Junqing Le

Orcid: 0000-0003-2240-5263

According to our database1, Junqing Le authored at least 32 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
LWAKA: Lightweight Anonymous Authenticated Key Agreement for VANETs.
IEEE Trans. Intell. Transp. Syst., June, 2025

PSRAKA: Physically Secure and Robust Authenticated Key Agreement for VANETs.
IEEE Trans. Veh. Technol., May, 2025

ASMAFL: Adaptive Staleness-Aware Momentum Asynchronous Federated Learning in Edge Computing.
IEEE Trans. Mob. Comput., April, 2025

LRCPA: Lattice-Based Robust and Conditional Privacy-Preserving Authentication for VANETs.
IEEE Trans. Veh. Technol., March, 2025

Privacy-Preserving Federated Learning Based on Dataset Condensation.
IEEE Trans. Consumer Electron., February, 2025

Secure and Accurate Personalized Federated Learning With Similarity-Based Model Aggregation.
IEEE Trans. Sustain. Comput., 2025

PECHA: Privacy-Preserving and Efficient Cross-Domain Handover Authentication for Heterogeneous Networks.
IEEE Trans. Dependable Secur. Comput., 2025

DLA-FCIL: Federated Class-Incremental Learning for Dynamic Data with Forgetting Compensation and Auxiliary Generators.
Int. J. Pattern Recognit. Artif. Intell., 2025

Approximate statistic query via sampling for IoT data trading and sharing.
Comput. Networks, 2025

2024
Secure and Efficient Continuous Learning Model for Traffic Flow Prediction.
IEEE Trans. Netw. Serv. Manag., August, 2024

An Efficient Privacy-Preserving Ranked Multi-Keyword Retrieval for Multiple Data Owners in Outsourced Cloud.
IEEE Trans. Serv. Comput., 2024

Secure Redactable Blockchain With Dynamic Support.
IEEE Trans. Dependable Secur. Comput., 2024

AVPMIR: Adaptive Verifiable Privacy-Preserving Medical Image Retrieval.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Privacy-Preserving Federated Learning With Malicious Clients and Honest-but-Curious Servers.
IEEE Trans. Inf. Forensics Secur., 2023

Secure and Efficient Data Deduplication in JointCloud Storage.
IEEE Trans. Cloud Comput., 2023

A Novel Privacy-Preserving Location-Based Services Search Scheme in Outsourced Cloud.
IEEE Trans. Cloud Comput., 2023

2022
Minable Data Publication Based on Sensitive Association Rule Hiding.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

SecEDMO: Enabling Efficient Data Mining with Strong Privacy Protection in Cloud Computing.
IEEE Trans. Cloud Comput., 2022

2021
Federated Continuous Learning With Broad Network Architecture.
IEEE Trans. Cybern., 2021

Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey.
Int. J. Intell. Syst., 2021

Machine Learning-Assisted Wireless PHY Key Generation with Reconfigurable Intelligent Surfaces.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

2020
An Anonymous Off-Blockchain Micropayments Scheme for Cryptocurrencies in the Real World.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Anonymous Privacy Preservation Based on m-Signature and Fuzzy Processing for Real-Time Data Release.
IEEE Trans. Syst. Man Cybern. Syst., 2020

A two-layer algorithm based on PSO for solving unit commitment problem.
Soft Comput., 2020

Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation.
Comput. Secur., 2020

Improved evolutionary algorithm and its application in PID controller optimization.
Sci. China Inf. Sci., 2020

Privacy Protection and Efficient Incumbent Detection in Spectrum Sharing Based on Federated Learning.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

Efficient Physical Layer Group Key Generation in 5G Wireless Networks.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
A novel algorithm for privacy preserving utility mining based on integer linear programming.
Eng. Appl. Artif. Intell., 2019

Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction.
Comput. Secur., 2019

Unit Commitment Problem Using An Efficient PSO Based Algorithm.
Proceedings of the Eleventh International Conference on Advanced Computational Intelligence, 2019

2017
Full autonomy: A novel individualized anonymity model for privacy preserving.
Comput. Secur., 2017


  Loading...