Big data analytics for manufacturing internet of things: opportunities, challenges and enabling technologies HN Dai, H Wang, G Xu, J Wan, M Imran Enterprise Information Systems 14 (9-10), 1279-1303, 2020 | 404 | 2020 |
Contractward: Automated vulnerability detection models for ethereum smart contracts W Wang, J Song, G Xu, Y Li, H Wang, C Su IEEE Transactions on Network Science and Engineering 8 (2), 1133-1144, 2020 | 315 | 2020 |
Spatio-temporal deep learning method for adhd fmri classification Z Mao, Y Su, G Xu, X Wang, Y Huang, W Yue, L Sun, N Xiong Information Sciences 499, 1-11, 2019 | 213 | 2019 |
SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent Internet of vehicles G Xu, H Bai, J Xing, T Luo, NN Xiong, X Cheng, S Liu, X Zheng Journal of Parallel and Distributed Computing 164, 1-11, 2022 | 191 | 2022 |
UAV autonomous target search based on deep reinforcement learning in complex disaster scene C Wu, B Ju, Y Wu, X Lin, N Xiong, G Xu, H Li, X Liang IEEe Access 7, 117227-117245, 2019 | 157 | 2019 |
Network security situation awareness based on semantic ontology and user-defined rules for Internet of Things G Xu, Y Cao, Y Ren, X Li, Z Feng IEEE Access 5, 21046-21056, 2017 | 143 | 2017 |
Constructing features for detecting android malicious applications: issues, taxonomy and directions W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li, X Zhang IEEE access 7, 67602-67631, 2019 | 127 | 2019 |
E-AUA: An efficient anonymous user authentication protocol for mobile IoT X Zeng, G Xu, X Zheng, Y Xiang, W Zhou IEEE Internet of Things Journal 6 (2), 1506-1519, 2018 | 121 | 2018 |
Energy-efficient and trustworthy data collection protocol based on mobile fog computing in Internet of Things T Wang, L Qiu, AK Sangaiah, G Xu, A Liu IEEE Transactions on Industrial Informatics 16 (5), 3531-3539, 2019 | 115 | 2019 |
Am I eclipsed? A smart detector of eclipse attacks for Ethereum G Xu, B Guo, C Su, X Zheng, K Liang, DS Wong, H Wang Computers & Security 88, 101604, 2020 | 113 | 2020 |
SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs L Cheng, J Liu, G Xu, Z Zhang, H Wang, HN Dai, Y Wu, W Wang IEEE Transactions on Computational Social Systems 6 (6), 1373-1385, 2019 | 106 | 2019 |
Data collection in underwater sensor networks based on mobile edge computing S Cai, Y Zhu, T Wang, G Xu, A Liu, X Liu IEEE Access 7, 65357-65367, 2019 | 99 | 2019 |
Swift trust in a virtual temporary system: A model based on the Dempster-Shafer theory of belief functions G Xu, Z Feng, H Wu, D Zhao International Journal of Electronic Commerce 12 (1), 93-126, 2007 | 89 | 2007 |
A novel efficient MAKA protocol with desynchronization for anonymous roaming service in global mobility networks G Xu, J Liu, Y Lu, X Zeng, Y Zhang, X Li Journal of Network and Computer Applications 107, 83-92, 2018 | 84 | 2018 |
AMTS: Adaptive multi-objective task scheduling strategy in cloud computing H He, G Xu, S Pang, Z Zhao China Communications 13 (4), 162-171, 2016 | 82 | 2016 |
A network security situation assessment method based on adversarial deep learning H Yang, R Zeng, G Xu, L Zhang Applied Soft Computing 102, 107096, 2021 | 77 | 2021 |
An intelligent edge-computing-based method to counter coupling problems in cyber-physical systems T Wang, Y Liang, Y Yang, G Xu, H Peng, A Liu, W Jia IEEE Network 34 (3), 16-22, 2020 | 77 | 2020 |
Anonymous three-factor authenticated key agreement for wireless sensor networks Y Lu, G Xu, L Li, Y Yang Wireless Networks 25, 1461-1475, 2019 | 73 | 2019 |
On the security and improvement of a two-factor user authentication scheme in wireless sensor networks DZ Sun, JX Li, ZY Feng, ZF Cao, GQ Xu Personal and ubiquitous computing 17, 895-905, 2013 | 73 | 2013 |
TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting R Wang, G Xu, X Zeng, X Li, Z Feng Journal of Parallel and Distributed Computing 118, 100-106, 2018 | 67 | 2018 |