Liehuang Zhu
According to our database1,
Liehuang Zhu
authored at least 387 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., March, 2024
Blockchain-Based Lightweight and Privacy-Preserving Quality Assurance Framework in Crowdsensing Systems.
IEEE Internet Things J., January, 2024
Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems.
Comput. Stand. Interfaces, January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
IEEE Trans. Inf. Forensics Secur., 2024
A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning.
CoRR, 2024
CLIP-Driven Semantic Discovery Network for Visible-Infrared Person Re-Identification.
CoRR, 2024
2023
Privacy-Preserving Offloading in Edge Intelligence Systems With Inductive Learning and Local Differential Privacy.
IEEE Trans. Netw. Serv. Manag., December, 2023
Future Gener. Comput. Syst., December, 2023
FedSIGN: A sign-based federated learning framework with privacy and robustness guarantees.
Comput. Secur., December, 2023
IEEE Trans. Comput. Soc. Syst., October, 2023
IEEE Trans. Computers, October, 2023
How to Find a Bitcoin Mixer: A Dual Ensemble Model for Bitcoin Mixing Service Detection.
IEEE Internet Things J., October, 2023
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023
Power of Redundancy: Surplus Client Scheduling for Federated Learning Against User Uncertainties.
IEEE Trans. Mob. Comput., September, 2023
Peer Peer Netw. Appl., September, 2023
Security, Privacy, and Reliability in Ubiquitous Intelligence Empowered Internet of Vehicles.
IEEE Internet Things Mag., September, 2023
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.
ACM Trans. Internet Techn., August, 2023
A Time Impulse Neural Network Framework for Solving the Minimum Path Pair Problems of the Time-Varying Network.
IEEE Trans. Knowl. Data Eng., August, 2023
Sensors, August, 2023
IEEE Internet Things J., August, 2023
IEEE Internet Things J., July, 2023
Entropy, July, 2023
Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Trans. Big Data, June, 2023
Future Gener. Comput. Syst., June, 2023
BSDP: Blockchain-Based Smart Parking for Digital-Twin Empowered Vehicular Sensing Networks With Privacy Protection.
IEEE Trans. Ind. Informatics, May, 2023
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023
Leveraging Deep Reinforcement Learning With Attention Mechanism for Virtual Network Function Placement and Routing.
IEEE Trans. Parallel Distributed Syst., April, 2023
Future Gener. Comput. Syst., April, 2023
Traffic Flow Optimization for UAVs in Multi-Layer Information-Centric Software-Defined FANET.
IEEE Trans. Veh. Technol., February, 2023
Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
Peer Peer Netw. Appl., January, 2023
IEEE Trans. Sustain. Comput., 2023
EPPFM: Efficient and Privacy-Preserving Querying of Electronic Medical Records With Forward Privacy in Multiuser Setting.
IEEE Trans. Sustain. Comput., 2023
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Subject-Level Membership Inference Attack via Data Augmentation and Model Discrepancy.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023
J. Netw. Comput. Appl., 2023
Inf. Sci., 2023
IEEE Internet Things J., 2023
Privacy-Preserving and Traceable Blockchain-Based Charging Payment Scheme for Electric Vehicles.
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition.
Neurocomputing, 2023
IEEE Multim., 2023
SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning.
IACR Cryptol. ePrint Arch., 2023
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems.
Comput. Stand. Interfaces, 2023
CoRR, 2023
CoRR, 2023
IEEE Commun. Surv. Tutorials, 2023
WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023
Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer Networks.
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
A Novel Bearing Fault Diagnosis Method based on Stacked Autoencoder and End-edge Collaboration.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
Proceedings of the 2023 4th International Conference on Computing, 2023
Proceedings of the Advanced Information Systems Engineering Workshops, 2023
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023
Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning.
Proceedings of the IEEE International Conference on Blockchain, 2023
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
Proceedings of the Advanced Parallel Processing Technologies, 2023
MSDC: Exploiting Multi-State Power Consumption in Non-intrusive Load Monitoring Based on a Dual-CNN Model.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things.
IEEE Wirel. Commun., 2022
APPB: Anti-Counterfeiting and Privacy-Preserving Blockchain-Based Vehicle Supply Chains.
IEEE Trans. Veh. Technol., 2022
Accelerating Decentralized and Partial-Privacy Data Access for VANET via Online/Offline Functional Encryption.
IEEE Trans. Veh. Technol., 2022
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles.
IEEE Trans. Veh. Technol., 2022
Dynamic Data Transaction in Crowdsensing Based on Multi-Armed Bandits and Shapley Value.
IEEE Trans. Sustain. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE/ACM Trans. Netw., 2022
Location Privacy-Preserving Task Recommendation With Geometric Range Query in Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2022
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2022
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Peer-to-Peer Netw. Appl., 2022
Towards Efficient and Privacy-Preserving Versatile Task Allocation for Internet of Vehicles.
IEEE Open J. Comput. Soc., 2022
Neural Networks, 2022
Disease Prediction in Edge Computing: A Privacy-Preserving Technique for PHI Collection and Analysis.
IEEE Netw., 2022
FRUIT: A Blockchain-Based Efficient and Privacy-Preserving Quality-Aware Incentive Scheme.
IEEE J. Sel. Areas Commun., 2022
IEEE J. Sel. Areas Commun., 2022
IEEE Internet Things J., 2022
Reliable and Privacy-Preserving Top-k Disease Matching Schemes for E-Healthcare Systems.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
FastPRS: Augmenting Fast and Hidden Query in EPR Systems via Online/Offline Puncturable Search.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Privacy-Preserving and Fault-Tolerant Aggregation of Time-Series Data With a Semi-Trusted Authority.
IEEE Internet Things J., 2022
Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
IACR Cryptol. ePrint Arch., 2022
Frontiers Comput. Sci., 2022
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022
BPAF: Blockchain-Enabled Reliable and Privacy-Preserving Authentication for Fog-Based IoT Devices.
IEEE Consumer Electron. Mag., 2022
CCF Trans. Pervasive Comput. Interact., 2022
A polynomial kernel neural network classifier based on random sampling and information gain.
Appl. Intell., 2022
An Auxiliary Classifier GAN-Based DDoS Defense Solution in Blockchain-Based Software Defined Industrial Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
Towards Secure Bilateral Friend Query with Conjunctive Policy Matching in Social Networks.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
Malicious Transaction Identification in Digital Currency via Federated Graph Deep Learning.
Proceedings of the IEEE INFOCOM 2022, 2022
Stealing Secrecy from Outside: A Novel Gradient Inversion Attack in Federated Learning.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
A highly efficient, confidential, and continuous federated learning backdoor attack strategy.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Achieving a Blockchain-based Privacy-preserving Quality-aware Knowledge Marketplace in Crowdsensing.
Proceedings of the 20th IEEE International Conference on Embedded and Ubiquitous Computing, 2022
Proceedings of the Cyber Security - 19th China Annual Conference, 2022
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022
2021
PRVB: Achieving Privacy-Preserving and Reliable Vehicular Crowdsensing via Blockchain Oracle.
IEEE Trans. Veh. Technol., 2021
Successive Point-of-Interest Recommendation With Personalized Local Differential Privacy.
IEEE Trans. Veh. Technol., 2021
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing.
IEEE Trans. Serv. Comput., 2021
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Three-Stage Stackelberg Long-Term Incentive Mechanism and Monetization for Mobile Crowdsensing: An Online Learning Approach.
IEEE Trans. Netw. Sci. Eng., 2021
An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV With Fog Computing Architecture.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Intell. Transp. Syst., 2021
Blockchain Empowered Differentially Private and Auditable Data Publishing in Industrial IoT.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Inf. Forensics Secur., 2021
Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021
Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
An Energy-Aware High Performance Task Allocation Strategy in Heterogeneous Fog Computing Environments.
IEEE Trans. Computers, 2021
A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds.
Peer-to-Peer Netw. Appl., 2021
Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems.
Peer-to-Peer Netw. Appl., 2021
Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS.
J. Parallel Distributed Comput., 2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
ACM Comput. Surv., 2021
Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications.
Comput. Stand. Interfaces, 2021
Sci. China Inf. Sci., 2021
Achieving adaptively secure data access control with privacy protection for lightweight IoT devices.
Sci. China Inf. Sci., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing.
Proceedings of the 20th IEEE International Conference on Trust, 2021
SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud Storage.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021
Proceedings of the Knowledge Science, Engineering and Management, 2021
Proceedings of the Knowledge Science, Engineering and Management, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
From Local to Global Norm Emergence: Dissolving Self-reinforcing Substructures with Incremental Social Instruments.
Proceedings of the 38th International Conference on Machine Learning, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
Threat Prediction of Abnormal Transaction Behavior Based on Graph Convolutional Network in Blockchain Digital Currency.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling.
IEEE Wirel. Commun., 2020
Veh. Commun., 2020
BSFP: Blockchain-Enabled Smart Parking With Fairness, Reliability and Privacy Protection.
IEEE Trans. Veh. Technol., 2020
Verifiable and Privacy-Preserving Traffic Flow Statistics for Advanced Traffic Management Systems.
IEEE Trans. Veh. Technol., 2020
Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Dependable Secur. Comput., 2020
Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.
IEEE Netw., 2020
Blockchain-based multimedia sharing in vehicular social networks with privacy protection.
Multim. Tools Appl., 2020
IEEE J. Sel. Areas Commun., 2020
Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds.
IEEE J. Sel. Areas Commun., 2020
J. Comput. Sci. Technol., 2020
PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries.
Inf. Sci., 2020
Inf. Sci., 2020
A machine learning based golden-free detection method for command-activated hardware Trojan.
Inf. Sci., 2020
IEEE Internet Things J., 2020
Future Gener. Comput. Syst., 2020
Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN.
Future Gener. Comput. Syst., 2020
Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020
CoRR, 2020
An efficient and privacy-preserving truth discovery scheme in crowdsensing applications.
Comput. Secur., 2020
Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering.
Sci. China Inf. Sci., 2020
Sci. China Inf. Sci., 2020
Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis.
Proceedings of the Security and Privacy in Digital Economy, 2020
DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Efficient and Privacy-Preserving Non-Interactive Truth Discovery for Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2020
A Privacy-Preserving Location-Aware and Traffic Order-Based Route Collection Scheme in VANETs.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
2019
Traffic Monitoring in Self-Organizing VANETs: A Privacy-Preserving Mechanism for Speed Collection and Analysis.
IEEE Wirel. Commun., 2019
IEEE Trans. Multim., 2019
IEEE Trans. Ind. Informatics, 2019
Achieving Privacy-Friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds.
IEEE Trans. Cloud Comput., 2019
Sensors, 2019
Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach.
IEEE Netw., 2019
J. Netw. Comput. Appl., 2019
Inf. Sci., 2019
SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments.
Inf. Sci., 2019
Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting.
IEEE Internet Things J., 2019
PPMR: A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System.
IEEE Internet Things J., 2019
Achieving Searchable and Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT.
IEEE Internet Things J., 2019
Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities.
IEEE Internet Things J., 2019
Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.
IEEE Internet Things J., 2019
Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks.
IEEE Internet Things J., 2019
VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing.
CoRR, 2019
Online and automatic identification of encryption network behaviors in big data environment.
Concurr. Comput. Pract. Exp., 2019
IEEE Commun. Mag., 2019
Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor.
Clust. Comput., 2019
EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid.
Sci. China Inf. Sci., 2019
IEEE Access, 2019
IEEE Access, 2019
Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019
Proceedings of the IEEE International Conference on Smart Cloud, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Encrypted traffic classification of decentralized applications on ethereum using feature fusion.
Proceedings of the International Symposium on Quality of Service, 2019
ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Wirel. Commun., 2018
Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Sensors, 2018
Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.
Secur. Commun. Networks, 2018
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.
Secur. Commun. Networks, 2018
IEEE Netw., 2018
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018
Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018
Online and automatic identification and mining of encryption network behavior in big data environment.
J. Intell. Fuzzy Syst., 2018
J. Comput. Sci. Technol., 2018
PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system.
Future Gener. Comput. Syst., 2018
EURASIP J. Wirel. Commun. Netw., 2018
When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection.
CoRR, 2018
Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources.
CoRR, 2018
IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018
CoRR, 2018
Sci. China Inf. Sci., 2018
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack.
Sci. China Inf. Sci., 2018
An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing.
IEEE Access, 2018
IEEE Access, 2018
Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018
SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018
A New Satellite Constellation Networking Certification and Reliable Maintenance Protocol (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the Web Services - ICWS 2018, 2018
2017
IEEE Trans. Sustain. Comput., 2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017
Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Ind. Informatics, 2017
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
IEEE Trans. Inf. Forensics Secur., 2017
Sensors, 2017
Secur. Commun. Networks, 2017
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017
A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System.
Mob. Inf. Syst., 2017
Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud.
J. Netw. Comput. Appl., 2017
PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud.
Inf. Sci., 2017
Achieving differential privacy of trajectory data publishing in participatory sensing.
Inf. Sci., 2017
Future Gener. Comput. Syst., 2017
Sci. China Inf. Sci., 2017
Practical two-dimensional correlation power analysis and its backward fault-tolerance.
Sci. China Inf. Sci., 2017
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Achieving Communication Effectiveness of Web Authentication Protocol with Key Update.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
2016
IEEE Trans. Veh. Technol., 2016
A universal method for realizing non-repudiable provable data possession in cloud storage.
Secur. Commun. Networks, 2016
Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing.
Mob. Inf. Syst., 2016
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows.
Future Gener. Comput. Syst., 2016
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication.
Computing, 2016
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
Proceedings of the Human Centered Computing - Second International Conference, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
Int. J. Wirel. Mob. Comput., 2015
IACR Cryptol. ePrint Arch., 2015
Frontiers Comput. Sci., 2015
Reasoning task dependencies for robust service selection in data intensive workflows.
Computing, 2015
One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority.
Comput. J., 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
How to protect query and report privacy without sacrificing service quality in participatory sensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
Proceedings of the Trusted Systems - 7th International Conference, 2015
Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications.
Proceedings of the 44th International Conference on Parallel Processing, 2015
Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
2014
Inf. Sci., 2014
An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Closeness-based routing with temporal constraint for mobile social delay tolerant networks.
Proceedings of the IEEE Global Communications Conference, 2014
2013
Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature.
Secur. Commun. Networks, 2013
Int. J. Wirel. Mob. Comput., 2013
Int. J. Wirel. Mob. Comput., 2013
ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks.
Int. J. Distributed Sens. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
Trust-based workflow refactoring for concurrent scheduling in service-oriented environment.
Concurr. Comput. Pract. Exp., 2013
Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013
Proceedings of the Frontiers in Internet Technologies, 2013
2012
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings.
Inf. Sci., 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012
2011
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach.
IEEE Trans. Veh. Technol., 2011
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2011
An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011
2008
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
2006
Proceedings of the Agent Computing and Multi-Agent Systems, 2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the Semantic Web, 2006
Multi-Media Retrieval with Semantic Web: A Case Study in Airport Security Inspection Applications.
Proceedings of the Advances in Intelligent IT, 2006
2004
Digital signature of multicast streams secure against adaptive chosen message attack.
Comput. Secur., 2004