Kuan Zhang

According to our database1, Kuan Zhang authored at least 112 papers between 2009 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Joint Frame Design and Resource Allocation for Ultra-Reliable and Low-Latency Vehicular Networks.
IEEE Trans. Wireless Communications, 2020

A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2020

Intelligent Cache Pollution Attacks Detection for Edge Computing Enabled Mobile Social Networks.
IEEE Trans. Emerging Topics in Comput. Intellig., 2020

Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2020

Ultra-Reliable and Low-Latency Communications for Connected Vehicles: Challenges and Solutions.
IEEE Network, 2020

A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020

Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing.
Inf. Sci., 2020

Cloud-based lightweight secure RFID mutual authentication protocol in IoT.
Inf. Sci., 2020

Leveraging Linear Quadratic Regulator Cost and Energy Consumption for Ultra-Reliable and Low-Latency IoT Control Systems.
CoRR, 2020

Performance modeling and analysis of a Hyperledger-based system using GSPN.
Comput. Commun., 2020

Landing site topographic mapping and rover localization for Chang'e-4 mission.
Sci. China Inf. Sci., 2020

LSTM-Based Anomaly Detection for Non-Linear Dynamical System.
IEEE Access, 2020

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020

2019
Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors.
IEEE Trans. Smart Grid, 2019

Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features.
IEEE Trans. Mob. Comput., 2019

Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme.
ACM Trans. Intell. Syst. Technol., 2019

A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems.
IEEE Network, 2019

A Novel Classifier Exploiting Mobility Behaviors for Sybil Detection in Connected Vehicle Systems.
IEEE Internet Things J., 2019

Game Theoretical Secure Caching Scheme in Multihoming Edge Computing-Enabled Heterogeneous Networks.
IEEE Internet Things J., 2019

Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.
IEEE Internet Things J., 2019

Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet Things J., 2019

Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision.
IEEE Communications Magazine, 2019

An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019

An IEEE 802.15.6-Based MAC Frame Aggregation Approach for Wireless Body Area Networks.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

A Secure Private Charging Pile Sharing Scheme with Electric Vehicles in Energy Blockchain.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Improved Secure Key Management Scheme for LoRa System.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

SmartEye: Mobile Device Proximity Monitoring via Wireless Signal Analysis.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

A High Accuracy Integrated Bagging-Fuzzy-GBDT Prediction Algorithm for Heart Disease Diagnosis.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Smart Cyber Forensics of Rear-End Collision based on Multi-Access Edge Computing.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

HMM Based Cache Pollution Attack Detection for Edge Computing Enabled Mobile Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2TM-MAC: A Two-Tier Multi-Channel Interference Mitigation MAC Protocol for Coexisting WBANs.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Secure Edge Caching Placement and Delivery for Ultra-Reliable and Low-Latency Vehicular Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Secure Edge Caching for Layered Multimedia Contents in Heterogeneous Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Lifecycle Prediction of Second Use Electric Vehicle Batteries Based on ARIMA Model.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

A Novel Learning Approach for Citywide Crowd Flow Prediction.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

2018
Adaptive Transmission Range Based Topology Control Scheme for Fast and Reliable Data Collection.
Wireless Communications and Mobile Computing, 2018

Crowdsourcing for Mobile Networks and IoT.
Wireless Communications and Mobile Computing, 2018

Performance Analysis of IEEE 802.15.6-Based Coexisting Mobile WBANs With Prioritized Traffic and Dynamic Interference.
IEEE Trans. Wireless Communications, 2018

Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Veh. Technol., 2018

Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage.
IEEE Trans. Dependable Secur. Comput., 2018

Optimal Computational Power Allocation in Multi-Access Mobile Edge Computing for Blockchain.
Sensors, 2018

EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Network, 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE J. Sel. Areas Commun., 2018

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.
IEEE Commun. Surv. Tutorials, 2018

QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks.
IEEE Access, 2018

Optimal Multi-access Computation Offloading for Mobile Blockchain.
Proceedings of the IEEE International Conference on Communication Systems, 2018

Dynamic Interference Analysis of Coexisting Mobile WBANs for Health Monitoring.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Game Theoretical Secure Caching Scheme in Multi-Homing Heterogeneous Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Anomalous Path Detection for Spatial Crowdsourcing-Based Indoor Navigation System.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering.
IEEE Trans. Smart Grid, 2017

SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs.
IEEE Trans. Intell. Transp. Syst., 2017

Algorithm to improve accuracy of energy expended in a room calorimeter.
Medical Biol. Eng. Comput., 2017

Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms.
Inf. Sci., 2017

High Reliability and Low Latency for Vehicular Networks: Challenges and Solutions.
CoRR, 2017

Multi-message Authentication over Noisy Channel with Secure Channel Codes.
CoRR, 2017

Security and Privacy in Smart City Applications: Challenges and Solutions.
IEEE Communications Magazine, 2017

Multi-message Authentication over Noisy Channel with Polar Codes.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

A measurement-based boundary estimation approach for localization in industrial WSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Lightweight and Privacy-Preserving Fog-Assisted Information Sharing Scheme for Health Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Channel-Based Sybil Detection in Industrial Wireless Sensor Networks: A Multi-Kernel Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Channel-Based Sampling Rate and Queuing State Control in Delay-Constraint Industrial WSNs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
CSMA/CA-based medium access control for indoor millimeter wave networks.
Wireless Communications and Mobile Computing, 2016

Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks.
IEEE Trans. Wireless Communications, 2016

Exploiting Secure and Energy-Efficient Collaborative Spectrum Sensing for Cognitive Radio Sensor Networks.
IEEE Trans. Wireless Communications, 2016

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2016

CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Security and Communication Networks, 2016

Big data-driven optimization for mobile networks toward 5G.
IEEE Network, 2016

Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Exploiting dispersive power gain and delay spread for sybil detection in industrial WSNs.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

AMA: Anonymous mutual authentication with traceability in carpooling systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EDAT: Efficient data aggregation without TTP for privacy-assured smart metering.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Security and privacy for mobile healthcare networks: from a quality of protection perspective.
IEEE Wirel. Commun., 2015

Epidemic Information Dissemination in Mobile Social Networks With Opportunistic Links.
IEEE Trans. Emerg. Top. Comput., 2015

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Soc. Syst., 2015

SACRM: Social Aware Crowdsourcing with Reputation Management in mobile sensing.
Comput. Commun., 2015

Cloud assisted HetNets toward 5G wireless networks.
IEEE Communications Magazine, 2015

Security and privacy in mobile crowdsourcing networks: challenges and opportunities.
IEEE Communications Magazine, 2015

Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions.
IEEE Communications Magazine, 2015

Dynamic bandwidth allocation in mobile social networks with multiple homing access.
Proceedings of the International Conference on Wireless Communications & Signal Processing, 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Security and Privacy for Mobile Healthcare Networks
Wireless Networks, Springer, ISBN: 978-3-319-24717-5, 2015

2014
Security and privacy in mobile social networks: challenges and solutions.
IEEE Wirel. Commun., 2014

Support Vector Machine Model for Diagnosing Pneumoconiosis Based on Wavelet Texture Features of Digital Chest Radiographs.
J. Digital Imaging, 2014

PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014

Sybil Attacks and Their Defenses in the Internet of Things.
IEEE Internet Things J., 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014

Privacy-Preserving Data Publish-Subscribe Service on Cloud-based Platforms.
IACR Cryptol. ePrint Arch., 2014

Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Communications Magazine, 2014

Standing-up control and ramp-climbing control of a spherical wheeled robot.
Proceedings of the 13th International Conference on Control Automation Robotics & Vision, 2014

Exploiting channel-aware reputation system against selective forwarding attacks in WSNs.
Proceedings of the IEEE Global Communications Conference, 2014

PMQC: A privacy-preserving multi-quality charging scheme in V2G network.
Proceedings of the IEEE Global Communications Conference, 2014

Gait characteristics of overweight and obese children with different ages.
Proceedings of the 7th International Conference on Biomedical Engineering and Informatics, 2014

2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

Mining indirect antagonistic communities from social interactions.
Knowl. Inf. Syst., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE J. Sel. Areas Commun., 2013

Mining direct antagonistic communities in signed social networks.
Inf. Process. Manag., 2013

A novel low-power mixed-mode implementation of weight update in particle PHD filters.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013

2012
Performance comparison of artificial neural network and logistic regression model for differentiating lung nodules on CT scans.
Expert Syst. Appl., 2012

VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Mining direct antagonistic communities in explicit trust networks.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Mining Antagonistic Communities from Social Networks.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

2009
Density-based clustering of data streams at multiple resolutions.
ACM Trans. Knowl. Discov. Data, 2009

Integrating Genomic Data and Topological Metrics to Obtain Reliable Protein-Protein Interactions.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009


  Loading...