2023
[117]
Lili Yan, Jingyi Cui, Jian Liu, Guangquan Xu, Lidong Han, Alireza Jolfaei, Xi Zheng, IGA : An Improved Genetic Algorithm to Construct Weightwise (Almost) Perfectly Balanced Boolean Functions with High Weightwise Nonlinearity. , AsiaCCS 2023, doi: 10.1145/3579856.3590337 (CCF-C)
[116]
Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker, Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters. , IEEE Transactions on Software Engineering (TSE), doi: 10.1109/TSE.2023.3308755 (CCF-A类期刊,SCI一区 Top)
[115]
Guangquan Xu, Zhengbo Han, Lixiao Gong, Litao Jiao, Hongpeng Bai, Shaoying Liu, Xi Zheng, ASQ-FastBM3D: An Adaptive Denoising Framework for Defending Adversarial Attacks in Machine Learning Enabled Systems. , IEEE Transactions on Reliability, doi: 10.1109/TR.2022.3171420 (SCI二区)
[114]
Xiaoming Li, Yi Luo, Neal Xiong, Wei Yu, Guangquan Xu, Changzheng Liu, Xiaoping Yang, Local node feature modeling for edge computing based on network embedding in dynamic networks. , Journal of Parallel and Distributed Computing, doi: 10.1016/j.jpdc.2022.09.013 (SCI二区, CCF-B类期刊)
[113]
Cong Wang, Xiaohang Li, Maode Ma, Tong Zhou, Guangquan Xu, Naixue Xiong, Yiying Zhang, PSAK: A provably secure authenticated key agreement scheme based on extended Chebyshev chaotic maps for smart grid environments. , Transactions on Emerging Telecommunications Technologies, doi: 10.1002/ett.4752
[112]
Guangquan Xu, Chen Qi, Wenyu Dong, Lixiao Gong, Shaoying Liu, Si Chen, Jian Liu, Xi Zheng, A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain. , IEEE Journal of Biomedical and Health Informatics, doi: 10.1109/JBHI.2022.3203577 (SCI一区 Top)
2022
[111]
Guangquan Xu, Guohua Xin, Litao Jiao, Jian Liu, Shaoying Liu ,Meiqi Feng, and Xi Zheng, OFEI: A Semi-black-box Android Adversarial Sample Attack Framework Against DLaaS, IEEE Transactions on Computers, doi: 10.1109/TC.2023.3236872(CCF-A类期刊)
[110]
Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, Kaitai Liang, JSCSP: a Novel Policy-Based XSS Defense Mechanism for Browsers, IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 862-878, 1 March-April 2022. DOI: 10.1109/TDSC.2020.3009472 (CCF-A类期刊,Top期刊)
2021
[109]
Pengli Nie, Guangquan Xu*, Litao Jiao, Shaoying Liu, Jian Liu*, Weizhi Meng, Hongyue Wu*, Meiqi Feng, Weizhe Wang, Zhengjun Jing, and Xi Zheng, Sparse Trust Data Mining,, IEEE Transactions on Information Forensics and Security ( Early Access ), 31 August 2021, DOI: 10.1109/TIFS.2021.3109412. (CCF-A类期刊,Top期刊)
[108]
Gongyu Zhou, Guangquan Xu, Jianye Hao, Shizhan Chen, Junfeng Xu, Xi Zheng, Generalized Centered 2-D Principal Component Analysis, IEEE Transactions on Cybernetics 51(3): 1666-1677 (2021). DOI: 10.1109/TCYB.2019.2931957. (SCI 一区, IF= 10.387)

[107]
Guangquan Xu, Yuyang Zhao, Litao Jiao, Meiqi Feng, Zhong Ji, Emmanouil Panaousis, Si Chen, Xi Zheng, TT-SVD: An Efficient Sparse Decision-Making Model With Two-Way Trust Recommendation in the AI-Enabled IoT Systems, IEEE Internet Things J. 8(12): 9559-9567 (2021) DOI: 10.1109/JIOT.2020.3006066.(SCI一区,IF= 9.515)
2020
[106]
Guangquan Xu, Xiaotong Li, Litao Jiao, Weizhe Wang, Ao Liu, Chunhua Su, Xi Zheng, Shaoying Liu, and Xiaochun Cheng, BAGKD: A Batch Authentication and Group Key Distribution Protocol for VANETs,IEEE Communications Magazine, July 2020, pp. 1-7. DOI: 10.1109/MCOM.001.2000118(SCI一区, IF=10.356)
[105]
Guangquan Xu, Xiaofei Xie, Shuhan Huang, Jun Zhang, Lei Pan, Wei Lou, and Kaitai Liang, JSCSP: a Novel Policy-Based XSS Defense Mechanism for Browsers, IEEE Transactions on Dependable and Secure Computing, Early Access, 20 July 2020, pp. 1-1, DOI: 10.1109/TDSC.2020.3009472 (CCF A类,SCI二区,Top期刊)
[104]
Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang, Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis, Journal of Systems and Software, Volume 167, 2020, 110609, ISSN 0164-1212, https://doi.org/10.1016/j.jss.2020.110609. (CCF-B)
[103]
Guangquan Xu, Bingyan Liu, Litao Jiao, Xiaotong Li, Meiqi Feng, Kaitai Liang, Lei Ma,Xi Zheng, Trust2Privacy: A Novel Fuzzy Trust-to-Privacy Mechanism for Mobile Social Networks, IEEE Wireless Communications, Vol. 27 , No. 3 , June 2020, pp. 72-78. DOI: 10.1109/MWC.001.1900440 (SCI 一区, IF= 11)
[102]
Zhengdi Hu, Guangquan Xu*, Xi Zheng, Jiang Liu, Zhangbing Li, Quan Z. Sheng, Wenjuan Lian, Hequn Xian, SSL-SVD: Semi-Supervised Learning Based Sparse Trust Recommendation, ACM Transactions on Internet Technology, 2020, 20(1):1-20. (CCF-B类,SCI 三区,IF=2.382)
[101]
Guangquan Xu, Wenjuan Zhou, Arun Kumar Sangaiah, Yao Zhang, Xi Zheng, Qiang Tang, Naixue Xiong, Kaitai Liang and Xiaokang Zhou, A Security-Enhanced Certificateless Aggregate Signature Authentication Protocol for InVANETs, IEEE Network, vol. 34, no. 2, pp. 22-29, March/April 2020. DOI: 10.1109/MNET.001.1900035. (SCI 一区,IF=7.503)
[100]
Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng, Kaitai Liang, Duncan S. Wong, Hao Wang, Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum, Computers & Security 88 (2020) 101604, doi: https://doi.org/10.1016/j.cose.2019.101604 (CCF-B类,SCI三区,IF=3.062)
[99]

Zhuobing Han, Xiaohong Li, Guangquan Xu*, Naixue Xiong, Ettore Merlo,Eleni Stroulia, An Effective Evolutionary Analysis Scheme for Industrial Software Access ControlModels, IEEE Transactions on Industrial Informatics, Vol. 16 , Issue 2 , Feb. 2020, pp.1024 - 1034. DOI:10.1109/TII.2019.2925422. (SCI 一区, IF= 7.377)

[98]

Tian Wang, Yuzhu Liang, Yi Yang, Guangquan Xu*, Hao Peng, Anfeng Liu, Weijia Jia, An Intelligent Edge-Computing-Based Method to Counter Coupling Problems in Cyber-Physical Systems, IEEE Network, Vol. 34 , Issue 3 , May/June 2020, pp. 16-22. DOI: 10.1109/MNET.011.1900251 (SCI一区)

[97]
Guangquan Xu, Weizhe Wang, Litao Jiao, Xiaotong Li, Kaitai Liang, Xi Zheng, Wenjuan Lian, Hequn Xian, Honghao Gao, SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications, IEEE Internet Things J. 7(4): 2539-2552 (2020). DOI: 10.1109/JIOT.2019.2944006. (SCI一区,IF= 9.515)

[96]
Yongzhong He, Chao Wang, Guangquan Xu, Wenjuan Li and Hequn Xian, Wei Wang, Privacy-Preserving Categorization of Mobile Applications Based on Large-scale Usage Data, Information Sciences, Volume 514, April 2020, pp. 557-570. https://doi.org/10.1016/j.ins.2019.11.007 (SCI二区,IF=5.524)
[95]

Longpeng Li, Guangquan Xu, Litao Jiao, Xiaotong Li, Hao Wang, Jing Hu, Hequn Xian, Wenjuan Lian, Honghao Gao, A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems, IEEE Transactions on Industrial Informatics 16(3): 2091-2101 (2020). DOI: 10.1109/TII.2019.2927296. (SCI 一区, IF= 7.377)

2019
[94]
Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, Wei Wang, Sensing Users' Emotional Intelligence in Social Networks, IEEE Transactions on Computational Social Systems (Early Access), 16 December 2019, pp. 1-10. DOI: 10.1109/TCSS.2019.2944687

[93]
Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, WeiWang, Polynomial-based modifiable blockchain structure for removing fraud transactions, Future Generation Computer Systems, Volume 99, October 2019, Pages 154-163. https://doi.org/10.1016/j.future.2019.04.028. (SCI 二区,IF=5.768)
[92]
Zhenyu Mao, Yi Su, Guangquan Xu, Xueping Wang, Yu Huang, Weihua Yue, Li Sun, Naixue Xiong, Spatio-temporal deep learning method for ADHD fMRI classification, Information Sciences 499: 1-11 (2019) (SCI 二区,IF=5.524)

[91]
Xiaoming Li, Guangquan Xu*, Wenjuan Lian, Hequn Xian, Litao Jiao, and Yu Huang, Multi-Layer Network Local Community Detection Based on Influence Relation, IEEE Access, Volume 7, 07 June 2019. DOI: 10.1109/ACCESS.2019.2921571 (SCI 二区,IF=4.098)

[90]
Da-Zhi Sun, Ze-Guang Zhu, Guangquan Xu, Wei Guo, One-round provably secure yoking-proof for RFID applications, Concurrency and Computation: Practice and Experience 31(23) (2019) (SCI四区,IF=1.167)
[89]
Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu*, Hequn Xian, Yuanyuan Li, Xiangliang Zhang, Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions, IEEE Access, Volume 7, 22 May 2019, DOI: 10.1109/ACCESS.2019.2918139 (SCI 二区,IF=4.098)
[88]
Guangquan Xu, Yao Zhang, Litao Jiao, Emmanouil Panaousis, Kaitai Liang, Hao Wang, Xiaotong Li, DT-CP: A Double-TTPs Based Contract-signing Protocol with Lower Computational Cost, IEEE Access ( Early Access ), 07 November 2019. DOI: 10.1109/ACCESS.2019.2952213 (SCI 二区,IF=4.098)
[87]
Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, and Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs, ACM Transactions on Intelligent Systems and Technology, Vol. 10, No. 6, Article 64, October 2019, 18 pages. https://doi.org/10.1145/3331147 (SCI二区, IF=2.861)

[86]
Jianan Li, Jun Wu, Guangquan Xu, Jianhua Li, Xi Zheng, Alireza Jolfaei, Integrating NFV and ICN for Advanced Driver Assistance Systems, IEEE Internet of Things Journal ( Early Access ), 18 November 2019. DOI: 10.1109/JIOT.2019.2953988 (SCI一区,IF= 9.515)
[85]
Gaolei Li, Guangquan Xu, Kunmar Sangaiah, Jun Wu, Jianhua Li, EdgeLaaS: Edge Learning as a Service for Knowledge-Centric Connected Healthcare, IEEE Network, Volume: 33 , Issue: 6 , Nov.-Dec. 2019, pp. 37-43. DOI: 10.1109/MNET.001.1900019 (SCI 一区, IF= 7.503)

[84]

Hong-Ning Dai, Hao Wang, Guangquan Xu, Jiafu Wan, Muhammad Imran,Big Data Analytics for Manufacturing Internet of Things: Opportunities,Challenges and Enabling Technologies, Enterprise Information Systems, 24 Jun 2019. DOI: 10.1080/17517575.2019.1633689. (SCI 三区, IF= 2.122)

[83]

Tian Wang, Lei Qiu, Guangquan Xu, Arun Kumar Sangaiah, Anfeng Liu,Energy-efficient and Trustworthy Data Collection Protocol Based on Mobile Fog Computing in Internet of Things, IEEE Transactions on Industrial Informatics (Early Access), 31 May 2019, pp. 1-1. DOI: 10.1109/TII.2019.2920277. (SCI 一区, IF= 7.377)

[82]

Yanrong Lu, Guangquan Xu, Lixiang Li, Yixian Yang, Anonymous three-factor authenticated key agreement for wireless sensor networks, Wireless Networks, May 2019, Volume 25, Issue 4, pp. 1461-1475. DOI: 10.1007/s11276-017-1604-0 (SCI三区,IF=2.405)

[81]

Guangquan Xu, Shuhan Huang, Bingjiang Guo, Ning Zhang, Wenjuan Zhou, Mengdi Liu, Xianjiao Zeng, Ran Wang, Longpeng Li, Data-Driven Security, X.(S.) Shen et al. (eds.), Encyclopedia of Wireless Networks, 4 March, 2019, Springer, Cham. DOI: https://doi.org/10.1007/978-3-319-32903-1_92-1

[80]

Lichen Cheng, Jiqiang Liu, Guangquan Xu, et al., SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs, IEEE Transactions on Computational Social Systems, VOL. 6, NO. 6, DECEMBER 2019, pp. 1373-1385. DOI: 10.1109/TCSS.2019.2904633

[79]

Weixuan Mao, Bo Sun, Guangquan Xu*, Cheng Liu, Chengxiang Si, Wei Wang, Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality, IEEE Access 7: 33380-33392 (2019), DOI: 10.1109/ACCESS.2019.2904333. (SCI 二区,IF=4.098)

[78]

Zhenhu Ning, Guangquan Xu,* Naixue Xiong, Yongli Yang, Changxiang Shen, Emmanouil Panaousis, Hao Wang, Kaitai Liang, TAW: Cost-Effective Threshold Authentication with Weights for Internet of Things, IEEE Access 7: 30112-30125 (2019). https://doi.org/10.1109/ACCESS.2019.2902226. (SCI 二区,IF=4.098)

[77]

Xiaoming Li, Guangquan Xu, Sandhya Armoogum, and Honghao Gao*, Consumers Team Detection Model Based on Trust for Multi-Level, Mobile Information Systems, Mobile Information Systems 2019: 4147859:1-4147859:10 (2019). https://doi.org/10.1155/2019/4147859. (SCI四区,,IF=1.635)

[76]
Xianjiao Zeng, Guangquan Xu, Xi Zheng, Yang Xiang, and Wanlei Zhou, E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT, IEEE Internet of Things Journal 6(2): 1506-1519, April 2019. DOI:10.1109/JIOT.2018.2847447. (SCI一区,IF= 9.515, EI: 20182505341572) ESI High Citation

[75]
Guangquan Xu, Yao Zhang, Arun K Sangaiah, Xiaohong Li, Aniello Castiglione, Xi Zheng, CSP-E^2: An abuse-free Contract Signing Protocol with low-storage TTP for energy-efficient electronic transactions ecosystems, Information Sciences 476 (2019) 505-515. DOI: 10.1016/j.ins.2018.05.022.(SCI二区,IF=5.524, WOS: 000452342700032, EI: 20182805526802) ESI High Citation

2018
[74]

Yang Zhao, Guangquan Xu,Yao Zhang, HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method,   Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, v 234 LNICST, p 248-257, 2018, Quality, Reliability, Security and Robustness in Heterogeneous Systems - 13th International Conference, QShine 2017.

[73]

Guangquan Xu, Jia Liu, Yanrong Lu *, Xianjiao Zeng, Yao Zhang, Xiaoming Li, A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks,   Journal of Network & Computer Applications 107 (2018) 83–92. (SCI二区, IF=3.5,WOS: 000428009500006 DOI: 10.1016/j.jnca.2018.02.003)

[72]

Chen Liu, Dingyi Fang, Yue Hu, Shensheng Tang, Dan Xu, Wen Cui, Xiaojiang Chen, Baoying Liu, Guangquan Xu, Hao Chen, EasyGo: Low-cost and robust geographic opportunistic sensing routing in a strip topology wireless sensor network. Computer Networks 143: 191-205 (2018)

[71]

Xiaohong Li, Feng Liu, Zhiyong Feng, Guangquan Xu*, Zhangjie Fu, A novel optimized vertical handover framework for seamless networking integration in cyber-enabled systems, Future Generation Computer Systems, 79 (2018) 417-430. doi:10.1155/2017/6310827. (SCI二区,IF=3.997, WOS: 000418968400039, EI: 20171903659163)

[70]

Xiaokang Zhou, Guangquan Xu, Jianhua Ma, Ivan Ruchkin, Scalable platforms and advanced algorithms for IoT and cyber-enabled applications, Journal of Parallel and Distributed Computing118(Part): 1-4 (2018)

[69]

Ran Wang, Guangquan Xu*, Xianjiao Zeng, Xiaohong Li, Zhiyong Feng, TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting, Journal of Parallel and Distributed Computing, Vol.118, Part 1, August 2018, pp. 100-106. DOI: 10.1016/j.jpdc.2017.07.006, (CCF-B,SCI三区,IF=1.930, WOS: 000434003300011, EI: 20173604121105)

[68]

XiaoMing Li, Guangquan Xu, Minghu Tang, Community detection for multi-layer social network based on local random walk, J. Visual Communication and Image Representation 57: 91-98 (2018)

[67]

Ning Zhang, Guangquan Xu*, Guozhu Meng, Xi Zheng, SoProtector: Securing Native C/C++ Libraries for Mobile Applications, ICA3PP (3) 2018: 417-431

[66]

Mengdi Liu, Guangquan Xu*, Jun Zhang, Rajan Shankaran, Gang Luo, Xi Zheng, Zonghua Zhang, Roundtable Gossip Algorithm: A Novel Sparse Trust Mining Method for Large-Scale Recommendation Systems, ICA3PP (4) 2018: 495-510

2017
[65]

Ran Wang, Guangquan Xu, Bin Liu, Yan Cao, and Xiaohong Li, Flow Watermarking for Antinoise and Multistream Tracing in Anonymous Networks,   IEEE MultiMedia , 2017, vol.24, no.4, pp.38-47. (SCI三区,IF=2.849, WOS:000415691200006)

[64]

G. Xu; Y. Cao; Y. Ren; X. Li; Z. Feng, Network Security Situation Awareness Based on Semantic Ontology and User-defined Rules for Internet of Things,  IEEE Access , 2017, vol.PP, no.99, pp.1-1. DOI: 10.1109/ACCESS.2017.2734681. (SCI三区,IF=3.244)

[63]

Li Y, Xu GQ, Xian HQ, Rao LL, Shi JG, Novel Android Malware Detection Method Based on Multi-dimensional Hybrid Features Extraction and Analysis, INTELLIGENT AUTOMATION AND SOFT COMPUTING, Vol.25, No.3, Sep. 2019, pp. 637-647. DOI: 10.31209/2019.100000118

[62]

Feng Guo, Guangquan Xu*, Ning Zhang, Kaili Qiu, POQAS-S: a Novel Programmer-Oriented Online Question Answering System With Semantic Comprehension, Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering (SEKE 2017), Pittsburgh, USA, July 5-7, 2017, pp. 52-56. DOI: 10.18293/SEKE2017-190. (CCF-C类)

[61]

Xiaoming Li, Guagquan Xu, Litao Jiao, Yinan Zhou, Wei Yu, Multi-layer network community detection model based on attributes and social interaction intensity, Computers and Electrical Engineering 77 (2019) 300-313. (SCI四区, IF= 1.747)

[60]

Yang Zhao, Guangquan Xu*, Yao Zhang, HFA-MD: An Efficient Hybrid Features Analysis Based Android Malware Detection Method, Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, v 234 LNICST, p 248-257, 2018, Quality, Reliability, Security and Robustness in Heterogeneous Systems - 13th International Conference, QShine 2017. (EI: 20181605008642)

[59]

Zhai, You; Xu, Guangquan; Zhang, Yao, A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature, 2017 International Conference on Networking and Network Applications, NaNA 2017, pp. 279-285.(EI: 20182705520723)

[58]

Qi Guo, Xiaohong Li, Guangquan Xu*, and Zhiyong Feng, MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection Method for Wireless Sensor Networks, Future Generation Computer Systems, Volume 70, May 2017, Pages 42-47. (SCI二区,,IF=3.997, WOS: 000394401800005, EI: 20164903082164)

[57]

Guangquan Xu, Gaoxu Zhang, Chao Xu, Bin Liu, Mingquan Li, Yan Ren, Xiaohong Li, Zhiyong Feng & Degan Zhang, A multi-attribute rating based trust model: improving the personalized trust modeling framework, Multimedia Tools and Applications-An International Journal, 76(4), April 2017, pp. 5833-5849. DOI: 10.1007/s11042-015-2539-z (SCI四区,,IF=1.331, WOS: 000397020500051, EI: 20151100646285)

[56]

Hongbo Li, Xiaohong Li, Jianye Hao, Guangquan Xu, Zhiyong Feng, Xiaofei Xie, FESR: A Framework for Eliciting Security Requirements Based on Integration of Common Criteria and Weakness Detection Formal Model. QRS 2017: 352-363

[55]

Jiangjuan Wang, Xiaohong Li, Zhiyong Feng, Jianye Hao, Guangquan Xu, Zhuobing Han, Automated Software Security Requirements Recommendation Based on FT-SR Model. SEKE 2017: 382-385.

[54]

Da-Zhi Sun, Guangquan Xu, One-Round Provably Secure Yoking-Proof for RFID Applications. TrustCom/BigDataSE/ICESS 2017: 315-322.

[53]

Wen-jun Wang, Xiao-ming Li, Peng-fei Jiao, Guang-quan Xu, Ning Yuan, and Wei Yu, Exploring Intracity Taxi Mobility during the Holidays for Location-Based Marketing, Mobile Information Systems, vol. 2017, Article ID 6310827, 10 pages, 2017. doi:10.1155/2017/6310827. (SCI四区, IF=0.849)

2016
[52]

Hua He, Guangquan Xu*, Shanchen Pang, Zenghua Zhao, AMTS: Adaptive Multi-objective Task Scheduling Strategy in Cloud Computing, China Communications, 2016, 13(4):162-171. (SCI四区,IF=0.903)

[51]

Xiaohong Li, Jiayi Xu† and Guangquan Xu*, Fepchecker: An Automatic Model Checker for Verifying Fairness and Non-Repudiation of Security Protocols in Web Service, International Journal of Software Engineering and Knowledge Engineering, Vol. 26, No. 4 (2016), 563–585. (SCI四区,IF= 0.299)

[50]

Guangquan XU*, Yuanyuan REN, Yuanbin Han, Member, Xiaohong Li, and Zhiyong FENG, Privacy Protection Method Based on Two-Factor Authentication Protocol in FRID Systems, IEICE  Trans. on Information and Systems, Vol.E99-D,No.8, pp.2019-2026, Aug. 2016.(SCI四区,IF=0.411)

[49]

Qi Guo,Xiaohong Li, Guangquan Xu*, and Zhiyong Feng, MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection Method for Wireless Sensor Networks, Future Generation Computer Systems, Volume 70, May 2017, Pages 42-47. (SCI二区,IF=3.997)

[48]

Guangquan Xu*, Yan Cao, Yao Zhang, Gaoxu Zhang, Xiaohong Li, Zhiyong Feng, TRM: Computing Reputation Score by Mining Reviews, AAAI WIT-EC 2016, February 12–17, Phoenix, Arizona USA.

2015
[47]

Tian, Dongdong; Li, Xiaohong; Hu, Jing; Xu, Guangquan; Feng, Zhiyong, API-level Multi-policy Access Control Enforcement for Android Middleware , 11th EAI International Conference on Security and Privacy in Communication Networks, OCTOBER 26, 2015, DALLAS, UNITED STATES. (CCF Tier-C conference)

[46]

Chao Xu, Zeping Lu, Guangquan Xu*, Zhiyong Feng, Hongyan Tan, and Haifeng Zhang, 3D Reconstruction of Tree-Crown Based on the UAV Aerial Images, Mathematical Problems in Engineering, Volume 2015 (2015), Article ID 318619, 8 pages http://dx.doi.org/10.1155/2015/318619 (SCI四区,IF=0.644)

[45]
张德干,许光全,孙达志,可信物联网技术,科学出版社,2015.10.

[44]

Guangquan Xu, Yuanyuan Ren, Bin Liu, Gaoxu Zhang, Xiaohong Li and Zhiyong Feng, PEM4RFID: Privacy Enhancement Model for RFID Systems, 15th International Conference on Algorithms and Architectures for Parallel Processing, Zhangjiajie, China, November 18-20, 2015(CCF Tier-C conference)

[43]

Guangquan Xu*, Bin Liu, Yuanyuan Ren, Runhe Huang, Gaoxu Zhang, Zhiyong Feng, Xiaohong Li, Towards Trustworthy Participants in Social Participatory Networks, The 2nd IEEE International Conference on Cyber Security and Cloud Computing, Nov. 3-5, 2015, New York, USA

[42]

Qi Guo, Xiaohong Li, Zhiyong Feng and Guangquan Xu*, MPOID:Multi-Protocol Oriented Intrusion Detection Method for Wireless Sensor Networks, 2015 IEEE 17th International Conference on High Performance Computing and Communications (HPCC) , AUG 24-26, 2016 , August 24-26, 2015, New York, USA, pp. 1512-1517.DOI: 10.1109/HPCC-CSS-ICESS.2015.283 (CCF C)

[41]

Guangquan Xu*, Yan Ren, Gaoxu Zhang, Bin Liu, Xiaohong Li, Zhiyong Feng, HyCPK: Securing Identity Authentication in ubiquitous computing, The 12th IEEE International Conference on Ubiquitous Intelligence and Computing, August 10-14, 2015, Beijing, China (CCF Tier-C conference)

[40]

Guangquan Xu, Gaoxu Zhang, Chao Xu, Bin Liu, Mingquan Li, Yan Ren, Xiaohong Li, Zhiyong Feng & Degan Zhang, A multi-attribute rating based trust model: improving the personalized trust modeling framework, Multimedia Tools and Applications-An International Journal, 76(4), April 2017, pp. 5833-5849. DOI: DOI 10.1007/s11042-015-2539-z (SCI四区,IF=1.331)

2014
[39]

Xiao Yingyuan, Jiang Tao,  Li Yukun, Xu Guangquan, Data interpolating over RFID data streams for missed readings, Web-Age Information Management - WAIM 2013, Lecture Notes in Computer Science, 2013, pp. 257-265. (EI: 20140617265094)

[38]

XiaoHong Li, Ke He, Zhiyong Feng, Guangquan Xu*, Unified Threat Model for Analyzing and Evaluating Software Threats,Security and Communication Networks,Vol. 7, No.10, OCT 2014, 1454-1466. (SCI四区: AQ7OW, IF=0.720,EI: 201444145153)

[37]

Shuai Zhao, Xiaohong Li, Guangquan Xu*, Lei Zhang, Zhiyong Feng, Attack Tree Based Android Malware Detection with Hybrid Analysis, 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2014), 24-26 Sept. 2014, pp.380-387. DOI: 10.1109/TrustCom.2014.49 ( CCF Tier-C Conference)

[36]

Gang Shen, Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng, An Extended UML Method for the Verification of Security Protocols , 2014 19th International Conference on Engineering of Complex Computer Systems, p 19-28, 2014. (CCF Tier-C Conference, EI: 201445163783)

[35]

Xiaoru Li, Xiaohong Li, Guangquan Xu, Jing Hu, Zhiyong Feng, Formal analysis of fairness for optimistic multiparty contract signing protocol, Journal of Applied Mathematics, p 983204 (10 pp.), 2014. (SCI: AK0EM)

[34]

Xiaofei Wu , Xiaohong Li, Ruitao Feng, Guangquan Xu, Jing Hu, Zhiyong Feng, OOPN-SRAM: A Novel Method for Software Risk Assessment, 2014 19th International Conference on Engineering of Complex Computer Systems, p 150-3, 2014. (CCF Tier-C Conference, EI: 201445163799)

2013
[33]

Da-Zhi Sun, Jian-Xin Li, Zhi-Yong Feng, Zhen-Fu Cao, and Guang-Quan Xu, On the security and improvement of a two-factor user authentication scheme in wireless sensor networks, ACM/Springer Personal and Ubiquitous Computing 7(5) (2013) 895-905. (SCI, EI)

[32]

Xu R., Xu G., Sun D., Li X., Feng Z. (2015) Improving KeyNote Trust Management Model Based on User Behavior for Social Learning. In: Chiu D. et al. (eds) Advances in Web-Based Learning – ICWL 2013 Workshops. ICWL 2013. Lecture Notes in Computer Science, vol 8390. Springer, Berlin, Heidelberg. DOI: https://doi.org/10.1007/978-3-662-46315-4_10 (EI)

[31]

Xiuming Tian, Guangquan Xu*, Xiaohong Li, Zhiyong Feng, Dazhi Sun, Personalized Recommendation Based on Information Flow in Data Intensive Services, Journal of Internet Technology, Vol. 14, No.5, Sep. 2013, pp. 825-834. (SCI四区: 229CJ,IF=0.418 , EI: 20135117113652)

[30]
Guangquan Xu*,Weisheng Li, Rui Xu, Yingyuan Xiao,Honghao Gao,Xiaohong Li ,Zhiyong Feng , Jia Mei, An Algorithm on Fairness Verification of Mobile Sink Routing in Wireless Sensor Network, ACM/Springer Personal and Ubiquitous Computing, Vol. 17, No.5, June 2013, pp. 851-864. (SCI三区: 206KV,IF=1.616, EI: 20133716721881)
[29]
Guangquan Xu*, Xiuming Tian, Xiaochun Cao, Zhiyong Feng, Xiaohong Li, Rui Xu, TPS_DR: A Universal Reducing Algorithm on Optimal Trust Path Selection in Complex Sensor Network, Applied Mathematics & Information Sciences, Vol. 7, No. 1L , Feb. 2013, pp. 161-167 (SCI三区: 126PP,IF=1.232)
[28]
Chao Xu, Guangquan Xu, Xiaohong Li, Zhiyong Feng, Zhaopeng Meng, Approach to Security Attack Pattern Networks on the Basis of Bayesian Networks, Appl. Math. Inf. Sci., Vol. 7, No. 1L (Feb. 2013), pp. 233-241. (SCI: 126PP)
[27]
Chao Xu, Qinghua Hu, Guangquan Xu & Zhiyong Feng, An approach to facial expression analysis with multi-model interactions, International Journal of Computer Mathematics, 11 Jun 2013. (SCI: AT9US)
2012
[26]
Xiao YY, Zhang H, Xu GQ, Wang JS, A Prediction Recovery Method for Supporting Real-Time Data Services, Appl. Math. Inf. Sci.,vol.6, no.2, SI, 2012, pp. 363S-369S. (SCI)
[25]
XiaoHong Li, Ke He, Zhiyong Feng, Guangquan Xu, Unified Threat Model for Analyzing and Evaluating Software Threats,Security and Communication Networks, 5 JUL 2012 (SCI)
[24]
Meng Lingling,Xu Rui,Li Xiaohong,Xu Guangquan, The improvements of KeyNote trust management system, International Journal of Digital Content Technology and its Applications, vol.6, no.3,February 2012,pp. 177-185.(EI: 20121114855005)
[23]
Zhai Min,Tian Xiuming,Li Xiaohong,Ma Jingli,Xu Guangquan, A dynamic trust sense collection model based on fuzzy reasoning, International Journal of Digital Content Technology and its Applications, vol.6, no.3, February 2012, pp. 186-192. (EI: 20121114855006)
[22]
Xu Guangquan, Xu Chao, Tian Xiuming, Zhang Lvxia, Li, Xiaohong ,Li Weisheng, PSO-TPS: An Optimal Trust Path Selection Algorithm Based on Particle Swarm Optimization in Small World Network, 2012 Second International Conference on Cloud and Green Computing (CGC), Xiangtan, China, 1-3 Nov. 2012, pp. 594- 600. (EI: 20131116103191)
2011
[21]
XU Guangquan, PANG Shanchen, GAO Honghao, XIAO Yingyuan, LI Xiaohong and FENG Zhiyong, State/Action-based Fairness Verification for Non-determinism,Chinese Journal of Electronics, Vol.20, No.4, Oct. 2011, pp. 603-606 (SCI四区: 837EV,IF=0.147, EI: 20114514491685)
2010
[20]
Guangquan Xu, Xiaohong Li, Zhiyong Feng, Yingyuan Xiao, Ontology Driven Formal Description of Swift Trust and Its Computational Model, WCSE2010, pp.126-129 (EI: 20111313852916)
[19]
Chunjuan Zhao, Yingyuan Xiao, Xiaoye Wang, Guangquan Xu, A Web Service Matching Mechanism Based on QoS and Semantic, In Proceedings of IEEE the 3rd International Conference on Computer and Electrical Engineering (ICCEE2010), Nov. 16-18, 2010.(EI)
[18]
Jiafang Wang, Zhiyong Feng and Guangquan Xu, Research on Trust Framework in Multi—Agent System from the Cognitive View, Chinese Journal of Computers, Jan 2010, Vo1.33 No.1, pp.139-151.(selected excellent paper from CCF China National Computer Congress, CNCC2009).(in Chinese). (EI: 20101212786202)
[17]
Qingwei Shi, Guangquan Xu and Xinhai Wang, Study on Text Retrieval in Structured P2P Network, Computer Engineering, June 2010, Vol.36, No.12, pp.43-45, 51.(in Chinese)
[16]
Guangquan Xu, Zhiyong Feng, Xiaohong Li and Jinyan Chen, Computational trust evaluation model based on temporal sequential marker, Journal of Computer Applications, Mar. 2010, Vol. 30, No. 3, pp.93-97, 127. (in Chinese)
2009
[15]
Guangquan Xu, Zhiyong Feng, Xiaohong Li, Hutong Wu, Yongxin Yu, Shizhan Chen, and Guozheng Rao, TSM-Trust: a Time-Cognition Based Computational Model for Trust Dynamics, S. Qing, C.J. Mitchell, and G. Wang (Eds.): ICICS 2009, Beijing, China, LNCS 5927, 2009.12, pp. 385–395 (EI: 20100712713847)
[14]
Jie Chen, Guangquan Xu, SVM-Based Swift Trust Rating Model in E-commerce, the 2009 First International Workshop on Education Technology and Computer Science, etcs, vol. 1, pp.640-643, 2009 (EI ).
[13]
Qingwei Shi, Xinhai Wang, Guangquan Xu, Text Retrieval in Small World P2P Networks, International Symposium on Computer Network and Multimedia Technology (CNMT 2009), Wuhan, China, 18-20 Jan. 2009, pp. 1- 4.(EI)
[12]
Xiaohui Yang,Zhiyong Feng,Guangquan Xu, An active model of agent mind: The model of agent's lived experience,Proceedings - 2009 International Conference on Information Engineering and Computer Science, ICIECS 2009, 2009, pp.1-3.(EI)
2008
[11]
Xiaohui Yang ,Zhiyong Feng and Guangquan Xu, The Automatic Formation of Agent Societies: A Service-Driven Approach, International Conference on Advanced Language Processing and Web Information Technology, 2008, pp556-561 (EI).
[10]
Huabei Wu, Jizhou Sun, Ce Yu and Guangquan Xu, Java-based Parallel Skeleton Model for Concurrent Programming on Multicore Platform, Proceedings of International Conference on Information Technology and Environmental System Science, Jiao zuo,China,15-17 May 2008,volume 4,pp362-365 (EI ).
[9]
Huabei Wu, Jizhou Sun, Guangquan Xu, On the Trust Decision in Virtual Society: using the Least Point Principle in Dempster- Shafer Theory of Belief Functions, Proceedings of the Fourth International Conference on Natural Computation, Jinan, Shandong, China,18-20 October 2008 (EI)
[8]
Jie Chen, Guangquan Xu, On trust reasoning model based on fuzzy sets theory in trustable software system, Journal of Tianjin Normal University(Natural Science Edition), 0ct.2008, V0l. 28, No.4, pp. 77-80. (in Chinese)
2007
[7]
Guangquan Xu, Zhiyong Feng,Huabei Wu and Dexin Zhao,Swift Trust in Virtual Temporary System: A Model Based on Dempster-Shafer Theory of Belief Functions, International Journal of Electronic Commerce(IJEC), Fall 2007, Vol. 12, No. 1, pp. 93-127. (SCI: 222GP)
[6]
Guangquan Xu, Zhiyong Feng, Gang Wang and Huabei Wu, An Improvement of Coleman Model of Trust: Using Fuzzy Non-Homogeneous Markov System to Manage Reputation in Multi-Agent Systems, the 2007 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology-Workshops,Silicon Valley,USA,2007.11,pp. 319–322. (EI: 20083111428120)
[5]
Dexin Zhao, Zhiyong Feng, Qing Yu, Guangquan Xu, A Fuzzy Extension of OWL for Vague Knowledge, In: Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007) 2007, Vol.4,pp.312-316. (EI).
2006
[4]
Jiying Shi, Lei Zhang, Mingzeng Cao and Guangquan Xu, An Encription Algorithm of Distributed System Based on Chaos, Computer Simulation, June 2006, Vol. 23, No. 6, pp. 137-138, 170. (in Chinese)
2005
[3]
Jiying Shi, Liang Yang, Guangquan Xu and Baoci Chen, Discrete Model of PWM Boost Converter Based on Z-Transform and its Chaos Simulation, Computer Simulation, Apr. 2005, Vol. 22, No.4, pp. 40-42. (in Chinese)
[2]
Jiying Shi, Baoci Chen and Guangquan Xu, Application of Wavelet Networks in Buck Converter, Computer Simulation, Nov. 2005, Vol. 22, No.11, pp. 303-306. (in Chinese)
[1]
Jiying Shi, Guangquan Xu, Lei Zhang and Shutang Zhou, Research on VPN Solution Based on Windows 2000 in Distance Education University, Microcomputer Applications, Vol. 21,No. 12,2005, pp. 50-51, 60. (in Chinese)