Liehuang Zhu

According to our database1, Liehuang Zhu authored at least 387 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., March, 2024

Blockchain-Based Lightweight and Privacy-Preserving Quality Assurance Framework in Crowdsensing Systems.
IEEE Internet Things J., January, 2024

Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems.
Comput. Stand. Interfaces, January, 2024

Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage.
IEEE Trans. Inf. Forensics Secur., 2024

Locally Verifiable Batch Authentication in IoMT.
IEEE Trans. Inf. Forensics Secur., 2024

Decentralized Threshold Signatures With Dynamically Private Accountability.
IEEE Trans. Inf. Forensics Secur., 2024

SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

Graph-Based Covert Transaction Detection and Protection in Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
IEEE Trans. Inf. Forensics Secur., 2024

A Closer Look at the Belief Propagation Algorithm in Side-Channel-Assisted Chosen-Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2024

CL-SCA: Leveraging Contrastive Learning for Profiled Side-Channel Analysis.
IACR Cryptol. ePrint Arch., 2024

Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning.
CoRR, 2024

CLIP-Driven Semantic Discovery Network for Visible-Infrared Person Re-Identification.
CoRR, 2024

2023
Privacy-Preserving Offloading in Edge Intelligence Systems With Inductive Learning and Local Differential Privacy.
IEEE Trans. Netw. Serv. Manag., December, 2023

Enabling efficient and secure health data sharing for Healthcare IoT systems.
Future Gener. Comput. Syst., December, 2023

FedSIGN: A sign-based federated learning framework with privacy and robustness guarantees.
Comput. Secur., December, 2023

Blockchain-Based Multisignature Lock for UAC in Metaverse.
IEEE Trans. Comput. Soc. Syst., October, 2023

A Novel Covert Timing Channel Based on Bitcoin Messages.
IEEE Trans. Computers, October, 2023

How to Find a Bitcoin Mixer: A Dual Ensemble Model for Bitcoin Mixing Service Detection.
IEEE Internet Things J., October, 2023

InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023

Power of Redundancy: Surplus Client Scheduling for Federated Learning Against User Uncertainties.
IEEE Trans. Mob. Comput., September, 2023

B-Tor: Anonymous communication system based on consortium blockchain.
Peer Peer Netw. Appl., September, 2023

Security, Privacy, and Reliability in Ubiquitous Intelligence Empowered Internet of Vehicles.
IEEE Internet Things Mag., September, 2023

A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.
ACM Trans. Internet Techn., August, 2023

A Time Impulse Neural Network Framework for Solving the Minimum Path Pair Problems of the Time-Varying Network.
IEEE Trans. Knowl. Data Eng., August, 2023

Decentralized Policy-Hidden Fine-Grained Redaction in Blockchain-Based IoT Systems.
Sensors, August, 2023

Blockchains for Artificial Intelligence of Things: A Comprehensive Survey.
IEEE Internet Things J., August, 2023

BTAA: Blockchain and TEE-Assisted Authentication for IoT Systems.
IEEE Internet Things J., July, 2023

Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains.
Entropy, July, 2023

Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Trans. Big Data, June, 2023

Enabling privacy-preserving multi-server collaborative search in smart healthcare.
Future Gener. Comput. Syst., June, 2023

BSDP: Blockchain-Based Smart Parking for Digital-Twin Empowered Vehicular Sensing Networks With Privacy Protection.
IEEE Trans. Ind. Informatics, May, 2023

Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023

Leveraging Deep Reinforcement Learning With Attention Mechanism for Virtual Network Function Placement and Routing.
IEEE Trans. Parallel Distributed Syst., April, 2023

A blockchain based access control scheme with hidden policy and attribute.
Future Gener. Comput. Syst., April, 2023

Traffic Flow Optimization for UAVs in Multi-Layer Information-Centric Software-Defined FANET.
IEEE Trans. Veh. Technol., February, 2023

Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

Privacy-preserving and fault-tolerant aggregation of time-series data without TA.
Peer Peer Netw. Appl., January, 2023

Non-Interactive DSSE for Medical Data Sharing With Forward and Backward Privacy.
IEEE Trans. Sustain. Comput., 2023

EPPFM: Efficient and Privacy-Preserving Querying of Electronic Medical Records With Forward Privacy in Multiuser Setting.
IEEE Trans. Sustain. Comput., 2023

Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage.
IEEE Trans. Serv. Comput., 2023

TreeNet Based Fast Task Decomposition for Resource-Constrained Edge Intelligence.
IEEE Trans. Serv. Comput., 2023

EthereumX: Improving Signature Security With Randomness Preprocessing Module.
IEEE Trans. Serv. Comput., 2023

Efficient Defenses Against Output Poisoning Attacks on Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023

Subject-Level Membership Inference Attack via Data Augmentation and Model Discrepancy.
IEEE Trans. Inf. Forensics Secur., 2023

EGIA: An External Gradient Inversion Attack in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments.
IEEE Trans. Dependable Secur. Comput., 2023

PILE: Robust Privacy-Preserving Federated Learning Via Verifiable Perturbations.
IEEE Trans. Dependable Secur. Comput., 2023

Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023

EBDL: Effective blockchain-based covert storage channel with dynamic labels.
J. Netw. Comput. Appl., 2023

Transfer subspace learning via label release and contribution degree distinction.
Inf. Sci., 2023

Cross-Chain-Based Trustworthy Node Identity Governance in Internet of Things.
IEEE Internet Things J., 2023

Privacy-Preserving and Traceable Blockchain-Based Charging Payment Scheme for Electric Vehicles.
IEEE Internet Things J., 2023

Blockchain-Based Anonymous Data Sharing With Accountability for Internet of Things.
IEEE Internet Things J., 2023

Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition.
Neurocomputing, 2023

Blockchain-Empowered Privacy-Preserving Digital Object Trading in the Metaverse.
IEEE Multim., 2023

SPA-GPT: General Pulse Tailor for Simple Power Analysis Based on Reinforcement Learning.
IACR Cryptol. ePrint Arch., 2023

Enabling privacy and leakage resistance for dynamic blockchain-based access control systems.
Comput. Stand. Interfaces, 2023

Survey on Quality Assurance of Smart Contracts.
CoRR, 2023

A Comparative Evaluation of Automated Analysis Tools for Solidity Smart Contracts.
CoRR, 2023

Zero-knowledge Proof Meets Machine Learning in Verifiability: A Survey.
CoRR, 2023

VFedMH: Vertical Federated Learning for Training Multi-party Heterogeneous Models.
CoRR, 2023

Artificial Intelligence for Web 3.0: A Comprehensive Survey.
CoRR, 2023

Zero-Knowledge Proof-based Practical Federated Learning on Blockchain.
CoRR, 2023

Machine Learning-Powered Encrypted Network Traffic Analysis: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2023

WaterBear: Practical Asynchronous BFT Matching Security Guarantees of Partially Synchronous BFT.
Proceedings of the 32nd USENIX Security Symposium, 2023

Subverting Website Fingerprinting Defenses with Robust Traffic Representation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Blockchain-based Certificate Management with Multi-Party Authentication.
Proceedings of the 6th International Conference on Information and Computer Technologies, 2023

Illegal Accounts Detection on Ethereum Using Heterogeneous Graph Transformer Networks.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

BDVFL: Blockchain-based Decentralized Vertical Federated Learning.
Proceedings of the IEEE International Conference on Data Mining, 2023

Fine-Grained Data Rights Governance in Blockchain-Based Cloud-Edge Communications.
Proceedings of the IEEE Global Communications Conference, 2023

HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

A Novel Bearing Fault Diagnosis Method based on Stacked Autoencoder and End-edge Collaboration.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Blockchain-based Privacy-Preserving Reputation Management for Crowdsensing.
Proceedings of the 2023 4th International Conference on Computing, 2023

Regulation-Friendly Privacy-Preserving Blockchain Based on zk-SNARK.
Proceedings of the Advanced Information Systems Engineering Workshops, 2023

Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning.
Proceedings of the IEEE International Conference on Blockchain, 2023

Enabling Fuzzy Matching in Privacy-preserving Bilateral Task Recommendation.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023

From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis.
Proceedings of the Advanced Parallel Processing Technologies, 2023

MSDC: Exploiting Multi-State Power Consumption in Non-intrusive Load Monitoring Based on a Dual-CNN Model.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Privacy-Preserving in Mobile Crowdsensing
Springer, ISBN: 978-981-19-8314-6, 2023

2022
Secure and Trusted Collaborative Learning Based on Blockchain for Artificial Intelligence of Things.
IEEE Wirel. Commun., 2022

APPB: Anti-Counterfeiting and Privacy-Preserving Blockchain-Based Vehicle Supply Chains.
IEEE Trans. Veh. Technol., 2022

Accelerating Decentralized and Partial-Privacy Data Access for VANET via Online/Offline Functional Encryption.
IEEE Trans. Veh. Technol., 2022

Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles.
IEEE Trans. Veh. Technol., 2022

Dynamic Data Transaction in Crowdsensing Based on Multi-Armed Bandits and Shapley Value.
IEEE Trans. Sustain. Comput., 2022

TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET.
IEEE Trans. Serv. Comput., 2022

TDFL: Truth Discovery Based Byzantine Robust Federated Learning.
IEEE Trans. Parallel Distributed Syst., 2022

User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
IEEE/ACM Trans. Netw., 2022

Location Privacy-Preserving Task Recommendation With Geometric Range Query in Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2022

Video Aficionado: We Know What You Are Watching.
IEEE Trans. Mob. Comput., 2022

Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2022

Report When Malicious: Deniable and Accountable Searchable Message-Moderation System.
IEEE Trans. Inf. Forensics Secur., 2022

Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2022

Multi-Access Filtering for Privacy-Preserving Fog Computing.
IEEE Trans. Cloud Comput., 2022

EPDL: An efficient and privacy-preserving deep learning for crowdsensing.
Peer-to-Peer Netw. Appl., 2022

Towards Efficient and Privacy-Preserving Versatile Task Allocation for Internet of Vehicles.
IEEE Open J. Comput. Soc., 2022

The minimum regret path problem on stochastic fuzzy time-varying networks.
Neural Networks, 2022

Disease Prediction in Edge Computing: A Privacy-Preserving Technique for PHI Collection and Analysis.
IEEE Netw., 2022

FRUIT: A Blockchain-Based Efficient and Privacy-Preserving Quality-Aware Incentive Scheme.
IEEE J. Sel. Areas Commun., 2022

Blockchain-Empowered Efficient Data Sharing in Internet of Things Settings.
IEEE J. Sel. Areas Commun., 2022

Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain.
IEEE Internet Things J., 2022

Reliable and Privacy-Preserving Top-k Disease Matching Schemes for E-Healthcare Systems.
IEEE Internet Things J., 2022

SmartFilter: An Edge System for Real-Time Application-Guided Video Frames Filtering.
IEEE Internet Things J., 2022

Fair Incentive Mechanism With Imperfect Quality in Privacy-Preserving Crowdsensing.
IEEE Internet Things J., 2022

RePEL: Blockchain-Empowered Conditional Privacy-Preserving Encrypted Learning.
IEEE Internet Things J., 2022

Toward Reliable and Confidential Release for Smart Contract via ID-Based TRE.
IEEE Internet Things J., 2022

FastPRS: Augmenting Fast and Hidden Query in EPR Systems via Online/Offline Puncturable Search.
IEEE Internet Things J., 2022

Edge Computing and Lightning Network Empowered Secure Food Supply Management.
IEEE Internet Things J., 2022

Attacking the Edge-of-Things: A Physical Attack Perspective.
IEEE Internet Things J., 2022

Chain-Based Covert Data Embedding Schemes in Blockchain.
IEEE Internet Things J., 2022

Privacy-Preserving and Fault-Tolerant Aggregation of Time-Series Data With a Semi-Trusted Authority.
IEEE Internet Things J., 2022

Practical Asynchronous Distributed Key Generation: Improved Efficiency, Weaker Assumption, and Standard Model.
IACR Cryptol. ePrint Arch., 2022

SCARE and power attack on AES-like block ciphers with secret S-box.
Frontiers Comput. Sci., 2022

Blockchain Meets Covert Communication: A Survey.
IEEE Commun. Surv. Tutorials, 2022

Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022

BPAF: Blockchain-Enabled Reliable and Privacy-Preserving Authentication for Fog-Based IoT Devices.
IEEE Consumer Electron. Mag., 2022

A two-tiered incentive mechanism design for federated crowd sensing.
CCF Trans. Pervasive Comput. Interact., 2022

A polynomial kernel neural network classifier based on random sampling and information gain.
Appl. Intell., 2022

An Auxiliary Classifier GAN-Based DDoS Defense Solution in Blockchain-Based Software Defined Industrial Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Towards Secure Bilateral Friend Query with Conjunctive Policy Matching in Social Networks.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Malicious Transaction Identification in Digital Currency via Federated Graph Deep Learning.
Proceedings of the IEEE INFOCOM 2022, 2022

Stealing Secrecy from Outside: A Novel Gradient Inversion Attack in Federated Learning.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A highly efficient, confidential, and continuous federated learning backdoor attack strategy.
Proceedings of the ICMLC 2022: 14th International Conference on Machine Learning and Computing, Guangzhou, China, February 18, 2022

Using Blockchains for Censorship-Resistant Bootstrapping in Anonymity Networks.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Stealthy Clustering of Ethereum Transactions Using Time Leakage from Fixed Nodes.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Privacy-preserving Training Algorithm for Naive Bayes Classifiers.
Proceedings of the IEEE International Conference on Communications, 2022

Achieving a Blockchain-based Privacy-preserving Quality-aware Knowledge Marketplace in Crowdsensing.
Proceedings of the 20th IEEE International Conference on Embedded and Ubiquitous Computing, 2022

Detecting Bitcoin Nodes by the Cyberspace Search Engines.
Proceedings of the Cyber Security - 19th China Annual Conference, 2022

Real-Time Detection of Cryptocurrency Mining Behavior.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

Traffic Correlation for Deanonymizing Cryptocurrency Wallet Through Tor.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

Residual Entropy-based Graph Generative Algorithms.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
PRVB: Achieving Privacy-Preserving and Reliable Vehicular Crowdsensing via Blockchain Oracle.
IEEE Trans. Veh. Technol., 2021

Successive Point-of-Interest Recommendation With Personalized Local Differential Privacy.
IEEE Trans. Veh. Technol., 2021

Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing.
IEEE Trans. Serv. Comput., 2021

A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021

A Blockchain-Based Storage System With Financial Incentives for Load-balancing.
IEEE Trans. Netw. Sci. Eng., 2021

Three-Stage Stackelberg Long-Term Incentive Mechanism and Monetization for Mobile Crowdsensing: An Online Learning Approach.
IEEE Trans. Netw. Sci. Eng., 2021

An Energy Aware Offloading Scheme for Interdependent Applications in Software-Defined IoV With Fog Computing Architecture.
IEEE Trans. Intell. Transp. Syst., 2021

Blockchain-Enabled Trustworthy Group Communications in UAV Networks.
IEEE Trans. Intell. Transp. Syst., 2021

Blockchain Empowered Differentially Private and Auditable Data Publishing in Industrial IoT.
IEEE Trans. Ind. Informatics, 2021

Efficient Framework for Genetic Algorithm-Based Correlation Power Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Accurate Decentralized Application Identification via Encrypted Traffic Analysis Using Graph Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Effective and Robust Physical-World Attacks on Deep Learning Face Recognition Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Fine-Grained Webpage Fingerprinting Using Only Packet Length Information of Encrypted Traffic.
IEEE Trans. Inf. Forensics Secur., 2021

Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems.
IEEE Trans. Dependable Secur. Comput., 2021

Enabling Privacy-Preserving Shortest Distance Queries on Encrypted Graph Data.
IEEE Trans. Dependable Secur. Comput., 2021

An Energy-Aware High Performance Task Allocation Strategy in Heterogeneous Fog Computing Environments.
IEEE Trans. Computers, 2021

A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds.
Peer-to-Peer Netw. Appl., 2021

Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems.
Peer-to-Peer Netw. Appl., 2021

Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021

Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS.
J. Parallel Distributed Comput., 2021

Privacy-preserving voluntary-tallying leader election for internet of things.
Inf. Sci., 2021

Privacy-Preserving Machine Learning Training in IoT Aggregation Scenarios.
IEEE Internet Things J., 2021

Exploiting Unintended Property Leakage in Blockchain-Assisted Federated Learning for Intelligent Edge Computing.
IEEE Internet Things J., 2021

SearchBC: A Blockchain-Based PEKS Framework for IoT Services.
IEEE Internet Things J., 2021

IriTrack: Face Presentation Attack Detection Using Iris Tracking.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

SDN Controllers: A Comprehensive Analysis and Performance Evaluation Study.
ACM Comput. Surv., 2021

Privacy-preserving contact tracing in 5G-integrated and blockchain-based medical applications.
Comput. Stand. Interfaces, 2021

On-demand cut off the covert channel to mitigate meltdown.
Sci. China Inf. Sci., 2021

Achieving adaptively secure data access control with privacy protection for lightweight IoT devices.
Sci. China Inf. Sci., 2021

Blockchain-Based Verifiable DSSE with Forward Security in Multi-server Environments.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Achieving Efficient and Privacy-preserving Biometric Identification in Cloud Computing.
Proceedings of the 20th IEEE International Conference on Trust, 2021

SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud Storage.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

A Blockchain-Assisted Privacy-Preserving Cloud Computing Method with Multiple Keys.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

BS-KGS: Blockchain Sharding Empowered Knowledge Graph Storage.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Blockchain-as-a-Service Powered Knowledge Graph Construction.
Proceedings of the Knowledge Science, Engineering and Management, 2021

Privacy-Preserving Approximate Top-k Nearest Keyword Queries over Encrypted Graphs.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Efficient Fine-Grained Website Fingerprinting via Encrypted Traffic Analysis with Deep Learning.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

SM9-based Anonymous Search over Encrypted Data.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Heuristic-based Blockchain Assignment: An Empirical Study.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

From Local to Global Norm Emergence: Dissolving Self-reinforcing Substructures with Incremental Social Instruments.
Proceedings of the 38th International Conference on Machine Learning, 2021

V-EPTD: A Verifiable and Efficient Scheme for Privacy-Preserving Truth Discovery.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Analysis of Address Linkability in Tornado Cash on Ethereum.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

A Review of Machine Learning Algorithms for Text Classification.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

Threat Prediction of Abnormal Transaction Behavior Based on Graph Convolutional Network in Blockchain Digital Currency.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Classification Method of Blockchain and IoT Devices Based on LSTM.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Fully Exploiting Cascade Graphs for Real-time Forwarding Prediction.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
Toward Reinforcement-Learning-Based Service Deployment of 5G Mobile Edge Computing with Request-Aware Scheduling.
IEEE Wirel. Commun., 2020

Accountable credential management system for vehicular communication.
Veh. Commun., 2020

BSFP: Blockchain-Enabled Smart Parking With Fairness, Reliability and Privacy Protection.
IEEE Trans. Veh. Technol., 2020

Verifiable and Privacy-Preserving Traffic Flow Statistics for Advanced Traffic Management Systems.
IEEE Trans. Veh. Technol., 2020

Secure SVM Training Over Vertically-Partitioned Datasets Using Consortium Blockchain for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.
IEEE Trans. Veh. Technol., 2020

Differential Privacy-Based Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

Guest Editorial: Special Section on Security and Privacy in Industry 4.0.
IEEE Trans. Ind. Informatics, 2020

ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.
IEEE Netw., 2020

Achieving a Covert Channel over an Open Blockchain Network.
IEEE Netw., 2020

Blockchain-based multimedia sharing in vehicular social networks with privacy protection.
Multim. Tools Appl., 2020

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT.
IEEE J. Sel. Areas Commun., 2020

Blockchain-Based Incentives for Secure and Collaborative Data Sharing in Multiple Clouds.
IEEE J. Sel. Areas Commun., 2020

Data Security and Privacy in Bitcoin System: A Survey.
J. Comput. Sci. Technol., 2020

PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries.
Inf. Sci., 2020

A privacy-preserving data aggregation scheme for dynamic groups in fog computing.
Inf. Sci., 2020

A machine learning based golden-free detection method for command-activated hardware Trojan.
Inf. Sci., 2020

WiPOS: A POS Terminal Password Inference System Based on Wireless Signals.
IEEE Internet Things J., 2020

SCM: Secure and accountable TLS certificate management.
Int. J. Commun. Syst., 2020

T-CAM: Time-based content access control mechanism for ICN subscription systems.
Future Gener. Comput. Syst., 2020

Aggregate in my way: Privacy-preserving data aggregation without trusted authority in ICN.
Future Gener. Comput. Syst., 2020

Content-based multi-source encrypted image retrieval in clouds with privacy preservation.
Future Gener. Comput. Syst., 2020

Robust Attacks on Deep Learning Face Recognition in the Physical World.
CoRR, 2020

Privacy-Preserving Machine Learning Training in Aggregation Scenarios.
CoRR, 2020

A new hashing based nearest neighbors selection technique for big datasets.
CoRR, 2020

Blockchain Meets Cloud Computing: A Survey.
IEEE Commun. Surv. Tutorials, 2020

An efficient and privacy-preserving truth discovery scheme in crowdsensing applications.
Comput. Secur., 2020

Identifying the vulnerabilities of bitcoin anonymous mechanism based on address clustering.
Sci. China Inf. Sci., 2020

PPLS: a privacy-preserving location-sharing scheme in mobile online social networks.
Sci. China Inf. Sci., 2020

Attack-Resilient TLS Certificate Transparency.
IEEE Access, 2020

Transaction Deanonymization in Large-Scale Bitcoin Systems via Propagation Pattern Analysis.
Proceedings of the Security and Privacy in Digital Economy, 2020

DeepQoE: Real-time Measurement of Video QoE from Encrypted Traffic with Deep Learning.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Consensus in Lens of Consortium Blockchain: An Empirical Study.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Reputation-Based Trustworthy Supply Chain Management Using Smart Contract.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Blockchain Meets DAG: A BlockDAG Consensus Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

LNBFSM: A Food Safety Management System Using Blockchain and Lightning Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Efficient and Privacy-Preserving Non-Interactive Truth Discovery for Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2020

A Privacy-Preserving Location-Aware and Traffic Order-Based Route Collection Scheme in VANETs.
Proceedings of the IEEE Global Communications Conference, 2020

Research Status and Prospect of Blockchain Technology in Agriculture Field.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Whispers on Ethereum: Blockchain-based Covert Data Embedding Schemes.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

Blockchain: Empowering Secure Data Sharing
Springer, ISBN: 978-981-15-5938-9, 2020

2019
Traffic Monitoring in Self-Organizing VANETs: A Privacy-Preserving Mechanism for Speed Collection and Analysis.
IEEE Wirel. Commun., 2019

Fusion of Cognitive Wireless Networks and Edge Computing.
IEEE Wirel. Commun., 2019

Trust-Based Privacy-Preserving Photo Sharing in Online Social Networks.
IEEE Trans. Multim., 2019

Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid.
IEEE Trans. Ind. Informatics, 2019

Achieving Privacy-Friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds.
IEEE Trans. Cloud Comput., 2019

A Privacy-Preserving Traffic Monitoring Scheme via Vehicular Crowdsourcing.
Sensors, 2019

Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach.
IEEE Netw., 2019

Toward Smart Treatment Management for Personalized Healthcare.
IEEE Netw., 2019

A packet-reordering covert channel over VoLTE voice and video traffics.
J. Netw. Comput. Appl., 2019

PPTDS: A privacy-preserving truth discovery scheme in crowd sensing systems.
Inf. Sci., 2019

SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments.
Inf. Sci., 2019

Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting.
IEEE Internet Things J., 2019

PPMR: A Privacy-Preserving Online Medical Service Recommendation Scheme in eHealthcare System.
IEEE Internet Things J., 2019

Achieving Searchable and Privacy-Preserving Data Sharing for Cloud-Assisted E-Healthcare System.
IEEE Internet Things J., 2019

Pay as How You Behave: A Truthful Incentive Mechanism for Mobile Crowdsensing.
IEEE Internet Things J., 2019

LAMANCO: A Lightweight Anonymous Mutual Authentication Scheme for $N$ -Times Computing Offloading in IoT.
IEEE Internet Things J., 2019

Privacy-Preserving Support Vector Machine Training Over Blockchain-Based Encrypted IoT Data in Smart Cities.
IEEE Internet Things J., 2019

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT.
IEEE Internet Things J., 2019

Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.
IEEE Internet Things J., 2019

An Efficient and Accurate Nonintrusive Load Monitoring Scheme for Power Consumption.
IEEE Internet Things J., 2019

Permissioned Blockchain and Edge Computing Empowered Privacy-Preserving Smart Grid Networks.
IEEE Internet Things J., 2019

VLA: A Practical Visible Light-based Attack on Face Recognition Systems in Physical World.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

Controllable and trustworthy blockchain-based cloud data management.
Future Gener. Comput. Syst., 2019

LPTD: Achieving lightweight and privacy-preserving truth discovery in CIoT.
Future Gener. Comput. Syst., 2019

SDN Controllers: Benchmarking & Performance Evaluation.
CoRR, 2019

Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing.
CoRR, 2019

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
CoRR, 2019

Online and automatic identification of encryption network behaviors in big data environment.
Concurr. Comput. Pract. Exp., 2019

Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid.
IEEE Commun. Mag., 2019

Encrypted network behaviors identification based on dynamic time warping and k-nearest neighbor.
Clust. Comput., 2019

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid.
Sci. China Inf. Sci., 2019

Efficient Group Proof of Storage With Malicious-Member Distinction and Revocation.
IEEE Access, 2019

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
IEEE Access, 2019

Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019

Location-based Privacy-preserving Techniques in Connected Environment: A Survey.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Power Analysis and Protection on SPECK and Its Application in IoT.
Proceedings of the Security and Privacy in Communication Networks, 2019

CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing.
Proceedings of the Security and Privacy in Communication Networks, 2019

REM: From Structural Entropy to Community Structure Deception.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Encrypted traffic classification of decentralized applications on ethereum using feature fusion.
Proceedings of the International Symposium on Quality of Service, 2019

ESAS: An Efficient Semantic and Authorized Search Scheme over Encrypted Outsourced Data.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Webpage Fingerprinting using Only Packet Length Information.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

An Approach of Secure Two-Way-Pegged Multi-sidechain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Machine Learning Classification on Traffic of Secondary Encryption.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy-Preserving Graph Encryption for Approximate Constrained Shortest Distance Queries.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

An Incentive Mechanism Using Shapley Value for Blockchain-Based Medical Data Sharing.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

Blockchain Technology in Internet of Things
Springer, ISBN: 978-3-030-21765-5, 2019

Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
An Efficient Identity-Based Proxy Blind Signature for Semioffline Services.
Wirel. Commun. Mob. Comput., 2018

Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid.
IEEE Wirel. Commun., 2018

Security and Privacy in Wireless IoT.
IEEE Wirel. Commun., 2018

Cloud-Based Approximate Constrained Shortest Distance Queries Over Encrypted Graphs With Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2018

An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Sensors, 2018

Side-Channel Attacks and Countermeasures for Identity-Based Cryptographic Algorithm SM9.
Secur. Commun. Networks, 2018

Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.
Secur. Commun. Networks, 2018

RTSense: Providing Reliable Trust-Based Crowdsensing Services in CVCC.
IEEE Netw., 2018

A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018

Privacy-Preserving DDoS Attack Detection Using Cross-Domain Traffic in Software Defined Networks.
IEEE J. Sel. Areas Commun., 2018

Blockchain-Based Data Preservation System for Medical Data.
J. Medical Syst., 2018

Online and automatic identification and mining of encryption network behavior in big data environment.
J. Intell. Fuzzy Syst., 2018

Scalable and Privacy-Preserving Data Sharing Based on Blockchain.
J. Comput. Sci. Technol., 2018

PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles.
IEEE Internet Things J., 2018

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things.
IEEE Internet Things J., 2018

PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system.
Future Gener. Comput. Syst., 2018

Real-time positioning of a specific object in the big data environment.
EURASIP J. Wirel. Commun. Netw., 2018

When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection.
CoRR, 2018

Research on the Security of Blockchain Data: A Survey.
CoRR, 2018

Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources.
CoRR, 2018

IriTrack: Liveness Detection Using Irises Tracking for Preventing Face Spoofing Attacks.
CoRR, 2018

PPLS: A Privacy-Preserving Location-Sharing Scheme in Vehicular Social Networks.
CoRR, 2018

Blockchain-Enabled Reengineering of Cloud Datacenters.
IEEE Cloud Comput., 2018

Cross-cluster asymmetric group key agreement for wireless sensor networks.
Sci. China Inf. Sci., 2018

Right or wrong collision rate analysis without profiling: full-automatic collision fault attack.
Sci. China Inf. Sci., 2018

An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing.
IEEE Access, 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing.
IEEE Access, 2018

Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

A New Satellite Constellation Networking Certification and Reliable Maintenance Protocol (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

An Optimal LTE-U Access Method for Throughput Maximization and Fairness Assurance.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Ontology-Based Personalized Telehealth Scheme in Cloud Computing.
Proceedings of the Web Services - ICWS 2018, 2018

2017
Graph Encryption for Top-K Nearest Keyword Search Queries on Cloud.
IEEE Trans. Sustain. Comput., 2017

Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Ind. Informatics, 2017

Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
IEEE Trans. Inf. Forensics Secur., 2017

PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.
Sensors, 2017

RFA: <i>R</i>-Squared Fitting Analysis Model for Power Attack.
Secur. Commun. Networks, 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017

A Collusion-Resistant and Privacy-Preserving Data Aggregation Protocol in Crowdsensing System.
Mob. Inf. Syst., 2017

Efficient searchable symmetric encryption for storing multiple source dynamic social data on cloud.
J. Netw. Comput. Appl., 2017

PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud.
Inf. Sci., 2017

Achieving differential privacy of trajectory data publishing in participatory sensing.
Inf. Sci., 2017

A round-optimal lattice-based blind signature scheme for cloud services.
Future Gener. Comput. Syst., 2017

A privacy-preserving video subscription scheme with the limitation of expire date.
Sci. China Inf. Sci., 2017

Practical two-dimensional correlation power analysis and its backward fault-tolerance.
Sci. China Inf. Sci., 2017

TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning.
IEEE Access, 2017

Utility-Privacy Tradeoff Based on Random Data Obfuscation in Internet of Energy.
IEEE Access, 2017

INBAR: A new interest-based routing framework in vehicular social networks.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Achieving Communication Effectiveness of Web Authentication Protocol with Key Update.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

An Efficient Sparse Coding-Based Data-Mining Scheme in Smart Grid.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Malicious Bitcoin Transaction Tracing Using Incidence Relation Clustering.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

CloudShare: Towards a Cost-Efficient and Privacy-Preserving Alliance Cloud Using Permissioned Blockchains.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET.
IEEE Trans. Veh. Technol., 2016

A universal method for realizing non-repudiable provable data possession in cloud storage.
Secur. Commun. Networks, 2016

A Perturbed Compressed Sensing Protocol for Crowd Sensing.
Mob. Inf. Syst., 2016

Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing.
Mob. Inf. Syst., 2016

Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows.
Future Gener. Comput. Syst., 2016

LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication.
Computing, 2016

Certificate-aware encrypted traffic classification using Second-Order Markov Chain.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

SSSP on GPU Without Atomic Operation.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Differentially Private Publication Scheme for Trajectory Data.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

An Anonymous Scheme for Current Taxi Applications.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
A survey of SCADA test bed.
Int. J. Wirel. Mob. Comput., 2015

A GPU-accelerated parallel network traffic analysis system.
Int. J. Wirel. Mob. Comput., 2015

Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on Cloud.
IACR Cryptol. ePrint Arch., 2015

Scalable protocol for cross-domain group password-based authenticated key exchange.
Frontiers Comput. Sci., 2015

Reasoning task dependencies for robust service selection in data intensive workflows.
Computing, 2015

One-Round Affiliation-Hiding Authenticated Asymmetric Group Key Agreement with Semi-trusted Group Authority.
Comput. J., 2015

Latency-aware routing with bandwidth assignment for Software Defined Networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Self-adaptive anonymous communication scheme under SDN architecture.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

How to protect query and report privacy without sacrificing service quality in participatory sensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Elastic and Efficient Virtual Network Provisioning for Cloud-Based Multi-tier Applications.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Availability-Aware Virtual Network Embedding for Multi-tier Applications in Cloud Networks.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

An Efficient and Secure RFID Batch Authentication Protocol with Group Tags Ownership Transfer.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

2014
Search pattern leakage in searchable encryption: Attacks and new construction.
Inf. Sci., 2014

An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Achieving bandwidth guarantees in multi-tenant cloud networks using a dual-hose model.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

Closeness-based routing with temporal constraint for mobile social delay tolerant networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature.
Secur. Commun. Networks, 2013

ASCDS: a smartphone confidential data storage scheme.
Int. J. Wirel. Mob. Comput., 2013

A new hierarchical and scalable group key exchange protocol with XOR operation.
Int. J. Wirel. Mob. Comput., 2013

ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks.
Int. J. Distributed Sens. Networks, 2013

Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions.
IACR Cryptol. ePrint Arch., 2013

Trust-based workflow refactoring for concurrent scheduling in service-oriented environment.
Concurr. Comput. Pract. Exp., 2013

Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Authenticating and tracing biological anonym of VANET based on KMC decentralization and two-factor.
Proceedings of the 11th Annual International Conference on Mobile Systems, 2013

The Adaptive Multicast Data Origin Authentication Protocol.
Proceedings of the Frontiers in Internet Technologies, 2013

2012
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings.
Inf. Sci., 2012

Risk-Aware Checkpoint Selection in Cloud-Based Scientific Workflow.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Workflow Refactoring for Concurrent Task Execution.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Cloud Storage-oriented Secure Information Gateway.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach.
IEEE Trans. Veh. Technol., 2011

Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2011

An energy efficient and integrity-preserving aggregation protocol in wireless sensor networks.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Computationally Sound Symbolic Analysis of EAP-TNC Protocol.
Proceedings of the Trusted Systems - Third International Conference, 2011

Fuzzy keyword search on encrypted cloud storage data with small index.
Proceedings of the 2011 IEEE International Conference on Cloud Computing and Intelligence Systems, 2011

2008
A Novel Tree-based Authenticated Dynamic Group Key Agreement Protocol for Wireless Sensor Network.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
An Efficient Hybrid P2P Incentive Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

2006
Ontological Modeling of Virtual Organization Agents.
Proceedings of the Agent Computing and Multi-Agent Systems, 2006

A Novel Algorithm for Scrambling Digital Image Based on Cat Chaotic Mapping.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Semantic Web Modeling for Virtual Organization: A Case Study in Logistics.
Proceedings of the Semantic Web, 2006

Multi-Media Retrieval with Semantic Web: A Case Study in Airport Security Inspection Applications.
Proceedings of the Advances in Intelligent IT, 2006

2004
Digital signature of multicast streams secure against adaptive chosen message attack.
Comput. Secur., 2004


  Loading...