Jinbo Xiong

Orcid: 0000-0001-9985-1953

According to our database1, Jinbo Xiong authored at least 89 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024

2023
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing.
J. Syst. Archit., November, 2023

When MetaVerse Meets Computing Power Networking: An Energy-Efficient Framework For Service Placement.
IEEE Wirel. Commun., October, 2023

Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing.
IEEE Internet Things J., September, 2023

Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT.
IEEE Trans. Ind. Informatics, May, 2023

Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023

FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023

The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles.
Concurr. Comput. Pract. Exp., 2023

FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare.
Proceedings of the IEEE International Conference on E-health Networking, 2023

Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual Reality.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Privacy-Preserving Traffic Violation Image Filtering and Searching via Crowdsensing.
Mob. Networks Appl., December, 2022

Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

A Blockchain-Based Machine Learning Framework for Edge Services in IIoT.
IEEE Trans. Ind. Informatics, 2022

POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing.
Multim. Tools Appl., 2022

Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022

Special Issue on Knowledge- and Service-Oriented Industrial Internet of Things: Architectures, Challenges, and Methodologies.
IEEE Internet Things J., 2022

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022

Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT.
Digit. Commun. Networks, 2022

An incentive mechanism for collaborative intelligence.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2022

Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2022

Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data.
Proceedings of the IEEE International Conference on Communications, 2022

Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Location Privacy Protection Scheme for LBS in IoT.
Wirel. Commun. Mob. Comput., 2021

An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021

CP-ABE-Based Secure and Verifiable Data Deletion in Cloud.
Secur. Commun. Networks, 2021

Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage.
Secur. Commun. Networks, 2021

Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021

Structural Mutual Information and Its Application.
IACR Cryptol. ePrint Arch., 2021

A lightweight privacy protection scheme based on user preference in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021

Privacy and Security Issues in Deep Learning: A Survey.
IEEE Access, 2021

2020
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT.
Wirel. Commun. Mob. Comput., 2020

Edge-Assisted Privacy-Preserving Raw Data Sharing Framework for Connected Autonomous Vehicles.
IEEE Wirel. Commun., 2020

A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2020

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020

A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs.
IEEE Trans. Ind. Informatics, 2020

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020

ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud.
Concurr. Comput. Pract. Exp., 2020

HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth.
IEEE Access, 2020

Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019

An Attribute-Based Assured Deletion Scheme in Cloud Computing.
Int. J. Inf. Technol. Web Eng., 2019

Privacy-preserving edge-assisted image retrieval and classification in IoT.
Frontiers Comput. Sci., 2019

Fine-grained multi-authority access control in IoT-enabled mHealth.
Ann. des Télécommunications, 2019

Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019

Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach.
IEEE Access, 2019

A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Low-Latency High-Level Data Sharing for Connected and Autonomous Vehicular Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wirel. Commun. Mob. Comput., 2018

RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
Mob. Networks Appl., 2018

Local HMM for indoor positioning based on fingerprinting and displacement ranging.
IET Commun., 2018

MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018

D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018

Distributed and Application-Aware Task Scheduling in Edge-Clouds.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

A Novel Data Secure Deletion Scheme for Mobile Devices.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems.
IEEE Access, 2017

Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

DPLK-Means: A Novel Differential Privacy K-Means Mechanism.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
History-aware page replacement algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electron., 2016

A secure access and associate deleting scheme for multi-replica in multi-cloud environment.
Int. J. High Perform. Syst. Archit., 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016

An efficient CGA algorithm against DoS attack on Duplicate Address Detection process.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Role and Time-Based Access Control with Efficient Revocation for Cloud Storage.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Multi-replica Associated Deleting Scheme in Cloud.
Proceedings of the 10th International Conference on Complex, 2016

2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Secur. Commun. Networks, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Netw. Appl., 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mob. Inf. Syst., 2015

A Novel Cyberspace-Oriented Access Control Model.
IACR Cryptol. ePrint Arch., 2015

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

2013
Access control requirements for structured document in cloud computing.
Int. J. Grid Util. Comput., 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
TNC-eSA: An Echanced Security Access Solution to Office Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012

2009
Syncretizing Context Information into the Collaborative Filtering Recommendation.
Proceedings of the First International Workshop on Database Technology and Applications, 2009


  Loading...