Xiaodong Lin

According to our database1, Xiaodong Lin authored at least 288 papers between 1998 and 2019.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2017, "For contributions in secure and privacy-preserving vehicular communications".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation.
IEEE Trans. Vehicular Technology, 2019

On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach.
IEEE Trans. Vehicular Technology, 2019

Toward Privacy-Preserving Valet Parking in Autonomous Driving Era.
IEEE Trans. Vehicular Technology, 2019

Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors.
IEEE Trans. Smart Grid, 2019

Anonymous Reputation System for IIoT-Enabled Retail Marketing Atop PoS Blockchain.
IEEE Trans. Industrial Informatics, 2019

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
IEEE Trans. Information Forensics and Security, 2019

Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives.
IEEE Network, 2019

Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.
IEEE Internet of Things Journal, 2019

CSCAC: one constant-size CPABE access control scheme in trusted execution environment.
IJCSE, 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Generation Comp. Syst., 2019

One secure data integrity verification scheme for cloud storage.
Future Generation Comp. Syst., 2019

Drones in the Era of V2X Communications.
IEEE Communications Standards Magazine, 2019

Against Pilot Spoofing Attack with Double Channel Training in Massive MIMO NOMA Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Private and Efficient Ad Impression Aggregation in Mobile Advertising.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Secure and Fair IIoT-Enabled Supply Chain Management via Blockchain-Based Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Privacy-Enhancing Fog Computing and Its Applications
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-030-02112-2, 2018

Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Vehicular Technology, 2018

Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles.
IEEE Trans. Vehicular Technology, 2018

HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Industrial Informatics, 2018

Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities.
IEEE Network, 2018

Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View.
IEEE Network, 2018

Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT.
IEEE Journal on Selected Areas in Communications, 2018

Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain.
J. Medical Systems, 2018

Anonymous Group Message Authentication Protocol for LTE-based V2X Communications.
Internet Technol. Lett., 2018

Automated forensic analysis of mobile applications on Android devices.
Digital Investigation, 2018

Vehicular Networking: Protecting Vehicles from Imminent Cyber Threats.
IEEE Communications Standards Magazine, 2018

Vehicular Networking Series Editorial.
IEEE Communications Standards Magazine, 2018

Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.
IEEE Communications Surveys and Tutorials, 2018

Multi-Channel Physical Random Bits Generation Using a Vertical-Cavity Surface-Emitting Laser Under Chaotic Optical Injection.
IEEE Access, 2018

Passivity-Based Control Strategy for SMES Under an Unbalanced Voltage Condition.
IEEE Access, 2018

Stable Propagation of Inhibited Spiking Dynamics in Vertical-Cavity Surface-Emitting Lasers for Neuromorphic Photonic Networks.
IEEE Access, 2018

Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

One Secure Access Scheme Based on Trusted Execution Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

One Secure IoT Scheme for Protection of True Nodes.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Efficient Deduplicated Reporting in Fog-Assisted Vehicular Crowdsensing.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Privacy-Preserving Incentive Framework for the Vehicular Cloud.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Understanding Ethereum via Graph Analysis.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Blockchain-Based Secure Data Provenance for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

EFRS: Enabling Efficient and Fine-Grained Range Search on Encrypted Spatial Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

Introductory Computer Forensics - A Hands-on Practical Approach
Springer, ISBN: 978-3-030-00580-1, 2018

2017
Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Vehicular Technology, 2017

Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering.
IEEE Trans. Smart Grid, 2017

Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems.
IEEE Trans. Information Forensics and Security, 2017

A Selective Linearization Method For Multiblock Convex Optimization.
SIAM Journal on Optimization, 2017

Security-Aware and Privacy-Preserving D2D Communications in 5G.
IEEE Network, 2017

A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing.
IEEE Internet of Things Journal, 2017

A Privacy-Preserving Data-Sharing Framework for Smart Grid.
IEEE Internet of Things Journal, 2017

Vehicular Networking.
IEEE Communications Standards Magazine, 2017

Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing.
IEEE Communications Magazine, 2017

Coordinated Control Strategies for SMES-Battery Hybrid Energy Storage Systems.
IEEE Access, 2017

Tunable Ultra-Broadband Microwave Frequency Combs Generation Based on a Current Modulated Semiconductor Laser Under Optical Injection.
IEEE Access, 2017

Location privacy-aware task recommendation for spatial crowdsourcing.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Secure and privacy-preserving task announcement in vehicular cloud.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Cloud-based parallel concolic execution.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

Privacy-preserving mobile crowdsensing for located-based applications.
Proceedings of the IEEE International Conference on Communications, 2017

Dual-anonymous reward distribution for mobile crowdsensing.
Proceedings of the IEEE International Conference on Communications, 2017

Leakage of signal function with reused keys in RLWE key exchange.
Proceedings of the IEEE International Conference on Communications, 2017

A privacy-preserving and truthful tendering framework for vehicle cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An Efficient Compromised Node Revocation Scheme in Fog-Assisted Vehicular Crowdsensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

MotionTree: A Tree-Based In-Bed Body Motion Classification System Using Load-Cells.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Android digital forensics: data, extraction and analysis.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
A Threshold Anonymous Authentication Protocol for VANETs.
IEEE Trans. Vehicular Technology, 2016

Consent-based access control for secure and privacy-preserving health information exchange.
Security and Communication Networks, 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive and Mobile Computing, 2016

Guest Editorial: Network Forensics and Surveillance for Emerging Networks.
IEEE Network, 2016

Itrust: interpersonal trust measurements from social interactions.
IEEE Network, 2016

Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks.
TIIS, 2016

Towards collusion-attack-resilient group key management using one-way function tree.
Computer Networks, 2016

Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016

SQLite Forensic Analysis Based on WAL.
Proceedings of the Security and Privacy in Communication Networks, 2016

Device-invisible two-factor authenticated key agreement protocol for BYOD.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Secure outsourced data transfer with integrity verification in cloud storage.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

AMA: Anonymous mutual authentication with traceability in carpooling systems.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EDAT: Efficient data aggregation without TTP for privacy-assured smart metering.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Fairness-Aware and Privacy-Preserving Online Insurance Application System.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Silent Battery Draining Attack against Android Systems by Subverting Doze Mode.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Efficient and Privacy-Preserving Smart Grid Downlink Communication Using Identity Based Signcryption.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Proxy Re-encryption with Delegatable Verifiability.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions.
IEEE Wireless Commun., 2015

User-provided networking for QoE provisioning in mobile networks.
IEEE Wireless Commun., 2015

PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System.
IEEE Trans. Parallel Distrib. Syst., 2015

Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Information Forensics and Security, 2015

User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices.
IEEE Trans. Emerging Topics Comput., 2015

An effective behavior-based Android malware detection system.
Security and Communication Networks, 2015

Duth: a user-friendly dual-factor authentication for Android smartphone devices.
Security and Communication Networks, 2015

An empirical investigation into path divergences for concolic execution using CREST.
Security and Communication Networks, 2015

ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Security and Communication Networks, 2015

MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Networking and Applications, 2015

Networking for big data: part 2 [Guest Editorial].
IEEE Network, 2015

CHetNet: crowdsourcing to heterogeneous cellular networks.
IEEE Network, 2015

PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems.
J. Sel. Topics Signal Processing, 2015

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid.
TIIS, 2015

Design and Implementation of Real-time Sobel Edge Detection on FPGA for Mobile Device Applications.
Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNets, 2015

Security and Privacy in Mobile Social Networks.
Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNets, 2015

TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fine-grained data sharing in cloud computing for mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

An Improved Ant Colony Algorithm to Solve Vehicle Routing Problem with Time Windows.
Proceedings of the Intelligent Computing Theories and Methodologies, 2015

New threshold anonymous authentication for VANETs.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

QoS oriented heterogeneous traffic scheduling in LTE downlink.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A uniform framework for network selection in Cognitive Radio Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Blurred License Plate Recognition based on single snapshot from drive recorder.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Achieving authorized and ranked multi-keyword search over encrypted cloud data.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Efficient e-health data release with consistency guarantee under differential privacy.
Proceedings of the 17th International Conference on E-health Networking, 2015

Effective Data Rate Based Rank Adaptive Receive Antenna Selection.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Security-Enhanced Data Aggregation against Malicious Gateways in Smart Grid.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Security and privacy in mobile social networks: challenges and solutions.
IEEE Wireless Commun., 2014

Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distrib. Syst., 2014

Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation.
IEEE J. Biomedical and Health Informatics, 2014

PPNA special issue on "the green, reliability and security of machine-to-machine communications".
Peer-to-Peer Networking and Applications, 2014

Networking for big data [Guest Editorial].
IEEE Network, 2014

Socialized WBANs in mobile sensing environments.
IEEE Network, 2014

Wireless Technology for Pervasive Healthcare.
MONET, 2014

Alternating linearization for structured regularization problems.
J. Mach. Learn. Res., 2014

Radio Resource Management of CoMP System in HetNet under Power and Backhaul Constraints.
TIIS, 2014

NUND: Non-Uniform Node Distribution in Cluster-based Wireless Sensor Networks.
TIIS, 2014

A Fast Modular Reduction Method.
IACR Cryptology ePrint Archive, 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PLAM: A privacy-preserving framework for local-area mobile social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Hybrid ITO Algorithm for Solving Numerical Optimization Problem.
Proceedings of the Intelligent Computing Theory - 10th International Conference, 2014

Statistical analysis of capacity in joint processing coordinated multi-point systems.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Natural image splicing detection based on defocus blur at edges.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A framework for privacy-preserving data sharing in the Smart Grid.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Power allocation for CoMP system with backhaul limitation.
Proceedings of the IEEE International Conference on Communications, 2014

User-satisfaction-based weighted SLNR beamforming in TD-LTE-A system.
Proceedings of the IEEE International Conference on Communications, 2014

Separate-combine recovery for compressed sensing of large images.
Proceedings of the IEEE International Conference on Communications, 2014

Cooperative sensing scheduling in Cognitive Radio Networks with multiple Primary Networks.
Proceedings of the IEEE Global Communications Conference, 2014

Toward secure user-habit-oriented authentication for mobile devices.
Proceedings of the IEEE Global Communications Conference, 2014

An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid.
Proceedings of the IEEE Global Communications Conference, 2014

Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Security and Privacy in Mobile Social Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013

Securing m-healthcare social networks: challenges, countermeasures and future directions.
IEEE Wireless Commun., 2013

On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking.
IEEE Wireless Commun., 2013

Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2013

A New Delay Analysis for IEEE 802.11 PCF.
IEEE Trans. Vehicular Technology, 2013

UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid.
IEEE Trans. Smart Grid, 2013

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
IEEE Trans. Parallel Distrib. Syst., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE Journal on Selected Areas in Communications, 2013

A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems.
IEEE Intelligent Systems, 2013

Kernel regression based encrypted images compression for e-healthcare systems.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

Community detection based reference points clustering for indoor localization in WLAN.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

On symbol mapping for FQPSK modulation enabled Physical-layer Network Coding.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

EATH: An efficient aggregate authentication protocol for smart grid communications.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On optimal communication strategies for cooperative cognitive radio networking.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Effective epidemic control and source tracing through mobile social sensing over WBANs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Analysis on dynamic of node storage in space delay/disruption tolerant networking.
Proceedings of IEEE International Conference on Communications, 2013

Joint optimization of spectrum sensing and dynamic spectrum access system.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Secure and effective image storage for cloud based e-healthcare systems.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

RECCE: A reliable and efficient cloud cooperation scheme in E-healthcare.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Detecting GPS information leakage in Android applications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Selectively iterative particle filtering and its applications for target tracking in WSNs.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Vehicular Technology, 2012

Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Vehicular Technology, 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distrib. Syst., 2012

A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intelligent Transportation Systems, 2012

Security and privacy in emerging information technologies.
Security and Communication Networks, 2012

A covariance-free iterative algorithm for distributed principal component analysis on vertically partitioned data.
Pattern Recognition, 2012

Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Network and Computer Applications, 2012

Guest Editorial.
JCM, 2012

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Computer Communications, 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Communications Magazine, 2012

Cross entropy based component carrier allocation in LTE-Advanced wireless communication system.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

LPDA: A lightweight privacy-preserving data aggregation scheme for smart grid.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

Improving RF-based device-free passive localization in cluttered indoor environments through probabilistic classification methods.
Proceedings of the 11th International Conference on Information Processing in Sensor Networks (co-located with CPS Week 2012), 2012

PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

PDP: A Privacy-Preserving Data Provenance Scheme.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Towards hierarchical security framework for smartphones.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

A secure message delivery scheme with path tracking for delay tolerant networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Enabling pervasive healthcare with privacy preservation in smart community.
Proceedings of IEEE International Conference on Communications, 2012

Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks.
Proceedings of IEEE International Conference on Communications, 2012

A privacy-preserving proximity friend notification scheme with opportunistic networking.
Proceedings of IEEE International Conference on Communications, 2012

Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Capillary Machine-to-Machine Communications: The Road Ahead.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012

2011
A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks.
Wireless Communications and Mobile Computing, 2011

An efficient and provably secure public key encryption scheme based on coding theory.
Security and Communication Networks, 2011

A provably secure threshold signature scheme based on DDH assumption.
Security and Communication Networks, 2011

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network.
MONET, 2011

A clique-based secure admission control scheme for mobile ad hoc networks (MANETs).
J. Network and Computer Applications, 2011

Emerging technologies and applications of wireless communication in healthcare.
Journal of Communications and Networks, 2011

PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
Journal of Communications and Networks, 2011

GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Communications Magazine, 2011

Smart community: an internet of things application.
IEEE Communications Magazine, 2011

A Spectral Graphical Model Approach for Learning Brain Connectivity Network of Children's Narrative Comprehension.
Brain Connectivity, 2011

STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks.
Proceedings of IEEE International Conference on Communications, 2011

EVSE: An Efficient Vehicle Social Evaluation Scheme with Location Privacy Preservation for Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient and Secure User Revocation Scheme in Mobile Social Networks.
Proceedings of the Global Communications Conference, 2011

2010
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks.
Wireless Communications and Mobile Computing, 2010

Complementing public key infrastructure to secure vehicular ad hoc networks.
IEEE Wireless Commun., 2010

Pi: a practical incentive protocol for delay tolerant networks.
IEEE Trans. Wireless Communications, 2010

An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Vehicular Technology, 2010

Active Learning From Stream Data Using Optimal Weight Classifier Ensemble.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2010

REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks.
Computer Networks, 2010

Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs.
Proceedings of IEEE International Conference on Communications, 2010

A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2010

TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010

Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010

Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding.
Proceedings of the Global Communications Conference, 2010

On Achieving Encrypted File Recovery.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

An Efficient Searchable Encryption Scheme and Its Application in Network Forensics.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010

Emerging trends in network forensics.
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010

Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

2009
Security in service-oriented vehicular networks.
IEEE Wireless Commun., 2009

PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.
IEEE Trans. Vehicular Technology, 2009

SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Vehicular Technology, 2009

A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Vehicular Technology, 2009

A distributed approach to enabling privacy-preserving model-based classifier training.
Knowl. Inf. Syst., 2009

Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems.
IEEE Journal on Selected Areas in Communications, 2009

SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Location-Release Signature for Vehicular Communications.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A Group-Based Key Management Protocol for Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wireless Communications, 2008

TSVC: timed efficient and secure vehicular communications with privacy preserving.
IEEE Trans. Wireless Communications, 2008

TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wireless Communications, 2008

An Efficient Message Authentication Scheme for Vehicular Communications.
IEEE Trans. Vehicular Technology, 2008

New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks.
IJSN, 2008

A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math., 2008

Security in vehicular ad hoc networks.
IEEE Communications Magazine, 2008

RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A model-based semi-quantitative approach for evaluating security of enterprise networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Introducing people knowledge into science learning.
Proceedings of the Cre8ing a learning world: Proceedings of the 8th International Conference for the Learning Sciences, 2008

AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008

AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008

BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications.
IEEE Trans. Vehicular Technology, 2007

Information Conversion, Effective Samples, and Parameter Size.
IEEE Trans. Information Theory, 2007

Secure, Privacy-Preserving Analysis of Distributed Databases.
Technometrics, 2007

TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

A keyless facility access control system with wireless enabled personal devices.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Towards compromise-resilient localized authentication architecture for wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

Active Learning from Data Streams.
Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2007

Two-Factor Localized Authentication Scheme for WLAN Roaming.
Proceedings of IEEE International Conference on Communications, 2007

ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Secure Localized Authentication and Billing for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

Performance Enhancement for Secure Vehicular Communications.
Proceedings of the Global Communications Conference, 2007

2006
Gene selection using support vector machines with non-convex penalty.
Bioinformatics, 2006

Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2005
Privacy-preserving clustering with distributed EM mixture modeling.
Knowl. Inf. Syst., 2005

Secure analysis of distributed chemical databases without data integration.
Journal of Computer-Aided Molecular Design, 2005

2004
Learning a complex metabolomic dataset using random forests and support vector machines.
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

Privacy preserving regression modelling via distributed computation.
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2004

Regression on Distributed Databases via Secure Multi-Party Computation.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

2003
Semantic video classification by integrating flexible mixture model with adaptive EM algorithm.
Proceedings of the 5th ACM SIGMM International Workshop on Multimedia Information Retrieval, 2003

2002
Tools for Privacy Preserving Data Mining.
SIGKDD Explorations, 2002

2001
Computers, productive agency, and the effort after shared meaning.
J. Computing in Higher Education, 2001

2000
Performance Analysis of Secure Web Server Based on SSL.
Proceedings of the Information Security, Third International Workshop, 2000

1998
Comment on "Reparable key distribution protocols for Internet environments" [and reply].
IEEE Trans. Communications, 1998


  Loading...