default search action
Zhuoqun Xia
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Zhuoqun Xia, Guanghui Wang, Bo Yin, Hongrui Li:
Blockchain-based secure transaction mechanism for electric vehicles with multiple temporary identities. Soft Comput. 28(6): 4933-4950 (2024) - [j18]Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Chao Su, Hangyu Hu, Kejun Long:
Secure and Lightweight Vehicular Privacy Preservation Scheme Under Fog Computing-Based IoVs. IEEE Trans. Intell. Veh. 9(2): 4115-4129 (2024) - [c13]Zhuoqun Xia, Xiangyu Lei, Shiyu Wang, Zhenzhen Hu:
A Photovoltaic Power Theft Detection Method based on Data-driven Stacking Model. CSCWD 2024: 1334-1339 - [c12]Zhuoqun Xia, Shiyu Wang, Jingjing Tan, Zhenzhen Hu:
Stacking Ensemble Learning Network Attack Detection Based on Industrial Processes in CPS-Enabled Smart Water Conservancy. CSCWD 2024: 2301-2306 - [c11]Zhuoqun Xia, Kai Lin, Jingjing Tan, Zhenzhen Hu:
Collaborative Detection Method against False Data Injection Attacks in Microgrid Cyber-Physical Systems. CSCWD 2024: 2406-2411 - [c10]Zhuoqun Xia, Jiahao Sun, Jingjing Tan:
Privacy-Preserving Data Sharing in IoV: A Federated Learning and Blockchain-Based Approach. ICC Workshops 2024: 511-516 - [c9]Zhuoqun Xia, Longfei Huang, Jingjing Tan, Faqun Jiang, Zhenzhen Hu:
TIDL-IDS: A Time-Series Imaging and Deep Learning-Based IDS for Connected Autonomous Vehicles. ISC (2) 2024: 269-285 - 2023
- [j17]Zhuoqun Xia, Yaling Chen, Bo Yin, Haolan Liang, Hongmei Zhou, Ke Gu, Fei Yu:
Fed_ADBN: An efficient intrusion detection framework based on client selection in AMI network. Expert Syst. J. Knowl. Eng. 40(4) (2023) - [j16]Zhuoqun Xia, Dan Yin, Ke Gu, Xiong Li:
Privacy-Preserving Electricity Data Classification Scheme Based on CNN Model With Fully Homomorphism. IEEE Trans. Sustain. Comput. 8(4): 652-669 (2023) - [c8]Zhuoqun Xia, Chao Su, Zisang Xu, Kejun Long:
Lightweight Security Authentication Scheme for Vehicle-Road Collaboration using Physical Unclonable Function. ISPA/BDCloud/SocialCom/SustainCom 2023: 169-174 - [c7]Zhuoqun Xia, Ziyu Wang, Xiao Liu:
Partitioning-based Active Trust Mechanism in Cloud-Edge-Device Collaborative Data Collection. ISPA/BDCloud/SocialCom/SustainCom 2023: 183-190 - [c6]Zhuoqun Xia, Hangyu Hu, Wenjing Li, Qisheng Jiang, Chengzhang Zhu, Ziwei Zou:
A Framework for Identifying Diabetic Retinopathy Based on patch attention and lesion location. IJCNN 2023: 1-8 - [c5]Zhuoqun Xia, Qisheng Jiang, Wenjing Li, Hangyu Hu, Chengzhang Zhu, Ziwei Zou:
A Two-stream Channel Cross Enhancement Network for Diabetic Retinopathy Classification. IJCNN 2023: 1-7 - [c4]Zhuoqun Xia, Li Zhang, Arun Kumar Sangaiah:
An Efficient Data Aggregation Solution for Smart Meters Based on Cloud-Edge Collaboration. SCC 2023: 95-107 - 2022
- [j15]Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia:
Two-Dimensional Behavior-Marker-Based Data Forwarding Incentive Scheme for Fog-Computing-Based SIoVs. IEEE Trans. Comput. Soc. Syst. 9(5): 1406-1418 (2022) - [j14]Zhuoqun Xia, Yichao Zhang, Ke Gu, Xiong Li, Weijia Jia:
Secure Multi-Dimensional and Multi-Angle Electricity Data Aggregation Scheme for Fog Computing-Based Smart Metering System. IEEE Trans. Green Commun. Netw. 6(1): 313-328 (2022) - [j13]Zhuoqun Xia, Xiaoxiao Mao, Ke Gu, Weijia Jia:
Dual-Mode Data Forwarding Scheme Based on Interest Tags for Fog Computing-Based SIoVs. IEEE Trans. Netw. Serv. Manag. 19(3): 2780-2797 (2022) - [j12]Zhuoqun Xia, Lingxuan Zeng, Ke Gu, Xiong Li, Weijia Jia:
Conditional Identity Privacy-preserving Authentication Scheme Based on Cooperation of Multiple Fog Servers under Fog Computing-based IoVs. ACM Trans. Internet Techn. 22(4): 107:1-107:28 (2022) - [c3]Zhuoqun Xia, Kaixin Zhou, Jingjing Tan, Hongmei Zhou:
Bidirectional LSTM-based attention mechanism for CNN power theft detection. TrustCom 2022: 323-330 - [c2]Zhuoqun Xia, Hongrui Li, Ke Gu:
CECAS: A cloud-edge collaboration authentication scheme based on V2G short randomizable signature. TrustCom 2022: 429-434 - 2021
- [j11]Zhuoqun Xia, Zhenwei Fang, Ke Gu, Jin Wang, Jingjing Tan, Guanghui Wang:
Effective charging identity authentication scheme based on fog computing in V2G networks. J. Inf. Secur. Appl. 58: 102649 (2021) - [j10]Zhuoqun Xia, Jingjing Tan, Ke Gu, Weijia Jia:
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids. J. Parallel Distributed Comput. 147: 236-247 (2021) - [j9]Zhuoqun Xia, Gaohang Long, Bo Yin:
Confidence-aware collaborative detection mechanism for false data attacks in smart grids. Soft Comput. 25(7): 5607-5618 (2021) - [j8]Zhuoqun Xia, Jingjing Tan, Ke Gu, Xiong Li, Weijia Jia:
IDS Intelligent Configuration Scheme Against Advanced Adaptive Attacks. IEEE Trans. Netw. Sci. Eng. 8(2): 995-1008 (2021) - 2020
- [j7]Miao Du, Kun Wang, Zhuoqun Xia, Yan Zhang:
Differential Privacy Preserving of Training Model in Wireless Big Data with Edge Computing. IEEE Trans. Big Data 6(2): 283-295 (2020)
2010 – 2019
- 2019
- [j6]Zhuoqun Xia, Jingjing Tan, Jin Wang, Runnong Zhu, Hongguang Xiao, Arun Kumar Sangaiah:
Research on Fair Trading Mechanism of Surplus Power Based on Blockchain. J. Univers. Comput. Sci. 25(10): 1240-1260 (2019) - [j5]Zhuoqun Xia, Zhenwei Fang, Fengfei Zou, Jin Wang, Arun Kumar Sangaiah:
Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant. Secur. Commun. Networks 2019: 6956072:1-6956072:13 (2019) - 2018
- [j4]Zhuoqun Xia, Hong Zhou, Ke Gu, Bo Yin, Youyou Zeng, Ming Xu:
Secure Session Key Management Scheme for Meter-Reading System Based on LoRa Technology. IEEE Access 6: 75015-75024 (2018) - [j3]Liang Huang, Suzhi Bi, Li Ping Qian, Zhuoqun Xia:
Adaptive Scheduling in Energy Harvesting Sensor Networks for Green Cities. IEEE Trans. Ind. Informatics 14(4): 1575-1584 (2018) - 2017
- [j2]Zhuoqun Xia, Zhenzhen Hu, Junpeng Luo:
UPTP Vehicle Trajectory Prediction Based on User Preference Under Complexity Environment. Wirel. Pers. Commun. 97(3): 4651-4665 (2017) - [c1]Pengshuai Cui, Peidong Zhu, Peng Xun, Zhuoqun Xia:
Enhance the robustness of cyber-physical systems by adding interdependency. ISI 2017: 203 - 2012
- [j1]Zhuoqun Xia, Zhigang Chen, Xiaoheng Deng, Ming Zhao:
An Enforceable Incentive Scheme in Wireless Multi-path Inter-session Network Coding Game. J. Networks 7(2): 351-356 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:39 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint