default search action
Xuewen Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Zhiwei Zhang, Zehan Chen, Yulong Shen, Xuewen Dong, Ning Xi:
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles. IEEE Trans. Veh. Technol. 73(6): 7532-7546 (2024) - [j36]Xuewen Dong, Zhichao You, Ximeng Liu, Yuanxiong Guo, Yulong Shen, Yanmin Gong:
Federated and Online Dynamic Spectrum Access for Mobile Secondary Users. IEEE Trans. Wirel. Commun. 23(1): 621-636 (2024) - [c24]Wei Tong, Xuewen Dong, Weidong Yang, Yulong Shen, Chao Yang, Zesong Dong:
Non-Subjective Trust Mechanism for Online Ride-Hailing Services. ICWS 2024: 1377-1383 - 2023
- [j35]Xiangli Xiao, Xiaotong He, Yushu Zhang, Xuewen Dong, Lu-Xing Yang, Yong Xiang:
Blockchain-based reliable image copyright protection. IET Blockchain 3(4): 222-237 (2023) - [j34]Jiandong Wang, Hao Liu, Xuewen Dong, Yulong Shen, Xinghui Zhu, Bin Wang, Feng Li:
Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing. IEEE Internet Things J. 10(10): 8971-8983 (2023) - [j33]Hui Qiao, Xuewen Dong, Qi Jiang, Siqi Ma, Chao Liu, Ning Xi, Yulong Shen:
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System. IEEE Internet Things J. 10(19): 16715-16726 (2023) - [j32]Wei Tong, Xuewen Dong, Yushu Zhang, Zongyang Zhang, Lingxiao Yang, Weidong Yang, Yulong Shen:
TI-BIoV: Traffic Information Interaction for Blockchain-Based IoV With Trust and Incentive. IEEE Internet Things J. 10(24): 21528-21543 (2023) - [j31]Shiyang Ma, Yulong Shen, Xuewen Dong, Wei Tong, Lingxiao Yang:
Link-ability: A Compatibility Prediction Method of Wireless Service based on Markov Process. J. Inf. Sci. Eng. 39(6): 1321-1339 (2023) - [j30]Xinghui Zhu, Zijie Di, Qingsong Yao, Xuewen Dong, Jiandong Wang, Yulong Shen:
Performance-Power Tradeoff in Heterogeneous SaaS Clouds With Trustworthiness Guarantee. IEEE Trans. Computers 72(6): 1554-1567 (2023) - [j29]Yushu Zhang, Jiajia Jiang, Xuewen Dong, Liangmin Wang, Yong Xiang:
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation. IEEE Trans. Cloud Comput. 11(3): 2273-2284 (2023) - [j28]Xuewen Dong, Lingtao Xue, Zhiwei Zhang, Yushu Zhang, Teng Li, Zhichao You, Yulong Shen:
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control. IEEE Trans. Cloud Comput. 11(3): 3139-3152 (2023) - [j27]Di Lu, Minqiang Shi, Xindi Ma, Ximeng Liu, Rui Guo, Tianfang Zheng, Yulong Shen, Xuewen Dong, Jianfeng Ma:
Smaug: A TEE-Assisted Secured SQLite for Embedded Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3617-3635 (2023) - [j26]Sheng Gao, Jingjie Luo, Jianming Zhu, Xuewen Dong, Weisong Shi:
VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning. IEEE Trans. Inf. Forensics Secur. 18: 3760-3773 (2023) - [j25]Xuewen Dong, Yuanyu Zhang, Yuanxiong Guo, Yanmin Gong, Yulong Shen, Jianfeng Ma:
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers. IEEE Trans. Mob. Comput. 22(2): 1143-1156 (2023) - [j24]Xuewen Dong, Zhichao You, Yulong Shen, Di Lu, Yang Xu, Jia Liu:
A Two-Dimensional Sybil-Proof Mechanism for Dynamic Spectrum Access. IEEE Trans. Mob. Comput. 22(11): 6237-6250 (2023) - [j23]Xiangli Xiao, Yushu Zhang, Xuewen Dong, Liangmin Wang, Yong Xiang, Xiaochun Cao:
Fair Outsourcing Paid in Fiat Money Using Blockchain. IEEE Trans. Serv. Comput. 16(3): 1860-1873 (2023) - [j22]Xuewen Dong, Zijie Di, Liangmin Wang, Qingsong Yao, Guangxia Li, Yulong Shen:
Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing. IEEE Trans. Wirel. Commun. 22(7): 4313-4326 (2023) - [c23]Lingxiao Yang, Xuewen Dong, Sheng Gao, Qiang Qu, Xiaodong Zhang, Wensheng Tian, Yulong Shen:
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability. ICDCS 2023: 692-702 - [c22]Xiaodong Zhang, Wei Zhao, Yang Sun, Jun Sun, Yulong Shen, Xuewen Dong, Zijiang Yang:
Testing Automated Driving Systems by Breaking Many Laws Efficiently. ISSTA 2023: 942-953 - [i1]Lingxiao Yang, Xuewen Dong, Sheng Gao, Qiang Qu, Xiaodong Zhang, Wensheng Tian, Yulong Shen:
Optimal Hub Placement and Deadlock-Free Routing for Payment Channel Network Scalability. CoRR abs/2305.19182 (2023) - 2022
- [j21]Wei Tong, Xuewen Dong, Yulong Shen, Yuanyu Zhang, Xiaohong Jiang, Wensheng Tian:
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain. Future Gener. Comput. Syst. 131: 279-291 (2022) - [j20]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang, Zhiwei Zhang:
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity. Future Gener. Comput. Syst. 135: 85-94 (2022) - [j19]Tao Zhang, Anxiao Song, Xuewen Dong, Yulong Shen, Jianfeng Ma:
Privacy-Preserving Asynchronous Grouped Federated Learning for IoT. IEEE Internet Things J. 9(7): 5511-5523 (2022) - [j18]Jiajia Jiang, Yushu Zhang, Youwen Zhu, Xuewen Dong, Liangmin Wang, Yong Xiang:
DCIV: Decentralized cross-chain data integrity verification with blockchain. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 7988-7999 (2022) - [j17]Xuewen Dong, Wen Zhang, Yushu Zhang, Zhichao You, Sheng Gao, Yulong Shen, Chao Wang:
Optimizing Task Location Privacy in Mobile Crowdsensing Systems. IEEE Trans. Ind. Informatics 18(4): 2762-2772 (2022) - [j16]Sheng Gao, Xiuhua Chen, Jianming Zhu, Xuewen Dong, Jianfeng Ma:
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing. IEEE Trans. Serv. Comput. 15(6): 3577-3590 (2022) - [c21]Tao Zhang, Shaojing Yang, Anxiao Song, Guangxia Li, Xuewen Dong:
Dual Adversarial Federated Learning on Non-IID Data. KSEM (3) 2022: 233-246 - [c20]Xinghui Zhu, Yalong Lv, Jia Liu, Xuewen Dong, Lin Li, Jiandong Wang:
A Study of Service Registration and Discovery Techniques in Microservice Architecture. NaNA 2022: 1-6 - [c19]Shiyang Ma, Yahui Li, Zhonghua Wang, Di Lu, Xuewen Dong, Wei Tong, Lingxiao Yang:
Link-ability: A Prediction Method of Web Service Compatibility based on Markov Process. NaNA 2022: 511-516 - 2021
- [j15]Xuewen Dong, Zhichao You, Tom H. Luan, Qingsong Yao, Yulong Shen, Jianfeng Ma:
Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy. IEEE Internet Things J. 8(10): 8032-8043 (2021) - [j14]Di Lu, Ruidong Han, Yulong Shen, Xuewen Dong, Jianfeng Ma, Xiaojiang Du, Mohsen Guizani:
xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices. IEEE J. Sel. Areas Commun. 39(2): 370-383 (2021) - [j13]Xuewen Dong, Liangmin Wang, Qingsong Yao, Yongzhi Wang, Junwei Zhang, Yulong Shen:
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA. IEEE Trans. Veh. Technol. 70(5): 4646-4656 (2021) - [c18]Tao Zhang, Yani Han, Xuewen Dong, Yang Xu, Yulong Shen:
Dual-Target Cross-Domain Bundle Recommendation. SCC 2021: 183-192 - [c17]Jianbo Shao, Yang Xu, Jia Liu, Hiroki Takakura, Zhao Li, Xuewen Dong:
On Strategic Interactions in Blockchain Markets: A Three-stage Stackelberg Game Approach. GLOBECOM 2021: 1-6 - 2020
- [j12]Wei Tong, Xuewen Dong, Yulong Shen, Jiawei Zheng:
BC-RAN: Cloud radio access network enabled by blockchain for 5G. Comput. Commun. 162: 179-186 (2020) - [j11]Di Lu, Ruidong Han, Yue Wang, Yongzhi Wang, Xuewen Dong, Xindi Ma, Teng Li, Jianfeng Ma:
A secured TPM integration scheme towards smart embedded system based collaboration network. Comput. Secur. 97: 101922 (2020) - [j10]Jiawei Zheng, Xuewen Dong, Yulong Shen, Wei Tong:
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT. J. Inf. Sci. Eng. 36(4): 821-836 (2020) - [j9]Yongzhi Wang, Yulong Shen, Cuicui Su, Jiawen Ma, Lingtong Liu, Xuewen Dong:
CryptSQLite: SQLite With High Data Security. IEEE Trans. Computers 69(5): 666-678 (2020) - [j8]Xuewen Dong, Zhichao You, Liangmin Wang, Sheng Gao, Yulong Shen, Jianfeng Ma:
A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation. IEEE Trans. Wirel. Commun. 19(7): 4632-4642 (2020) - [j7]Xuewen Dong, Guangxia Li, Tao Zhang, Di Lu, Yulong Shen, Jianfeng Ma:
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing. World Wide Web 23(2): 1035-1055 (2020) - [c16]Xuewen Dong, Qiao Kang, Qingsong Yao, Di Lu, Yang Xu, Jia Liu:
Towards Primary User Sybil-proofness for Online Spectrum Auction in Dynamic Spectrum Access. INFOCOM 2020: 1439-1448 - [c15]Wei Tong, Wensheng Tian, Xuewen Dong, Lingxiao Yang, Shiyang Ma, Hua Lu:
B-SDN: A Novel Blockchain-based Software Defined Network Architecture. NaNA 2020: 206-212 - [c14]Lingxiao Yang, Xuewen Dong, Wei Tong, Shiyang Ma, Hui Qiao, Siyu Xing:
Secure Off-chain Payment in Consortium Blockchain System. NaNA 2020: 259-264
2010 – 2019
- 2019
- [j6]Xuewen Dong, Feng Wu, Anter Faree, Deke Guo, Yulong Shen, Jianfeng Ma:
Selfholding: A combined attack model using selfish mining with block withholding attack. Comput. Secur. 87 (2019) - [j5]Hui Qiao, Xuewen Dong, Yulong Shen:
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS. J. Medical Syst. 43(11): 321:1-321:13 (2019) - [j4]Xuewen Dong, Tao Zhang, Di Lu, Guangxia Li, Yulong Shen, Jianfeng Ma:
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing. IEEE Trans. Veh. Technol. 68(9): 8881-8892 (2019) - [c13]Jiawei Zheng, Xuewen Dong, Qihang Liu, Xinghui Zhu, Wei Tong:
Blockchain-based secure digital asset exchange scheme with QoS-aware incentive mechanism. HPSR 2019: 1-6 - [c12]Wei Tong, Xuewen Dong, Yulong Shen, Xiaohong Jiang:
A Hierarchical Sharding Protocol for Multi-Domain IoT Blockchains. ICC 2019: 1-6 - [c11]Xuewen Dong, Qiao Kang, Yang Xu, Zhuo Ma, Teng Li:
Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation. INFOCOM Workshops 2019: 1047-1048 - [c10]Hui Qiao, Yangyang Liu, Xuewen Dong, Di Lu:
Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model. NaNA 2019: 290-295 - [c9]Wei Tong, Xuewen Dong, Jiawei Zheng:
Trust-PBFT: A PeerTrust-Based Practical Byzantine Consensus Algorithm. NaNA 2019: 344-349 - [c8]Shiyang Ma, Xuewen Dong, Jiawei Zheng, Xiaozhou Yang, Qihang Liu:
Partial-Equivalence: A Semantic Strategy in Service Composition and Modeling. NaNA 2019: 403-408 - [c7]Xuewen Dong, Qihang Liu, Di Lu, Shiyang Ma, Jiawei Zheng:
QoS-Aware Path Finding and Load Balancing in Service-Composition. NaNA 2019: 409-414 - [c6]Lingxiao Yang, Xuewen Dong, Siyu Xing, Jiawei Zheng, Xinyu Gu, Xiongfei Song:
An Abnormal Transaction Detection Mechanim on Bitcoin. NaNA 2019: 452-457 - 2018
- [j3]Xuewen Dong, Yanmin Gong, Jianfeng Ma, Yuanxiong Guo:
Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks. IEEE Trans. Veh. Technol. 67(7): 6561-6572 (2018) - [c5]Xuewen Dong, Xiaozhou Yang, Yongzhi Wang, Ahmed Salem, Yulong Shen, Jianfeng Ma:
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation. INFOCOM Workshops 2018: 1-2 - [c4]Xuewen Dong, Tao Zhang, Guangxia Li, Di Lu, Balin Tian:
A Privacy-Preserving Incentive Mechanism on Multi-Bid Crowdsourced Spectrum Sensing. NaNA 2018: 7-13 - [c3]Jiawei Zheng, Xuewen Dong, Tao Zhang, Junfeng Chen, Wei Tong, Xiaozhou Yang:
MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data Shareing. NaNA 2018: 350-355 - 2017
- [c2]Yongzhi Wang, Lingtong Liu, Cuicui Su, Jiawen Ma, Lei Wang, Yibo Yang, Yulong Shen, Guangxia Li, Tao Zhang, Xuewen Dong:
CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX. NaNA 2017: 303-308 - 2016
- [j2]Xuewen Dong, Chao Yang, Lijie Sheng, Chao Wang, Jianfeng Ma:
A new method to deduce counterexamples in secure routing protocols based on strand space model. Secur. Commun. Networks 9(18): 5834-5848 (2016) - 2011
- [j1]Chao Yang, Jianfeng Ma, Xuewen Dong:
A New Evaluation Model for Security Protocols. J. Commun. 6(6): 485-494 (2011)
2000 – 2009
- 2009
- [c1]Liqiang Mao, Jianfeng Ma, Xuewen Dong:
Towards Provably Secure On-demand Source Routing in MANET. IAS 2009: 299-302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 21:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint