Tao Feng

Orcid: 0000-0003-1611-9017

Affiliations:
  • Lanzhou University of Technology, School of Computer and Communication, China


According to our database1, Tao Feng authored at least 44 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials.
J. Cloud Comput., December, 2024

A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption.
IEEE Trans. Consumer Electron., February, 2024

Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool.
Inf., February, 2024

Security assessment and improvement of smart grid NIKE protocol.
Int. J. Inf. Sec., February, 2024

DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024

2023
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment.
Cryptogr., June, 2023

Research on PoW Protocol Security under Optimized Long Delay Attack.
Cryptogr., June, 2023

A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme.
Inf., May, 2023

Verifiable Keyword Search Encryption Scheme That Supports Revocation of Attributes.
Symmetry, March, 2023

Evaluation of Machine Learning Algorithms for Malware Detection.
Sensors, January, 2023

An intelligent zero trust secure framework for software defined networking.
PeerJ Comput. Sci., 2023

A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario.
IEEE Internet Things J., 2023

Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB.
Inf., 2023

Security Analysis and Enhancement of INTERBUS Protocol in ICS Based on Colored Petri Net.
Inf., 2023

Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service.
Future Internet, 2023

Optimized model analysis of blockchain PoW procotol under long delay attack.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

2022
Research on a Vehicle Authentication and Key Transmission Protocol Based on CPN.
Symmetry, November, 2022

Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time.
Symmetry, 2022

Malware Analysis and Detection Using Machine Learning Algorithms.
Symmetry, 2022

Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers.
EAI Endorsed Trans. Security Safety, 2022

An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol.
Sensors, 2022

Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things.
Sensors, 2022

Security Analysis and Improvement of Vehicle Ethernet SOME/IP Protocol.
Sensors, 2022

A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption.
Inf., 2022

Research on Data Transaction Security Based on Blockchain.
Inf., 2022

Fuzzy Keyword Searchable Encryption Scheme Based on Blockchain.
Inf., 2022

Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment.
EAI Endorsed Trans. Creative Technol., 2022

IoT Based Detection of Molded Bread and Expiry Prediction using Machine Learning Techniques.
EAI Endorsed Trans. Creative Technol., 2022

An Intelligent and Secured Privacy Preserving Framework For Wireless Body Area Networks (WBANs).
EAI Endorsed Trans. Creative Technol., 2022

IOTA Based Anomaly Detection Machine learning in Mobile Sensing.
EAI Endorsed Trans. Creative Technol., 2022

Techniques For Reducing Energy And Delay For Data Aggregation In Wireless Sensor Networks.
EAI Endorsed Trans. Creative Technol., 2022

Certificateless Searchable Encryption Scheme in Multi-User Environment.
Cryptogr., 2022

2021
Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT.
Secur. Commun. Networks, 2021

Secure Data Collaborative Computing Scheme Based on Blockchain.
Secur. Commun. Networks, 2021

Group signature with time-bound keys and unforgeability of expiry time for smart cities.
EURASIP J. Wirel. Commun. Netw., 2021

The future of Artificial Intelligence in Cybersecurity: A Comprehensive Survey.
EAI Endorsed Trans. Creative Technol., 2021

An overview of the applications of Artificial Intelligence in Cybersecurity.
EAI Endorsed Trans. Creative Technol., 2021

Survey of 3D Printer Security Offensive and Defensive.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2019
Research on privacy enhancement scheme of blockchain transactions.
Secur. Priv., 2019

A Searchable CP-ABE Privacy Preserving Scheme.
Int. J. Netw. Secur., 2019

Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019

2018
An Efficient and Anonymous KP-ABE Scheme with Keyword Search.
Proceedings of the Information Science and Applications 2018, 2018

2016
Secure Content Delivery Scheme Based on Yaksha System for CCMANETs.
J. Commun., 2016


  Loading...