Reportcoin: A novel blockchain-based incentive anonymous reporting system S Zou, J Xi, S Wang, Y Lu, G Xu IEEE access 7, 65544-65559, 2019 | 46 | 2019 |
A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu Sensors 18 (7), 2394, 2018 | 45 | 2018 |
Detecting sensitive information of unstructured text using convolutional neural network G Xu, C Qi, H Yu, S Xu, C Zhao, J Yuan 2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019 | 36 | 2019 |
A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure F Wang, G Xu, G Xu, Y Wang, J Peng Wireless Communications and Mobile Computing 2020, 1-15, 2020 | 33 | 2020 |
Multi‐scale classification network for road crack detection H Feng, G Xu, Y Guo IET Intelligent Transport Systems 13 (2), 398-405, 2019 | 31 | 2019 |
A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map F Wang, G Xu, G Xu IEEE Access 7, 101596-101608, 2019 | 30 | 2019 |
An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 978-1002, 2019 | 28 | 2019 |
Ensemble strategy for insider threat detection from user activity logs S Zou, H Sun, G Xu, R Quan Computers, Materials and Continua, 2020 | 17 | 2020 |
A semi-supervised ensemble approach for mining data streams J Liu, G Xu, D Xiao, LZ Gu, XX Niu Journal of Computers 8 (11), 2873-2880, 2013 | 16 | 2013 |
Intrusion detection method for in-vehicle can bus based on message and time transfer matrix Z Bi, G Xu, G Xu, M Tian, R Jiang, S Zhang Security and Communication Networks 2022, 2022 | 14 | 2022 |
Sensitive information detection based on convolution neural network and bi-directional LSTM Y Lin, G Xu, G Xu, Y Chen, D Sun 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 14 | 2020 |
Data streams classification with ensemble model based on decision-feedback LIU Jing, G Xu, S Zheng, X Da, L Gu The Journal of China Universities of Posts and Telecommunications 21 (1), 79-85, 2014 | 14 | 2014 |
An ID-based blind signature from bilinear pairing with unlinkability G Xu, G Xu 2013 3rd International Conference on Consumer Electronics, Communications …, 2013 | 14 | 2013 |
Bit-level automotive controller area network message reverse framework based on linear regression Z Bi, G Xu, G Xu, C Wang, S Zhang Sensors 22 (3), 981, 2022 | 11 | 2022 |
Android Malware Detection Based on Feature Selection and Weight Measurement. H Sun, G Xu, Z Wu, R Quan Intelligent Automation & Soft Computing 33 (1), 2022 | 9 | 2022 |
A blockchain dynamic sharding scheme based on hidden Markov model in collaborative IoT J Xi, G Xu, S Zou, Y Lu, G Li, J Xu, R Wang IEEE Internet of Things Journal, 2023 | 8 | 2023 |
Robust app clone detection based on similarity of ui structure Y Hu, G Xu, B Zhang, K Lai, G Xu, M Zhang IEEE Access 8, 77142-77155, 2020 | 7 | 2020 |
Perhelper: Helping developers make better decisions on permission uses in android apps G Xu, S Xu, C Gao, B Wang, G Xu Applied Sciences 9 (18), 3699, 2019 | 7 | 2019 |
ID-based multi-proxy sequential signature system from bilinear pairing G Xu, Y Yang, L Gu, X Niu Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web …, 2007 | 7 | 2007 |
Deep reinforcement learning-based intelligent security forwarding strategy for VANET B Liu, G Xu, G Xu, C Wang, P Zuo Sensors 23 (3), 1204, 2023 | 6 | 2023 |