default search action
Xiaoling Tao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Xiaoling Tao, Shen Lu, Feng Zhao, Rushi Lan, Longsheng Chen, Lianyou Fu, Ruchun Jia:
User Behavior Threat Detection Based on Adaptive Sliding Window GAN. IEEE Trans. Netw. Serv. Manag. 21(2): 2493-2503 (2024) - [c10]Changsong Yang, Ping Li, Yong Ding, Xiaoling Tao, Huiyong Wang, Ruwen Zhao:
A new SM2-based ring signature scheme with revocability and anonymity. CSCWD 2024: 2454-2459 - 2023
- [j35]Xiaoling Tao, Ziyi Liu, Feng Zhao, Rushi Lan, Runrong Liu, Lianyou Fu, Yifu Ouyang:
An SSA-LC-DAE Method for Extracting Network Security Elements. IEEE Trans. Netw. Sci. Eng. 10(2): 1175-1185 (2023) - 2022
- [c9]Xiaoling Tao, Runrong Liu, Lianyou Fu, Qiqi Qiu, Yuelin Yu, Haijing Zhang:
An Effective Insider Threat Detection Apporoach Based on BPNN. WASA (1) 2022: 231-243 - 2021
- [j34]Xiaoling Tao, Yang Peng, Feng Zhao, Changsong Yang, Baohua Qiang, Yufeng Wang, Zuobin Xiong:
Gated recurrent unit-based parallel network traffic anomaly detection using subagging ensembles. Ad Hoc Networks 116: 102465 (2021) - [j33]Changsong Yang, Feng Zhao, Xiaoling Tao, Yong Wang:
Publicly verifiable outsourced data migration scheme supporting efficient integrity checking. J. Netw. Comput. Appl. 192: 103184 (2021) - [j32]Xiaoling Tao, Zi-yi Liu, Chang-song Yang:
An Efficient Network Security Situation Assessment Method Based on AE and PMU. Wirel. Commun. Mob. Comput. 2021: 1173065:1-1173065:9 (2021) - [j31]Xiaoling Tao, Lan Shi, Feng Zhao, Shen Lu, Yang Peng:
A Hybrid Alarm Association Method Based on AP Clustering and Causality. Wirel. Commun. Mob. Comput. 2021: 5576504:1-5576504:10 (2021) - [j30]Xiaofeng Wu, Fangyuan Ren, Yiming Li, Zhenwei Chen, Xiaoling Tao:
Efficient Authentication for Internet of Things Devices in Information Management Systems. Wirel. Commun. Mob. Comput. 2021: 9921036:1-9921036:14 (2021) - 2020
- [j29]Changsong Yang, Yueling Liu, Xiaoling Tao, Feng Zhao:
Publicly Verifiable and Efficient Fine-Grained Data Deletion Scheme in Cloud Computing. IEEE Access 8: 99393-99403 (2020) - [j28]Yong Wang, Xiaoling Tao, Feng Zhao, Bo Tian, Akshita Maradapu Vera Venkata Sai:
SLA-aware resource scheduling algorithm for cloud storage. EURASIP J. Wirel. Commun. Netw. 2020(1): 6 (2020) - [j27]Changsong Yang, Yueling Liu, Xiaoling Tao:
Assure deletion supporting dynamic insertion for outsourced data in cloud computing. Int. J. Distributed Sens. Networks 16(9): 155014772095829 (2020) - [j26]Xiaoling Tao, Kaichuan Kong, Feng Zhao, Siyan Cheng, Sufang Wang:
An efficient method for network security situation assessment. Int. J. Distributed Sens. Networks 16(11): 155014772097151 (2020) - [j25]Changsong Yang, Xiaoling Tao, Qiyu Chen:
New Publicly Verifiable Data Deletion Supporting Efficient Tracking for Cloud Storage. Int. J. Netw. Secur. 22(5): 885-896 (2020) - [c8]Xiaoling Tao, Yang Peng, Feng Zhao, Sufang Wang, Ziyi Liu:
An Improved Parallel Network Traffic Anomaly Detection Method Based on Bagging and GRU. WASA (1) 2020: 420-431 - [c7]Changsong Yang, Xiaoling Tao, Sufang Wang, Feng Zhao:
Data Integrity Checking Supporting Reliable Data Migration in Cloud Storage. WASA (1) 2020: 615-626
2010 – 2019
- 2019
- [j24]Zhiwei Zhang, Xiaofeng Chen, Jianfeng Ma, Xiaoling Tao:
New efficient constructions of verifiable data streaming with accountability. Ann. des Télécommunications 74(7-8): 483-499 (2019) - [j23]Changsong Yang, Xiaoling Tao, Feng Zhao:
Publicly verifiable data transfer and deletion scheme for cloud storage. Int. J. Distributed Sens. Networks 15(10) (2019) - [j22]Yuan Ni, Zhiwei Zhang, Xiaoling Tao:
A new scheme for improving the utilisation of nested-cloud resources. Int. J. Embed. Syst. 11(2): 170-181 (2019) - [j21]Ping Chen, Zhiying Wang, Xiaoling Tao:
A new efficient privacy-preserving data publish-subscribe scheme. Int. J. Embed. Syst. 11(3): 374-385 (2019) - [j20]Bingpeng Ou, Jingjing Guo, Xiaoling Tao:
An efficient privacy-preserving friendship-based recommendation system. Int. J. Embed. Syst. 11(4): 516-525 (2019) - [j19]Ziao Liu, Tao Jiang, Xiaoling Tao:
A result correctness verification mechanism for cloud computing based on MapReduce. Int. J. Embed. Syst. 11(4): 526-539 (2019) - [j18]Kai Nie, Yunling Wang, Xiaoling Tao:
Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing. Int. J. Embed. Syst. 11(6): 707-718 (2019) - [j17]Huixia Huo, Tao Jiang, Shichong Tan, Xiaoling Tao:
Efficient public integrity auditing with secure deduplication in cloud computing. Int. J. Embed. Syst. 11(6): 764-777 (2019) - [j16]Haoxuan Li, Hui Huang, Shichong Tan, Ning Zhang, Xiaotong Fu, Xiaoling Tao:
A new revocable reputation evaluation system based on blockchain. Int. J. High Perform. Comput. Netw. 14(3): 385-396 (2019) - [j15]Zhiwei Zhang, Xiaofeng Chen, Jin Li, Xiaoling Tao, Jianfeng Ma:
HVDB: a hierarchical verifiable database scheme with scalable updates. J. Ambient Intell. Humaniz. Comput. 10(8): 3045-3057 (2019) - [j14]Xiaoling Tao, Liyan Liu, Feng Zhao, Yan Huang, Saide Zhu, Yi Liang:
Ontology and Weighted D-S Evidence Theory-Based Vulnerability Data Fusion Method. J. Univers. Comput. Sci. 25(3): 203-221 (2019) - [c6]Changsong Yang, Xiaoling Tao, Feng Zhao, Yong Wang:
A New Outsourced Data Deletion Scheme with Public Verifiability. WASA 2019: 631-638 - 2018
- [j13]Xiaoling Tao, Yang Liu, Feng Zhao, Changsong Yang, Yong Wang:
Graph database-based network security situation awareness data storage method. EURASIP J. Wirel. Commun. Netw. 2018: 294 (2018) - [j12]Xiaoling Tao, Yang Peng, Feng Zhao, Peichao Zhao, Yong Wang:
A parallel algorithm for network traffic anomaly detection based on Isolation Forest. Int. J. Distributed Sens. Networks 14(11) (2018) - [j11]Yang Li, Xiaoling Tao, Wei Wu, Joseph K. Liu:
GO-CP-ABE: group-oriented ciphertext-policy attribute-based encryption. Int. J. Embed. Syst. 10(1): 62-70 (2018) - [j10]Yong Wang, Xiaoling Tao, Jianbing Ni, Yong Yu:
Data integrity checking with reliable data transfer for secure cloud storage. Int. J. Web Grid Serv. 14(1): 106-121 (2018) - [j9]Jingjing Wang, Xiaoyu Zhang, Xiaoling Tao, Jianfeng Wang:
EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing. J. High Speed Networks 24(3): 259-279 (2018) - [j8]Hongyu Li, Liehuang Zhu, Meng Shen, Feng Gao, Xiaoling Tao, Sheng Liu:
Blockchain-Based Data Preservation System for Medical Data. J. Medical Syst. 42(8): 141:1-141:13 (2018) - [c5]Dulin, Zhiwei Zhang, Shichong Tan, Jianfeng Wang, Xiaoling Tao:
An Associated Deletion Scheme for Multi-copy in Cloud Storage. ICA3PP (4) 2018: 511-526 - [c4]Changsong Yang, Jianfeng Wang, Xiaoling Tao, Xiaofeng Chen:
Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage. ICICS 2018: 445-458 - 2017
- [j7]Jinfeng Liu, Jianfeng Wang, Xiaoling Tao, Jian Shen:
Secure similarity-based cloud data deduplication in Ubiquitous city. Pervasive Mob. Comput. 41: 231-242 (2017) - [j6]Li Zang, Yong Yu, Liang Xue, Yannan Li, Yujie Ding, Xiaoling Tao:
Improved dynamic remote data auditing protocol for smart city security. Pers. Ubiquitous Comput. 21(5): 911-921 (2017) - 2016
- [j5]Yafang Zhang, Jianbing Ni, Xiaoling Tao, Yong Wang, Yong Yu:
Provable multiple replication data possession with full dynamics for secure cloud storage. Concurr. Comput. Pract. Exp. 28(4): 1161-1173 (2016) - [j4]Yong Wang, Wenlong Ke, Xiaoling Tao:
A Feature Selection Method for Large-Scale Network Traffic Classification Based on Spark. Inf. 7(1): 6 (2016) - [j3]Xiaoling Tao, Deyan Kong, Yi Wei, Yong Wang:
A Big Network Traffic Data Fusion Approach Based on Fisher and Deep Auto-Encoder. Inf. 7(2): 20 (2016) - [j2]Xiaoling Tao, Deyan Kong, Yong Wang:
A parallelized network traffic classification framework based on selective ensemble and diversity measures. J. High Speed Networks 22(1): 35-42 (2016) - 2015
- [j1]Yong Wang, Yong Liu, Xiaoling Tao, Qian He:
An FPGA Based High-speed Network Performance Measurement for RFC 2544. EURASIP J. Wirel. Commun. Netw. 2015: 2 (2015)
2000 – 2009
- 2009
- [c3]Xiaoling Tao, Yong Wang:
Application of Grid Technologies in Linux Host Intrusion Detection System. CSO (1) 2009: 13-17 - [c2]Yong Wang, Xiaobu Xu, Xiaoling Tao:
Localization in Wireless Sensor Networks via Support Vector Regression. WGEC 2009: 549-552 - [c1]Guifeng Wang, Yong Wang, Xiaoling Tao:
An Ant Colony Clustering Routing Algorithm for Wireless Sensor Networks. WGEC 2009: 670-673
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint