu, S Xu, C Zhao, J Yuan
2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019
232019
An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography
S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu
KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 978-1002, 2019
222019
A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map
F Wang, G Xu, G Xu
IEEE Access 7, 101596-101608, 2019
202019
Ensemble strategy for insider threat detection from user activity logs
S Zou, H Sun, G Xu, R Quan
Computers, Materials and Continua, 2020
142020
An ID-based blind signature from bilinear pairing with unlinkability
G Xu, G Xu
2013 3rd International Conference on Consumer Electronics, Communications …, 2013
132013
Data streams classification with ensemble model based on decision-feedback
LIU Jing, G Xu, S Zheng, X Da, L Gu
The Journal of China Universities of Posts and Telecommunications 21 (1), 79-85, 2014
122014
A semi-supervised ensemble approach for mining data streams
J Liu, G Xu, D Xiao, LZ Gu, XX Niu
Journal of Computers 8 (11), 2873-2880, 2013
122013
Sensitive information detection based on convolution neural network and bi-directional lstm
Y Lin, G Xu, G Xu, Y Chen, D Sun
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
102020
Intrusion Detection Method for In-Vehicle CAN Bus Based on Message and Time Transfer Matrix
Z Bi, G Xu, G Xu, M Tian, R Jiang, S Zhang
Security and Communication Networks 2022, 2022
72022
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression
Z Bi, G Xu, G Xu, C Wang, S Zhang
Sensors 22 (3), 981, 2022
72022
ID-based multi-proxy sequential signature system from bilinear pairing
G Xu, Y Yang, L Gu, X Niu
Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web …, 2007
62007
Robust app clone detection based on similarity of ui structure
Y Hu, G Xu, B Zhang, K Lai, G Xu, M Zhang
IEEE Access 8, 77142-77155, 2020
52020
PerHelper: helping developers make better decisions on permission uses in Android apps
G Xu, S Xu, C Gao, B Wang, G Xu
Applied Sciences 9 (18), 3699, 2019
52019
A new restrictive partially blind signature with designated verifier
G Xu
2008 International Conference on Computer Science and Information Technology …, 2008
52008
Network security analysis based on host-security-group
Z Shang-Qi, XU Guo-Qing, YAO Wen-Bin, Y Xi-Xian
Journal of Beijing University of Posts and Telecommunications 35 (1), 19, 2012
42012
Android malware detection based on feature selection and weight measurement
H Sun, G Xu, Z Wu, R Quan
Intelligent Automation & Soft Computing 33 (1), 2022
32022
系统目前无法执行此操作,请稍后再试。
文章 1–20