Bei Gong

Orcid: 0000-0003-3188-3531

According to our database1, Bei Gong authored at least 62 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A secure cross-domain authentication scheme based on threshold signature for MEC.
J. Cloud Comput., December, 2024

TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things.
IEEE Trans. Mob. Comput., May, 2024

MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors.
IEEE Trans. Computers, April, 2024

An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application.
ACM Trans. Sens. Networks, March, 2024

VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain.
ACM Trans. Sens. Networks, March, 2024

A federated semi-supervised automatic sleep staging method based on relationship knowledge sharing.
Expert Syst. Appl., March, 2024

An Intelligent Edge Dual-Structure Ensemble Method for Data Stream Detection and Releasing.
IEEE Internet Things J., January, 2024

Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT.
IEEE Internet Things J., January, 2024

SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security.
IEEE Trans. Intell. Transp. Syst., December, 2023

Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services.
IEEE Syst. J., December, 2023

Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption.
IEEE Netw., November, 2023

A data compression and encryption method for green edge computing.
Clust. Comput., October, 2023

Smart contracts vulnerability detection model based on adversarial multi-task learning.
J. Inf. Secur. Appl., September, 2023

LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things.
IEEE Internet Things J., July, 2023

MSKNP: Multistage Key Negotiation Protocol for IoT-Blockchain Environment.
IEEE Internet Things J., July, 2023

Sandbox Computing: A Data Privacy Trusted Sharing Paradigm Via Blockchain and Federated Learning.
IEEE Trans. Computers, March, 2023

A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks.
IEEE Trans. Serv. Comput., 2023

Applications of Differential Privacy in Social Network Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2023

CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems.
IEEE Trans. Dependable Secur. Comput., 2023

A Fine-Grained Cross-Chain Spectrum Sharing Mechanism Based on Oracle.
Proceedings of the IEEE Global Communications Conference, 2023

A Trusted Routing Schemes for IoT.
Proceedings of the 8th International Conference on Computer and Communication Systems, 2023

2022
Structure-Attribute-Based Social Network Deanonymization With Spectral Graph Partitioning.
IEEE Trans. Comput. Soc. Syst., 2022

SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing.
Peer-to-Peer Netw. Appl., 2022

Trustworthy Blockchain-Empowered Collaborative Edge Computing-as-a-Service Scheduling and Data Sharing in the IIoE.
IEEE Internet Things J., 2022

A trusted proof mechanism of data source for smart city.
Future Gener. Comput. Syst., 2022

A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things.
Future Gener. Comput. Syst., 2022

Anonymous Traceability protocol based on Group Signature for Blockchain.
Future Gener. Comput. Syst., 2022

An identity privacy scheme for blockchain-based on edge computing.
Concurr. Comput. Pract. Exp., 2022

Character-level domain name generation algorithm based on ED-GAN.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Consensus Algorithm Based on Subject Credit.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Fast identification method of malicious code based on extreme learning machine.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Trusted Blockchain-based Data Fingerprinting Differential-Traceability and SkipList Indexing Methods in Privacy Protection.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

A Blockchain-Enabled Location Privacy-preserving under Local Differential Privacy for Internet of Vehicles.
Proceedings of the 4th Blockchain and Internet of Things Conference, 2022

2021
Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2021

Construction of Trusted Routing Based on Trust Computation.
Wirel. Commun. Mob. Comput., 2021

Distributed learning dynamics of Multi-Armed Bandits for edge intelligence.
J. Syst. Archit., 2021

Secure Multi-Subinterval Data Aggregation Scheme with Interval Privacy Preservation for Vehicle Sensing Systems.
J. Circuits Syst. Comput., 2021

Competitive Age of Information in Dynamic IoT Networks.
IEEE Internet Things J., 2021

A Trusted Attestation Scheme for Data Source of Internet of Things in Smart City Based on Dynamic Trust Classification.
IEEE Internet Things J., 2021

Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT.
IEEE Internet Things J., 2021

A trusted behaviour measurement scheme based on feedback and control in trusted network.
Int. J. Wirel. Mob. Comput., 2021

Construction of Internet of things trusted group based on multidimensional attribute trust model.
Int. J. Distributed Sens. Networks, 2021

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT.
EURASIP J. Wirel. Commun. Netw., 2021

Trusted data collection for Internet of Things.
Concurr. Comput. Pract. Exp., 2021

A threshold group signature scheme suitable for the Internet of Things.
Concurr. Comput. Pract. Exp., 2021

A delay-sensitive resource allocation algorithm for container cluster in edge computing environment.
Comput. Commun., 2021

2020
An Intelligent Data Uploading Selection Mechanism for Offloading Uplink Traffic of Cellular Networks.
Sensors, 2020

A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles.
Peer-to-Peer Netw. Appl., 2020

An efficient privacy-preserving data query and dissemination scheme in vehicular cloud.
Pervasive Mob. Comput., 2020

RJCC: Reinforcement-Learning-Based Joint Communicational-and-Computational Resource Allocation Mechanism for Smart City IoT.
IEEE Internet Things J., 2020

FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks.
IEEE Internet Things J., 2020

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things.
CoRR, 2020

MalFox: Camouflaged Adversarial Malware Example Generation Based on C-GANs Against Black-Box Detectors.
CoRR, 2020

Differential Privacy and Its Applications in Social Network Analysis: A Survey.
CoRR, 2020

Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment.
Comput. Commun., 2020

Distributed Data Aggregation in Dynamic Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

An Attack Scheme of RSA Encryption System with Protocol Failure.
Proceedings of the 3rd International Conference on Smart BlockChain, 2020

2019
Neural Networks for Compressed Sensing Based on Information Geometry.
Circuits Syst. Signal Process., 2019

2018
The Model Design of Mobile Resource Scheduling in Large Scale Activities.
Mob. Networks Appl., 2018

A remote attestation mechanism for the sensing layer nodes of the Internet of Things.
Future Gener. Comput. Syst., 2018

2011
A Threshold Signature Scheme Based on TPM.
Int. J. Commun. Netw. Syst. Sci., 2011


  Loading...