Hua Dai

Orcid: 0000-0003-2465-8977

Affiliations:
  • Nanjing University of Posts and Telecommunications, College of Computer Science and Technology, China
  • Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing, China


According to our database1, Hua Dai authored at least 64 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DAFL: Domain adaptation-based federated learning for privacy-preserving biometric recognition.
Future Gener. Comput. Syst., January, 2024

VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks.
Comput. Secur., January, 2024

2023
A novel semantic-aware search scheme based on BCI-tree index over encrypted cloud data.
World Wide Web (WWW), September, 2023

EVSS: An efficient verifiable search scheme over encrypted cloud data.
World Wide Web (WWW), July, 2023

Protecting Vaccine Safety: An Improved, Blockchain-Based, Storage-Efficient Scheme.
IEEE Trans. Cybern., June, 2023

Privacy-Preserving and Verifiable Federated Learning Framework for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Split Learning for Large-Scaled Vision Pre-Training.
IEEE Trans. Inf. Forensics Secur., 2023

BP-Model-based convoy mining algorithms for moving objects.
Expert Syst. Appl., 2023

TFS-index-based Multi-keyword Ranked Search Scheme Over Cloud Encrypted Data.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Efficient Multi-source Contact Event Query Processing for Moving Objects.
Proceedings of the IEEE International Conference on Data Mining, 2023

A Human Pose Similarity Calculation Method Based on Partition Weighted OKS Model.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

HSFV-based Action Recognition Using Recurrent Neural Networks.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

An Urban Electric Load Forecasting Model Using Discrepancy Compensation and Short-term Sampling Contrastive Loss in LSTM.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
NttpFL: Privacy-Preserving Oriented No Trusted Third Party Federated Learning System Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., December, 2022

A Keyword-Grouping Inverted Index Based Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Sustain. Comput., 2022

PFLF: Privacy-Preserving Federated Learning Framework for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2022

Enhanced Semantic-Aware Multi-Keyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

A novel rough set-based approach for minimum vertex cover of hypergraphs.
Neural Comput. Appl., 2022

Accuracy-first and efficiency-first privacy-preserving semantic-aware ranked searches in the cloud.
Int. J. Intell. Syst., 2022

The final security problem in IOT: Don't count on the canary!
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

CSMRS: An Efficient and Effective Semantic-aware Ranked Search Scheme over Encrypted Cloud Data.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Multi-source Infection Pattern Mining Algorithms over Moving Objects.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

SAPMS: A Semantic-Aware Privacy-Preserving Multi-keyword Search Scheme in Cloud.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

Multi-Information-Enhanced Knowledge Embedding in Hyperbolic Space.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Improving Vaccine Safety Using Blockchain.
ACM Trans. Internet Techn., 2021

Generating Unrestricted 3D Adversarial Point Clouds.
CoRR, 2021

ECMA: An Efficient Convoy Mining Algorithm for Moving Objects.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Towards Usable Cloud Storage Auditing.
IEEE Trans. Parallel Distributed Syst., 2020

A Multibranch Search Tree-Based Multi-Keyword Ranked Search Scheme over Encrypted Cloud Data.
Secur. Commun. Networks, 2020

QHSE: An efficient privacy-preserving scheme for blockchain-based transactions.
Future Gener. Comput. Syst., 2020

FSSE: An Effective Fuzzy Semantic Searchable Encryption Scheme Over Encrypted Cloud Data.
IEEE Access, 2020

A Privacy-Preserving Multi-Keyword Ranked Search Over Encrypted Data in Hybrid Clouds.
IEEE Access, 2020

A Privacy-preserving and Collusion-resisting Top-k Query Processing in WSNs.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Detection of Loose Tracking Behavior over Trajectory Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
面向云环境的多关键词密文排序检索研究综述 (Research on Multi-keyword Ranked Search over Encrypted Cloud Data).
计算机科学, 2019

Semantic-aware multi-keyword ranked search scheme over encrypted cloud data.
J. Netw. Comput. Appl., 2019

An Efficient and Dynamic Semantic-Aware Multikeyword Ranked Search Scheme Over Encrypted Cloud Data.
IEEE Access, 2019

A Parallel Multi-keyword Top-k Search Scheme over Encrypted Cloud Data.
Proceedings of the Network and Parallel Computing, 2019

Privacy-Preserving MAX/MIN Query Processing for WSN -as-a -Service.
Proceedings of the 2019 IFIP Networking Conference, 2019

A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Data in Hybrid Clouds.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

t/t-Diagnosability of BCube Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

PMRS: A Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Public Key-Based Authentication and En-Route Filtering Scheme in Wireless Sensor Networks.
Sensors, 2018

A Novel Secure Scheme for Supporting Complex SQL Queries over Encrypted Databases in Cloud Computing.
Secur. Commun. Networks, 2018

Privacy-Preserving Sorting Algorithms Based on Logistic Map for Clouds.
Secur. Commun. Networks, 2018

基于安全比较码的云环境隐私保护排序方法 (Secure Comparator Based Privacy-preserving Sorting Algorithms for Clouds).
计算机科学, 2018

面向云环境的一致性可验证单关键词检索方法 (Integrity-verifying Single Keyword Search Method in Clouds).
计算机科学, 2018

Efficient Geographical Information-Based En-route Filtering Scheme in Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2018

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2018

2017
MUSE: An Efficient and Accurate Verifiable Privacy-Preserving Multikeyword Text Search over Encrypted Cloud Data.
Secur. Commun. Networks, 2017

两层传感器网络中安全Top-k查询处理技术综述 (Overview of Secure Top-k Query Processing in Two-tiered Wireless Sensor Networks).
计算机科学, 2017

Anomaly-Tolerant Traffic Matrix Estimation via Prior Information Guided Matrix Completion.
IEEE Access, 2017

Secure MAX/MIN Queries in Two-Tiered Wireless Sensor Networks.
IEEE Access, 2017

A Verifiable Single Keyword Top-k Search Scheme against Insider Attacks over Cloud Data.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
CSRQ: Communication-Efficient Secure Range Queries in Two-Tiered Sensor Networks.
Sensors, 2016

Random Secure Comparator Selection Based Privacy-Preserving MAX/MIN Query Processing in Two-Tiered Sensor Networks.
J. Sensors, 2016

VP<sup>2</sup>RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks.
Int. J. Distributed Sens. Networks, 2016

2015
Parking Query in Vehicular Delay-Tolerant Networks with Privacy Protection Based on Secure Multiparty Computation.
J. Sensors, 2015

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2015

Switching Algorithm with Prediction Strategy for Maximizing Lifetime in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

Designing Constrained Trajectory Based on Maximizing Energy Reduction in Large-Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2013
Precision-Enhanced and Encryption-Mixed Privacy-Preserving Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

EMQP: An Energy-Efficient Privacy-Preserving MAX/MIN Query Processing in Tiered Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

EVTQ: An Efficient Verifiable Top-k Query Processing in Two-Tiered Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013


  Loading...