Ning Lu

Orcid: 0000-0001-7325-7307

Affiliations:
  • Xidian University, Xi'an, China
  • Northeastern University at Qinhuangdao, Computer and Communication Engineering College, China


According to our database1, Ning Lu authored at least 22 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme.
Frontiers Comput. Sci., April, 2024

Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids.
IEEE Internet Things J., January, 2024

PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain.
IEEE Internet Things J., 2024

2023
OWL: A data sharing scheme with controllable anonymity and integrity for group users.
Comput. Commun., September, 2023

2022
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure Access Control Framework for Cloud Management.
Mob. Networks Appl., 2022

Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2021

NeuCheck: A more practical Ethereum smart contract security analysis tool.
Softw. Pract. Exp., 2021

A secure spectrum auction scheme without the trusted party based on the smart contract.
Digit. Commun. Networks, 2021

An efficient combined deep neural network based malware detection framework in 5G environment.
Comput. Networks, 2021

2020
Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images.
Remote. Sens., 2020

Opcode sequence analysis of Android malware by a convolutional neural network.
Concurr. Comput. Pract. Exp., 2020

A secure and scalable data integrity auditing scheme based on hyperledger fabric.
Comput. Secur., 2020

2019
Universally composable secure geographic area verification without pre-shared secret.
Sci. China Inf. Sci., 2019

Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2017
A Security and Efficient Routing Scheme with Misbehavior Detection in Delay-Tolerant Networks.
Secur. Commun. Networks, 2017

A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Pers. Ubiquitous Comput., 2017

2016
A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress).
Proceedings of the Provable Security, 2016

A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-Matching.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Postfix automata.
Theor. Comput. Sci., 2015


  Loading...