Xin Huang
Xin Huang
Taiyuan University of Technology
Verified email at
Cited by
Cited by
A secure system for pervasive social network-based healthcare
J Zhang, N Xue, X Huang
Ieee Access 4, 9239-9250, 2016
SecIoT: a security framework for the Internet of Things
X Huang, P Craig, H Lin, Z Yan
Security and communication networks 9 (16), 3083-3094, 2016
User interactive internet of things privacy preserved access control
X Huang, R Fu, B Chen, T Zhang, AW Roscoe
2012 International Conference for Internet Technology And Secured …, 2012
A denial of service attack method for an iot system
L Liang, K Zheng, Q Sheng, X Huang
2016 8th international conference on Information Technology in Medicine and …, 2016
Improving RSS-based ranging in LOS-NLOS scenario using GMMs
Q Wang, I Balasingham, M Zhang, X Huang
IEEE Communications Letters 15 (10), 1065-1067, 2011
S2Net: A security framework for software defined intelligent building networks
N Xue, X Huang, J Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 654-661, 2016
Localizing Multiple Objects using Radio Tomographic Imaging Technology
Q Wang, H Yigitler, R Jantti, X Huang
Vehicular Technology, IEEE Transactions on, 2015
Human interactive secure ID management in body sensor networks
X Huang, X Ma, B Chen, A Markham, Q Wang, AW Roscoe
Journal of Networks 7 (9), 1400, 2012
Human interactive secure key and identity exchange protocols in body sensor networks
X Huang, B Chen, A Markham, Q Wang, Z Yan, AW Roscoe
IET Information Security 7 (1), 30-38, 2013
Software defined intelligent building
RY Xu, X Huang, J Zhang, Y Lu, G Wu, Z Yan
International Journal of Information Security and Privacy (IJISP) 9 (3), 84-99, 2015
A survey on an emerging area: Deep learning for smart city data
Q Chen, W Wang, F Wu, S De, R Wang, B Zhang, X Huang
IEEE Transactions on Emerging Topics in Computational Intelligence 3 (5 …, 2019
Model checking PBFT consensus mechanism in healthcare blockchain network
K Zheng, Y Liu, C Dai, Y Duan, X Huang
2018 9th International Conference on Information Technology in Medicine and …, 2018
Usable Security Mechanisms in Smart Building
W Bo, Y Zhang, X Hong, H Sun, X Huang
Computational Science and Engineering (CSE), 2014 IEEE 17th International …, 2014
Body sensor network key distribution using human interactive channels
X Huang, Q Wang, C Bangdao, A Markham, R Jäntti, AW Roscoe
Proceedings of the 4th International Symposium on Applied Sciences in …, 2011
Privacy of value-added context-aware service cloud
X Huang, Y He, Y Hou, L Li, L Sun, S Zhang, Y Jiang, T Zhang
IEEE International Conference on Cloud Computing, 547-552, 2009
Pervasive information visualization: toward an information visualization design methodology for multi-device co-located synchronous collaboration
P Craig, X Huang, H Chen, X Wang, S Zhang
2015 IEEE International Conference on Computer and Information Technology …, 2015
Id management among clouds
X Huang, T Zhang, Y Hou
2009 First International Conference on Future Information Networks, 237-241, 2009
Improve blockchain performance using graph data structure and parallel mining
J Kan, S Chen, X Huang
2018 1st IEEE International Conference on Hot Information-Centric Networking …, 2018
A handshake protocol with unbalanced cost for wireless updating
J Cai, X Huang, J Zhang, J Zhao, Y Lei, D Liu, X Ma
IEEE Access 6, 18570-18581, 2018
Security protocols in body sensor networks using visible light communications
X Huang, X Gao, Z Yan
International Journal of Communication Systems 29 (16), 2349-2363, 2016
The system can't perform the operation now. Try again later.
Articles 1–20