Guishan Dong

According to our database1, Guishan Dong authored at least 20 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems.
Sensors, October, 2023

2022
Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

2021
A projection and contraction method for circular cone programming support vector machines.
Int. J. Mach. Learn. Cybern., 2021

Access Control Scheme Supporting Attribute Revocation in Cloud Computing.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Generating Audio Adversarial Examples with Ensemble Substituted Models.
Proceedings of the ICC 2021, 2021

Application and Challenges of Blockchain in Heterogeneous Identity Trust.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
A novel second-order cone programming support vector machine model for binary data classification.
J. Intell. Fuzzy Syst., 2020

Searchable encryption scheme with limited search scope for group users.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Unified Trust Service Scheme for Heterogeneous Identity Alliance.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
区块链应用中的隐私保护策略研究 (Research on Privacy Protection Strategies in Blockchain Application).
计算机科学, 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019

Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

An Open Identity Authentication Scheme Based on Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Trust Enhancement Scheme for Cross Domain Authentication of PKI System.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Anonymous cross-domain authentication scheme for medical PKI system.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
基于区块链的身份管理认证研究 (Research on Identity Management Authentication Based on Blockchain).
计算机科学, 2018

GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid.
IEEE Access, 2018

A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

2007
A MLS Cooperation System Based on Virtual Machine Monitor.
Proceedings of the 2007 International Conference on Security & Management, 2007


  Loading...