Entao Luo

Orcid: 0000-0002-7147-5893

According to our database1, Entao Luo authored at least 39 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Outage performance and energy efficiency optimization of wireless-powered millimeter-wave sensor networks.
EURASIP J. Wirel. Commun. Netw., December, 2024

Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing.
IEEE Internet Things J., January, 2024

2023
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing.
J. Syst. Archit., November, 2023

ALPS: Achieving accuracy-aware location privacy service via assisted regions.
Future Gener. Comput. Syst., August, 2023

Physically Secure and Conditional-Privacy Authenticated Key Agreement for VANETs.
IEEE Trans. Veh. Technol., June, 2023

NC<sup>2</sup>E: boosting few-shot learning with novel class center estimation.
Neural Comput. Appl., March, 2023

Medical Image Super-Resolution Based on Semantic Perception Transfer Learning.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse.
J. Syst. Archit., 2023

Differential privacy protection method for trip-oriented shared data.
Concurr. Comput. Pract. Exp., 2023

2022
Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT.
IEEE Trans. Ind. Informatics, 2022

2021
Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning.
Mob. Inf. Syst., 2021

A trustworthy industrial data management scheme based on redactable blockchain.
J. Parallel Distributed Comput., 2021

Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks.
Inf. Sci., 2021

A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Semi-Supervised Intrusion Detection Method based on Adversarial Autocoder.
Proceedings of the IEEE Intl Conf on Dependable, 2021

A Survey on Privacy-security in Internet of Vehicles.
Proceedings of the IEEE Intl Conf on Dependable, 2021

2020
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.
Secur. Commun. Networks, 2020

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020

Hidden the true identity and dating characteristics based on quick private matching in mobile social networks.
Future Gener. Comput. Syst., 2020

Computation offloading through mobile vehicles in IoT-edge-cloud network.
EURASIP J. Wirel. Commun. Netw., 2020

RAitc: Securely Auditing the Remotely Executed Applications.
IEEE Access, 2020

2019
SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application.
J. Netw. Comput. Appl., 2019

A Multi-attributes-Based Trust Model of Internet of Vehicle.
Proceedings of the Network and System Security - 13th International Conference, 2019

Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

A Decentralized and Anonymous Data Transaction Scheme Based on Blockchain and Zero-Knowledge Proof in Vehicle Networking (Workshop Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems.
IEEE Commun. Mag., 2018

Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting.
Ad Hoc Networks, 2018

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.
Proceedings of the Information Security Practice and Experience, 2018

2017
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Gener. Comput. Syst., 2017

Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Secure Beamforming Design with Bidirectional Secondary Transmissions in Wireless-Powered Cognitive Radio Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
位置信息记录中基于期望最大化的名称消重算法 (Expectation Maximization Based Name Deduplicating Algorithm in Spatial Records).
计算机科学, 2016

Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Commun. Lett., 2016

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016

2015
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015


  Loading...