Book Chapters

Xiaofeng Wang, Jinshu Su, Xiaofeng Hu, Chunqing Wu and Huan Zhou, "Trust Model for Cloud Systems with Self Variance Evaluation", Security, Privacy and Trust in Cloud Systems, Springer, 2014.

Journal Papers

Huan Zhou, Xiaofeng Wang, Jinshu Su, An efficient identity-based key agreement protocol in a multiple PKG environment, Wuhan University Journal of Natural Sciences, 2014, Springer, http://link.springer.com/article/10.1007/s11859-014-1039-8 

Jinshu Su, Dan Cao, Baokang Zhao, Xiaofeng Wang, I You, ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things, Future Generation Computer Systems, Elsevier 2014. 

Huabiao Lu, Xiaofeng Wang, B Zhao, F Wang, J Su, ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences, Mathematical and Computer Modelling, Elsevier, 2013

Huabiao Lu, Xiaofeng Wang, J Su, SCMA: Scalable and Collaborative Malware Analysis using System Call Sequences, International Journal of Grid & Distributed Computing, 6 (2), 2013

Xiaofeng Wang, Ling Liu and Jinshu Su, RLM: A General Model for Trust Representation and Aggregation, IEEE Transactions on Services Computing, 5(1), 131-143, 2012. 

Dan Cao, Baokang Zhao, Xiaofeng WangJinshu Su: Flexible multi-authority attribute-based signature schemes for expressive policy. Mobile Information Systems 8(3): 255-274 (2012)

Fei Wang,  Hailong Wang,  Xiaofeng Wang, Jinshu Su, A New Multistage Approach to Detect Subtle DDoS Attacks, Mathematical and Computer Modelling, 55(1-2): 198-213,  Elsevier Science, 2012.

Huabiao Lu, Xiaofeng Wang, Jinshu Su, CCS: Collaborative Malware Clustering and Signature Generation using Malware Behavioral Analysis, International Journal of Hybrid Information Technology, 5(2), 2012 

Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya, Jinshu Su, Optimizing Makespan and Reliability for Workow Applications with Reputation and Look-ahead Genetic Algorithm,  Future Generation Computer Systems, 27(8), 1124-1134, 2011. 

 

Conference Papers

Peixin Chen, Xiaofeng Wang, Yilun Wu, Jinshu Su, Huan Zhou,POSTER: iPKI Identity-based Private Key Infrastructure for Securing BGP Protocol, (Poster), 22st ACM Conference on Computer and Communications Security (CCS), 2015 

Hao Sun,Xiaofeng Wang,Jinshu Su, RScam: Cloud-Based Anti-Malware via Reversible Sketch, 11th International Conference on Security and Privacy in Communication Networks (SecureComm), 2015 

Yuebin Luo, Baosheng Wang, Xiaofeng Wang, Xiaofeng Hu and Hao Sun, RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2015 

Xiaofeng Wang, Huan Zhou, Jinshu Su etc, T-IP: A Self-Trustworthy and Secure Internet Protocol with Full Compliance to TCP/IP, (Poster), 21st ACM Conference on Computer and Communications Security (CCS), 2014

Huabiao Lu, Xiaofeng Wang, Jinshu Su, and Peidai Xie, ResSig: an Resource Constraint based Malware Behavioral Signature, International Conference on Information Technology and Computer Science, 2013 

Fei Wang, Xiaofeng Wang, Jinshu Su, Bin Xiao: VicSifter: A Collaborative DDoS Detection System with Lightweight Victim Identification. The 11th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom), 2012 

Wen Wang, Xiaofeng Wang, Huabiao Lu, Jinshu Su, Automatic signature analysis and generation for large-scale network malware,  IET International Conference on Information Science and Control Engineering, 2012 

Dang Cao, Xiaofeng Wang, Tianzuo Wang, Jinshu Su, An Expressive Attribute-based Signature Scheme without Random Oracles, The 2nd International Conference on Computer Application and System Modeling, 2012

Jie Yu, Liming Lu, Zhoujun Li, Xiaofeng Wang, and Jinshu Su, A Simple Effective Scheme to Enhance the Capability of Web Servers Using P2P Networks, the 39th International Conference on Parallel Processing, San Diego (ICPP), USA, 2010

Xiaofeng Wang, Chee Shin Yeo, Rajkumar Buyya and Jinshu Su, Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA, Proceeding of the 23rd IEEE  International Conference on Advanced Information Networking and Applications (AINA). Bradford, UK, May 26-29, 2009.

Xiaofeng Wang, Rajkumar Buyya and Jinshu Su, Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy, Proceeding of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID). Shanghai, China, May 18-21, 2009.

 

主要中文文章(Papers in Chinese)

王小峰,陈培鑫,周寰,苏金树, T-HIBE: A Trustworthy and Secure Hierarchical Identity-Based Encryption System, 电子学报,2015

吴纯青,任沛阁,王小峰, 基于语义的网络大数据组织与搜索, 计算机学报,2014

王小峰,苏金树, ,张一鸣面向分布式证明的信任协商策略语言和方法软件学报,20(10): 2776-2787 2009

王小峰,马延鹏,苏金树, 一种开放网络环境下的分布式信任证明算法, 计算机工程与科学, 33(06), 1-6, 2011.

王小峰,时向泉,苏金树一种TCP/IP卸载的数据零拷贝传输方法[PDF] 计算机工程与科学, 2008 02

苏金树,曹丹,王小峰,孙一品,胡乔林属性基加密机制软件学报, 22(6):1299-1315, 2011.

曹丹,王小峰(通信作者),苏金树, 一种高效可追责的多机构身份基加密机制, 电子与信息学报, 2011