default search action
Xinguang Peng
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [j16]Gaimei Gao, Xinguang Peng, Lizhong Jin:
Efficient Access Control Scheme with Certificateless Signcryption for Wireless Body Area Networks. Int. J. Netw. Secur. 21(3): 428-437 (2019) - [j15]Fang Zheng, Xinguang Peng, Pingzhen Li:
One More Accuracy k-Anonymity Framework for LBS. Mob. Inf. Syst. 2019: 9297181:1-9297181:11 (2019) - 2018
- [j14]Lizhong Jin, Junjie Chen, Xinguang Peng:
Joint classification of complementary features based on multitask compressive sensing with application to synthetic aperture radar automatic target recognition. J. Electronic Imaging 27(05): 053034 (2018) - 2017
- [j13]Yuli Yang, Xinguang Peng, Donglai Fu:
A framework of cloud service selection based on trust mechanism. Int. J. Ad Hoc Ubiquitous Comput. 25(3): 109-119 (2017) - [j12]Ye Tian, Yanbin Peng, Gaimei Gao, Xinguang Peng:
Role-based Access Control for Body Area Networks Using Attribute-based Encryption in Cloud Storage. Int. J. Netw. Secur. 19(5): 720-726 (2017) - [j11]Ling Zhang, Xinguang Peng, Gang Li, Haifang Li:
A novel active contour model for image segmentation using local and global region-based information. Mach. Vis. Appl. 28(1-2): 75-89 (2017) - 2016
- [j10]Gaimei Gao, Xinguang Peng, Ye Tian, Zefeng Qin:
A Chaotic Maps-Based Authentication Scheme for Wireless Body Area Networks. Int. J. Distributed Sens. Networks 12(9): 2174720 (2016) - [j9]Donglai Fu, Xinguang Peng, Yuli Yang:
Unbalanced tree-formed verification data for trusted platforms. Secur. Commun. Networks 9(7): 622-633 (2016) - 2015
- [j8]Dong Lai Fu, Xinguang Peng, Yuli Yang:
Trusted Validation for Geolocation of Cloud Data. Comput. J. 58(10): 2595-2607 (2015) - [j7]Ying Wang, Xinguang Peng:
Cryptanalysis of Two Efficient Password-based Authentication Schemes Using Smart Cards. Int. J. Netw. Secur. 17(6): 728-735 (2015) - [j6]Yuli Yang, Xinguang Peng, Jianfang Cao:
Trust-Based Scheduling Strategy for Cloud Workflow Applications. Informatica 26(1): 159-180 (2015) - [j5]Yuli Yang, Xinguang Peng, Xiaohong Wan:
Security-aware data replica selection strategy for Bag-of-Tasks application in cloud computing. J. High Speed Networks 21(4): 299-311 (2015) - [j4]Ying Wang, Xinguang Peng, Jing Bian:
Study on the security of information system authentication scheme based on the fuzzy number intuitionistic fuzzy information. J. Intell. Fuzzy Syst. 28(5): 2225-2232 (2015) - [j3]Yuli Yang, Xinguang Peng, Zheng Wang:
主观信任评估模型与决策方法的研究 (Research of Subjective Trust Evaluation Model and Decision-making). 计算机科学 42(1): 170-174 (2015) - 2014
- [j2]Ye Tian, Yanbin Peng, Xinguang Peng, Hongbin Li:
An Attribute-Based Encryption Scheme with Revocation for Fine-Grained Access Control in Wireless Body Area Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j1]Ying Wang, Xinguang Peng, Jing Bian:
Computer Crime Forensics Based on Improved Decision Tree Algorithm. J. Networks 9(4): 1005-1011 (2014) - 2013
- [c9]Yuli Yang, Xinguang Peng:
Trust-Based Scheduling Strategy for Workflow Applications in Cloud Environment. 3PGCIC 2013: 316-320 - 2011
- [c8]Jing Bian, Hai Zhang, Xinguang Peng:
The Research and Implementation of Heterogeneous Data Integration under Ontology Mapping Mechanism. WISM (2) 2011: 87-94 - [c7]Rui Hao, Xinguang Peng, Lei Xiu:
Model of Trusted Dynamic Measurement Based on System Calls. WISM (3) 2011: 238-241 - [c6]Yongwei Fu, Xinguang Peng:
Web Application Security Based on Trusted Network Connection. WISM (2) 2011: 420-427
2000 – 2009
- 2009
- [c5]Jianjing Pang, Xinguang Peng:
Trustworthy Web Service Security Risk Assessment Research. IFITA (3) 2009: 417-420 - 2008
- [c4]Xinguang Peng, Yanyan Zhang:
Robust Host Anomaly Detector Using Strong Isolation. CSSE (3) 2008: 575-578 - 2006
- [c3]Xinguang Peng, Junfeng Zhang:
Program Detection with Context Dependency for Collaborative Services. CSCWD 2006: 48-53 - 2005
- [c2]Xinguang Peng, Zhirong Zhang, Zheng Wang:
Anomaly detection of privileged program based on fuzzy segments. ISADS 2005: 580-584 - [c1]Xinguang Peng, Kaifeng Ren:
Anomaly Detection with High Deviations for System Security. PRDC 2005: 200-207
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 23:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint