Yong Ding

Orcid: 0000-0002-3571-7576

Affiliations:
  • Guilin University of Electronic Technology, School of Computer Science and Information Security, China
  • City University of Hong Kong, Hong Kong (2008 - 2009)
  • Xidian University, School of Communication Engineering, Xi'an, China (PhD 2005)


According to our database1, Yong Ding authored at least 113 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-preserving federated learning based on partial low-quality data.
J. Cloud Comput., December, 2024

Industrial Wireless Internet Zero Trust Model: Zero Trust Meets Dynamic Federated Learning with Blockchain.
IEEE Wirel. Commun., April, 2024

Privacy-preserving blockchain-based contract signing with multi-party supervision.
Trans. Emerg. Telecommun. Technol., April, 2024

SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning.
Peer Peer Netw. Appl., March, 2024

SVFL: Efficient Secure Aggregation and Verification for Cross-Silo Federated Learning.
IEEE Trans. Mob. Comput., January, 2024

Semi-shadow file system: An anonymous files storage solution.
Peer Peer Netw. Appl., January, 2024

A Lightweight and Robust Multidimensional Data Aggregation Scheme for IoT.
IEEE Internet Things J., January, 2024

Lightweight and Decentralized Cross-Cloud Auditing With Data Recovery.
IEEE Trans. Serv. Comput., 2024

2023
Blockchain enabled task offloading based on edge cooperation in the digital twin vehicular edge network.
J. Cloud Comput., December, 2023

Phishing detection on Ethereum via transaction subgraphs embedding.
IET Blockchain, December, 2023

Security and privacy protection technologies in securing blockchain applications.
Inf. Sci., October, 2023

An efficient blockchain-based anonymous authentication and supervision system.
Peer Peer Netw. Appl., September, 2023

A Highly Compatible Verification Framework with Minimal Upgrades to Secure an Existing Edge Network.
ACM Trans. Internet Techn., August, 2023

ExpSeeker: extract public exploit code information from social media.
Appl. Intell., June, 2023

Blockchain-based auditing with data self-repair: From centralized system to distributed storage.
J. Syst. Archit., April, 2023

Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data.
J. Inf. Secur. Appl., March, 2023

Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023

A blockchain-based framework for privacy-preserving and verifiable billing in smart grid.
Peer Peer Netw. Appl., January, 2023

Algebraic Signature-Based Public Data Integrity Batch Verification for Cloud-IoT.
IEEE Trans. Cloud Comput., 2023

Output regeneration defense against membership inference attacks for protecting data privacy.
Int. J. Web Inf. Syst., 2023

Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health.
Comput. Stand. Interfaces, 2023

A BIPMU-based network security situation assessment method for wireless network.
Comput. Stand. Interfaces, 2023

Public integrity auditing for dynamic group cooperation files with efficient user revocation.
Comput. Stand. Interfaces, 2023

Blockchain-empowered security and privacy protection technologies for smart grid.
Comput. Stand. Interfaces, 2023

Distributed Key Derivation for Multi-Party Management of Blockchain Digital Assets.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Secure Multi-Keyword Retrieval with Integrity Guarantee for Outsourced ADS-B Data in Clouds.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

OBiLSTM-Based Intrusion Detection Method for Industrial Internet of Things.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

EduChain: A Blockchain-Based Privacy-Preserving Lifelong Education Platform.
Proceedings of the Database Systems for Advanced Applications, 2023

IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability.
Proceedings of the Database Systems for Advanced Applications, 2023

Towards Privacy-Preserving and Practical Vaccine Supply Chain based on Blockchain.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
Decentralized Self-Auditing Scheme With Errors Localization for Multi-Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient data transfer supporting provable data deletion for secure cloud storage.
Soft Comput., 2022

Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures.
Secur. Commun. Networks, 2022

A faster outsourced medical image retrieval scheme with privacy preservation.
J. Syst. Archit., 2022

Multi-Party Electronic Contract Signing Protocol Based on Blockchain.
IEICE Trans. Inf. Syst., 2022

A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022

Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Secure outsourced VANET data in clouds with designated supervisor.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A timestamp-based covert data transmission method in Industrial Control System.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

An efficient anonymous authentication and supervision system based on blockchain.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Privacy-Preserving Lightweight Energy Data Sharing Scheme Based on Blockchain for Smart Grid.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

A Privacy-Preserving Credit Bank Supervision Framework Based on Redactable Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

Blockchain-Based UAV-Assisted Forest Supervision and Data Sharing.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

Analyses on Multi-sensor Fingerprint Enhancement and Indexing.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

2021
Privacy-Preserving Lightweight Data Monitoring in Internet of Things Environments.
Wirel. Pers. Commun., 2021

A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks.
Secur. Commun. Networks, 2021

Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks.
Secur. Commun. Networks, 2021

Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing.
Peer-to-Peer Netw. Appl., 2021

Design and implementation of blockchain-based digital advertising media promotion system.
Peer-to-Peer Netw. Appl., 2021

PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model.
Mob. Networks Appl., 2021

Group authentication and key distribution for sensors in wireless body area network.
Int. J. Distributed Sens. Networks, 2021

Perlin Noise Improve Adversarial Robustness.
CoRR, 2021

An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

An Anti-forensic Method Based on RS Coding and Distributed Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

A Honeypot-enabled SDN-based Selector for Industrial Device Access Control.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Incremental Forensics Snapshot of Digital Evidence Method Using Differencing Algorithm and Blockchain.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Verifiable and Privacy-Preserving Ranked Multi-Keyword Search over Outsourced Data in Clouds.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
Secure Metering Data Aggregation With Batch Verification in Industrial Smart Grid.
IEEE Trans. Ind. Informatics, 2020

Quantum algorithm for solving hyperelliptic curve discrete logarithm problem.
Quantum Inf. Process., 2020

Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

GSCS: General Secure Consensus Scheme for Decentralized Blockchain Systems.
IEEE Access, 2020

A Password Strength Evaluation Algorithm based on Sensitive Personal Information.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Hyperparameter Optimization of ICS Intrusion Detection Classifier Based on Improved Hybrid Algorithm.
Proceedings of the Security and Privacy in Digital Economy, 2020

Group Authentication for Sensors in Wireless Body Area Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Smart Watchdog: A Lightweight Defending Mechanism Against Adversarial Transfer Learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

An Aggregate Authentication Framework for Unmanned Aerial Vehicle Cluster Network.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Neural Tensor Completion for Accurate Network Monitoring.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Evil Chaincode: APT Attacks Based on Smart Contract.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Security Analysis on dBFT Protocol of NEO.
Proceedings of the Financial Cryptography and Data Security, 2020

Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019

A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE.
Soft Comput., 2019

Medical Data Management on Blockchain with Privacy.
J. Medical Syst., 2019

Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones.
IEEE Access, 2019

CPDA: A Confidentiality-Preserving Deduplication Cloud Storage With Public Cloud Auditing.
IEEE Access, 2019

A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Defence Against Adversarial Attacks Using Clustering Algorithm.
Proceedings of the Data Science, 2019

A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds.
Proceedings of the Data Science, 2019

Wireless Communication Signal Strength Prediction Method Based on the K-nearest Neighbor Algorithm.
Proceedings of the Data Science, 2019

Ultralightweight RFID Authentication Protocol Based on Permutation Matrix Encryption.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

A New Provably Secure Identity-Based Multi-proxy Signature Scheme.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Privacy and Integrity Protection of Metering Data in Smart Grid.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
A privacy-preserving fuzzy interest matching protocol for friends finding in social networks.
Soft Comput., 2018

Ciphertext retrieval via attribute-based FHE in cloud computing.
Soft Comput., 2018

Pilot Cluster ICI Suppression in OFDM Systems Based on Coded Symbols.
IEICE Trans. Commun., 2018

Image search scheme over encrypted database.
Future Gener. Comput. Syst., 2018

Controllable keyword search scheme supporting multiple users.
Future Gener. Comput. Syst., 2018

Improved functional proxy re-encryption schemes for secure cloud data sharing.
Comput. Sci. Inf. Syst., 2018

Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things.
IEEE Access, 2018

Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018

2017
Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

Numerical methods for solving some matrix feasibility problems.
Numer. Algorithms, 2017

Fast lane detection based on bird's eye view and improved random sample consensus algorithm.
Multim. Tools Appl., 2017

Secure outsourcing of modular exponentiations under single untrusted programme model.
J. Comput. Syst. Sci., 2017

Secure communication scheme analysis via complex networks.
Concurr. Comput. Pract. Exp., 2017

Authenticity Protection in Outsourced Database.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Policy Based on Homomorphic Encryption and Retrieval Scheme in Cloud Computing.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Gener. Comput. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Gener. Comput. Syst., 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Gener. Comput. Syst., 2016

Secure outsourcing of modular exponentiations in cloud and cluster computing.
Clust. Comput., 2016

Secure Outsourcing Algorithm of Polynomials in Cloud Computing.
Proceedings of the 28th International Conference on Software Engineering and Knowledge Engineering, 2016

2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Energy-aware resource allocation for cooperative cognitive radio dynamic spectrum access networks.
J. High Speed Networks, 2015

Epidemic transmission on random mobile network with diverse infection periods.
Commun. Nonlinear Sci. Numer. Simul., 2015

2014
Dynamic Model for Anonymity Measurement Based on Information Entropy.
J. Internet Serv. Inf. Secur., 2014

2013
Information Entropy Model for Anonymity Measurement.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2010
Comments and Improvements on Key-Exposure Free Chameleon Hashing Based on Factoring.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010


  Loading...