Jianfeng Ma

According to our database1, Jianfeng Ma authored at least 519 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020

A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation.
IEEE Trans. Wireless Communications, 2020

Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET.
IEEE Trans. Veh. Technol., 2020

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain.
IEEE Trans. Veh. Technol., 2020

Research on Remaining Useful Life Prediction of Rolling Element Bearings Based on Time-Varying Kalman Filter.
IEEE Trans. Instrum. Meas., 2020

A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs.
IEEE Trans. Ind. Informatics, 2020

AdCapsule: Practical Confinement of Advertisements in Android Applications.
IEEE Trans. Dependable Secur. Comput., 2020

Trajectory-Based Community Detection.
IEEE Trans. Circuits Syst., 2020

BTNC: A blockchain based trusted network connection protocol in IoT.
J. Parallel Distributed Comput., 2020

Additive centralized and Stackelberg DEA models for two-stage system with shared resources.
Int. Trans. Oper. Res., 2020

Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data.
Inf. Sci., 2020

Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering.
Inf. Sci., 2020

User interaction-oriented community detection based on cascading analysis.
Inf. Sci., 2020

Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020

LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020

TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs.
IEEE Internet Things J., 2020

Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band.
IEEE Internet Things J., 2020

TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning.
IEEE Internet Things J., 2020

FEM assessment of the effects of machining parameters in vibration assisted nano impact machining of silicon by loose abrasives.
IJMR, 2020

SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020

PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020

VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
CoRR, 2020

Cloud-based Federated Boosting for Mobile Crowdsensing.
CoRR, 2020

Learn to Forget: User-Level Memorization Elimination in Federated Learning.
CoRR, 2020

An Improved Phenomenological Model of the Planetary Gearbox Based on Meshing Vibration Characteristics.
IEEE Access, 2020

A Construction Method of (2, 3) Visual Cryptography Scheme.
IEEE Access, 2020

Target Privacy Preserving for Social Networks.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Medical Privacy-preserving Service Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
SRDPV: secure route discovery and privacy-preserving verification in MANETs.
Wirel. Networks, 2019

Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019

Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing.
IEEE Trans. Veh. Technol., 2019

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Serv. Comput., 2019

Fingerprint Protected Password Authentication Protocol.
Security and Communication Networks, 2019

Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing.
Security and Communication Networks, 2019

Pruneable sharding-based blockchain protocol.
Peer Peer Netw. Appl., 2019

一种面向二进制的细粒度控制流完整性方法 (Fine-grained Control Flow Integrity Method on Binaries).
计算机科学, 2019

Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme.
J. Parallel Distributed Comput., 2019

Inference attack in Android Activity based on program fingerprint.
J. Netw. Comput. Appl., 2019

Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019

HVDB: a hierarchical verifiable database scheme with scalable updates.
J. Ambient Intell. Humaniz. Comput., 2019

Quaternion weighted spherical Bessel-Fourier moment and its invariant for color image reconstruction and object recognition.
Inf. Sci., 2019

PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data.
Inf. Sci., 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

Privacy-preserving and high-accurate outsourced disease predictor on random forest.
Inf. Sci., 2019

Counting the frequency of time-constrained serial episodes in a streaming sequence.
Inf. Sci., 2019

Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.
IEEE Internet Things J., 2019

Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices.
IEEE Internet Things J., 2019

Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet Things J., 2019

Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019

Blockchain-based secure and fair crowdsourcing scheme.
Int. J. Distributed Sens. Networks, 2019

User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Commun. Syst., 2019

Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model.
IET Information Security, 2019

Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.
Entropy, 2019

Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
Entropy, 2019

Research on neural network chaotic encryption algorithm in wireless network security communication.
EURASIP J. Wireless Comm. and Networking, 2019

IHP: improving the utility in differential private histogram publication.
Distributed Parallel Databases, 2019

Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

Selfholding: A combined attack model using selfish mining with block withholding attack.
Comput. Secur., 2019

Universally composable secure geographic area verification without pre-shared secret.
Sci. China Inf. Sci., 2019

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
Sci. China Inf. Sci., 2019

New efficient constructions of verifiable data streaming with accountability.
Ann. des Télécommunications, 2019

Energy-Aware RFID Authentication in Edge Computing.
IEEE Access, 2019

A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms.
IEEE Access, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

Differentially Privacy-preserving Social IoT.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

A Novel User Membership Leakage Attack in Collaborative Deep Learning.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019

Edge Weight Differential Privacy Based Spectral Query Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Semantic-Based Dummy Generation Strategy for Location Privacy.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Comparison of Neural Networks' Performance in Early Screening of Autism Spectrum Disorders Under Two MRI Principles.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

An Automatic Crisis Information Recognition Model Based on BP Neural Network.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Research on Resolution Limit of Community Detection in Location-Based Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Fuzzy String Matching Scheme Resistant to Statistical Attack.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Time-Aware Dummy-Based Privacy Protection for Continuous LBSs.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Collective Influence Based Privacy Preservation for Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Topology Based Differential Privacy Scheme for Average Path Length Query.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Lightweight Security Authentication Mechanism Towards UAV Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Cheating Detection in (k, n) Secret Image Sharing Scheme.
Proceedings of the Digital Forensics and Watermarking - 18th International Workshop, 2019

Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Credible Routing Scheme of SDN-Based Cloud Using Blockchain.
Proceedings of the Data Science, 2019

Listen!: Audio-based Smart IoT Device Pairing Protocol.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Transparent Access and Integration of Heterogeneous Encrypted Database in Hybrid Cloud Environment.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Collaborative Deep Learning for Medical Image Analysis with Differential Privacy.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Continuous Authentication for the Internet of Things Using Channel State Information.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Lightweight Secure Communication Mechanism Towards UAV Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), 2019

MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Covert Wireless Communications in IoT Systems: Hiding Information in Interference.
IEEE Wirel. Commun., 2018

Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks.
IEEE Trans. Veh. Technol., 2018

Dlog: diagnosing router events with syslogs for anomaly detection.
J. Supercomput., 2018

Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018

Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Systems Journal, 2018

Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept.
Sensors, 2018

EOABS: expressive outsourced attribute-based signature.
Peer Peer Netw. Appl., 2018

DOAS: Efficient data owner authorized search over encrypted cloud data.
Peer Peer Netw. Appl., 2018

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer Peer Netw. Appl., 2018

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer Peer Netw. Appl., 2018

Trust-based service composition and selection in service oriented architecture.
Peer Peer Netw. Appl., 2018

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing.
IEEE Network, 2018

A remotely keyed file encryption scheme under mobile cloud computing.
J. Netw. Comput. Appl., 2018

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2018

Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones.
J. Inf. Sci. Eng., 2018

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018

Hidden community identification in location-based social network via probabilistic venue sequences.
Inf. Sci., 2018

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

PRE<sup>+</sup>: dual of proxy re-encryption for secure cloud data sharing service.
IJWGS, 2018

VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner.
Int. J. High Perform. Comput. Netw., 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018

DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing.
Future Gener. Comput. Syst., 2018

Evaluating operation and coordination efficiencies of parallel-series two-stage system: A data envelopment analysis approach.
Expert Syst. Appl., 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018

Covert Wireless Communications with Active Eavesdropper on AWGN Channels.
CoRR, 2018

ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence.
CoRR, 2018

SADUS: Secure data deletion in user space for mobile devices.
Comput. Secur., 2018

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018

ProactiveCrowd: Modelling Proactive Steering Behaviours for Agent-Based Crowd Simulation.
Comput. Graph. Forum, 2018

Verifiable keyword search over encrypted cloud data in smart city.
Comput. Electr. Eng., 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Comput. Informatics, 2018

Image Feature Extraction in Encrypted Domain With Privacy-Preserving Hahn Moments.
IEEE Access, 2018

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs.
IEEE Access, 2018

Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data.
IEEE Access, 2018

CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.
IEEE Access, 2018

A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018

A Novel Dynamic Android Malware Detection System With Ensemble Learning.
IEEE Access, 2018

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018

True Random Number Generation Using Process Scheduling of Android Systems.
Proceedings of the International Conference on Networking and Network Applications, 2018

Cooperative Jamming for Secrecy of Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2018

Preserving Privacy for Hubs and Links in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On Covert Communication with Interference Uncertainty.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks.
IEEE Trans. Veh. Technol., 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Inf. Forensics Secur., 2017

An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything.
Security and Communication Networks, 2017

The postprocessing of quantum digital signatures.
Quantum Inf. Process., 2017

VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel.
Peer Peer Netw. Appl., 2017

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive Mob. Comput., 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017

Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mobile Information Systems, 2017

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mobile Information Systems, 2017

ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment.
J. Medical Syst., 2017

An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

A Multi-Party Secret Handshake Scheme Based on Chaotic Maps.
Inf. Technol. Control., 2017

A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud.
Inf. Sci., 2017

Sampling-based adaptive bounding evolutionary algorithm for continuous optimization problems.
Inf. Sci., 2017

A fair data access control towards rational users in cloud storage.
Inf. Sci., 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017

Reusable garbled gates for new fully homomorphic encryption service.
IJWGS, 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
IJWGS, 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017

An efficient revocable ID-based encryption scheme in the standard model.
IJES, 2017

Analysis and improvement of the Internet-Draft IKEv3 protocol.
Int. J. Commun. Syst., 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017

Test of Mechanical Failure for Via Holes and Solder Joints of Complex Interconnect Structure.
J. Electronic Testing, 2017

Efficiency measurement and decomposition in hybrid two-stage DEA with additional inputs.
Expert Syst. Appl., 2017

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization.
CoRR, 2017

Identifying opinion leaders in social networks with topic limitation.
Cluster Computing, 2017

An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.
Sci. China Inf. Sci., 2017

hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017

VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings.
Sci. China Inf. Sci., 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017

FCT: a fully-distributed context-aware trust model for location based service recommendation.
Sci. China Inf. Sci., 2017

Reconstruction methodology for rational secret sharing based on mechanism design.
Sci. China Inf. Sci., 2017

NetPro: detecting attacks in MANET routing with provenance and verification.
Sci. China Inf. Sci., 2017

APRS: a privacy-preserving location-aware recommender system based on differentially private histogram.
Sci. China Inf. Sci., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs.
IEEE Access, 2017

Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access, 2017

A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems.
IEEE Access, 2017

Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-Preserving Comparable Encryption Scheme in Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Multi-hop Based Centrality of a Path in Complex Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
A privacy preserving three-factor authentication protocol for e-Health clouds.
J. Supercomput., 2016

Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.
IEEE Trans. Computers, 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Dynamic game model of botnet DDoS attack and defense.
Security and Communication Networks, 2016

Efficient keyword search over encrypted data in multi-cloud setting.
Security and Communication Networks, 2016

A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities.
Security and Communication Networks, 2016

Measuring the risk value of sensitive dataflow path in Android applications.
Security and Communication Networks, 2016

A new method to deduce counterexamples in secure routing protocols based on strand space model.
Security and Communication Networks, 2016

Cooperative Jammer Placement for Physical Layer Security Enhancement.
IEEE Network, 2016

LSOT: A Lightweight Self-Organized Trust Model in VANETs.
Mobile Information Systems, 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016

A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016

m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Syst., 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Syst., 2016

Position based key exchange: defnitions and implementations.
J. Comm. Inform. Networks, 2016

On the architecture and development life cycle of secure cyber-physical systems.
J. Comm. Inform. Networks, 2016

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment.
KSII Trans. Internet Inf. Syst., 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
Inf. Technol. Control., 2016

An intelligent movie recommendation system through group-level sentiment analysis in microblogs.
Neurocomputing, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
IJGUC, 2016

Improved algorithm for secure outsourcing of modular exponentiations with high checkability.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Gener. Comput. Syst., 2016

Revocable and anonymous searchable encryption in multi-user setting.
Concurr. Comput. Pract. Exp., 2016

DALP: A demand-aware location privacy protection scheme in continuous location-based services.
Concurr. Comput. Pract. Exp., 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Cluster Computing, 2016

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016

Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating.
Sci. China Inf. Sci., 2016

Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.
Comput. Electr. Eng., 2016

Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Modeling Gap Seeking Behaviors for Agent-based Crowd Simulation.
Proceedings of the 29th International Conference on Computer Animation and Social Agents, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Improving the utility in differential private histogram publishing: Theoretical study and practice.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
LTPPM: a location and trajectory privacy protection mechanism in participatory sensing.
Wirel. Commun. Mob. Comput., 2015

Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility.
IEEE Trans. Wireless Communications, 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Inf. Forensics Secur., 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Secur. Comput., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015

Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Comput. Collect. Intell., 2015

Protocol Derivation System for the Needham-Schroeder family.
Security and Communication Networks, 2015

Provable ownership of files in deduplication cloud storage.
Security and Communication Networks, 2015

Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Security and Communication Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Security and Communication Networks, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer Peer Netw. Appl., 2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer Peer Netw. Appl., 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mobile Information Systems, 2015

基于离散Hermite多项式的图像压缩 (Image Compression Based on Discrete Hermite Polynomials).
计算机科学, 2015

Social Influence Study in Online Networks: A Three-Level Review.
J. Comput. Sci. Technol., 2015

New access control systems based on outsourced attribute-based encryption.
J. Comput. Secur., 2015

A new proxy re-encryption scheme for protecting critical information systems.
J. Ambient Intell. Humaniz. Comput., 2015

A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems.
Inf. Technol. Control., 2015

A Security Quantitative Analysis Method For Access Control Based on Security Entropy.
Int. J. Netw. Secur., 2015

Numerical investigation of restricted contact cutting tool in machining of AISI 1045 steel.
IJMR, 2015

A two-factor authenticated key exchange protocol based on RSA with dynamic passwords.
IJES, 2015

Energy-Efficient Collaborative Communication for Optimization Cluster Heads Selection Based on Genetic Algorithms in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment.
Int. J. Distributed Sens. Networks, 2015

Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Commun. Syst., 2015

Improvement of robust smart-card-based password authentication scheme.
Int. J. Commun. Syst., 2015

Secure service composition with information flow control in service clouds.
Future Gener. Comput. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Gener. Comput. Syst., 2015

A two-stage DEA model considering shared inputs and free intermediate measures.
Expert Syst. Appl., 2015

Device-to-Device Communication in LTE-Advanced Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2015

Stability analysis of an <i>e</i>-<i>SEIAR</i> model with point-to-group worm propagation.
Commun. Nonlinear Sci. Numer. Simul., 2015

A delegation based cross trusted domain direct anonymous attestation scheme.
Comput. Networks, 2015

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015

Universally composable secure positioning in the bounded retrieval model.
Sci. China Inf. Sci., 2015

Survey on cyberspace security.
Sci. China Inf. Sci., 2015

Bayesian mechanism for rational secret sharing scheme.
Sci. China Inf. Sci., 2015

A privacy-preserving data collection model for digital community.
Sci. China Inf. Sci., 2015

An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information.
Sci. China Inf. Sci., 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc Sens. Wirel. Networks, 2015

Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Data Owner Based Attribute Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

New Compact CCA Secure Elgamal Scheme in the Random Oracle Model.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Continuous Context-Aware Device Comfort Evaluation Method.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An Improved Algorithm for Secure Outsourcing of Modular Exponentiations.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency.
Proceedings of the 10th International Conference on P2P, 2015

Another Look at Ciphertext Updating Algorithms for Cloud Storage.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
Wireless Personal Communications, 2014

An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wireless Personal Communications, 2014

FLAP: An Efficient WLAN Initial Access Authentication Protocol.
IEEE Trans. Parallel Distrib. Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distrib. Syst., 2014

A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
J. Softw., 2014

Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Netw. Comput. Appl., 2014

Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng., 2014

Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms.
JCP, 2014

Access Control Capability Assessment Method Based on Security Entropy.
JCP, 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Information Security, 2014

New and efficient conditional e-payment systems with transferability.
Future Gener. Comput. Syst., 2014

From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Cluster Computing, 2014

Trust-based service composition in multi-domain environments under time constraint.
Sci. China Inf. Sci., 2014

Automated enforcement for relaxed information release with reference points.
Sci. China Inf. Sci., 2014

Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin.
Proceedings of the 2014 IEEE International Conference on Systems, Man, and Cybernetics, 2014

Multi-domain Direct Anonymous Attestation Scheme from Pairings.
Proceedings of the Network and System Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wireless Personal Communications, 2013

An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation.
IEEE Trans. Smart Grid, 2013

TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
IEEE Trans. Inf. Forensics Secur., 2013

An Engine for Automatic Code Generation of Security Protocols in Multiple Languages.
Smart CR, 2013

A Collaborative QoS-Aware Service Evaluation Method for Service Selection.
J. Networks, 2013

An novel three-party authenticated key exchange protocol using one-time key.
J. Netw. Comput. Appl., 2013

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

Constructing Verifiable Random Number in Finite Field.
J. Internet Serv. Inf. Secur., 2013

An Improved Password-Based Remote User Authentication Protocol without Smart Cards.
Inf. Technol. Control., 2013

A rational framework for secure communication.
Inf. Sci., 2013

Access control requirements for structured document in cloud computing.
IJGUC, 2013

MAP: Towards Authentication for Multiple Tags.
Int. J. Distributed Sens. Networks, 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
Int. J. Distributed Sens. Networks, 2013

Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Fair (t, n) threshold secret sharing scheme.
IET Information Security, 2013

Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
CoRR, 2013

Flexible relay selection for secure communication in two-hop wireless networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013

Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
Data security in unattended wireless sensor networks with mobile sinks.
Wirel. Commun. Mob. Comput., 2012

Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Security and Communication Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Security and Communication Networks, 2012

Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms.
Pattern Recognit., 2012

Radial Tchebichef moment invariants for image recognition.
J. Vis. Commun. Image Represent., 2012

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
IJRFITA, 2012

Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
Int. J. Netw. Secur., 2012

Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings.
Int. J. Netw. Secur., 2012

A method for efficient parallel computation of Tate pairing.
IJGUC, 2012

Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems.
Int. J. Distributed Sens. Networks, 2012

Secrecy Transfer.
Int. J. Distributed Sens. Networks, 2012

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerg. Telecommun. Technol., 2012

PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks.
EURASIP J. Wireless Comm. and Networking, 2012

User authentication via keystroke dynamics based on difference subspace and slope correlation degree.
Digit. Signal Process., 2012

Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
CoRR, 2012

Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
CoRR, 2012

Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A simple energy-efficient routing algorithm for Wireless Sensor Networks based on Artificial Potential Field.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An efficient WLAN initial access authentication protocol.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Verifying Location-Based Services with Declassification Enforcement.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Analysis on Variation and Factors of Water Resources Consumption Intensity in China.
Proceedings of the Modeling Risk Management for Resources and Environment in China, 2011

Authentications and Key Management in 3G-WLAN Interworking.
MONET, 2011

A novel re-authentication scheme based on tickets in wireless local area networks.
J. Parallel Distributed Comput., 2011

A New Evaluation Model for Security Protocols.
J. Commun., 2011

Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario.
Intell. Autom. Soft Comput., 2011

Reasonable routing in delay/disruption tolerant networks.
Frontiers Comput. Sci. China, 2011

Security analysis of two recently proposed RFID authentication protocols.
Frontiers Comput. Sci. China, 2011

A USIM-Based Uniform Access Authentication Framework in Mobile Communication.
EURASIP J. Wireless Comm. and Networking, 2011

Secret Sharing Scheme with Fairness.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Towards Location and Trajectory Privacy Protection in Participatory Sensing.
Proceedings of the Mobile Computing, Applications, and Services, 2011

From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011

Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Invariant Image Recognition Using Radial Jacobi Moment Invariants.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Analysis of the Authentication Protocols Based on Game Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wireless Communications, 2010

Image analysis by Bessel-Fourier moments.
Pattern Recognit., 2010

Rotation invariant analysis and orientation estimation method for texture classification based on Radon transform and correlation analysis.
J. Vis. Commun. Image Represent., 2010

Efficient and Identity-based Signcryption with Provably-secure.
J. Digit. Content Technol. its Appl., 2010

A highly secure identity-based authenticated key-exchange protocol for satellite communication.
J. Commun. Networks, 2010

A Hierarchical Hybrid Routing Protocol for Wireless Mesh Network.
J. Convergence Inf. Technol., 2010

An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
Int. J. Netw. Secur., 2010

Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks.
Int. J. Netw. Secur., 2010

An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment.
IEICE Trans. Inf. Syst., 2010

Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2010

SAM: Secure Access of Media Independent Information Service with User Anonymity.
EURASIP J. Wireless Comm. and Networking, 2010

Stability analysis of a SEIQV epidemic model for rapid spreading worms.
Comput. Secur., 2010

Universally composable one-time signature and broadcast authentication.
Sci. China Inf. Sci., 2010

Universally composable secure TNC model and EAP-TNC protocol in IF-T.
Sci. China Inf. Sci., 2010

Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2010

Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A novel data communication approach in wireless sensor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A Digital Rights Management scheme based on rational share content.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010

Changeable Threshold Signature Scheme Based on Lattice Theory.
Proceedings of the International Conference on E-Business and E-Government, 2010

Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Wireless Mesh Networks-Based Multinetwork Convergence and Security Access.
Proceedings of the Guide to Wireless Mesh Networks, 2009

Modeling and analysis of a self-learning worm based on good point set scanning.
Wirel. Commun. Mob. Comput., 2009

Asymmetric Key Pre-distribution Scheme for sensor networks.
IEEE Trans. Wireless Communications, 2009

Security and Trust in Digital Rights Management: A Survey.
Int. J. Netw. Secur., 2009

Robust Node Positioning in Wireless Sensor Networks.
IEICE Trans. Commun., 2009

UC-Secure Source Routing Protocol.
IACR Cryptol. ePrint Arch., 2009

Defending passive worms in unstructured P2P networks based on healthy file dissemination.
Comput. Secur., 2009

Key hierarchies for hierarchical access control in secure group communications.
Comput. Networks, 2009

Secure Error-Correction Network Coding in a Randomized Setting.
Proceedings of the Advances in Information Security and Assurance, 2009

Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

The Development Mode of Trust E-commerce Services.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Hybrid Routing Protocol for Wireless Mesh Network.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Predators Combat Good Point Set Scanning-Based Self-Learning Worms.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Cell Biocompatibility of Porous Nano-Hydroxyapatite/Polyamide66 Composite Scaffolds for Bone Tissue Engineering.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

An Active Defense Model and Framework of Insider Threats Detection and Sense.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Towards Provably Secure On-demand Source Routing in MANET.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Action-Based Access Control for Web Services.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Analysis the Properties of TLS Based on Temporal Logic of Knowledge.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Node-failure Tolerance of Topology in Wireless Sensor Networks.
Int. J. Netw. Secur., 2008

Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves.
IACR Cryptol. ePrint Arch., 2008

Polynomials for Ate Pairing and Ate<sub>i</sub> Pairing.
IACR Cryptol. ePrint Arch., 2008

Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wireless Comm. and Networking, 2008

Secure Network Coding Against the Contamination and Eavesdropping Adversaries
CoRR, 2008

A new approach for UC security concurrent deniable authentication.
Sci. China Ser. F Inf. Sci., 2008

Keying Material Based Key Pre-distribution Scheme for Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2008

Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

SMNDP: A Practical and Provably Secure Multi-path Source Routing.
Proceedings of the MSN 2008, 2008

A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks.
Proceedings of the MSN 2008, 2008

A pairwise key establishment scheme for heterogeneous sensor networks.
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008

Keying material based key pre-distribution scheme.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A Secure and Efficient Group Key Agreement for Ad Hoc Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Enhanced Architecture of TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Aggregate Signature Scheme with Constant Pairing Operations.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

ECC-Based Threshold Digital Signature Scheme without a Trusted Party.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Towards Provably Secure On-Demand Distance Vector Routing in MANET.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms.
Pattern Recognit., 2007

Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor.
IJAAC, 2007

Universally composable anonymous Hash certification model.
Sci. China Ser. F Inf. Sci., 2007

A truly meshless pre- and post-processor for meshless analysis methods.
Adv. Eng. Softw., 2007

Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Research on the Resilience of Key Management in Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Fault and intrusion tolerance of wireless sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Ternary Tree Based Group Key Management in Dynamic Peer Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Security extension for the Canetti-Krawczyk model in identity-based systems.
Sci. China Ser. F Inf. Sci., 2005

Efficient Group Key Management for Dynamic Peer Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Security Analysis on Chinese Wireless LAN Standard and Its Solution.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

Design and Implementation of Survivable Network Systems.
Proceedings of the Advances in Intelligent Computing, 2005

An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005

A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Worm Propagation Modeling and Analysis on Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On the Security of the Canetti-Krawczyk Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A new authentication scheme with anonymity for wireless environments.
IEEE Trans. Consumer Electron., 2004

An efficient and secure fault-tolerant conference-key distribution scheme.
IEEE Trans. Consumer Electron., 2004

An intrusion-tolerant authorization and authentication scheme in distributed environments.
ACM SIGOPS Oper. Syst. Rev., 2004

Practical Secret Sharing Scheme Realizing Generalized Adversary Structure.
J. Comput. Sci. Technol., 2004

Enhancing the Content of the Intrusion Alerts Using Logic Correlation.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Availability Analysis and Comparison of Different Intrusion-Tolerant Systems.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2003
Using transforming matrices to generate DNA clone grids.
Discret. Appl. Math., 2003


  Loading...