Cheng Guo

Orcid: 0000-0001-7489-7381

Affiliations:
  • Dalian University of Technology, School of Software Technology, China


According to our database1, Cheng Guo authored at least 86 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detect software vulnerabilities with weight biases via graph neural networks.
Expert Syst. Appl., March, 2024

A game-theory-based scheme to facilitate consensus latency minimization in sharding blockchain.
Inf. Sci., February, 2024

An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.
IEEE Trans. Dependable Secur. Comput., 2024

2023
A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems.
IEEE Internet Things J., September, 2023

Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems.
J. Inf. Secur. Appl., May, 2023

Two-party interactive secure deduplication with efficient data ownership management in cloud storage.
J. Inf. Secur. Appl., March, 2023

2022
Secure Similarity Search Over Encrypted Non-Uniform Datasets.
IEEE Trans. Cloud Comput., 2022

EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.
IEEE Syst. J., 2022

A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022

A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems.
IEEE Internet Things J., 2022

2021
Enabling Privacy-Assured Fog-Based Data Aggregation in E-Healthcare Systems.
IEEE Trans. Ind. Informatics, 2021

A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images.
IEEE Trans. Ind. Informatics, 2021

EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network.
IEEE Trans. Comput. Soc. Syst., 2021

A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information.
Int. Trans. Oper. Res., 2021

A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.
Comput. Networks, 2021

Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption.
IEEE Trans. Serv. Comput., 2020

A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration.
Mob. Networks Appl., 2020

R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity.
J. Netw. Comput. Appl., 2020

Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.
IEEE Internet Things J., 2020

Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization.
IEEE Internet Things J., 2020

Lightweight privacy preserving data aggregation with batch verification for smart grid.
Future Gener. Comput. Syst., 2020

Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images.
Comput. Secur., 2020

Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.
Appl. Math. Comput., 2020

A Reliable IoT Edge Computing Trust Management Mechanism for Smart Cities.
IEEE Access, 2020

2019
A new construction of compressed sensing matrices for signal processing via vector spaces over finite fields.
Multim. Tools Appl., 2019

RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks.
Knowl. Based Syst., 2019

Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.
IEEE Internet Things J., 2019

Secure Range Search Over Encrypted Uncertain IoT Outsourced Data.
IEEE Internet Things J., 2019

Privacy preserving weighted similarity search scheme for encrypted data.
IET Inf. Secur., 2019

Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.
Future Gener. Comput. Syst., 2019

Dynamic Multi-Keyword Ranked Search Based on Bloom Filter Over Encrypted Cloud Data.
IEEE Access, 2019

An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019

Developing Patrol Strategies for the Cooperative Opportunistic Criminals.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

An Evolutionary Game-Based Mechanism for Unwanted Traffic Control.
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019

2018
Reputation-based multi-auditing algorithmic mechanism for reliable mobile crowdsensing.
Pervasive Mob. Comput., 2018

Construction of compressed sensing matrices for signal processing.
Multim. Tools Appl., 2018

A novel proactive secret image sharing scheme based on LISS.
Multim. Tools Appl., 2018

Online task scheduling for edge computing based on repeated stackelberg game.
J. Parallel Distributed Comput., 2018

A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
Int. J. Netw. Secur., 2018

Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage.
Future Gener. Comput. Syst., 2018

Efficient method to verify the integrity of data with supporting dynamic data in cloud computing.
Sci. China Inf. Sci., 2018

Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment.
IEEE Access, 2018

Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping.
IEEE Access, 2018

An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Task Assignment for Simple Tasks with Small Budget in Mobile Crowdsourcing.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
(t, n) Threshold secret image sharing scheme with adversary structure.
Multim. Tools Appl., 2017

Newly deterministic construction of compressed sensing matrices via singular linear spaces over finite fields.
J. Comb. Optim., 2017

Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network.
KSII Trans. Internet Inf. Syst., 2017

A Verifiable E-voting Scheme with Secret Sharing.
Int. J. Netw. Secur., 2017

Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017

Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

2016
AD-ASGKA - authenticated dynamic protocols for asymmetric group key agreement.
Secur. Commun. Networks, 2016

A region-adaptive semi-fragile dual watermarking scheme.
Multim. Tools Appl., 2016

A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem.
Multim. Tools Appl., 2016

Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016

An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing.
IEEE Access, 2016

Personalized pre-trust reputation management in social P2P network.
Proceedings of the 2016 International Conference on Computing, 2016

A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

2015
A novel weighted threshold secret image sharing scheme<sup>†</sup>.
Secur. Commun. Networks, 2015

A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem.
Int. J. Netw. Secur., 2015

A Novel Proactive Multi-secret Sharing Scheme.
Int. J. Netw. Secur., 2015

LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage.
Proceedings of the 12th International Conference on Information Technology, 2015

RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

Identity-Based Broadcast Encryption Schemes for Open Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

A Group Authentication Scheme Supporting Cheating Detection and Identification.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

RSAE: Ranked Keyword Search over Asymmetric Encrypted Cloud Data.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

2014
A novel (n, t, n) secret image sharing scheme without a trusted third party.
Multim. Tools Appl., 2014

Generalized Secret Sharing with Linear Hierarchical Secrets.
Int. J. Netw. Secur., 2014

An authenticated group key distribution protocol based on the generalized Chinese remainder theorem.
Int. J. Commun. Syst., 2014

2013
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications.
J. Inf. Hiding Multim. Signal Process., 2013

A Construction for Secret Sharing Scheme with General Access Structure.
J. Inf. Hiding Multim. Signal Process., 2013

A fault-tolerant group key agreement protocol exploiting dynamic setting.
Int. J. Commun. Syst., 2013

Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Inf. Secur., 2013

Chaotic maps-based password-authenticated key agreement using smart cards.
Commun. Nonlinear Sci. Numer. Simul., 2013

2012
Reversible secret image sharing with steganography and dynamic embedding.
Secur. Commun. Networks, 2012

A multi-threshold secret image sharing scheme based on MSP.
Pattern Recognit. Lett., 2012

A hierarchical threshold secret image sharing.
Pattern Recognit. Lett., 2012

2011
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
J. Multim., 2011

A Multi-attribute Hierarchical Threshold Scheme.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

General Threshold Signature Based on the Chinese Remainder Theorem.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

2009
A New Secret Sharing Scheme Based on the Multi-Dealer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
Trust Similarity Measure in Trust Model for P2P Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
Quadrangularly connected claw-free graphs.
Discret. Math., 2007


  Loading...