Kuan Zhang

Orcid: 0000-0002-4262-153X

Affiliations:
  • University of Nebraska-Lincoln, Lincoln, NE, USA


According to our database1, Kuan Zhang authored at least 157 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid.
IEEE Internet Things J., March, 2024

Breaking Down Data Sharing Barrier of Smart City: A Digital Twin Approach.
IEEE Netw., January, 2024

Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT.
IEEE Internet Things J., January, 2024

Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT.
IEEE Internet Things J., January, 2024

Game Theoretical Incentive for USV Fleet-Assisted Data Sharing in Maritime Communication Networks.
IEEE Trans. Netw. Sci. Eng., 2024

Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things.
IEEE Internet Things J., 2024

SC-Chain: An Efficient Blockchain Framework for Smart City.
IEEE Internet Things J., 2024

2023
Dynamic Beam-Based Random Access Scheme for M2M Communications in Massive MIMO Systems.
IEEE Trans. Veh. Technol., November, 2023

A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects.
IEEE Internet Things J., September, 2023

P<sup>2</sup>AE: Preserving Privacy, Accuracy, and Efficiency in Location-Dependent Mobile Crowdsensing.
IEEE Trans. Mob. Comput., April, 2023

Reservoir Inflow Forecasting in Hydropower Industry: A Generative Flow-Based Approach.
IEEE Trans. Ind. Informatics, 2023

Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023

Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud.
IEEE Netw., 2023

2022
Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks.
IEEE Trans. Veh. Technol., 2022

Federated Learning With Fair Incentives and Robust Aggregation for UAV-Aided Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2022

A Stable AI-Based Binary and Multiple Class Heart Disease Prediction Model for IoMT.
IEEE Trans. Ind. Informatics, 2022

A Deep One-Class Intrusion Detection Scheme in Software-Defined Industrial Networks.
IEEE Trans. Ind. Informatics, 2022

Anonymous and Efficient Authentication Scheme for Privacy-Preserving Distributed Learning.
IEEE Trans. Inf. Forensics Secur., 2022

Identity-Based Provable Data Possession From RSA Assumption for Secure Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network.
Peer-to-Peer Netw. Appl., 2022

Blockchain-based trust management for verifiable time synchronization service in IoT.
Peer-to-Peer Netw. Appl., 2022

Audio-Based Security Techniques for Secure Device-to-Device Communications.
IEEE Netw., 2022

A Behavior Decision Method Based on Reinforcement Learning for Autonomous Driving.
IEEE Internet Things J., 2022

Leveraging Energy, Latency, and Robustness for Routing Path Selection in Internet of Battlefield Things.
IEEE Internet Things J., 2022

Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems.
IEEE Internet Things J., 2022

Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022

Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT.
IEEE Internet Things J., 2022

Privacy-preserving data deduplication in edge-assisted mobile crowdsensing.
Int. J. Multim. Intell. Secur., 2022

Dynamic Beam-Based Random Access Scheme for M2M Communications in Massive MIMO Systems.
CoRR, 2022

Energy-Aware Device Scheduling for Joint Federated Learning in Edge-assisted Internet of Agriculture Things.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Preserving Location Privacy and Accurate Task Allocation in Edge-assisted Mobile Crowdsensing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems.
Proceedings of the IEEE INFOCOM 2022, 2022

Efficient Multi-Layer Stochastic Gradient Descent Algorithm for Federated Learning in E-health.
Proceedings of the IEEE International Conference on Communications, 2022

Collaborative Edge Caching with Personalized Modeling of Content Popularity over Indoor Mobile Social Networks.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Security and Privacy for Mobile Edge Caching: Challenges and Solutions.
IEEE Wirel. Commun., 2021

Security Solutions for IoT-Enabled Applications Against the Disease Pandemic.
IEEE Internet Things Mag., 2021

Fast Containment of Infectious Diseases With E-Healthcare Mobile Social Internet of Things.
IEEE Internet Things J., 2021

Adaptive Artificial Intelligence for Resource-Constrained Connected Vehicles in Cybertwin-Driven 6G Network.
IEEE Internet Things J., 2021

Reinforcement-Learning-Based Query Optimization in Differentially Private IoT Data Publishing.
IEEE Internet Things J., 2021

Adaptive and Dynamic Security in AI-Empowered 6G: From an Energy Efficiency Perspective.
IEEE Commun. Stand. Mag., 2021

An ultra light weight and secure RFID batch authentication scheme for IoMT.
Comput. Commun., 2021

Efficient and Privacy-preserving Distributed Learning in Cloud-Edge Computing Systems.
Proceedings of the WiseML@WiSec 2021: Proceedings of the 3rd ACM Workshop on Wireless Security and Machine Learning, 2021

A Quantitative Study of Energy Consumption for Embedded Security.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Communication-Efficient Federated Learning for Connected Vehicles with Constrained Resources.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

Exploiting Feature Interactions for Malicious Website Detection with Overhead-accuracy Tradeoff.
Proceedings of the ICC 2021, 2021

Exploiting Ensemble Learning for Edge-assisted Anomaly Detection Scheme in e-healthcare System.
Proceedings of the IEEE Global Communications Conference, 2021

Cooperative Task Allocation in Edge Computing Assisted Vehicular Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Joint Frame Design and Resource Allocation for Ultra-Reliable and Low-Latency Vehicular Networks.
IEEE Trans. Wirel. Commun., 2020

A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Defending Malicious Check-In Using Big Data Analysis of Indoor Positioning System: An Access Point Selection Approach.
IEEE Trans. Netw. Sci. Eng., 2020

Abnormal Crowd Traffic Detection for Crowdsourced Indoor Positioning in Heterogeneous Communications Networks.
IEEE Trans. Netw. Sci. Eng., 2020

Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2020

Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2020

Physical Layer based Message Authentication with Secure Channel Codes.
IEEE Trans. Dependable Secur. Comput., 2020

Ultra-Reliable and Low-Latency Communications for Connected Vehicles: Challenges and Solutions.
IEEE Netw., 2020

Challenges and Solutions in Autonomous Driving: A Blockchain Approach.
IEEE Netw., 2020

Blockchain-Based Data Security for Artificial Intelligence Applications in 6G Networks.
IEEE Netw., 2020

A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020

Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing.
Inf. Sci., 2020

Cloud-based lightweight secure RFID mutual authentication protocol in IoT.
Inf. Sci., 2020

Leveraging Linear Quadratic Regulator Cost and Energy Consumption for Ultrareliable and Low-Latency IoT Control Systems.
IEEE Internet Things J., 2020

An AUV-Assisted Data Gathering Scheme Based on Clustering and Matrix Completion for Smart Ocean.
IEEE Internet Things J., 2020

Leveraging Linear Quadratic Regulator Cost and Energy Consumption for Ultra-Reliable and Low-Latency IoT Control Systems.
CoRR, 2020

Deep Reinforcement Learning for Autonomous Internet of Things: Model, Applications and Challenges.
IEEE Commun. Surv. Tutorials, 2020

Privacy-preserving searchable encryption in the intelligent edge computing.
Comput. Commun., 2020

Security in edge-assisted Internet of Things: challenges and solutions.
Sci. China Inf. Sci., 2020

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020

An Optimization Framework for Privacy-preserving Access Control in Cloud-Fog Computing Systems.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Defending Malicious Check-in Based on Access Point Selection for Indoor Positioning System.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors.
IEEE Trans. Smart Grid, 2019

Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features.
IEEE Trans. Mob. Comput., 2019

Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme.
ACM Trans. Intell. Syst. Technol., 2019

A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems.
IEEE Netw., 2019

Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled Heterogeneous Networks.
IEEE Internet Things J., 2019

Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.
IEEE Internet Things J., 2019

Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet Things J., 2019

Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision.
IEEE Commun. Mag., 2019

An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019

An IEEE 802.15.6-Based MAC Frame Aggregation Approach for Wireless Body Area Networks.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

A Secure Private Charging Pile Sharing Scheme with Electric Vehicles in Energy Blockchain.
Proceedings of the 18th IEEE International Conference On Trust, 2019

SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

A High Accuracy Integrated Bagging-Fuzzy-GBDT Prediction Algorithm for Heart Disease Diagnosis.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Smart Cyber Forensics of Rear-End Collision based on Multi-Access Edge Computing.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

HMM Based Cache Pollution Attack Detection for Edge Computing Enabled Mobile Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2TM-MAC: A Two-Tier Multi-Channel Interference Mitigation MAC Protocol for Coexisting WBANs.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Secure Edge Caching Placement and Delivery for Ultra-Reliable and Low-Latency Vehicular Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Secure Edge Caching for Layered Multimedia Contents in Heterogeneous Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Lifecycle Prediction of Second Use Electric Vehicle Batteries Based on ARIMA Model.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

A Novel Learning Approach for Citywide Crowd Flow Prediction.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
Adaptive Transmission Range Based Topology Control Scheme for Fast and Reliable Data Collection.
Wirel. Commun. Mob. Comput., 2018

Crowdsourcing for Mobile Networks and IoT.
Wirel. Commun. Mob. Comput., 2018

Performance Analysis of IEEE 802.15.6-Based Coexisting Mobile WBANs With Prioritized Traffic and Dynamic Interference.
IEEE Trans. Wirel. Commun., 2018

Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Veh. Technol., 2018

Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Secur. Comput., 2018

Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain.
Sensors, 2018

EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Netw., 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE J. Sel. Areas Commun., 2018

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.
IEEE Commun. Surv. Tutorials, 2018

QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks.
IEEE Access, 2018

Optimal Multi-access Computation Offloading for Mobile Blockchain.
Proceedings of the IEEE International Conference on Communication Systems, 2018

Dynamic Interference Analysis of Coexisting Mobile WBANs for Health Monitoring.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Game Theoretical Secure Caching Scheme in Multi-Homing Heterogeneous Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Anomalous Path Detection for Spatial Crowdsourcing-Based Indoor Navigation System.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering.
IEEE Trans. Smart Grid, 2017

SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs.
IEEE Trans. Intell. Transp. Syst., 2017

Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms.
Inf. Sci., 2017

High Reliability and Low Latency for Vehicular Networks: Challenges and Solutions.
CoRR, 2017

Multi-message Authentication over Noisy Channel with Secure Channel Codes.
CoRR, 2017

Security and Privacy in Smart City Applications: Challenges and Solutions.
IEEE Commun. Mag., 2017

Multi-message Authentication over Noisy Channel with Polar Codes.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

A measurement-based boundary estimation approach for localization in industrial WSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Lightweight and Privacy-Preserving Fog-Assisted Information Sharing Scheme for Health Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Channel-Based Sampling Rate and Queuing State Control in Delay-Constraint Industrial WSNs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
CSMA/CA-based medium access control for indoor millimeter wave networks.
Wirel. Commun. Mob. Comput., 2016

Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks.
IEEE Trans. Wirel. Commun., 2016

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2016

CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Secur. Commun. Networks, 2016

Big data-driven optimization for mobile networks toward 5G.
IEEE Netw., 2016

Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Exploiting dispersive power gain and delay spread for sybil detection in industrial WSNs.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

AMA: Anonymous mutual authentication with traceability in carpooling systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EDAT: Efficient data aggregation without TTP for privacy-assured smart metering.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wirel. Commun., 2015

Epidemic Information Dissemination in Mobile Social Networks With Opportunistic Links.
IEEE Trans. Emerg. Top. Comput., 2015

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Soc. Syst., 2015

SACRM: Social Aware Crowdsourcing with Reputation Management in mobile sensing.
Comput. Commun., 2015

Cloud assisted HetNets toward 5G wireless networks.
IEEE Commun. Mag., 2015

Security and privacy in mobile crowdsourcing networks: challenges and opportunities.
IEEE Commun. Mag., 2015

Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions.
IEEE Commun. Mag., 2015

Dynamic bandwidth allocation in mobile social networks with multiple homing access.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Security and Privacy for Mobile Healthcare Networks
Wireless Networks, Springer, ISBN: 978-3-319-24717-5, 2015

2014
Security and privacy in mobile social networks: challenges and solutions.
IEEE Wirel. Commun., 2014

PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014

Sybil Attacks and Their Defenses in the Internet of Things.
IEEE Internet Things J., 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014

Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms.
IACR Cryptol. ePrint Arch., 2014

Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Commun. Mag., 2014

Exploiting channel-aware reputation system against selective forwarding attacks in WSNs.
Proceedings of the IEEE Global Communications Conference, 2014

PMQC: A privacy-preserving multi-quality charging scheme in V2G network.
Proceedings of the IEEE Global Communications Conference, 2014

2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE J. Sel. Areas Commun., 2013

A novel low-power mixed-mode implementation of weight update in particle PHD filters.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013

2012
VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012


  Loading...