Bei Pei

According to our database1, Bei Pei authored at least 25 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Binary Rewritten based Control Flow Integrity Protection for Wireless Industrial Communication System.
Proceedings of the IEEE International Conference on Communications, 2024

A Binary Level Verification Framework for Real-Time Performance of PLC Program in Backhaul/Fronthaul Networks.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Multi-Level ACE-based IoT Knowledge Sharing for Personalized Privacy-Preserving Federated Learning.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Blockchain-Assisted UAV Data Free-Boundary Spatial Querying and Authenticated Sharing.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
Lattice-Based Fine-grained Data Access Control and Sharing Scheme in Fog and Cloud Computing Environments for the 6G Systems.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

A Secure Microgrid Power Transaction Scheme Based on Hyperledger Fabric.
Proceedings of the Blockchain Technology and Emerging Technologies, 2022

2021
An Efficient Proactive Secret Sharing Scheme for Cloud Storage.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2017
Steganalysis of content-adaptive binary image data hiding.
J. Vis. Commun. Image Represent., 2017

Securing dynamic microgrid partition in the smart grid.
Int. J. Distributed Sens. Networks, 2017

Cryptanalysis and Countermeasures on Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

2016
Efficient privacy-preserving third-party auditing for ambient intelligence systems.
J. Ambient Intell. Humaniz. Comput., 2016

Improving Energy Efficiency in Industrial Wireless Sensor Networks Using SDN and NFV.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

How to Defend against Sophisticated Intrusions in Home Networks Using SDN and NFV.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Multiple Watermarking Using Multilevel Quantization Index Modulation.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Survey on Domain Name System Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Detecting Malicious Server Based on Server-to-Server Realation Graph.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Context-Aware Traffic Forwarding Service for Applications in SDN.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Toward Vulnerability Assessment for 5G Mobile Communication Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

A Layered and Componentized Security Architecture for Linux Based Mobile Network Elements.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

Medical Ontology Learning Based on Web Resources.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

Weakly-Supervised Occupation Detection for Micro-blogging Users.
Proceedings of the Natural Language Processing and Chinese Computing, 2014

The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

A XOR Based Public Auditing Scheme for Proof-of-storage.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014


  Loading...