Name
Affiliation
Papers
GUANGQUAN XU
Tianjin University, Tianjin, 300072, China
90
Collaborators
Citations 
PageRank 
276
171
33.20
Referers 
Referees 
References 
568
2004
709
Search Limit
1001000
Title
Citations
PageRank
Year
JSCSP: A Novel Policy-Based XSS Defense Mechanism for Browsers00.342022
SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles10.352022
Heterogeneous Information Network Representation Learning Incorporating Community Structure00.342022
Higher-Order Multiple-Feature-based Community Evolution Model with Potential Applications in Criminal Network Investigation00.342021
TT-SVD: an Efficient Sparse Decision Making Model with Two-way Trust Recommendation in the AI Enabled IoT Systems20.352021
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts30.402021
Fnet: A Two-Stream Model For Detecting Adversarial Attacks Against 5g-Based Deep Learning Services00.342021
Generalized Centered 2-D Principal Component Analysis10.342021
An Unsupervised Learning-Based Network Threat Situation Assessment Model For Internet Of Things00.342020
Privacy-preserving categorization of mobile applications based on large-scale usage data10.342020
Big Data Analytics For Manufacturing Internet Of Things: Opportunities, Challenges And Enabling Technologies30.392020
Security Analysis Of Indistinguishable Obfuscation For Internet Of Medical Things Applications00.342020
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.20.362020
A Variational Generative Network Based Network Threat Situation Assessment.00.342020
Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks.10.352020
An Effective Evolutionary Analysis Scheme for Industrial Software Access Control Models.00.342020
Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum20.412020
A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs20.352020
SSL-SVD: Semi-supervised Learning--based Sparse Trust Recommendation10.352020
Energy-Efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things40.382020
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis00.342020
HUCDO: A Hybrid User-centric Data Outsourcing Scheme00.342020
BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs20.382020
A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems.50.392020
An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems00.342020
Location Privacy-Preserving Distance Computation for Spatial Crowdsourcing10.352020
Sensing Users’ Emotional Intelligence in Social Networks10.352020
Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface.00.342019
Inferring Patterns For Taint-Style Vulnerabilities With Security Patches10.482019
Spatio-temporal deep learning method for ADHD fMRI classification40.432019
One-round provably secure yoking-proof for RFID applications.00.342019
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.00.342019
A Behavior Based Trustworthy Service Composition Discovery Approach in Cloud Environment.00.342019
DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost.00.342019
A Knowledge-Based Multiplayer Collaborative Routing in Opportunistic Networks10.352019
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.00.342019
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.00.342019
Data Collection in Underwater Sensor Networks based on Mobile Edge Computing.40.352019
Consumers Team Detection Model Based on Trust for Multi-Level.00.342019
A Node-Oriented Discrete Event Scheduling Algorithm Based on Finite Resource Model00.342019
UAV-enabled friendly jamming scheme to secure industrial Internet of Things.60.412019
SSL-STR: Semi-Supervised Learning for Sparse Trust Recommendation00.342019
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs120.422019
E-AUA: an efficient anonymous user authentication protocol for mobile IoT80.442019
Anonymous three-factor authenticated key agreement for wireless sensor networks10.352019
Using Sparse Representation to Detect Anomalies in Complex WSNs.40.362019
Polynomial-based modifiable blockchain structure for removing fraud transactions20.352019
UAV Autonomous Target Search Based on Deep Reinforcement Learning in Complex Disaster Scene10.362019
Multi-Layer Network Local Community Detection Based on Influence Relation00.342019
CSP-E2: An abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems.00.342019
  • 1
  • 2