Follow
Guosheng Xu
Guosheng Xu
Bejing Unversity of Posts and Telecommunications
Verified email at bupt.edu.cn
Title
Cited by
Cited by
Year
Reportcoin: A novel blockchain-based incentive anonymous reporting system
S Zou, J Xi, S Wang, Y Lu, G Xu
IEEE access 7, 65544-65559, 2019
462019
A multi-server two-factor authentication scheme with un-traceability using elliptic curve cryptography
G Xu, S Qiu, H Ahmad, G Xu, Y Guo, M Zhang, H Xu
Sensors 18 (7), 2394, 2018
452018
Detecting sensitive information of unstructured text using convolutional neural network
G Xu, C Qi, H Yu, S Xu, C Zhao, J Yuan
2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019
362019
A robust IoT-based three-factor authentication scheme for cloud computing resistant to session key exposure
F Wang, G Xu, G Xu, Y Wang, J Peng
Wireless Communications and Mobile Computing 2020, 1-15, 2020
332020
Multi‐scale classification network for road crack detection
H Feng, G Xu, Y Guo
IET Intelligent Transport Systems 13 (2), 398-405, 2019
312019
A provably secure anonymous biometrics-based authentication scheme for wireless sensor networks using chaotic map
F Wang, G Xu, G Xu
IEEE Access 7, 101596-101608, 2019
302019
An improved lightweight two-factor authentication and key agreement protocol with dynamic identity based on elliptic curve cryptography
S Qiu, G Xu, H Ahmad, G Xu, X Qiu, H Xu
KSII Transactions on Internet and Information Systems (TIIS) 13 (2), 978-1002, 2019
282019
Ensemble strategy for insider threat detection from user activity logs
S Zou, H Sun, G Xu, R Quan
Computers, Materials and Continua, 2020
172020
A semi-supervised ensemble approach for mining data streams
J Liu, G Xu, D Xiao, LZ Gu, XX Niu
Journal of Computers 8 (11), 2873-2880, 2013
162013
Intrusion detection method for in-vehicle can bus based on message and time transfer matrix
Z Bi, G Xu, G Xu, M Tian, R Jiang, S Zhang
Security and Communication Networks 2022, 2022
142022
Sensitive information detection based on convolution neural network and bi-directional LSTM
Y Lin, G Xu, G Xu, Y Chen, D Sun
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
142020
Data streams classification with ensemble model based on decision-feedback
LIU Jing, G Xu, S Zheng, X Da, L Gu
The Journal of China Universities of Posts and Telecommunications 21 (1), 79-85, 2014
142014
An ID-based blind signature from bilinear pairing with unlinkability
G Xu, G Xu
2013 3rd International Conference on Consumer Electronics, Communications …, 2013
142013
Bit-level automotive controller area network message reverse framework based on linear regression
Z Bi, G Xu, G Xu, C Wang, S Zhang
Sensors 22 (3), 981, 2022
112022
Android Malware Detection Based on Feature Selection and Weight Measurement.
H Sun, G Xu, Z Wu, R Quan
Intelligent Automation & Soft Computing 33 (1), 2022
92022
A blockchain dynamic sharding scheme based on hidden Markov model in collaborative IoT
J Xi, G Xu, S Zou, Y Lu, G Li, J Xu, R Wang
IEEE Internet of Things Journal, 2023
82023
Robust app clone detection based on similarity of ui structure
Y Hu, G Xu, B Zhang, K Lai, G Xu, M Zhang
IEEE Access 8, 77142-77155, 2020
72020
Perhelper: Helping developers make better decisions on permission uses in android apps
G Xu, S Xu, C Gao, B Wang, G Xu
Applied Sciences 9 (18), 3699, 2019
72019
ID-based multi-proxy sequential signature system from bilinear pairing
G Xu, Y Yang, L Gu, X Niu
Proceedings of the 2007 IEEE/WIC/ACM International Conferences on Web …, 2007
72007
Deep reinforcement learning-based intelligent security forwarding strategy for VANET
B Liu, G Xu, G Xu, C Wang, P Zuo
Sensors 23 (3), 1204, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20