Match!
Xiaofeng Chen
South China University of Technology
433Publications
43H-index
7,362Citations
Publications 433
Newest
Published on Oct 1, 2019in Information Sciences5.52
Fei Zhu1
Estimated H-index: 1
(Fujian Normal University),
Wei Wu (Fujian Normal University)+ 1 AuthorsXiaofeng Chen43
Estimated H-index: 43
(Xidian University)
Abstract Previous solutions on security and privacy in Industrial Internet of Things (IIoT) focus primarily on the data or the deployment and communication problems of devices. However, the management and authentication of IoT devices for IIoT systems has received less attention. To facilitate the research on this area, we take the IIoT control system as an example. It is crucial to authenticate the relationships among devices to ensure that data can only be accessed by authenticated parties. In...
Published on Aug 1, 2019
Yinyuan Zhao , Haoran Yuan1
Estimated H-index: 1
(Xidian University)
+ 1 AuthorsXiaofeng Chen
Abstract The emergence of the Internet of Things (IoT) has been greatly applied for improving people’s lives. Through the combination with cloud computing resources, the IoT is no longer constrained by computing and storage resources. For the storage service of IoT/cloud, it is crucial to keep the data within some specific geolocation borders for improving storage service quality. At the same time, it can protect the security of data against natural or man-made disasters. However, the outsourcin...
Zhiwei Zhang1
Estimated H-index: 1
(Xidian University),
Xiaofeng Chen43
Estimated H-index: 43
(Xidian University)
+ 2 AuthorsJianfeng Ma28
Estimated H-index: 28
(Xidian University)
The notion of verifiable database (VDB) plays an important role in secure outsourcing of data storage, which allows a client, typically a resource-constraint one, to outsource the large-scale databases to an untrusted server and make retrieval and update queries. For each query request, the server responds with a query result and a proof which is used to verify the result. Plenty of research work has been done on designing efficient VDB schemes in the past years. However, it seems that all of th...
Published on Aug 1, 2019in Materials Letters3.02
Weihan Xie5
Estimated H-index: 5
(SCUT: South China University of Technology),
Xiaoling Fu8
Estimated H-index: 8
(SCUT: South China University of Technology)
+ 2 AuthorsXiaofeng Chen43
Estimated H-index: 43
(SCUT: South China University of Technology)
Abstract In the present study, a porous electrospun polycaprolactone (PCL) scaffold incorporated with bioactive glass (BG) particles was fabricated by combining phase separation with electrospinning. Chloroform (CF) and dimethyl formamide (DMF) were used as good solvents, while dimethyl sulfoxide (DMSO) was used as a poor solvent to generate pores on the fiber surface. The effects of PCL concentration, DMSO amount and BG particles dosage on the surface morphology of electrospun fibers were inves...
Published on May 20, 2019in Journal of Clinical Oncology28.25
Xiaofeng Chen43
Estimated H-index: 43
(Nanjing Medical University),
Xiaofeng Wu (Nanjing Medical University)+ 13 AuthorsGaohua Han (Nantong University)
Published on May 1, 2019in Information Sciences5.52
Xu Ma1
Estimated H-index: 1
(Xidian University),
Xiaofeng Chen43
Estimated H-index: 43
(Xidian University)
+ 0 AuthorsXiaoyu Zhang3
Estimated H-index: 3
(Xidian University)
Abstract Neural network is a particular machine learning framework which has gained widespread popularity due to its superior performance in many applications, such as complex board games, face recognition and disease diagnosis. A new service paradigm which offers online neural-network-based prediction to clients is increasingly popular. Although the prediction service has clear benefits, serious privacy issues have also emerged from the clients’ sensitive data and the neural network model itsel...
Published on Apr 1, 2019in International Journal of Information Security1.82
Kamil Kluczniak5
Estimated H-index: 5
,
Jianfeng Wang9
Estimated H-index: 9
(Xidian University)
+ 1 AuthorsMirosław Kutyłowski15
Estimated H-index: 15
Recently, a few pragmatic and privacy protecting systems for authentication in multiple systems have been designed. The most prominent examples include Pseudonymous Signatures for German personal identity cards and Anonymous Attestation. The main properties are that a user can authenticate himself with a single private key (stored on a smart card), but nevertheless the user’s IDs in different systems are unlinkable. We develop a solution which enables a user to achieve the above-mentioned goals ...
Published on Feb 1, 2019in Journal of Network and Computer Applications5.27
Lingling Xu (SCUT: South China University of Technology), Jin Li37
Estimated H-index: 37
(GU: Guangzhou University)
+ 3 AuthorsHao-Tian Wu (SCUT: South China University of Technology)
Abstract With the widespread adoption of Internet of Things (IoT) and cloud computing, more and more individuals and organizations are outsourcing their IoT data in the cloud server. Under these circumstances, how to protect the privacy and security of the outsourced data becomes a key challenge. Public key encryption with keyword search (PEKS) is a promising technology to solve the problem. In this paper, we present a new kind of PEKS named time controlled public key encryption with delegated c...
Published on Jan 1, 2019in Journal of Materials Chemistry B5.05
Weihan Xie5
Estimated H-index: 5
(SCUT: South China University of Technology),
Xiaoling Fu8
Estimated H-index: 8
(SCUT: South China University of Technology)
+ 4 AuthorsXiaofeng Chen43
Estimated H-index: 43
(SCUT: South China University of Technology)
Many pathophysiologic conditions can interrupt the normal wound healing process and lead to chronic wounds due to the arrest of macrophages in their inflammatory phenotype. Thus, strategies that promote the recovery of macrophage functions are of great benefit to heal chronic wounds. Bioactive glass (BG) dissolution has been recognized for its modulatory functions in macrophage polarization. However, further efforts are greatly needed to address how BG particles affect macrophage behaviors (such...
Published on Jan 1, 2018
Haibo Tian9
Estimated H-index: 9
(SYSU: Sun Yat-sen University),
Xiaofeng Chen + 2 AuthorsFang-GuoZhang24
Estimated H-index: 24
(SYSU: Sun Yat-sen University)
12345678910