Arthur Sandor Voundi Koe

Orcid: 0000-0002-8737-3189

Affiliations:
  • Guangzhou University, School of Computer Science and Cyber Engineering, Guangzhou, China
  • Hunan University, College of Information Science and Engineering, Changsha, China


According to our database1, Arthur Sandor Voundi Koe authored at least 25 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Secure and Flexible Blockchain-Based Offline Payment Protocol.
IEEE Trans. Computers, February, 2024

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024

Towards Key-Escrow Free Attribute-Based Encryption for Self-Sovereign Identity Systems.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

2023
MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration.
J. Syst. Archit., November, 2023

A novel extended multimodal AI framework towards vulnerability detection in smart contracts.
Inf. Sci., July, 2023

Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT.
Inf. Sci., 2023

A real-time privacy-preserving scheme based on grouping queries for continuous location-based services.
Concurr. Comput. Pract. Exp., 2023

2022
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services.
Sensors, 2022

BSM-ether: Bribery selfish mining in blockchain-based healthcare systems.
Inf. Sci., 2022

Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough.
Inf. Sci., 2022

ESM: Selfish mining under ecological footprint.
Inf. Sci., 2022

Secure and efficient parameters aggregation protocol for federated incremental learning and its applications.
Int. J. Intell. Syst., 2022

Interval-valued Pythagorean fuzzy linguistic KPCA model based on TOPSIS and its application for emergency group decision making.
Int. J. Intell. Syst., 2022

Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud.
Int. J. Intell. Syst., 2022

Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
A novel blockchain-based privacy-preserving framework for online social networks.
Connect. Sci., 2021

Adversarial perturbation in remote sensing image recognition.
Appl. Soft Comput., 2021

Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Full-Stack Hierarchical Fusion of Static Features for Smart Contracts Vulnerability Detection.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
A Secure and Efficient Task Matching Scheme for Spatial Crowdsourcing.
IEEE Access, 2020

An Efficient Privacy-Preserving Multi-Keyword Query Scheme in Location Based Services.
IEEE Access, 2020

2019
Offline privacy preserving proxy re-encryption in mobile cloud computing.
Pervasive Mob. Comput., 2019

Differential privacy-based trajectory community recommendation in social network.
J. Parallel Distributed Comput., 2019

Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage.
J. Netw. Comput. Appl., 2019

A lightweight privacy and integrity preserving range query scheme for mobile cloud computing.
Comput. Secur., 2019


  Loading...