default search action
Guangxia Xu
Person information
Other persons with a similar name
- Xu Guangxiang
- Guang-xian Xu (aka: Guangxian Xu) — disambiguation page
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j49]Lejun Zhang, Bo Zhang, Ran Guo, Zhujun Wang, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian, Sergey Gataullin:
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext. Frontiers Comput. Sci. 19(2): 192807 (2025) - 2024
- [j48]Yuqing Xu, Guangxia Xu, Yong Liu, Yuan Liu, Ming Shen:
A survey of the fusion of traditional data security technology and blockchain. Expert Syst. Appl. 252: 124151 (2024) - [j47]Lejun Zhang, Chendong Zhu, Zhihong Tian, Yuan Liu, Jing Qiu, Shen Su, Guangxia Xu, Ran Guo:
ICRB: An improved consensus-based redactable blockchain considering contextual consistency. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j46]Xiaoling Song, Guangxia Xu, Yongfei Huang, Jingnan Dong:
DID-HVC-based Web3 healthcare data security and privacy protection scheme. Future Gener. Comput. Syst. 158: 267-276 (2024) - [j45]Jingnan Dong, Guangxia Xu, Chuang Ma, Jun Liu, Uchani Gutierrez Omar Cliff:
Blockchain-Based Certificate-Free Cross-Domain Authentication Mechanism for Industrial Internet. IEEE Internet Things J. 11(2): 3316-3330 (2024) - [j44]Yongfei Huang, Guangxia Xu, Xiaoling Song, Yuqing Xu:
An Efficient RLWE-Based Privacy-Preserving Authentication Scheme Based on Edge Computing in Industrial Internet of Things. IEEE Trans. Serv. Comput. 17(5): 2012-2026 (2024) - [j43]Yongfei Huang, Guangxia Xu, Xiaoling Song, Yong Liu, Qiuyan Wang:
A quantum-secure certificateless aggregate signature protocol for vehicular ad hoc networks. Veh. Commun. 47: 100775 (2024) - [j42]Lejun Zhang, Yuan Li, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen, Zhihong Tian:
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS. J. Signal Process. Syst. 96(3): 215-237 (2024) - 2023
- [j41]Chuang Ma, Xin Ren, Guangxia Xu, Bo He:
FedGR: Federated Graph Neural Network for Recommendation Systems. Axioms 12(2): 170 (2023) - [j40]Zhujun Wang, Lejun Zhang, Ran Guo, Guopeng Wang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Zhihong Tian:
A covert channel over blockchain based on label tree without long waiting times. Comput. Networks 232: 109843 (2023) - [j39]Jun Liu, Haoyu Jin, Guangxia Xu, Mingwei Lin, Tao Wu, Majid Kamal A. Nour, Fayadh Alenezi, Adi Alhudhaif, Kemal Polat:
Aliasing black box adversarial attack with joint self-attention distribution and confidence probability. Expert Syst. Appl. 214: 119110 (2023) - [j38]Guangxia Xu, Jingnan Dong, Chuang Ma, Jun Liu, Uchani Gutierrez Omar Cliff:
A Certificateless Signcryption Mechanism Based on Blockchain for Edge Computing. IEEE Internet Things J. 10(14): 11960-11974 (2023) - [j37]Guangxia Xu, Zhaojian Zhou, Jingnan Dong, Lejun Zhang, Xiaoling Song:
A Blockchain-Based Federated Learning Scheme for Data Sharing in Industrial Internet of Things. IEEE Internet Things J. 10(24): 21467-21478 (2023) - [j36]Jun Liu, Mingyue Xie, Shuyu Chen, Guangxia Xu, Tianshu Wu, Wei Li:
TS-REPLICA: A novel replica placement algorithm based on the entropy weight TOPSIS method in spark for multimedia data analysis. Inf. Sci. 626: 133-148 (2023) - [j35]Chuang Ma, Shuaiwu Liu, Guangxia Xu:
HGAT: smart contract vulnerability detection method based on hierarchical graph attention network. J. Cloud Comput. 12(1): 93 (2023) - [j34]Yongfei Huang, Guangxia Xu, Xiaoling Song:
An improved efficient identity-based quantum signature scheme. Quantum Inf. Process. 22(1): 36 (2023) - [j33]Yuan Liu, Wangyuan Yu, Zhengpeng Ai, Guangxia Xu, Liang Zhao, Zhihong Tian:
A Blockchain-Empowered Federated Learning in Healthcare-Based Cyber Physical Systems. IEEE Trans. Netw. Sci. Eng. 10(5): 2685-2696 (2023) - [c14]Guangxia Xu, Yuling Huang, Chuang Ma:
Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme. CloudNet 2023: 372-380 - 2022
- [j32]Guangxia Xu, Jiajun Zhang, Uchani Gutierrez Omar Cliff, Chuang Ma:
An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption. Int. J. Intell. Syst. 37(12): 10715-10750 (2022) - [j31]Jun Liu, Juan Zhao, Haihui Huang, Guangxia Xu:
A novel logistics data privacy protection method based on blockchain. Multim. Tools Appl. 81(17): 23867-23887 (2022) - [j30]Yuqing Xu, Guangxia Xu, Chuang Ma, Zeliang An:
An Advancing Temporal Convolutional Network for 5G Latency Services via Automatic Modulation Recognition. IEEE Trans. Circuits Syst. II Express Briefs 69(6): 3002-3006 (2022) - [j29]Yuqing Xu, Guangxia Xu, Chuang Ma:
A Novel Blind High-Order Modulation Classifier Using Accumulated Constellation Temporal Convolution for OSTBC-OFDM Systems. IEEE Trans. Circuits Syst. II Express Briefs 69(9): 3959-3963 (2022) - [c13]Guangxia Xu, Li Wang:
SCUC-DSAC: A Data Sharing Access Control Model Based on Smart Contract and User Credit. DSN Workshops 2022: 135-140 - [c12]Yuan Li, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities. SmartCom 2022: 350-359 - [c11]Weijie Chen, Ran Guo, Guopeng Wang, Lejun Zhang, Jing Qiu, Shen Su, Yuan Liu, Guangxia Xu, Huiling Chen:
Smart Contract Vulnerability Detection Model Based on Siamese Network. SmartCom 2022: 639-648 - 2021
- [j28]Yong Liu, Guangxia Xu:
Fixed degree of decentralization DPoS consensus mechanism in blockchain based on adjacency vote and the average fuzziness of vague value. Comput. Networks 199: 108432 (2021) - [j27]Xingping Xian, Tao Wu, Shaojie Qiao, Wei Wang, Chao Wang, Yanbing Liu, Guangxia Xu:
DeepEC: Adversarial attacks against graph structure prediction models. Neurocomputing 437: 168-185 (2021) - [j26]Guangxia Xu, Mengxiao Hu, Chuang Ma:
Secure and smart autonomous multi-robot systems for opinion spammer detection. Inf. Sci. 576: 681-693 (2021) - [j25]Xingping Xian, Tao Wu, Yanbing Liu, Wei Wang, Chao Wang, Guangxia Xu, Yonggang Xiao:
Towards link inference attack against network structure perturbation. Knowl. Based Syst. 218: 106674 (2021) - [j24]Jun Liu, Shuang Zheng, Guangxia Xu, Mingwei Lin:
Cross-domain sentiment aware word embeddings for review sentiment analysis. Int. J. Mach. Learn. Cybern. 12(2): 343-354 (2021) - [j23]Guangxia Xu, Jingnan Dong, Chuang Ma:
A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw. Appl. 14(5): 2952-2960 (2021) - [j22]Guangxia Xu, Daiqi Zhou, Jun Liu:
Social Network Spam Detection Based on ALBERT and Combination of Bi-LSTM with Self-Attention. Secur. Commun. Networks 2021: 5567991:1-5567991:11 (2021) - [c10]Yuqing Xu, Guangxia Xu, Zeliang An, Yanbin Liu:
EPSTO-ARIMA: Electric Power Stochastic Optimization Predicting Based on ARIMA. iSCI 2021: 70-75 - [c9]Guangxia Xu, Yuqing Xu:
EPFSTO-ARIMA: Electric Power Forced Stochastic Optimization Predicting Based on ARIMA. ISPEC 2021: 57-68 - 2020
- [j21]Jun Liu, Sule Tang, Guangxia Xu, Chuang Ma, Mingwei Lin:
A Novel Configuration Tuning Method Based on Feature Selection for Hadoop MapReduce. IEEE Access 8: 63862-63871 (2020) - [j20]Guangxia Xu, Weifeng Li, Jun Liu:
A social emotion classification approach using multi-model fusion. Future Gener. Comput. Syst. 102: 347-356 (2020) - [j19]Guangxia Xu, Linghao Zhang, Chuang Ma, Yanbing Liu:
A mixed attributes oriented dynamic SOM fuzzy cluster algorithm for mobile user classification. Inf. Sci. 515: 280-293 (2020) - [j18]Guangxia Xu, Xinkai Wu, Jun Liu, Yanbing Liu:
A Community Detection Method Based on Local Optimization in Social Networks. IEEE Netw. 34(4): 42-48 (2020) - [j17]Guangxia Xu, Yong Liu, Prince Waqas Khan:
Improvement of the DPoS Consensus Mechanism in Blockchain Based on Vague Sets. IEEE Trans. Ind. Informatics 16(6): 4252-4259 (2020)
2010 – 2019
- 2019
- [j16]Prince Waqas Khan, Guangxia Xu, Muhammad Ahsan Latif, Khizar Abbas, Ammara Yasin:
UAV's Agricultural Image Segmentation Predicated by Clifford Geometric Algebra. IEEE Access 7: 38442-38450 (2019) - [j15]Tao Wu, Guannan Ming, Xingping Xian, Wei Wang, Shaojie Qiao, Guangxia Xu:
Structural Predictability Optimization Against Inference Attacks in Data Publishing. IEEE Access 7: 92119-92136 (2019) - [j14]Guangxia Xu, Zhijing Tang, Chuang Ma, Yanbing Liu, Mahmoud Daneshmand:
A Collaborative Filtering Recommendation Algorithm Based on User Confidence and Time Context. J. Electr. Comput. Eng. 2019: 7070487:1-7070487:12 (2019) - [c8]Guangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand, Shaoci Xie:
VRPSOFC: a framework for focused crawler using mutation improving particle swarm optimization algorithm. ACM TUR-C 2019: 4:1-4:7 - [c7]Mengxiao Hu, Guangxia Xu, Chuang Ma, Mahmoud Daneshmand:
Detecting review spammer groups in dynamic review networks. ACM TUR-C 2019: 11:1-11:6 - [c6]Guangxia Xu, Mengxiao Hu, Chuang Ma, Mahmoud Daneshmand:
GSCPM: CPM-Based Group Spamming Detection in Online Product Reviews. ICC 2019: 1-6 - [c5]Guangxia Xu, Lijie He, Mengxiao Hu:
Document Context-Aware Social Recommendation Method. ICNC 2019: 787-791 - 2018
- [j13]Jun Liu, Hancui Zhang, Guangxia Xu:
An Anomaly Detector Deployment Awareness Detection Framework Based on Multi-Dimensional Resources Balancing in Cloud Platform. IEEE Access 6: 44927-44933 (2018) - [j12]Yanbing Liu, Yao Kuang, Yunpeng Xiao, Guangxia Xu:
SDN-Based Data Transfer Security for Internet of Things. IEEE Internet Things J. 5(1): 257-268 (2018) - [c4]Guangxia Xu, Guowei Gao, Mengxiao Hu:
Detecting Spammer on Micro-blogs Base on Fuzzy Multi-class SVM. CyberC 2018 - [c3]Guangxia Xu, Peng Jiang, Chuang Ma, Mahmoud Daneshmand:
A Focused Crawler Model Based on Mutation Improving Particle Swarm Optimization Algorithm. ICII 2018: 173-174 - 2017
- [j11]Guangxia Xu, Shiyi Gao, Mahmoud Daneshmand, Chonggang Wang, Yanbing Liu:
A Survey for Mobility Big Data Analytics for Geolocation Prediction. IEEE Wirel. Commun. 24(1): 111-119 (2017) - 2016
- [j10]Guangxia Xu, Qun Wu, Mahmoud Daneshmand, Yanbing Liu, Manman Wang:
A data privacy protective mechanism for wireless body area networks. Wirel. Commun. Mob. Comput. 16(13): 1746-1758 (2016) - [j9]Yousheng Zhou, Guangxia Xu, Yong Wang, Xiaojun Wang:
Chaotic map-based time-aware multi-keyword search scheme with designated server. Wirel. Commun. Mob. Comput. 16(13): 1851-1858 (2016) - [c2]Guangxia Xu, Jin Qi, Deling Huang, Mahmoud Daneshmand:
Detecting spammers on social networks based on a hybrid model. IEEE BigData 2016: 3062-3068 - [c1]Guangxia Xu, Jingteng Zhao, Deling Huang:
An improved social spammer detection based on tri-training. IEEE BigData 2016: 4040-4042 - 2014
- [j8]Guangxia Xu, Manman Wang:
An Energy-Efficient Routing Mechanism Based On Genetic Ant Colony Algorithm for Wireless Body Area Networks. J. Networks 9(12): 3366-3372 (2014) - [j7]Guangxia Xu, Fuyi Lin, Yu Liu:
An Improved Mix Transmission Algorithm for Privacy-Preserving. J. Networks 9(12): 3373-3380 (2014) - [j6]Guangxia Xu, Shuangyan Liu, Yanbing Liu:
A Secure Transmission Protocol for Wireless Body Sensor Networks. J. Softw. 9(8): 2043-2049 (2014) - [j5]Guangxia Xu, Fuyi Lin, Yunpeng Xiao:
CLRU: a new page replacement algorithm for NAND flash-based consumer electronics. IEEE Trans. Consumer Electron. 60(1): 38-44 (2014) - [j4]Guangxia Xu, Manman Wang, Yanbing Liu:
Swap-aware garbage collection algorithm for NAND flash-based consumer electronics. IEEE Trans. Consumer Electron. 60(1): 60-65 (2014) - 2013
- [j3]Guangxia Xu, Yu Liu, Yunpeng Xiao, Yanbing Liu:
A Secure Data Transmission Scheme for Body Sensor Network. J. Commun. 8(5): 307-314 (2013) - [j2]Yunpeng Xiao, Guangxia Xu, Yanbing Liu, Bai Wang:
A Metadata-driven Cloud Computing Application Virtualization Model. J. Comput. 8(6): 1571-1579 (2013) - 2012
- [j1]Guangxia Xu, Yanbing Liu, Xiaoqin Zhang, Mingwei Lin:
Garbage collection policy to improve durability for flash memory. IEEE Trans. Consumer Electron. 58(4): 1232-1236 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint