Longfei Wu

Orcid: 0000-0003-2325-5009

According to our database1, Longfei Wu authored at least 63 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
GradDiff: Gradient-based membership inference attacks against federated distillation with differential comparison.
Inf. Sci., February, 2024

Designing novel proxy-based access control scheme for implantable medical devices.
Comput. Stand. Interfaces, January, 2024

From Informal Ed to the University - Hands-on Use of the BBC Micro: bit in CS1 Courses Post-COVID.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
GBMIA: Gradient-based Membership Inference Attack in Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2023

FeatureMix: A General Adversarial Defense Method for Pretrained Language Models.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Practical Cross-Device Federated Learning Framework over 5G Networks.
IEEE Wirel. Commun., 2022

A Blockchain-Based Dual-Side Privacy-Preserving Multiparty Computation Scheme for Edge-Enabled Smart Grid.
IEEE Internet Things J., 2022

Towards Explainability in NLP: Analyzing and Calculating Word Saliency through Word Properties.
CoRR, 2022

The blood heat exchanger in intra-arterial selective cooling infusion for acute ischemic stroke: A computational fluid-thermodynamics performance, experimental assessment and evaluation on the brain temperature.
Comput. Biol. Medicine, 2022

A Textual Adversarial Attack Scheme for Domain-Specific Models.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
Achieving Secure Search over Encrypted Data for e-Commerce: A Blockchain Approach.
ACM Trans. Internet Techn., 2021

Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid.
J. Parallel Distributed Comput., 2021

A differentially private distributed data mining scheme with high efficiency for edge computing.
J. Cloud Comput., 2021

Secure Data Access Control With Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach.
IEEE Internet Things J., 2021

A sentence-level text adversarial attack algorithm against IIoT based smart grid.
Comput. Networks, 2021

Achieving adaptively secure data access control with privacy protection for lightweight IoT devices.
Sci. China Inf. Sci., 2021

False Data Injection Attack Detection Based on Wavelet Packet Decomposition and Random Forest in Smart Grid.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
A Differentially Private Big Data Nonparametric Bayesian Clustering Algorithm in Smart Grid.
IEEE Trans. Netw. Sci. Eng., 2020

Cross-lingual multi-keyword rank search with semantic extension over encrypted data.
Inf. Sci., 2020

EchoIA: Implicit Authentication System Based on User Feedback.
CoRR, 2020

A differentially private greedy decision forest classification algorithm with high utility.
Comput. Secur., 2020

A Differentially Private Classification Algorithm With High Utility for Wireless Body Area Networks.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A Lightweight Attribute Based Encryption Scheme with Constant Size Ciphertext for Internet of Things.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Autonomous and Privacy-preserving Energy Trading Based on Redactable Blockchain in Smart Grid.
Proceedings of the IEEE Global Communications Conference, 2020

2019
APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT.
J. Netw. Comput. Appl., 2019

Achieving data utility-privacy tradeoff in Internet of Medical Things: A machine learning approach.
Future Gener. Comput. Syst., 2019

When Energy Trading meets Blockchain in Electrical Power System: The State of the Art.
CoRR, 2019

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search over Encrypted Cloud Data.
CoRR, 2019

Achieving differential privacy against non-intrusive load monitoring in smart grid: A fog computing approach.
Concurr. Comput. Pract. Exp., 2019

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid.
Sci. China Inf. Sci., 2019

POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices.
Proceedings of the Security and Privacy in Communication Networks, 2019

Achieving Secure and Efficient Cloud Search Services: Cross-Lingual Multi-Keyword Rank Search Over Encrypted Cloud Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Secure and Efficient Renewable Energy Trading Scheme Based on Blockchain in Smart Grid.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

An Efficient and Privacy-Preserving Energy Trading Scheme Based on Blockchain.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
POKs Based Low Energy Authentication Scheme for Implantable Medical Devices.
CoRR, 2018

An Accountable Anonymous Data Aggregation Scheme for Internet of Things.
CoRR, 2018

A Secure Proxy-based Access Control Scheme for Implantable Medical Devices.
CoRR, 2018

Privacy-Preserving and Efficient Aggregation Based on Blockchain for Power Grid Communications in Smart Communities.
IEEE Commun. Mag., 2018

SCRAPPOR: An Efficient Privacy-Preserving Algorithm Base on Sparse Coding for Information-Centric IoT.
IEEE Access, 2018

An Efficient Privacy-Preserving Algorithm Based on Randomized Response in IoT-Based Smart Grid.
Proceedings of the 2018 IEEE SmartWorld, 2018

An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology.
Proceedings of the 2018 International Conference on Computing, 2018

Security Mechanisms to Defend against New Attacks on Software-Defined Radio.
Proceedings of the 2018 International Conference on Computing, 2018

Enabling Fair Spectrum Sharing between Wi-Fi and LTE-Unlicensed.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
A Survey on Security and Privacy Issues in Internet-of-Things.
IEEE Internet Things J., 2017

Access Control Schemes for Implantable Medical Devices: A Survey.
IEEE Internet Things J., 2017

Achieving Efficient and Secure Data Acquisition for Cloud-Supported Internet of Things in Smart Grid.
IEEE Internet Things J., 2017

Achieving Efficient Detection Against False Data Injection Attacks in Smart Grid.
IEEE Access, 2017

Achieving Fair Spectrum Allocation for Co-Existing Heterogeneous Secondary User Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

VDAS: Verifiable data aggregation scheme for Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2017

EPDA: Enhancing Privacy-Preserving Data Authentication for Mobile Crowd Sensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Novel Traceroute-Based Detection Scheme for Wi-Fi Evil Twin Attacks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Achieving Differential Privacy of Data Disclosure from Non-intrusive Load Monitoring in Smart Grid.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms.
IEEE Trans. Veh. Technol., 2016

Analysis of clickjacking attacks and an effective defense scheme for Android devices.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
An effective access control scheme for preventing permission leak in Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

A practical approach to the attestation of computational integrity in hybrid cloud.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Effective task scheduling in proximate mobile device based communication systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Security threats to mobile multimedia applications: Camera-based attacks on mobile phones.
IEEE Commun. Mag., 2014

MobiFish: A lightweight anti-phishing scheme for mobile phones.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Analyzing mobile phone vulnerabilities caused by camera.
Proceedings of the IEEE Global Communications Conference, 2014

2012
Energy and Delay Minimization in Cluster-Based Wireless Sensor Networks.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Social Summarization via Automatically Discovered Social Context.
Proceedings of the Fifth International Joint Conference on Natural Language Processing, 2011


  Loading...