Tao Peng

Orcid: 0000-0003-1653-4501

Affiliations:
  • Guangzhou University, School of Computer Science and Educational Software, China
  • Central South University, School of Information Science and Engineering, China


According to our database1, Tao Peng authored at least 58 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing.
IEEE Trans. Mob. Comput., May, 2024

veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases.
IEEE Trans. Knowl. Data Eng., May, 2024

Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing.
IEEE Internet Things J., January, 2024

2023
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing.
J. Syst. Archit., November, 2023

Prediction of Parkinson's disease based on artificial neural networks using speech datasets.
J. Ambient Intell. Humaniz. Comput., October, 2023

SlimBox: Lightweight Packet Inspection over Encrypted Traffic.
IEEE Trans. Dependable Secur. Comput., 2023

A blockchain-based mobile crowdsensing scheme with enhanced privacy.
Concurr. Comput. Pract. Exp., 2023

Differential privacy protection method for trip-oriented shared data.
Concurr. Comput. Pract. Exp., 2023

Bilateral Personalized Information Fusion in Mobile Crowdsensing.
Proceedings of the Ubiquitous Security, 2023

Real-Time Driver Fatigue Detection Method Based on Comprehensive Facial Features.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data.
IEEE Trans. Serv. Comput., 2022

Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search.
IEEE Trans. Serv. Comput., 2022

A Privacy-Preserving Mobile Crowdsensing Scheme Based on Blockchain and Trusted Execution Environment.
IEICE Trans. Inf. Syst., 2022

A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks.
Ad Hoc Networks, 2022

FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

An Interactive Query Differential Privacy Protection Model Based on Big Data Analysis.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Personalized Privacy-Preserving Information Fusion in Mobile Crowdsensing.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems.
J. Syst. Archit., 2021

Reliable and Controllable Data Sharing Based on Blockchain.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks.
Sci. Program., 2020

Optimization of communication in VANETs using fuzzy logic and artificial Bee colony.
J. Intell. Fuzzy Syst., 2020

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.
Inf. Sci., 2020

Feature importance in mobile malware detection.
CoRR, 2020

A Privacy-Preserving Crowdsensing System with Muti-Blockchain.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Function-Centric Risk Assessment Approach for Android Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Feature importance in Android malware detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Intelligent route planning on large road networks with efficiency and privacy.
J. Parallel Distributed Comput., 2019

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Gener. Comput. Syst., 2019

Multidimensional privacy preservation in location-based services.
Future Gener. Comput. Syst., 2019

AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
Dynamic Keyword Search With Hierarchical Attributes in Cloud Computing.
IEEE Access, 2018

Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

Achieving Secure and Effective Search Services in Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I.
Proceedings of the 17th IEEE International Conference On Trust, 2018

SDN-Based Secure VANETs Communication with Fog Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Portable Non-invasive Device for Measuring Saturated Oxygen of the Blood.
Proceedings of the Soft Computing Applications, 2018

"Smart" Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors.
Proceedings of the Soft Computing Applications, 2018

Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Enhanced Location Privacy Preserving Scheme in Location-Based Services.
IEEE Syst. J., 2017

Collaborative trajectory privacy preserving scheme in location-based services.
Inf. Sci., 2017

Dynamic access policy in cloud-based personal health record (PHR) systems.
Inf. Sci., 2017

A Multilevel Access Control Scheme for Data Security in Transparent Computing.
Comput. Sci. Eng., 2017

Achieving reliable and secure services in cloud computing environments.
Comput. Electr. Eng., 2017

Verifiable Ranked Search over dynamic encrypted data in cloud computing.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

Attribute-Based Encryption with Personalized Search.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Lightweight Privacy Aware Friend Locator in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

DABKS: Dynamic attribute-based keyword search in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Dynamic Verifiable Search Over Encrypted Data in Untrusted Clouds.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2016

2015
A weighted throttled load balancing approach for virtual machines in cloud environment.
Int. J. Comput. Sci. Eng., 2015

HCBE: Achieving Fine-Grained Access Control in Cloud-Based PHR Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
Privacy Preserving for Location-Based Services Using Location Transformation.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013


  Loading...