Ben Niu

According to our database1, Ben Niu authored at least 48 papers between 2011 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet of Things Journal, 2019

HideMe: Privacy-Preserving Photo Sharing on Social Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Privacy-Preserving Partner Selection for Ride-Sharing Services.
IEEE Trans. Vehicular Technology, 2018

HAC: Hybrid Access Control for Online Social Networks.
Security and Communication Networks, 2018

Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptology ePrint Archive, 2018

Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Server-aided private set intersection based on reputation.
Inf. Sci., 2017

Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017

Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Privacy Preservation Strategy in Time-Sensitive LBSs.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
IJTHI, 2016

Time obfuscation-based privacy-preserving scheme for location-based services.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Hunting abnormal configurations for permission-sensitive role mining.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Achieving lightweight, time-specific and secure access control in cloud storage.
Proceedings of the 2016 International Conference on Computing, 2016

Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016

Achieving secure and accurate friend discovery based on friend-of-friend's recommendations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
A novel attack to spatial cloaking schemes in location-based services.
Future Generation Comp. Syst., 2015

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wireless Personal Communications, 2014

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Privacy-area aware dummy generation algorithms for Location-Based Services.
Proceedings of the IEEE International Conference on Communications, 2014

2013
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Security and Communication Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Security and Communication Networks, 2012

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
IJRFITA, 2012

2011
Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...