Kuan Zhang

According to our database1, Kuan Zhang authored at least 82 papers between 2009 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors.
IEEE Trans. Smart Grid, 2019

Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features.
IEEE Trans. Mob. Comput., 2019

A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems.
IEEE Network, 2019

A Novel Classifier Exploiting Mobility Behaviors for Sybil Detection in Connected Vehicle Systems.
IEEE Internet of Things Journal, 2019

Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled Heterogeneous Networks.
IEEE Internet of Things Journal, 2019

Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet of Things Journal, 2019

Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision.
IEEE Communications Magazine, 2019

SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Adaptive Transmission Range Based Topology Control Scheme for Fast and Reliable Data Collection.
Wireless Communications and Mobile Computing, 2018

Crowdsourcing for Mobile Networks and IoT.
Wireless Communications and Mobile Computing, 2018

Performance Analysis of IEEE 802.15.6-Based Coexisting Mobile WBANs With Prioritized Traffic and Dynamic Interference.
IEEE Trans. Wireless Communications, 2018

Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Vehicular Technology, 2018

Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Sec. Comput., 2018

Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain.
Sensors, 2018

EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Network, 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE Journal on Selected Areas in Communications, 2018

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.
IEEE Communications Surveys and Tutorials, 2018

QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks.
IEEE Access, 2018

Optimal Multi-access Computation Offloading for Mobile Blockchain.
Proceedings of the IEEE International Conference on Communication Systems, 2018

Dynamic Interference Analysis of Coexisting Mobile WBANs for Health Monitoring.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Game Theoretical Secure Caching Scheme in Multi-Homing Heterogeneous Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Anomalous Path Detection for Spatial Crowdsourcing-Based Indoor Navigation System.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering.
IEEE Trans. Smart Grid, 2017

SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs.
IEEE Trans. Intelligent Transportation Systems, 2017

Algorithm to improve accuracy of energy expended in a room calorimeter.
Med. Biol. Engineering and Computing, 2017

Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms.
Inf. Sci., 2017

Security and Privacy in Smart City Applications: Challenges and Solutions.
IEEE Communications Magazine, 2017

Multi-message Authentication over Noisy Channel with Polar Codes.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

A measurement-based boundary estimation approach for localization in industrial WSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Lightweight and Privacy-Preserving Fog-Assisted Information Sharing Scheme for Health Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Channel-Based Sampling Rate and Queuing State Control in Delay-Constraint Industrial WSNs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
CSMA/CA-based medium access control for indoor millimeter wave networks.
Wireless Communications and Mobile Computing, 2016

Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2016

Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks.
IEEE Trans. Wireless Communications, 2016

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks.
IEEE Trans. Industrial Informatics, 2016

CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Security and Communication Networks, 2016

Big data-driven optimization for mobile networks toward 5G.
IEEE Network, 2016

Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Exploiting dispersive power gain and delay spread for sybil detection in industrial WSNs.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

AMA: Anonymous mutual authentication with traceability in carpooling systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EDAT: Efficient data aggregation without TTP for privacy-assured smart metering.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wireless Commun., 2015

Epidemic Information Dissemination in Mobile Social Networks With Opportunistic Links.
IEEE Trans. Emerging Topics Comput., 2015

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Social Systems, 2015

SACRM: Social Aware Crowdsourcing with Reputation Management in mobile sensing.
Computer Communications, 2015

Cloud assisted HetNets toward 5G wireless networks.
IEEE Communications Magazine, 2015

Security and privacy in mobile crowdsourcing networks: challenges and opportunities.
IEEE Communications Magazine, 2015

Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions.
IEEE Communications Magazine, 2015

Dynamic bandwidth allocation in mobile social networks with multiple homing access.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Security and Privacy for Mobile Healthcare Networks
Wireless Networks, Springer, ISBN: 978-3-319-24717-5, 2015

2014
Security and privacy in mobile social networks: challenges and solutions.
IEEE Wireless Commun., 2014

Support Vector Machine Model for Diagnosing Pneumoconiosis Based on Wavelet Texture Features of Digital Chest Radiographs.
J. Digital Imaging, 2014

PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014

Sybil Attacks and Their Defenses in the Internet of Things.
IEEE Internet of Things Journal, 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet of Things Journal, 2014

Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms.
IACR Cryptology ePrint Archive, 2014

Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Communications Magazine, 2014

Standing-up control and ramp-climbing control of a spherical wheeled robot.
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014

Exploiting channel-aware reputation system against selective forwarding attacks in WSNs.
Proceedings of the IEEE Global Communications Conference, 2014

PMQC: A privacy-preserving multi-quality charging scheme in V2G network.
Proceedings of the IEEE Global Communications Conference, 2014

Gait characteristics of overweight and obese children with different ages.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerging Topics Comput., 2013

Mining indirect antagonistic communities from social interactions.
Knowl. Inf. Syst., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE Journal on Selected Areas in Communications, 2013

Mining direct antagonistic communities in signed social networks.
Inf. Process. Manage., 2013

A novel low-power mixed-mode implementation of weight update in particle PHD filters.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013

2012
Performance comparison of artificial neural network and logistic regression model for differentiating lung nodules on CT scans.
Expert Syst. Appl., 2012

VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Mining direct antagonistic communities in explicit trust networks.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Mining Antagonistic Communities from Social Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

2009
Density-based clustering of data streams at multiple resolutions.
TKDD, 2009

Integrating Genomic Data and Topological Metrics to Obtain Reliable Protein-Protein Interactions.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009


  Loading...