Ximeng Liu

Orcid: 0000-0002-4238-3295

According to our database1, Ximeng Liu authored at least 416 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
POTA: Privacy-Preserving Online Multi-Task Assignment With Path Planning.
IEEE Trans. Mob. Comput., May, 2024

A Survey on Searchable Symmetric Encryption.
ACM Comput. Surv., May, 2024

FlGan: GAN-Based Unbiased Federated Learning Under Non-IID Settings.
IEEE Trans. Knowl. Data Eng., April, 2024

Toward Fine-Grained Task Allocation With Bilateral Access Control for Intelligent Transportation Systems.
IEEE Internet Things J., April, 2024

$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024

Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., March, 2024

PAM<sup>3</sup>S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
IEEE/ACM Trans. Netw., February, 2024

Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring.
ACM Trans. Intell. Syst. Technol., February, 2024

FRAD: Free-Rider Attacks Detection Mechanism for Federated Learning in AIoT.
IEEE Internet Things J., February, 2024

ATAL: Active Learning Using Adversarial Training for Data Augmentation.
IEEE Internet Things J., February, 2024

When Evolutionary Computation Meets Privacy.
IEEE Comput. Intell. Mag., February, 2024

Federated and Online Dynamic Spectrum Access for Mobile Secondary Users.
IEEE Trans. Wirel. Commun., January, 2024

DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models.
IEEE Trans. Circuits Syst. Video Technol., January, 2024

Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach.
Peer Peer Netw. Appl., January, 2024

A Blockchain-Based Anonymous Attribute-Based Searchable Encryption Scheme for Data Sharing.
IEEE Internet Things J., January, 2024

Lightweight Privacy-Preserving Feature Extraction for EEG Signals Under Edge Computing.
IEEE Internet Things J., January, 2024

VeriRange: A Verifiable Range Query Model on Encrypted Geographic Data for IoT Environment.
IEEE Internet Things J., January, 2024

Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services.
IEEE Internet Things J., January, 2024

Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges.
IEEE CAA J. Autom. Sinica, January, 2024

Privacy-Preserving Multi-Label Propagation Based on Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2024

Blockchain-Based Dynamic Time-Encapsulated Data Auditing for Outsourcing Storage.
IEEE Trans. Inf. Forensics Secur., 2024

Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data.
IEEE Trans. Inf. Forensics Secur., 2024

Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme.
IEEE Trans. Reliab., December, 2023

Learning Distinct Relationship in Package Recommendation With Graph Attention Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023

Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023

A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Enabling efficient and secure health data sharing for Healthcare IoT systems.
Future Gener. Comput. Syst., December, 2023

Several classes of permutation pentanomials with the form xrh(xpm-1) over Fp2m.
Finite Fields Their Appl., December, 2023

TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023

Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries.
ACM Trans. Storage, November, 2023

Electrocardiogram Based Group Device Pairing for Wearables.
IEEE Trans. Mob. Comput., November, 2023

PriMPSO: A Privacy-Preserving Multiagent Particle Swarm Optimization Algorithm.
IEEE Trans. Cybern., November, 2023

Generation matrix: An embeddable matrix representation for hierarchical trees.
Theor. Comput. Sci., November, 2023

Embedding Hamiltonian Paths in $k$-Ary $n$-Cubes With Exponentially-Many Faulty Edges.
IEEE Trans. Computers, November, 2023

aChain: A SQL-Empowered Analytical Blockchain as a Database.
IEEE Trans. Computers, November, 2023

NAH: neighbor-aware attention-based heterogeneous relation network model in E-commerce recommendation.
World Wide Web (WWW), September, 2023

CrowdFL: Privacy-Preserving Mobile Crowdsensing System Via Federated Learning.
IEEE Trans. Mob. Comput., August, 2023

Federated Clique Percolation for Privacy-preserving Overlapping Community Detection.
ACM Trans. Intell. Syst. Technol., August, 2023

Practical reusable garbled circuits with parallel updates.
Comput. Stand. Interfaces, August, 2023

Privacy-Preserving Ranked Spatial Keyword Query in Mobile Cloud-Assisted Fog Computing.
IEEE Trans. Mob. Comput., June, 2023

GATrust: A Multi-Aspect Graph Attention Network Model for Trust Assessment in OSNs.
IEEE Trans. Knowl. Data Eng., June, 2023

FedECG: A federated semi-supervised learning framework for electrocardiogram abnormalities prediction.
J. King Saud Univ. Comput. Inf. Sci., June, 2023

Model poisoning attack in differential privacy-based federated learning.
Inf. Sci., June, 2023

Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security.
IEEE Trans. Knowl. Data Eng., May, 2023

Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023

A Scalable and Auditable Secure Data Sharing Scheme With Traceability for Fog-Based Smart Logistics.
IEEE Internet Things J., May, 2023

CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., March, 2023

Privacy-preserving association rule mining via multi-key fully homomorphic encryption.
J. King Saud Univ. Comput. Inf. Sci., February, 2023

Reliability Evaluation of Clustered Faults for Regular Networks Under the Probabilistic Diagnosis Model.
Comput. J., February, 2023

MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting.
IEEE Trans. Serv. Comput., 2023

Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method.
IEEE Trans. Serv. Comput., 2023

Defending Against Membership Inference Attack by Shielding Membership Signals.
IEEE Trans. Serv. Comput., 2023

RASK: Range Spatial Keyword Queries on Massive Encrypted Geo-Textual Data.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing.
IEEE Trans. Serv. Comput., 2023

Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Object Detection With Poisoning Recognition for Autonomous Vehicles.
IEEE Trans. Netw. Sci. Eng., 2023

CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.
IEEE Trans. Inf. Forensics Secur., 2023

Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness.
IEEE Trans. Inf. Forensics Secur., 2023

EGIA: An External Gradient Inversion Attack in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
IEEE Trans. Inf. Forensics Secur., 2023

A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs.
IEEE Trans. Emerg. Top. Comput., 2023

Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples.
IEEE Trans. Emerg. Top. Comput., 2023

Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments.
IEEE Trans. Dependable Secur. Comput., 2023

Forward/Backward and Content Private DSSE for Spatial Keyword Queries.
IEEE Trans. Dependable Secur. Comput., 2023

VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
IEEE Trans. Dependable Secur. Comput., 2023

Learn to Forget: Machine Unlearning via Neuron Masking.
IEEE Trans. Dependable Secur. Comput., 2023

Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

Smaug: A TEE-Assisted Secured SQLite for Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2023

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Optimal Black-Box Traceability in Decentralized Attribute-Based Encryption.
IEEE Trans. Cloud Comput., 2023

Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023

A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023

Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap.
IEEE Trans. Cloud Comput., 2023

Anonymous Aggregate Fine-Grained Cloud Data Verification System for Smart Health.
IEEE Trans. Cloud Comput., 2023

A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection.
Sensors, 2023

Accuracy Degrading: Toward Participation-Fair Federated Learning.
IEEE Internet Things J., 2023

Reschedule Gradients: Temporal Non-IID Resilient Federated Learning.
IEEE Internet Things J., 2023

A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
IEEE Internet Things J., 2023

Defed: An Edge-Feature-Enhanced Image Denoised Network Against Adversarial Attacks for Secure Internet of Things.
IEEE Internet Things J., 2023

Further results on several classes of optimal ternary cyclic codes with minimum distance four.
IACR Cryptol. ePrint Arch., 2023

The <i>c</i>-differential uniformity and boomerang uniformity of three classes of permutation polynomials over F2n.
Finite Fields Their Appl., 2023

A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective.
CoRR, 2023

SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers.
CoRR, 2023

Federated Online/Offline Remote Data Inspection for Distributed Edge Computing.
CoRR, 2023

Efficient Routing Algorithm Design for Large DetNet.
CoRR, 2023

Toward data privacy preservation with ciphertext update and key rotation for IoT.
Concurr. Comput. Pract. Exp., 2023

A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare.
IEEE Access, 2023

Q-TrHDRI: A Qurey-Based Transformer for High Dynamic Range Imaging with Dynamic Scenes.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Globally Consistent Federated Graph Autoencoder for Non-IID Graphs.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

Graph Unlearning Using Knowledge Distillation.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Achieving Privacy-preserving and Lightweight Truth Discovery in Mobile Crowdsensing (Extended abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Efficient and Secure Spatial Range Query over Large-scale Encrypted Data.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Enhance Transferability of Adversarial Examples with Model Architecture.
Proceedings of the IEEE International Conference on Acoustics, 2023

FedCML: Federated Clustering Mutual Learning with non-IID Data.
Proceedings of the Euro-Par 2023: Parallel Processing - 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28, 2023

Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security.
Proceedings of the IEEE Intl Conf on Dependable, 2023

New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

FedCMK: An Efficient Privacy-Preserving Federated Learning Framework.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

SRoUDA: Meta Self-Training for Robust Unsupervised Domain Adaptation.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Privacy-Preserving Traffic Violation Image Filtering and Searching via Crowdsensing.
Mob. Networks Appl., December, 2022

A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon.
IEEE Trans. Veh. Technol., 2022

TPPR: A Trust-Based and Privacy-Preserving Platoon Recommendation Scheme in VANET.
IEEE Trans. Serv. Comput., 2022

Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing.
IEEE Trans. Serv. Comput., 2022

Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022

Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing.
IEEE Trans. Serv. Comput., 2022

Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud.
IEEE Trans. Serv. Comput., 2022

Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing.
IEEE Trans. Serv. Comput., 2022

Completely Independent Spanning Trees on BCCC Data Center Networks With an Application to Fault-Tolerant Routing.
IEEE Trans. Parallel Distributed Syst., 2022

Achieving Privacy-Preserving and Lightweight Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., 2022

PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs.
IEEE Trans. Intell. Transp. Syst., 2022

Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things.
IEEE Trans. Ind. Informatics, 2022

A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box.
IEEE Trans. Ind. Informatics, 2022

Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial Internet-of-Thing System.
IEEE Trans. Ind. Informatics, 2022

FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

SOCI: A Toolkit for Secure Outsourced Computation on Integers.
IEEE Trans. Inf. Forensics Secur., 2022

Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2022

STOP: A Service Oriented Internet Purification Against Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-Preserving Object Detection for Medical Images With Faster R-CNN.
IEEE Trans. Inf. Forensics Secur., 2022

Retrofitting LBR Profiling to Enhance Virtual Machine Introspection.
IEEE Trans. Inf. Forensics Secur., 2022

LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

Dual Access Control for Cloud-Based Data Storage and Sharing.
IEEE Trans. Dependable Secur. Comput., 2022

RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022

VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2022

Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing.
IEEE Trans. Cloud Comput., 2022

Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings.
IEEE Trans. Cloud Comput., 2022

Similarity Search for Encrypted Images in Secure Cloud Computing.
IEEE Trans. Cloud Comput., 2022

Secure Similarity Search Over Encrypted Non-Uniform Datasets.
IEEE Trans. Cloud Comput., 2022

SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment.
IEEE Trans. Cloud Comput., 2022

DVREI: Dynamic Verifiable Retrieval Over Encrypted Images.
IEEE Trans. Computers, 2022

MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph.
IEEE Trans. Big Data, 2022

Lightweight verifiable data management system for cloud-assisted wireless body area networks.
Peer-to-Peer Netw. Appl., 2022

Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022

Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things.
J. Inf. Secur. Appl., 2022

Revocable and Privacy-Preserving Decentralized Data Sharing Framework for Fog-Assisted Internet of Things.
IEEE Internet Things J., 2022

Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022

Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022

RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking.
IEEE Internet Things J., 2022

Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.
IEEE Internet Things J., 2022

CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles.
IEEE Internet Things J., 2022

Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT.
IEEE Internet Things J., 2022

Toward Evaluating the Reliability of Deep-Neural-Network-Based IoT Devices.
IEEE Internet Things J., 2022

Active forgetting via influence estimation for neural networks.
Int. J. Intell. Syst., 2022

Front Cover: International Journal of Intelligent Systems, Volume 37 Issue 11 November 2022.
Int. J. Intell. Syst., 2022

Incorporating multi-interest into recommendation with graph convolution networks.
Int. J. Intell. Syst., 2022

A Network Attack Risk Control Framework for Large-Scale Network Topology Driven by Node Importance Assessment.
Int. J. Grid High Perform. Comput., 2022

The Component Diagnosability of General Networks.
Int. J. Found. Comput. Sci., 2022

The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2022

Return just your search: privacy-preserving homoglyph search for arbitrary languages.
Frontiers Comput. Sci., 2022

Refiner: Data Refining against Gradient Leakage Attacks in Federated Learning.
CoRR, 2022

SoK: Fully Homomorphic Encryption Accelerators.
CoRR, 2022

Federated Learning based on Defending Against Data Poisoning Attacks in IoT.
CoRR, 2022

MaskBlock: Transferable Adversarial Examples with Bayes Approach.
CoRR, 2022

Defense against Backdoor Attacks via Identifying and Purifying Bad Neurons.
CoRR, 2022

Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization.
CoRR, 2022

Case-Aware Adversarial Training.
CoRR, 2022

Enhance transferability of adversarial examples with model architecture.
CoRR, 2022

Malware detection method based on image analysis and generative adversarial networks.
Concurr. Comput. Pract. Exp., 2022

Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election.
Sci. China Inf. Sci., 2022

On some conjectures about optimal ternary cyclic codes.
Appl. Algebra Eng. Commun. Comput., 2022

Dynamically Selected Mixup Machine Unlearning.
Proceedings of the IEEE International Conference on Trust, 2022

Simplified Server-Aided Revocable Identity-Based Encryption from Lattices.
Proceedings of the Provable and Practical Security, 2022

Federated Community Detection in Social Networks.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

AMAD: Improving Adversarial Robustness Without Reducing Accuracy.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Spiking Neural Networks Subject to Adversarial Attacks in Spiking Domain.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

Backdoor Defense with Machine Unlearning.
Proceedings of the IEEE INFOCOM 2022, 2022

Privacy-Preserving Federated Cross-Domain Social Recommendation.
Proceedings of the Trustworthy Federated Learning - First International Workshop, 2022

SecMPNN: 3-Party Privacy-Preserving Molecular Structure Properties Inference.
Proceedings of the IEEE International Conference on Acoustics, 2022

Combating False Sense of Security: Breaking the Defense of Adversarial Training Via Non-Gradient Adversarial Attack.
Proceedings of the IEEE International Conference on Acoustics, 2022

FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

Blockchain-Based Encrypted Image Storage and Search in Cloud Computing.
Proceedings of the Database Systems for Advanced Applications, 2022

Research on Information Coordination Mechanism of Multi-participants in Community-based Elderly Care by Blockchain.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

Compressed Federated Learning Based on Adaptive Local Differential Privacy.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Secure Semantic-Aware Search Over Dynamic Spatial Data in VANETs.
IEEE Trans. Veh. Technol., 2021

Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021

Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud.
IEEE Trans. Serv. Comput., 2021

Privacy-Preserving Multi-Keyword Searchable Encryption for Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2021

Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021

iTAM: Bilateral Privacy-Preserving Task Assignment for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

PACE: Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing.
IEEE Trans. Ind. Informatics, 2021

Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes.
IEEE Trans. Emerg. Top. Comput., 2021

Reliable and Privacy-Preserving Truth Discovery for Mobile Crowdsensing Systems.
IEEE Trans. Dependable Secur. Comput., 2021

ObliComm: Towards Building an Efficient Oblivious Communication System.
IEEE Trans. Dependable Secur. Comput., 2021

Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2021

Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings.
IEEE Trans. Dependable Secur. Comput., 2021

A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2021

Person Re-Identification over Encrypted Outsourced Surveillance Videos.
IEEE Trans. Dependable Secur. Comput., 2021

The component connectivity, component diagnosability, and <i>t</i>/<i>k</i>-diagnosability of Bicube networks.
Theor. Comput. Sci., 2021

A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
IEEE Syst. J., 2021

Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage.
Secur. Commun. Networks, 2021

Reliability Evaluation of Generalized Exchanged Hypercubes Based on Imprecise Diagnosis Strategies.
Parallel Process. Lett., 2021

A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems.
Mob. Networks Appl., 2021

Forward and backward secure keyword search with flexible keyword shielding.
Inf. Sci., 2021

Secure and verifiable outsourced data dimension reduction on dynamic data.
Inf. Sci., 2021

PRICE: Privacy and Reliability-Aware Real-Time Incentive System for Crowdsensing.
IEEE Internet Things J., 2021

Fast and Secure Location-Based Services in Smart Cities on Outsourced Data.
IEEE Internet Things J., 2021

Securing the Internet-of-Things: Advances, challenges, future trends.
Trans. Emerg. Telecommun. Technol., 2021

Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness.
CoRR, 2021

Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid.
CoRR, 2021

When Crowdsensing Meets Federated Learning: Privacy-Preserving Mobile Crowdsensing System.
CoRR, 2021

Privacy and Security Issues in Deep Learning: A Survey.
IEEE Access, 2021

Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge.
Proceedings of the 20th IEEE International Conference on Trust, 2021

An Efficient Adaptive Fault Diagnosis Algorithm for Highly Scalable Data Center Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021

The Rg-conditional connectivity and diagnosablility of generalized exchanged X-cubes.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Robust Single-Step Adversarial Training with Regularizer.
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021

Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.
Proceedings of the Network and System Security - 15th International Conference, 2021

On the Analysis of the Outsourced Revocable Identity-Based Encryption from Lattices.
Proceedings of the Network and System Security - 15th International Conference, 2021

HTtext: A TextCNN-based pre-silicon detection for hardware Trojans.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Model-Agnostic Adversarial Example Detection Through Logit Distribution Learning.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021

Privacy-Preserving Optimal Insulin Dosing Decision.
Proceedings of the IEEE International Conference on Acoustics, 2021

Enabling Efficient and Expressive Spatial Keyword Queries On Encrypted Data.
Proceedings of the IEEE International Conference on Acoustics, 2021

Towards Transferable Adversarial Examples Using Meta Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

MEDASec: Logic Encryption Scheme for Micro-electrode-dot-array Biochips IP Protection.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021

Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

Federated Multi-label Propagation Based on Neighbor Node Influence for Community Detection on Attributed Networks.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2021

Federated Clique Percolation for Overlapping Community Detection on Attributed Networks.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2021

Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

An Efficient Decentralized Key Management Mechanism for VANET With Blockchain.
IEEE Trans. Veh. Technol., 2020

Detection of Low-Frequency and Multi-Stage Attacks in Industrial Internet of Things.
IEEE Trans. Veh. Technol., 2020

Privacy-Preserving Compressive Sensing for Real-Time Traffic Monitoring in Urban City.
IEEE Trans. Veh. Technol., 2020

Flexible Wildcard Searchable Encryption System.
IEEE Trans. Serv. Comput., 2020

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.
IEEE Trans. Serv. Comput., 2020

A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020

EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020

Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2020

Multi-User Multi-Keyword Rank Search Over Encrypted Data in Arbitrary Language.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy-Preserving Outsourced Calculation Toolkit in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2020

Lightweight Sharable and Traceable Secure Mobile Health System.
IEEE Trans. Dependable Secur. Comput., 2020

A fully distributed hierarchical attribute-based encryption scheme.
Theor. Comput. Sci., 2020

Efficient Traceable Authorization Search System for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2020

Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
IEEE Trans. Cloud Comput., 2020

Hardware Trojans in Chips: A Survey for Detection and Prevention.
Sensors, 2020

Lightweight Fine-Grained Access Control for Wireless Body Area Networks.
Sensors, 2020

Multimedia access control with secure provenance in fog-cloud computing networks.
Multim. Tools Appl., 2020

CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020

PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries.
Inf. Sci., 2020

Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data.
Inf. Sci., 2020

Efficient ciphertext-policy attribute-based encryption with blackbox traceability.
Inf. Sci., 2020

Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020

Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020

CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud.
Inf. Sci., 2020

Attribute-based fine-grained access control for outscored private set intersection computation.
Inf. Sci., 2020

IronM: Privacy-Preserving Reliability Estimation of Heterogeneous Data for Mobile Crowdsensing.
IEEE Internet Things J., 2020

LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020

Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020

A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020

PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020

Lightning-fast and privacy-preserving outsourced computation in the cloud.
Cybersecur., 2020

Cloud-based Federated Boosting for Mobile Crowdsensing.
CoRR, 2020

Learn to Forget: User-Level Memorization Elimination in Federated Learning.
CoRR, 2020

Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning.
CoRR, 2020

Space efficient revocable IBE for mobile devices in cloud computing.
Sci. China Inf. Sci., 2020

A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud.
IEEE Access, 2020

An Unsupervised Detection Approach for Hardware Trojans.
IEEE Access, 2020

Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things.
IEEE Access, 2020

Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020

OIDPR: Optimized Insulin Dosage based on Privacy-Preserving Reinforcement Learning.
Proceedings of the 2020 IFIP Networking Conference, 2020

PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

A Survey of DMFBs Security: State-of-the-Art Attack and Defense.
Proceedings of the 21st International Symposium on Quality Electronic Design, 2020

Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability.
Proceedings of the IEEE Global Communications Conference, 2020

Privacy-preserving Intelligent Traffic Light Control.
Proceedings of the IEEE Global Communications Conference, 2020

Flexible and Privacy-preserving Framework for Decentralized Collaborative Learning.
Proceedings of the IEEE Global Communications Conference, 2020

Spatial Dynamic Searchable Encryption with Forward Security.
Proceedings of the Database Systems for Advanced Applications, 2020

Privacy-Preserving in Defending against Membership Inference Attacks.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

SVM Learning for Default Prediction of Credit Card under Differential Privacy.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

Quantum Circuit Implementations of AES with Fewer Qubits.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
Real-Time Privacy-Preserving Data Release Over Vehicle Trajectory.
IEEE Trans. Veh. Technol., 2019

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Serv. Comput., 2019

Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

Pruneable sharding-based blockchain protocol.
Peer-to-Peer Netw. Appl., 2019

PPTDS: A privacy-preserving truth discovery scheme in crowd sensing systems.
Inf. Sci., 2019

Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system.
Inf. Sci., 2019

PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data.
Inf. Sci., 2019

Privacy-preserving and high-accurate outsourced disease predictor on random forest.
Inf. Sci., 2019

SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments.
Inf. Sci., 2019

Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019

SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019

Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019

Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.
IEEE Internet Things J., 2019

Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.
IEEE Internet Things J., 2019

Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices.
IEEE Internet Things J., 2019

Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019

CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query.
IEEE Internet Things J., 2019

Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019

A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Gener. Comput. Syst., 2019

Revocable Federated Learning: A Benchmark of Federated Forest.
CoRR, 2019

Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019

Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing.
CoRR, 2019

Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted Cloud With Fair Payment.
IEEE Access, 2019

A Comprehensive Survey on Secure Outsourced Computation and Its Applications.
IEEE Access, 2019

Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019

Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare.
IEEE Access, 2019

A Locating Method for Multi-Purposes HTs Based on the Boundary Network.
IEEE Access, 2019

The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial IoT.
IEEE Access, 2019

Dual-Search Artificial Bee Colony Algorithm for Engineering Optimization.
IEEE Access, 2019

A Multi-Layer Hardware Trojan Protection Framework for IoT Chips.
IEEE Access, 2019

Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019

Blockchain-Based Incentive Announcement System for Internet of Vehicles.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Privacy-Preserving Fine-Grained Outsourcing PHR with Efficient Policy Updating.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Lightweight Outsourced Privacy-Preserving Heart Failure Prediction Based on GRU.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Implementing Security-Enhanced PHR System in the Cloud Using FAME.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Privacy-Preserving Compressive Sensing for Traffic Estimation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Super Payment Channel for Decentralized Cryptocurrencies.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Attribute-Based Signatures for Inner-Product Predicate from Lattices.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wirel. Commun. Mob. Comput., 2018

Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018

Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things.
IEEE Trans. Ind. Informatics, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Secur. Comput., 2018

Improved Construction for Inner Product Functional Encryption.
Secur. Commun. Networks, 2018

EOABS: expressive outsourced attribute-based signature.
Peer-to-Peer Netw. Appl., 2018

DOAS: Efficient data owner authorized search over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2018

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Netw. Appl., 2018

Dual-side privacy-preserving task matching for spatial crowdsourcing.
J. Netw. Comput. Appl., 2018

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

Expressive query over outsourced encrypted data.
Inf. Sci., 2018

Anonymous Privacy-Preserving Task Matching in Crowdsourcing.
IEEE Internet Things J., 2018

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

Privacy-preserving fusion of IoT and big data for e-health.
Future Gener. Comput. Syst., 2018

Hybrid privacy-preserving clinical decision support system in fog-cloud computing.
Future Gener. Comput. Syst., 2018

Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system.
Future Gener. Comput. Syst., 2018

Simulation-based security of function-hiding inner product encryption.
Sci. China Inf. Sci., 2018

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018

An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing.
IEEE Access, 2018

A Lightweight Policy Preserving EHR Sharing Scheme in the Cloud.
IEEE Access, 2018

A Lightweight Cloud Sharing PHR System With Access Policy Updating.
IEEE Access, 2018

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018

Efficient Attribute-Based Encryption with Blackbox Traceability.
Proceedings of the Provable Security, 2018

Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Differentially Private Location Protection with Continuous Time Stamps for VANETs.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2018

PriBioAuth: Privacy-Preserving Biometric-Based Remote User Authentication.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
An Efficient Privacy-Preserving Outsourced Computation over Public Data.
IEEE Trans. Serv. Comput., 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017

Provably secure attribute based signcryption with delegated computation and efficient key updating.
KSII Trans. Internet Inf. Syst., 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017

VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings.
Sci. China Inf. Sci., 2017

Efficient Inner Product Encryption with Simulation-Based Security.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016

Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
IEEE Trans. Inf. Forensics Secur., 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Inf. Forensics Secur., 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016

m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Syst., 2016

A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud.
KSII Trans. Internet Inf. Syst., 2016

PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
Int. J. Embed. Syst., 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Gener. Comput. Syst., 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016

2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Secur. Commun. Networks, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Netw. Appl., 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mob. Inf. Syst., 2015

2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014

Toward efficient and privacy-preserving computing in big data era.
IEEE Netw., 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Access control requirements for structured document in cloud computing.
Int. J. Grid Util. Comput., 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013


  Loading...