Q. Xie

ORCID: 0009-0006-3265-1889
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Communication Networks Research
  • Wireless Networks and Protocols
  • User Authentication and Security Systems
  • Advanced Authentication Protocols Security
  • Network Traffic and Congestion Control
  • Data Management and Algorithms
  • Mobile Agent-Based Network Management
  • Data-Driven Disease Surveillance
  • Advanced Data Compression Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Data Mining Algorithms and Applications
  • Distributed and Parallel Computing Systems
  • Cultural Heritage Management and Preservation
  • Network Security and Intrusion Detection
  • Chaos-based Image/Signal Encryption
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Blockchain Technology Applications and Security
  • Algorithms and Data Compression
  • Conservation Techniques and Studies
  • Distributed systems and fault tolerance
  • Biometric Identification and Security
  • Advanced Image and Video Retrieval Techniques
  • Speech Recognition and Synthesis
  • Advanced Computational Techniques and Applications

Hangzhou Normal University
2012-2024

Oracle (United States)
2008-2016

Human Resource Development Group
2008

Motorola (United States)
2004-2007

Cisco Systems (China)
2004

University of Delaware
2004

University of British Columbia
2002

As a national Lingnan intangible cultural heritage, Dongguan’s Qian Jiao Lantern—featuring thousand-bamboo frames and oil lamps symbolizing clan prosperity—faces extinction due to aging inheritors (<5 remaining) prolonged crafting cycles (3–6 months/lantern), with no new lanterns produced since 2010. Analysis of 410 potential revealed that its transmission hinges on youth engagement in community affairs (Q4: β=0.202; Q5: β=0.204), forming “cognition-action” pathway contributing 13.3%...

10.26689/ssr.v7i4.10471 article EN Scientific and Social Research 2025-05-02

With the increasing number of vehicles connected to Internet Vehicles (IoV), accommodate evolving needs and patterns new vehicles, passengers, drivers, traditional single Trusted Authority (TA) authentication model may no longer be suitable for IoV scenario, it is crucial develop secure, lightweight, efficient, cross-TA identity key agreement algorithms. In 2021, Xu et al. proposed a blockchain-based Roadside Unit (RSU)-assisted protocol IoV. However, we describe that their vulnerable...

10.1109/access.2023.3308601 article EN cc-by-nc-nd IEEE Access 2023-01-01

To ensure the secure access control mechanisms for wireless sensor networks (WSN) with a 5G-enabled IoT system, very recently, Sahoo et al. (IEEE Internet of Things Journal, 10(17), pp. 15087-15099, DOI: 10.1109/JIOT.2023.3264565, Sep. 1, 2023) proposed three-factor-based authentication scheme 5G WSN and claimed that their can achieve all security properties. However, in this paper, we carefully analyze point out is vulnerable to user impersonation attacks, node captured simultaneous attacks...

10.1109/jiot.2023.3334708 article EN IEEE Internet of Things Journal 2023-11-22

In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the patient’s physiological data in a wireless network. order prevent unwarranted users from accessing network obtain patients’ data, designing lightweight and privacy-preserving authentication protocols plays crucial role. Many for IoT-based healthcare have been proposed recent years, but most them may suffer one or more security problems. particular, few can resist node-captured attacks achieve n-factor...

10.3390/math11183857 article EN cc-by Mathematics 2023-09-09

In 2009, Tsai proposed an efficient convertible multi-authenticated encryption (CMAE) scheme. However, the author shows that his scheme is distinguishable under adaptive chosen-message attack, and designated verifier can generate signature of same message for other verifiers. Since no formal model CMAE has been presented in literature, presents first complete CMAE. Then, a new proposed. The provably secure random oracle model.

10.1049/iet-ifs.2011.0162 article EN IET Information Security 2012-06-11

Vehicle-to-grid (V2G) technology can achieve bidirectional energy flow between electric vehicles and the power grid, but it also faces serious safety privacy leakage issues. Recently, Shureshkumar et al. proposed a lightweight authentication protocol for V2G communication claimed that their scheme is secure against various known attacks supports many security features. In this paper, we demonstrate lacks of anonymity, unlinkability, session key secrecy, perfect forward secrecy. addition, not...

10.2139/ssrn.4693941 preprint EN 2024-01-01

This paper summarizes the general requirements and specific characteristics of both geospatial raster database management system data processing platform from a domain-specific perspective as well computing point view. It also discusses need tight integration between system. These resulted in Oracle Spatial GeoRaster, global scale high performance earth imagery platform. The rationale, design, implementation, benefits GeoRaster are described. Basically, system, defines an integrated model,...

10.5194/isprsarchives-xli-b4-551-2016 article EN cc-by ˜The œinternational archives of the photogrammetry, remote sensing and spatial information sciences/International archives of the photogrammetry, remote sensing and spatial information sciences 2016-06-14

It is found that the performance of classifier designed with this method similar to traditional NN in terms classification accuracy. At same time significantly more economical and easier implement than NN.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

10.1109/pacrim.1993.407225 article EN 2002-12-30
Coming Soon ...