Xi Zheng
Perceptions on the state of the art in verification and validation in cyber-physical systems
X Zheng, C Julien, M Kim, S Khurshid
IEEE Systems Journal, 2015
Big Data Cleaning Based on Mobile Edge Computing in industrial Sensor-Cloud
T Wang, HX Ke, X Zheng
IEEE Transactions on Industrial Informatics, 2019
E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT
X Zeng, G Xu, X Zheng, Y Xiang, W Zhou
IEEE Internet of Things Journal, 2018
A survey on security issues in services communication of Microservices‐enabled fog applications
D Yu, Y Jin, Y Zhang, X Zheng
Concurrency and Computation: Practice and Experience 31 (22), e4436, 2019
Crowdsourcing Mechanism for Trust Evaluation in CPCS based on Intelligent Mobile Edge Computing
T Wang, H Luo, X Zheng, M Xie
ACM Transactions on Intelligent Systems and Technology, 2019
Edge-based Differenital Privacy Computing for Sensor-Cloud Systems
T Wang, Y Mei, W Jia, X Zheng, G Wang, M Xie
Journal of Parallel and Distributed Computing, 2019
Cyber security attacks to modern vehicular systems
L Pan, X Zheng, HX Chen, T Luan, H Bootwala, L Batten
Journal of information security and applications 36, 90-100, 2017
Verification and validation in cyber physical systems: research challenges and a way forward
X Zheng, C Julien
Software Engineering for Smart Cyber-Physical Systems (SEsCPS), 2015 IEEE …, 2015
CSP-E 2 : An abuse-free Contract Signing Protocol with low-storage TTP for energy-efficient electronic transaction ecosystems
G Xu, Y Zhang, K Arun, X Zheng
Information Sciences, 2018
A survey of security and privacy issues in the Internet of Things from the layered context
S Deep, X Zheng, A Jolfaei, DJ Yu, P Ostovari
Transactions on Emerging Telecommunications Technologies, 2020
Practical overview of security issues in wireless sensor network applications
H Radhappa, L Pan, J Xi Zheng, S Wen
International journal of computers and applications 40 (4), 202-213, 2018
SmartVM: a SLA-aware microservice deployment framework
T Zheng, X Zheng, Y Zhang, Y Deng, EX Dong, R Zhang, X Liu
World Wide Web 22 (1), 275-293, 2019
Efficient and scalable runtime monitoring for cyber–physical system
X Zheng, C Julien, R Podorozhny, F Cassez, T Rakotoarivelo
IEEE Systems Journal 12 (2), 1667-1678, 2016
Driver drowsiness detection using multi-channel second order blind identifications
C Zhang, X Wu, X Zheng, S Yu
IEEE Access 7, 11829-11843, 2019
Am I Eclipsed? A Smart Detector of Eclipse Attacks for Ethereum
GQ Xu, BJ Guo, CH Su, X Zheng, KT Liang, WD C. S., H Wang
Computers & Security, 2019
An Analysis of Adversarial Attacks and Defenses on Autonomous Driving Models
Y Deng, X Zheng, TY Zhang, C Chen, GN Lou, M Kim
IEEE International Conferene on Pervasive Computing and Communications (PerCom), 2020
Using AI to Attack VA: A Stealthy Spyware against Voice Assistances in Smart Phones
R Zhang, X Chen, S Wen, X Zheng
IEEE Access, 2019
Braceassertion: Runtime verification of cyber-physical systems
X Zheng, C Julien, R Podorozhny, F Cassez
Mobile Ad Hoc and Sensor Systems (MASS), 2015 IEEE 12th International …, 2015
An overview of attacks and defences on intelligent connected vehicles
M Dibaei, X Zheng, K Jiang, S Maric, R Abbas, S Liu, Y Zhang, Y Deng, ...
arXiv preprint arXiv:1907.07455, 2019
A Survey on Anomalous Behavior Detection for Elderly Care using Dense-sensing Networks
S Deep, X Zheng, C Karmakar, J Jin
IEEE Communications Surveys and Tutorials, 2020
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20