default search action
Xiangguo Cheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Lida Xu, Xiangguo Cheng, Weizhong Tian, Huanli Wang, Yan Zhang:
Cloud-Assisted Privacy-Preserving Spectral Clustering Algorithm Within a Multi-User Setting. IEEE Access 12: 75965-75982 (2024) - 2021
- [j38]Jufu Cui, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
Optimization scheme for intrusion detection scheme GBDT in edge computing center. Comput. Commun. 168: 136-145 (2021) - [j37]Rui Zhang, Hui Xia, Chao Liu, Ruobing Jiang, Xiangguo Cheng:
Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning. Wirel. Commun. Mob. Comput. 2021: 6619715:1-6619715:9 (2021) - [c19]Shu-shu Shao, Hui Xia, Rui Zhang, Xiangguo Cheng:
Greedy-Based Black-Box Adversarial Attack Scheme on Graph Structure. WASA (2) 2021: 96-106 - 2020
- [j36]Xiuqing Lu, Xiangguo Cheng:
A Secure and Lightweight Data Sharing Scheme for Internet of Medical Things. IEEE Access 8: 5022-5030 (2020) - [j35]Xuqi Wang, Xiangguo Cheng, Yu Xie:
Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage. IEEE Access 8: 11732-11742 (2020) - [j34]Rui Zhang, Hui Xia, Fei Chen, Li Li, Xiangguo Cheng:
Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System. IEEE Access 8: 12316-12326 (2020) - [j33]Li Li, Jufu Cui, Rui Zhang, Hui Xia, Xiangguo Cheng:
Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things. IEEE Access 8: 64184-64192 (2020) - [j32]Yizhe Li, Hui Xia, Rui Zhang, Benxu Hu, Xiangguo Cheng:
A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things. IEEE Access 8: 123938-123951 (2020) - [j31]Hui Xia, Li Li, Xiangguo Cheng, Xiuzhen Cheng, Tie Qiu:
Modeling and Analysis Botnet Propagation in Social Internet of Things. IEEE Internet Things J. 7(8): 7470-7481 (2020) - [j30]Hui Xia, Li Li, Xiangguo Cheng, Chao Liu, Tie Qiu:
A Dynamic Virus Propagation Model Based on Social Attributes in City IoT. IEEE Internet Things J. 7(9): 8036-8048 (2020) - [j29]Rui Zhang, Hui Xia, Shu-shu Shao, Hang Ren, Shuai Xu, Xiangguo Cheng:
An Intrusion Detection Scheme Based on Repeated Game in Smart Home. Mob. Inf. Syst. 2020: 8844116:1-8844116:9 (2020) - [j28]Hui Xia, Fu Xiao, Sanshun Zhang, Xiangguo Cheng, Zhenkuan Pan:
A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems. IEEE Trans. Netw. Sci. Eng. 7(2): 792-804 (2020) - [j27]Hui Xia, Rui Zhang, Xiangguo Cheng, Tie Qiu, Dapeng Oliver Wu:
Two-Stage Game Design of Payoff Decision-Making Scheme for Crowdsourcing Dilemmas. IEEE/ACM Trans. Netw. 28(6): 2741-2754 (2020) - [c18]Rui Zhang, Hui Xia, Jufu Cui, Xiangguo Cheng:
A Novel Solution to Quality of Service Dilemma in Crowdsourcing Systems. WASA (2) 2020: 105-112
2010 – 2019
- 2019
- [j26]Hui Xia, Chun-qiang Hu, Fu Xiao, Xiangguo Cheng, Zhenkuan Pan:
An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things. Comput. Networks 152: 210-220 (2019) - [j25]Panpan Meng, Chengliang Tian, Xiangguo Cheng:
Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations. J. Cloud Comput. 8: 24 (2019) - [c17]Xuqi Wang, Yu Xie, Xiangguo Cheng, Zhengtao Jiang:
An Efficient Key-Aggregate Keyword Searchable Encryption for Data Sharing in Cloud Storage. GLOBECOM Workshops 2019: 1-6 - 2018
- [j24]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - [j23]Hui Xia, Sanshun Zhang, Benxia Li, Li Li, Xiangguo Cheng:
Towards a Novel Trust-Based Multicast Routing for VANETs. Secur. Commun. Networks 2018: 7608198:1-7608198:12 (2018) - [c16]Sanshun Zhang, Shiwen Wang, Hui Xia, Xiangguo Cheng:
An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks. IIKI 2018: 473-479 - [c15]Hui Xia, Benxia Li, Sanshun Zhang, Shiwen Wang, Xiangguo Cheng:
A Novel Recommendation-Based Trust Inference Model for MANETs. WASA 2018: 893-906 - 2017
- [j22]Xiuxiu Jiang, Xinrui Ge, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage. J. Internet Serv. Inf. Secur. 7(2): 1-18 (2017) - 2016
- [j21]Hui Xia, Jia Yu, Zhenkuan Pan, Xiangguo Cheng, Edwin Hsing-Mean Sha:
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Networks 22(7): 2239-2257 (2016) - [j20]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - 2015
- [j19]Feng Diao, Fangguo Zhang, Xiangguo Cheng:
A Privacy-Preserving Smart Metering Scheme Using Linkable Anonymous Credential. IEEE Trans. Smart Grid 6(1): 461-467 (2015) - [c14]Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data. 3PGCIC 2015: 836-839 - 2014
- [j18]Huiyan Zhao, Jia Yu, Shaoxia Duan, Xiangguo Cheng, Rong Hao:
Key-insulated aggregate signature. Frontiers Comput. Sci. 8(5): 837-846 (2014) - [j17]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
One forward-secure signature scheme using bilinear maps and its applications. Inf. Sci. 279: 60-76 (2014) - [c13]Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. TrustCom 2014: 473-480 - 2013
- [j16]Jia Yu, Rong Hao, Xiangguo Cheng:
Security analysis and improvement of two verifiable multi-secret sharing schemes. Int. J. Secur. Networks 8(4): 200-206 (2013) - [j15]Xiangguo Cheng, Shaojie Zhou, Lifeng Guo, Jia Yu, Huiran Ma:
An ID-Based Short Group Signature Scheme. J. Softw. 8(3): 554-559 (2013) - 2012
- [j14]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 114(1): 103 (2012) - [j13]Xiangguo Cheng, Shaojie Zhou, Jia Yu, Xin Li, Huiran Ma:
A Practical ID-Based Group Signature Scheme. J. Comput. 7(11): 2650-2654 (2012) - [j12]Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:
Non-Interactive Forward-Secure Threshold Signature without Random Oracles. J. Inf. Sci. Eng. 28(3): 571-586 (2012) - [j11]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. J. Syst. Softw. 85(2): 382-391 (2012) - 2011
- [j10]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 111(2): 241-256 (2011) - [j9]Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen:
Forward-secure identity-based signature: Security notions and construction. Inf. Sci. 181(3): 648-660 (2011) - [j8]Xiangguo Cheng, Chen Yang, Jia Yu:
A New Approach to Group Signature Schemes. J. Comput. 6(4): 812-817 (2011) - [j7]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
New Forward-Secure Signature Scheme with Untrusted Update. J. Inf. Sci. Eng. 27(4): 1435-1448 (2011) - [j6]Xiangguo Cheng, Lifeng Guo, Chen Yang, Jia Yu:
ID-Based Sequential Aggregate Signatures. J. Softw. 6(12): 2495-2499 (2011) - [c12]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
Two Protocols for Member Revocation in Secret Sharing Schemes. PAISI 2011: 64-70 - 2010
- [j5]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Yangkui Chen, Xuliang Li, Guowen Li:
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. J. Networks 5(6): 634-641 (2010) - [c11]Zhixiong Chen, Xiangguo Cheng, Chenhuang Wu:
A Family of Binary Threshold Sequences Constructed by Using the Multiplicative Inverse. Inscrypt 2010: 95-104
2000 – 2009
- 2009
- [j4]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree. J. Softw. 4(1): 73-80 (2009) - 2008
- [c10]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97 - [c9]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184 - 2007
- [j3]Shi Cui, Pu Duan, Choong Wah Chan, Xiangguo Cheng:
An Efficient Identity-based Signature Scheme and Its Applications. Int. J. Netw. Secur. 5(1): 89-98 (2007) - 2006
- [j2]Xiangguo Cheng, Lifeng Guo, Xinmei Wang:
An Identity-based Mediated Signature Scheme from Bilinear Pairing. Int. J. Netw. Secur. 2(1): 29-33 (2006) - [c8]Shi Cui, Choong Wah Chan, Xiangguo Cheng:
Practical Group Signatures from RSA. AINA (1) 2006: 111-115 - [c7]Jingmei Liu, Xiangguo Cheng, Xinmei Wang:
Methods to Forge ElGamal Signatures and Determine Secret Key. AINA (1) 2006: 859-862 - [c6]Chen Yang, Xiangguo Cheng, Wenping Ma, Xinmei Wang:
A New ID-Based Broadcast Encryption Scheme. ATC 2006: 487-492 - 2005
- [j1]Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:
Cryptanalysis of Rijndael S-box and improvement. Appl. Math. Comput. 170(2): 958-975 (2005) - [c5]Jingmei Liu, Baodian Wei, Xiangguo Cheng, Xinmei Wang:
An AES S-Box to Increase Complexity and Cryptographic Analysis. AINA 2005: 724-728 - [c4]Xiangguo Cheng, Jingmei Liu, Xinmei Wang:
An Identity-Based Signature and Its Threshold Version. AINA 2005: 973-977 - [c3]Jingmei Liu, Xiangguo Cheng, Xinmei Wang:
Cryptanalysis of a Cellular Automata Cryptosystem. CIS (2) 2005: 49-54 - [c2]Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang:
Efficient Group Signatures from Bilinear Pairing. CISC 2005: 128-139 - [c1]Xiangguo Cheng, Jingmei Liu, Xinmei Wang:
Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing. ICCSA (4) 2005: 1046-1054
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint