default search action
Hequn Xian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Yu Zhang, Xiaowei Peng, Hequn Xian:
pFedBASC: Personalized Federated Learning with Blockchain-Assisted Semi-Centralized Framework. Future Internet 16(5): 164 (2024) - [j24]Zaikai Yang, Qian Lu, Hanlin Zhang, Fei Chen, Hequn Xian:
Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification. IEEE Internet Things J. 11(8): 14886-14900 (2024) - [j23]Qian Lu, Zaikai Yang, Hanlin Zhang, Fei Chen, Hequn Xian:
MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification. IEEE Internet Things J. 11(18): 30442-30454 (2024) - [j22]Duo Wu, Leibo Li, Weizhong Tian, Hequn Xian, Chengliang Tian:
Biometric identification on the cloud: A more secure and faster construction. Inf. Sci. 669: 120553 (2024) - [j21]Xinyue Guo, Hequn Xian:
AF-Dedup: Secure Encrypted Data Deduplication Based on Adaptive Dynamic Merkle Hash Forest PoW for Cloud Storage. IEEE Trans. Ind. Informatics 20(10): 12294-12304 (2024) - [c9]Jiang Han, Xiaowei Peng, Hequn Xian, Dalin Yang:
A Distortion Free Watermark Scheme for Relational Databases. ICCCN 2024: 1-6 - [c8]Jiang Han, Hequn Xian, Dalin Yang, Han Jiang:
Location Privacy Protection Method with Route Constraints. ICCCN 2024: 1-6 - 2023
- [j20]Yan Teng, Hequn Xian, Quanli Lu, Feng Guo:
A Data Deduplication Scheme Based on DBSCAN With Tolerable Clustering Deviation. IEEE Access 11: 9742-9750 (2023) - [j19]Kun Yang, Chengliang Tian, Hequn Xian, Weizhong Tian, Yan Zhang:
Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database. World Wide Web (WWW) 26(4): 1747-1774 (2023) - [c7]Dongping Zhang, Hequn Xian, Jiyang Chen, Zhiguo Xu:
VDCNet: A Vulnerability Detection and Classification System in Cross-Project Scenarios. ICANN (1) 2023: 305-316 - 2022
- [j18]Yuhang Shao, Chengliang Tian, Lidong Han, Hequn Xian, Jia Yu:
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier. IEEE Internet Things J. 9(21): 21648-21661 (2022) - 2021
- [j17]Xiaowei Peng, Hequn Xian, Qian Lu, Xiuqing Lu:
Semantics aware adversarial malware examples generation for black-box attacks. Appl. Soft Comput. 109: 107506 (2021) - [j16]Xudong Deng, Chengliang Tian, Fei Chen, Hequn Xian:
Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems. Mob. Inf. Syst. 2021: 2807395:1-2807395:15 (2021) - [j15]Ruitao Hou, Hequn Xian:
A Graded Reversible Watermarking Scheme for Relational Data. Mob. Networks Appl. 26(4): 1552-1563 (2021) - [j14]Yunlong He, Hequn Xian, Liming Wang, Shuguang Zhang:
Secure Encrypted Data Deduplication Based on Data Popularity. Mob. Networks Appl. 26(4): 1686-1695 (2021) - 2020
- [j13]Jiaping Men, Zhuo Lv, Xiaojun Zhou, Zhen Han, Hequn Xian, Ya Nan Song:
Machine Learning Methods for Industrial Protocol Security Analysis: Issues, Taxonomy, and Directions. IEEE Access 8: 83842-83857 (2020) - [j12]Shuguang Zhang, Hequn Xian, Zengpeng Li, Liming Wang:
SecDedup: Secure Encrypted Data Deduplication With Dynamic Ownership Updating. IEEE Access 8: 186323-186334 (2020) - [j11]Xiuqing Lu, Zhenkuan Pan, Hequn Xian:
An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices. Comput. Secur. 92: 101686 (2020) - [j10]Yuan Gao, Hequn Xian, Aimin Yu:
Secure data deduplication for Internet-of-things sensor networks based on threshold dynamic adjustment. Int. J. Distributed Sens. Networks 16(3) (2020) - [j9]Guangquan Xu, Wei Wang, Litao Jiao, Xiaotong Li, Kaitai Liang, James Xi Zheng, Wenjuan Lian, Hequn Xian, Honghao Gao:
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications. IEEE Internet Things J. 7(4): 2539-2552 (2020) - [j8]Yongzhong He, Chao Wang, Guangquan Xu, Wenjuan Lian, Hequn Xian, Wei Wang:
Privacy-preserving categorization of mobile applications based on large-scale usage data. Inf. Sci. 514: 557-570 (2020) - [j7]Liang Zhang, Hanlin Zhang, Jia Yu, Hequn Xian:
Blockchain-based two-party fair contract signing scheme. Inf. Sci. 535: 142-155 (2020) - [j6]Xiuqing Lu, Zhenkuan Pan, Hequn Xian:
An efficient and secure data sharing scheme for mobile devices in cloud computing. J. Cloud Comput. 9: 60 (2020) - [j5]Yi Zhang, Hequn Xian, Aimin Yu:
CSNN: Password guessing method based on Chinese syllables and neural network. Peer-to-Peer Netw. Appl. 13(6): 2237-2250 (2020) - [j4]Longpeng Li, Guangquan Xu, Litao Jiao, Xiaotong Li, Hao Wang, Jing Hu, Hequn Xian, Wenjuan Lian, Honghao Gao:
A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems. IEEE Trans. Ind. Informatics 16(3): 2091-2101 (2020) - [j3]Zhengdi Hu, Guangquan Xu, Xi Zheng, Jiang Liu, Zhangbing Li, Quan Z. Sheng, Wenjuan Lian, Hequn Xian:
SSL-SVD: Semi-supervised Learning-based Sparse Trust Recommendation. ACM Trans. Internet Techn. 20(1): 4:1-4:20 (2020) - [c6]Yuan Gao, Hequn Xian, Yan Teng:
User Similarity-Aware Data Deduplication Scheme for IoT Applications. FCS 2020: 44-52 - [c5]Xiaowei Peng, Hequn Xian, Qian Lu, Xiuqing Lu:
Generating Adversarial Malware Examples with API Semantics-Awareness for Black-Box Attacks. SocialSec 2020: 52-61
2010 – 2019
- 2019
- [j2]Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Hequn Xian, Yuanyuan Li, Xiangliang Zhang:
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions. IEEE Access 7: 67602-67631 (2019) - [j1]Xiaoming Li, Guangquan Xu, Wenjuan Lian, Hequn Xian, Litao Jiao, Yu Huang:
Multi-Layer Network Local Community Detection Based on Influence Relation. IEEE Access 7: 89051-89062 (2019) - [c4]Wei Ou, Ning Fang, Hequn Xian, Wei Guo, Feilu Hang, Linjiang Xie, Xuyue Tang:
Accelerating Public Key Cryptography in Android Platforms. BigCom 2019: 245-249 - [c3]Xiaodan Chen, Xiao Wang, Hequn Xian:
Database Watermarking Scheme Based on Clustering with Size Constraint. ICBDT 2019: 57-61 - [c2]Guandong Di, Xiao Wang, Hequn Xian:
Watermark Scheme of Database Based on Fuzzy C-Means. ICBDT 2019: 67-71 - 2017
- [c1]Zhiguo Wan, Zhangshuang Guan, Feng Zhuo, Hequn Xian:
BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain. SecureComm 2017: 644-658
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint