Mang Su

Orcid: 0000-0001-8574-1286

According to our database1, Mang Su authored at least 24 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DMRA: Model Usability Detection Scheme Against Model-Reuse Attacks in the Internet of Things.
IEEE Internet Things J., October, 2023

NER in Cyber Threat Intelligence Domain Using Transformer with TSGL.
J. Circuits Syst. Comput., August, 2023

MP-CLF: An effective Model-Preserving Collaborative deep Learning Framework for mitigating data leakage under the GAN.
Knowl. Based Syst., 2023

Asymmetric Trapdoor Pseudorandom Generators: Definitions, Constructions, and Applications to Homomorphic Signatures with Shorter Public Keys.
IACR Cryptol. ePrint Arch., 2023

2022
Towards privacy-preserving and verifiable federated matrix factorization.
Knowl. Based Syst., 2022

Verifiable Privacy-Preserving Scheme Based on Vertical Federated Random Forest.
IEEE Internet Things J., 2022

SEDML: Securely and efficiently harnessing distributed knowledge in machine learning.
Comput. Secur., 2022

Federated Learning Scheme with Dual Security of Identity Authentication and Verification.
Proceedings of the IEEE International Conference on Trust, 2022

2021
DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication.
Soft Comput., 2021

Access Control Policy Maintenance in IoT Based on Machine Learning.
J. Circuits Syst. Comput., 2021

Provenance-based data flow control mechanism for Internet of things.
Trans. Emerg. Telecommun. Technol., 2021

2020
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT.
Inf. Sci., 2020

Revocable Certificateless Public Key Encryption With Outsourced Semi-Trusted Cloud Revocation Agent.
IEEE Access, 2020

A Novel Scheme for Access Control Policy Generating and Evaluating in IoT based on Machine Learning.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Proxy Re-Encryption Scheme For Complicated Access Control Factors Description in Hybrid Cloud.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
PreBAC: a novel Access Control scheme based Proxy Re-Encryption for cloud computing.
KSII Trans. Internet Inf. Syst., 2019

ESDRA: An Efficient and Secure Distributed Remote Attestation Scheme for IoT Swarms.
IEEE Internet Things J., 2019

Privacy Preserving Fog-Enabled Dynamic Data Aggregation in Mobile Phone Sensing.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Data integrity verification of the outsourced big data in the cloud environment: A survey.
J. Netw. Comput. Appl., 2018

Secure and Verifiable Outsourcing of Large-Scale Matrix Inversion without Precondition in Cloud Computing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2016
Resource-centric Dynamic Access Control in Cloud.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Research on Credible Regulation Mechanism for the Trading of Digital Works.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Reliable Supervision Model and Implementation for the Trading of Digital Works.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A User-Based Document Management Mechanism in Cloud.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014


  Loading...