Name
Affiliation
Papers
XIAOLIN CHANG
Beijing JiaoTong University, China
108
Collaborators
Citations 
PageRank 
138
182
41.29
Referers 
Referees 
References 
511
1529
608
Search Limit
1001000
Title
Citations
PageRank
Year
Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack00.342022
Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective00.342022
A high performance two-layer consensus architecture for blockchain-based IoT systems00.342022
Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment00.342022
Dual-UAV Aided Secure Dynamic G2U Communication00.342022
Evaluating fork after withholding (FAW) attack in Bitcoin00.342022
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X.00.342022
Self-Training Enabled Efficient Classification Algorithm: An Application to Charging Pile Risk Assessment00.342022
Proof of Stake Voting in Multiple Entry PBFT System00.342022
DI-AA: An interpretable white-box attack for fooling deep neural networks00.342022
IWA: Integrated gradient-based white-box attacks for fooling deep neural networks00.342022
Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems00.342022
Revisiting FAW attack in an imperfect PoW blockchain system00.342022
Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach00.342022
Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning00.342022
AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples00.342022
DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics00.342022
How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach00.342022
Energy-efficient client selection in federated learning with heterogeneous data on edge00.342022
Mec 2 : Mobile Edge Computing enabled Caching Framework for Internet of Vehicles00.342021
Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles00.342021
Adapting PBFT for Use With Blockchain-Enabled IoT Systems20.422021
LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X00.342021
Mal-LSGAN: An Effective Adversarial Malware Example Generation Model00.342021
A Scalable Two-Tier PBFT Consensus for Blockchain-Based IoT Data Recording00.342021
Performance Analysis Of Heterogeneous Cloud-Edge Services: A Modeling Approach00.342021
Resilience-Driven Quantitative Analysis of Vehicle Platooning Service10.362021
Cost-Effective Migration-Based Dynamic Platform Defense Technique: A Ctmdp Approach00.342021
A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System00.342021
On Selfholding Attack Impact on Imperfect PoW Blockchain Networks00.342021
Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks20.402021
Trade-offs in large blockchain-based IoT system design00.342021
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach40.402020
Numerical Evaluation of Job Finish Time Under MTD Environment10.362020
Exploring Function Call Graph Vectorization And File Statistical Features In Malicious Pe File Classification00.342020
Making Transaction Propagation More Efficient: Deferred Transaction Relay In Bitcoin00.342020
Multiple entry point PBFT for IoT systems.00.342020
Model-based Performance Evaluation of a Moving Target Defense System00.342020
Lightweight Batch AKA Scheme for User-Centric Ultra-Dense Networks00.342020
Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks00.342020
Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach.10.352020
On The Combination Of Data Augmentation Method And Gated Convolution Model For Building Effective And Robust Intrusion Detection00.342020
Lightweight and Privacy-Preserving ID-as-a-Service Provisioning in Vehicular Cloud Computing30.362020
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views20.402020
PBFT-based ordering service for IoT domains00.342020
Performance of Bitcoin Network With Synchronizing Nodes and a Mix of Regular and Compact Blocks00.342020
Modeling of Bitcoin's Blockchain Delivery Network10.352020
Towards 6G Joint HAPS-MEC-Cloud 3C Resource Allocation for Delay-Aware Computation Offloading10.382020
Bla: Blockchain-Assisted Lightweight Anonymous Authentication For Distributed Vehicular Fog Services30.372019
Evaluating Performance of Active Containers on PaaS Fog under Batch Arrivals: A Modeling Approach00.342019
  • 1
  • 2