Zhiguang Qin

Orcid: 0009-0007-6105-0254

According to our database1, Zhiguang Qin authored at least 230 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition.
IEEE Trans. Artif. Intell., April, 2024

A cascaded framework with cross-modality transfer learning for whole heart segmentation.
Pattern Recognit., March, 2024

Hyperspectral image classification using Second-Order Pooling with Graph Residual Unit Network.
Expert Syst. Appl., March, 2024

Secure Task Distribution With Verifiable Re-Encryption in Mobile-Crowdsensing-Assisted Emergency IoT System.
IEEE Internet Things J., February, 2024

MFNet:Real-Time Motion Focus Network for Video Frame Interpolation.
IEEE Trans. Multim., 2024

Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network.
IEEE Trans. Inf. Forensics Secur., 2024

2023
FastNet: A Lightweight Convolutional Neural Network for Tumors Fast Identification in Mobile-Computer-Assisted Devices.
IEEE Internet Things J., June, 2023

MSDP: multi-scheme privacy-preserving deep learning via differential privacy.
Pers. Ubiquitous Comput., April, 2023

PiCovS: Pixel-Level With Covariance Pooling Feature and Superpixel-Level Feature Fusion for Hyperspectral Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2023

Interpreting Universal Adversarial Example Attacks on Image Classification Models.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-Head Spatiotemporal Attention Graph Convolutional Network for Traffic Prediction.
Sensors, 2023

Synthetic Aperture Radar Automatic Target Recognition Based on a Simple Attention Mechanism.
Int. J. Interact. Multim. Artif. Intell., 2023

Differentiable Attention Unet-like Nerual Architecture Search for Multimodal Magnetic Resonance Imaging-based Glioma Segmentaion DAUNAS for Multimodal MRI-based Glioma Segmentation.
Proceedings of the 2023 4th International Symposium on Artificial Intelligence for Medicine Science, 2023

2022
DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption.
IEEE Trans. Neural Networks Learn. Syst., 2022

Adversarial Sample Attack and Defense Method for Encrypted Traffic Data.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things.
IEEE J. Biomed. Health Informatics, 2022

MVFusFra: A Multi-View Dynamic Fusion Framework for Multimodal Brain Tumor Segmentation.
IEEE J. Biomed. Health Informatics, 2022

Attention Autoencoder for Generative Latent Representational Learning in Anomaly Detection.
Sensors, 2022

Traditional and Hybrid Access Control Models: A Detailed Survey.
Secur. Commun. Networks, 2022

MallesNet: A multi-object assistance based network for brachial plexus segmentation in ultrasound images.
Medical Image Anal., 2022

Facial expression recognition via coarse-grained and fine-grained feature representation.
J. Intell. Fuzzy Syst., 2022

PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system.
J. Ambient Intell. Humaniz. Comput., 2022

Segmentation mask and feature similarity loss guided GAN for object-oriented image-to-image translation.
Inf. Process. Manag., 2022

Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones.
IEEE Internet Things J., 2022

Generic network for domain adaptation based on self-supervised learning and deep clustering.
Neurocomputing, 2022

Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata-based functional encryption for an in-vehicle sensor database system.
Trans. Emerg. Telecommun. Technol., 2022

Constructing secure-channel free identity-based encryption with equality test for vehicle-data sharing in cloud computing.
Trans. Emerg. Telecommun. Technol., 2022

Maximal activation weighted memory for aspect based sentiment analysis.
Comput. Speech Lang., 2022

LCSB-inception: Reliable and effective light-chroma separated branches for Covid-19 detection from chest X-ray images.
Comput. Biol. Medicine, 2022

Dual_Pachi: Attention-based dual path framework with intermediate second order-pooling for Covid-19 detection from chest X-ray images.
Comput. Biol. Medicine, 2022

Edge-assisted Puncturable Fine-grained Task Distribution for the IoT-oriented Crowdsensing.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

2021
Equality test with an anonymous authorization in cloud computing.
Wirel. Networks, 2021

Certificateless-Based Anonymous Authentication and Aggregate Signature Scheme for Vehicular Ad Hoc Networks.
Wirel. Commun. Mob. Comput., 2021

A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics.
IEEE Trans. Fuzzy Syst., 2021

Comment on "Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data".
IEEE Trans. Cloud Comput., 2021

Fully Constant-Size CP-ABE with Privacy-Preserving Outsourced Decryption for Lightweight Devices in Cloud-Assisted IoT.
Secur. Commun. Networks, 2021

A location privacy protection scheme for convoy driving in autonomous driving era.
Peer-to-Peer Netw. Appl., 2021

Secure and dynamic access control for the Internet of Things (IoT) based traffic system.
PeerJ Comput. Sci., 2021

Efficient access control with traceability and user revocation in IoT.
Multim. Tools Appl., 2021

Spatial self-attention network with self-attention distillation for fine-grained image recognition.
J. Vis. Commun. Image Represent., 2021

Accountable Attribute-based Encryption with Public Auditing and User Revocation in the Personal Health Record System.
KSII Trans. Internet Inf. Syst., 2021

DeepSeg: Deep-Learning-Based Activity Segmentation Framework for Activity Recognition Using WiFi.
IEEE Internet Things J., 2021

DeepEDN: A Deep-Learning-Based Image Encryption and Decryption Network for Internet of Medical Things.
IEEE Internet Things J., 2021

Stock Market Prediction with Gaussian Naïve Bayes Machine Learning Algorithm.
Informatica (Slovenia), 2021

ToStaGAN: An end-to-end two-stage generative adversarial network for brain tumor segmentation.
Neurocomputing, 2021

A partially hidden policy CP-ABE scheme against attribute values guessing attacks with online privacy-protective decryption testing in IoT assisted cloud computing.
Future Gener. Comput. Syst., 2021

Attention augmented residual network for tomato disease detection and classification.
Turkish J. Electr. Eng. Comput. Sci., 2021

Decision tree pairwise metric learning against adversarial attacks.
Comput. Secur., 2021

Transfer Learning and Semisupervised Adversarial Detection and Classification of COVID-19 in CT Images.
Complex., 2021

Features to Text: A Comprehensive Survey of Deep Learning on Semantic Segmentation and Image Captioning.
Complex., 2021

Image Inpainting and Classification Agent Training Based on Reinforcement Learning and Generative Models with Attention Mechanism.
Proceedings of the International Conference on Microelectronics, 2021

Attention Augmented Convolutional Neural Network for Fine-Grained Plant Disease Classification and Visualization Using Stochastic Sample Transformations.
Proceedings of the ICAIP 2021: 5th International Conference on Advances in Image Processing, Chengdu, China, November 12, 2021

FDO-ABE: A Fully Decentralized Lightweight Access Control Architecture for Mobile Edge Computing.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
Physical Layer based Message Authentication with Secure Channel Codes.
IEEE Trans. Dependable Secur. Comput., 2020

An ECDSA Approach to Access Control in Knowledge Management Systems Using Blockchain.
Inf., 2020

Precursors of Role-Based Access Control Design in KMS: A Conceptual Framework.
Inf., 2020

Evaluation of Tree-Based Ensemble Machine Learning Models in Predicting Stock Price Direction of Movement.
Inf., 2020

Stock market decision support modeling with tree-based AdaBoost ensemble machine learning models.
Informatica (Slovenia), 2020

Imaging and fusing time series for wearable sensor-based human activity recognition.
Inf. Fusion, 2020

A framework for hierarchical division of retinal vascular networks.
Neurocomputing, 2020

A multi-path adaptive fusion network for multimodal brain tumor segmentation.
Neurocomputing, 2020

Brain tumor segmentation with deep convolutional symmetric neural network.
Neurocomputing, 2020

Computer-Mediated Communication Portal Implementation Framework: A Higher Education Institutional Perspective.
Int. J. Emerg. Technol. Learn., 2020

Multiple Instance Segmentation in Brachial Plexus Ultrasound Image Using BPMSegNet.
CoRR, 2020

A Multi-View Dynamic Fusion Framework: How to Improve the Multimodal Brain Tumor Segmentation from Multi-Views?
CoRR, 2020

Multi-Authority Ciphertext-Policy Attribute Based Encryption With Accountability.
CoRR, 2020

ECAS: an efficient and conditional privacy preserving collision warning system in fog-based vehicular ad hoc networks.
CCF Trans. Netw., 2020

Multi-Features Refinement and Aggregation for Medical Brain Segmentation.
IEEE Access, 2020

Attentively Conditioned Generative Adversarial Network for Semantic Segmentation.
IEEE Access, 2020

A Multi-Spiking Neural Network Learning Model for Data Classification.
IEEE Access, 2020

A Multi-Layered Data Encryption and Decryption Scheme Based on Genetic Algorithm and Residual Numbers.
IEEE Access, 2020

Multi-Class Triplet Loss With Gaussian Noise for Adversarial Robustness.
IEEE Access, 2020

A Hybrid Access Control Model With Dynamic COI for Secure Localization of Satellite and IoT-Based Vehicles.
IEEE Access, 2020

A Five-Factor KMS Success Model.
Proceedings of the Intelligent Human Systems Integration 2020, 2020

Research of Association Rules Mining based on Fuzzy Alarm Extraction.
Proceedings of the ICDSP 2020: 4th International Conference on Digital Signal Processing, 2020

Attacking the Dialogue System at Smart Home.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

FuzzyNet: Context Encoding and Spatial Fuzzy Refinement Network in Semantic Segmentation.
Proceedings of the CNIOT 2020: 2020 International Conference on Computing, 2020

2019
A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks.
Wirel. Commun. Mob. Comput., 2019

Modeling Embedding Dimension Correlations via Convolutional Neural Collaborative Filtering.
ACM Trans. Inf. Syst., 2019

Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model.
Symmetry, 2019

CsiGAN: Robust Channel State Information-Based Activity Recognition With GANs.
IEEE Internet Things J., 2019

Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.
IEEE Internet Things J., 2019

Managing an Information System Transformation in Higher Educational Institutions: A Case Study on CMC Portal in Ghana.
Int. J. Emerg. Technol. Learn., 2019

Iterative tighter nonparallel hyperplane support vector clustering with simultaneous feature selection.
Clust. Comput., 2019

Fixed-point twin support vector machine.
Clust. Comput., 2019

High-order correlation detecting in features for diagnosis of Alzheimer's disease and mild cognitive impairment.
Biomed. Signal Process. Control., 2019

Proxy Re-Encryption in Access Control Framework of Information-Centric Networks.
IEEE Access, 2019

MSCryptoNet: Multi-Scheme Privacy-Preserving Deep Learning in Cloud Computing.
IEEE Access, 2019

Cauchy Matrix Factorization for Tag-Based Social Image Retrieval.
IEEE Access, 2019

How to Improve the Deep Residual Network to Segment Multi-Modal Brain Tumor Images.
IEEE Access, 2019

Sec-D2D: A Secure and Lightweight D2D Communication System With Multiple Sensors.
IEEE Access, 2019

Fully Convolutional CaptionNet: Siamese Difference Captioning Attention Model.
IEEE Access, 2019

CaptionNet: Automatic End-to-End Siamese Difference Captioning Model With Attention.
IEEE Access, 2019

Negative Authorization by Implementing Negative Attributes in Attribute-Based Access Control Model for Internet of Medical Things.
Proceedings of the 15th International Conference on Semantics, Knowledge and Grids, 2019

Progressive Image Enhancement under Aesthetic Guidance.
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019

Role-Based ABAC Model for Implementing Least Privileges.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Learning Local Part Motion Representation for Skeleton-based Action Recognition.
Proceedings of the ICETC 2019, 2019

An Intelligent Bidding Strategy Based on Model-Free Reinforcement Learning for Real-Time Bidding in Display Advertising.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
Alternating Relaxed Twin Bounded Support Vector Clustering.
Wirel. Pers. Commun., 2018

Leveraging Image Visual Features in Content-Based Recommender System.
Sci. Program., 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Netw., 2018

A Service Recommendation Algorithm Based on Modeling of Dynamic and Diverse Demands.
Int. J. Web Serv. Res., 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE J. Sel. Areas Commun., 2018

Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud".
Inf. Process. Lett., 2018

Multi-modal brain tumor image segmentation based on SDAE.
Int. J. Imaging Syst. Technol., 2018

Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation.
Int. J. Netw. Secur., 2018

Cubic Medium Field Equation Public Key Cryptosystem.
Int. J. Netw. Secur., 2018

Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle.
Int. J. Netw. Secur., 2018

RUN: Residual U-Net for Computer-Aided Detection of Pulmonary Nodules without Candidate Selection.
CoRR, 2018

Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing.
IEEE Access, 2018

Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records.
IEEE Access, 2018

Brain Tumor Segmentation Using Concurrent Fully Convolutional Networks and Conditional Random Fields.
Proceedings of the 3rd International Conference on Multimedia and Image Processing, 2018

2017
Frequent Symptom Sets Identification from Uncertain Medical Data in Differentially Private Way.
Sci. Program., 2017

Captioning Videos Using Large-Scale Image Corpus.
J. Comput. Sci. Technol., 2017

S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol.
IEEE Internet Things J., 2017

Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare.
Int. J. Netw. Secur., 2017

An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet.
Int. J. Netw. Secur., 2017

Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme.
Int. J. Netw. Secur., 2017

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing.
Comput. Stand. Interfaces, 2017

Multi-message Authentication over Noisy Channel with Secure Channel Codes.
CoRR, 2017

Brain MR Image Classification for Alzheimer's Disease Diagnosis Based on Multifeature Fusion.
Comput. Math. Methods Medicine, 2017

LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context.
IEEE Access, 2017

PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme With Differential Privacy in Fog Computing.
IEEE Access, 2017

Wheel: Accelerating CNNs with Distributed GPUs via Hybrid Parallelism and Alternate Strategy.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Multi-message Authentication over Noisy Channel with Polar Codes.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

MESA: An Efficient Matching Scheme in Content-Based Publish/Subscribe System with Simplified Bayesian Approach.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Non-interactive deniable ring signature without random oracles.
Secur. Commun. Networks, 2016

一种基于编码关联的快速多模式匹配算法 (Multi-pattern Matching Algorithm Based on Coding Association).
计算机科学, 2016

Secure mobile agent-based English auction protocol using identity-based signature scheme.
Int. J. Secur. Networks, 2016

An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment.
Int. J. Netw. Secur., 2016

Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
Int. J. Netw. Secur., 2016

Certificateless Key Insulated Encryption: Cryptographic Primitive for Achieving Key-escrow free and Key-exposure Resilience.
IACR Cryptol. ePrint Arch., 2016

FRP: a fast resource placement algorithm in distributed cloud computing platform.
Concurr. Comput. Pract. Exp., 2016

Understanding Factors That Affect Web Traffic via Twitter.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Hierarchical Random Walk Inference in Knowledge Graphs.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

A deep learning-based segmentation method for brain tumor in MR images.
Proceedings of the 6th IEEE International Conference on Computational Advances in Bio and Medical Sciences, 2016

Measuring Trust in Online Social Networks.
Proceedings of the Artificial Intelligence Research and Development, 2016

Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

ActiveRec: A Novel Context-Sensitive Ranking Method for Active Movie Recommendation.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015

Characterization of Complex Networks for Epidemics Modeling.
Wirel. Pers. Commun., 2015

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Modeling and analysis of passive worm propagation in the P2P file-sharing network.
Simul. Model. Pract. Theory, 2015

功耗感知的自适应粒子群优化虚拟机动态映射 (Power-aware Virtual Machine Dynamic Mapper Using Particle Swarm Optimization).
计算机科学, 2015

A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
KSII Trans. Internet Inf. Syst., 2015

Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
Int. J. Netw. Secur., 2015

Cryptanalysis of Attribute-based Ring Signcryption Scheme.
Int. J. Netw. Secur., 2015

On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2015

Distance-bounding trust protocol in anonymous radio-frequency identification systems.
Concurr. Comput. Pract. Exp., 2015

Measuring User Influence Based on Multiple Metrics on YouTube.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Message Authentication Code over a wiretap channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Network coding based cooperative device-to-device communications in the uplink of cellular network.
Proceedings of the 9th International Conference on Signal Processing and Communication Systems, 2015

Fast Community Discovery and Its Evolution Tracking in Time-Evolving Social Networks.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

An ISP-Friendly Hierarchical Overlay for P2P Live Streaming.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Wireless Device Authentication Using Acoustic Hardware Fingerprints.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Classification of Alzheimer's disease based on the combination of morphometric feature and texture feature.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model.
Wirel. Pers. Commun., 2014

On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
Wirel. Pers. Commun., 2014

Certificate-free ad hoc anonymous authentication.
Inf. Sci., 2014

A Provably Secure Certificate Based Ring Signature Without Pairing.
Int. J. Netw. Secur., 2014

Simultaneous community discovery and user interests extraction in social network based on probabilistic model.
Int. J. Intell. Inf. Database Syst., 2014

Analysis and improvement of a provable secure fuzzy identity-based signature scheme.
Sci. China Inf. Sci., 2014

Incorporating Language Patterns and Domain Knowledge into Feature-Opinion Extraction.
Proceedings of the Text, Speech and Dialogue - 17th International Conference, 2014

A probabilistic approach towards modeling email network with realistic features.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Multimodal medical image fusion using wavelet transform and human vision system.
Proceedings of the International Conference on Audio, 2014

MRI brain image segmentation based on Kerneled FCM algorithm and using image filtering method.
Proceedings of the International Conference on Audio, 2014

An Architecture and a Platform for Recording and Replaying the Healthcare Information.
Proceedings of the Health Information Science - Third International Conference, 2014

An Improved Text Categorization Algorithm Based on VSM.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Cold-Start Mastered: LebiD1.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Secure and Efficient LCMQ Entity Authentication Protocol.
IEEE Trans. Inf. Theory, 2013

SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference.
IEEE Trans. Inf. Forensics Secur., 2013

Community Detecting and Feature Analysis in Real Directed Weighted Social Networks.
J. Networks, 2013

Certificateless threshold signature secure in the standard model.
Inf. Sci., 2013

Rate Efficient Authentication over a Wiretap Channel.
CoRR, 2013

SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A Trajectory Preserving Method Based on Semantic Anonymity Proxy.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
Towards high performance security policy evaluation.
J. Supercomput., 2012

An efficient conditionally anonymous ring signature in the random oracle model.
Theor. Comput. Sci., 2012

Further improvement of an identity-based signcryption scheme in the standard model.
Comput. Electr. Eng., 2012

Accelerating pairwise statistical significance estimation for local alignment by harvesting GPU's power.
BMC Bioinform., 2012

Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

An Optimistic Protocol for Distributed Fair Exchange.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Survey on Cloud Data Integrity Proof Techniques.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

Formal Verification of Communicating HSTM Designs.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
A co-commitment based secure data collection scheme for tiered wireless sensor networks.
J. Syst. Archit., 2011

A Certificateless Proxy Ring Signature Scheme with Provable Security.
Int. J. Netw. Secur., 2011

Efficient three-party authenticated key agreement protocol in certificateless cryptography.
Int. J. Comput. Math., 2011

Analysis of an Identity-Based Signcryption Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Cryptanalysis of an Identity Based Signcryption without Random Oracles.
Fundam. Informaticae, 2011

A Survey of Routing Protocols and Simulations in Delay-Tolerant Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

A New Conditionally Anonymous Ring Signature.
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011

2010
A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach.
J. Digit. Content Technol. its Appl., 2010

A Provably Secure Proxy Signature Scheme in Certificateless Cryptography.
Informatica, 2010

Identity-based Threshold Signature Secure in the Standard Model.
Int. J. Netw. Secur., 2010

More efficient DDH pseudorandom generators.
Des. Codes Cryptogr., 2010

Efficient Modeling of Spam Images.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2010

Topology Preserving SOM with Transductive Confidence Machine.
Proceedings of the Discovery Science - 13th International Conference, 2010

A New Technique of Anti-tampering Technology Based on AVS Video.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Method to Prevent CW Sharing in DTV CAS.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks.
J. Digit. Content Technol. its Appl., 2009

An Anonymous Sealed-bid Electronic Auction Based on Ring Signature.
Int. J. Netw. Secur., 2009

Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules.
IACR Cryptol. ePrint Arch., 2009

Secure and Efficient HB-CM Entity Authentication Protocol.
IACR Cryptol. ePrint Arch., 2009

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communications
CoRR, 2009

A Comment to the Intelligent Functions of Different Weight Ciphers.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

SDC: Secure Data Collection for Time Based Queries in Tiered Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Formal Analysis for Security of Otway-Rees Protocol with BAN Logic.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

Enhancing the Scale-Free Network's Attack Tolerance.
Proceedings of the Complex Sciences, 2009

A Distributed Framework for Passive Worm Detection and Throttling in P2P Networks.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
An Improved Certificateless Signature Scheme Secure in the Standard Model.
Fundam. Informaticae, 2008

HRS: A Hybrid Replication Strategy for Exhaustive P2P Search.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

DHT-assisted probabilistic exhaustive search in unstructured P2P networks.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Breaking Instance II of New TTM Cryptosystems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Designated Verifier Proxy Signature Scheme.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Propagation Model of Active Worms in P2P Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Link Farm Spam Detection Based on its Properties.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Efficient Multi-source Location in Unstructured P2P Systems.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

2006
IAC: Interest-Aware Caching for Unstructured P2P.
Proceedings of the 2006 International Conference on Semantics, 2006

Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Interconnected Peer-to-Peer Network: A Community Based Scheme.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A Note on Secure Key Issuing in ID-based Cryptography.
IACR Cryptol. ePrint Arch., 2005

2004
Policy-Tree Based Proactive Defense Model for Network Security.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Colored Petri Net Based Attack Modeling.
Proceedings of the Rough Sets, 2003

Distributing the Keys into P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

ECC Based Intrusion Tolerance for Web Security.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...