2024
Personalized client-edge-cloud hierarchical federated learning in mobile edge computing.
J. Cloud Comput., December, 2024
Correction: Efficient integer division computation protocols based on partial homomorphic encryption.
Clust. Comput., December, 2024
Efficient integer division computation protocols based on partial homomorphic encryption.
Clust. Comput., December, 2024
Privacy-preserving vertical federated broad learning system for artificial intelligence generated image content.
J. Real Time Image Process., February, 2024
A lattice-based efficient heterogeneous signcryption scheme for secure network communications.
J. High Speed Networks, 2024
2023
Transfer learning based cascaded deep learning network and mask recognition for COVID-19.
World Wide Web (WWW), September, 2023
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice.
Entropy, August, 2023
Research on Quantum-Attack-Resistant Strong Forward-Secure Signature Schemes.
Entropy, August, 2023
Identity-based proxy blind signature scheme on lattice in high-speed network environment.
J. High Speed Networks, 2023
Privacy Protection of Cloud Computing Based on Strong Forward Security.
Int. J. Cloud Appl. Comput., 2023
Minimax Weight Learning for Absorbing MDPs.
CoRR, 2023
Secure Position-Aware Graph Neural Networks for Session-Based Recommendation.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Application of Lattice-Based Unique Ring Signature in Blockchain Transactions.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
A Graph-Based Vertical Federation Broad Learning System.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Privacy-aware PKI model with strong forward security.
Int. J. Intell. Syst., December, 2022
Trust-based secure directed diffusion routing protocol in WSN.
J. Ambient Intell. Humaniz. Comput., 2022
Aitac: an identity-based traceable anonymous communication model.
J. Ambient Intell. Humaniz. Comput., 2022
IPSadas: Identity-privacy-aware secure and anonymous data aggregation scheme.
Int. J. Intell. Syst., 2022
Intelligent federated learning on lattice-based efficient heterogeneous signcryption.
Int. J. Intell. Syst., 2022
Lattice-based batch authentication scheme with dynamic identity revocation in VANET.
Int. J. Intell. Syst., 2022
A secure aggregation routing protocol with authentication and energy conservation.
Trans. Emerg. Telecommun. Technol., 2022
A traceable privacy-aware data publishing platform on permissioned blockchain.
Trans. Emerg. Telecommun. Technol., 2022
Tesia: A trusted efficient service evaluation model in Internet of things based on improved aggregation signature.
Concurr. Comput. Pract. Exp., 2022
An anonymous authentication and key agreement protocol in smart living.
Comput. Commun., 2022
BCSE: Blockchain-based trusted service evaluation model over big data.
Big Data Min. Anal., 2022
A Privacy Preserving and Format-Checkable E-voting Scheme.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
A Certificateless-Based Blind Signature Scheme with Message Recovery.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
A Broad Learning System Based on the Idea of Vertical Federated Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
A Lattice-Based Aggregate Signature Based on Revocable Identity.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
2021
An Efficient Anonymous Communication Scheme to Protect the Privacy of the Source Node Location in the Internet of Things.
Secur. Commun. Networks, 2021
ImpSuic: A quality updating rule in mixing coins with maximum utilities.
Int. J. Intell. Syst., 2021
LacminCC: lightweight anonymous communication model in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2021
Shortest link scheduling in wireless networks under the Rayleigh fading model.
EURASIP J. Wirel. Commun. Netw., 2021
Research on direct anonymous attestation mechanism in enterprise information management.
Enterp. Inf. Syst., 2021
Certificateless Proxy Authentication Scheme on Lattices Under the Background of Big Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
A Secure Aggregation Routing Protocol with Authentication and Energy-Saving on Data Mining and Big Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
An Agricultural Traceability Permissioned Blockchain with Privacy-Aware.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
An Anonymous Communication Scheme Between Nodes Based on Pseudonym and Bilinear Pairing in Big Data Environments.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
A Group Blind Signature Scheme for Privacy Protection of Power Big Data in Smart Grid.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
A Lattice-Based Anonymous Authentication for Privacy Protection of Medical Data.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
Key Agreement Protocol Under Multi-service Architecture.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
2020
Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things.
Wirel. Commun. Mob. Comput., 2020
FarpScusn: Fully Anonymous Routing Protocol with Self-Healing Capability in Unstable Sensor Networks.
Sensors, 2020
Belief and fairness: A secure two-party protocol toward the view of entropy for IoT devices.
J. Netw. Comput. Appl., 2020
Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing.
IEEE Access, 2020
A Trajectory-Privacy Protection Method Based on Location Similarity of Query Destinations in Continuous LBS Queries.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Research on Blockchain-Based Identity Authentication Scheme in Social Networks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Research and Application of Digital Signature Technology.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Research on Blind Signature Based Anonymous Electronic Cash Scheme.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Research on Friendvertising-Counter Technology in Big Data.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Evaluation of Machine Learning Algorithms for Anomaly Detection.
Proceedings of the 2020 International Conference on Cyber Security and Protection of Digital Services, 2020
2019
A game-theoretic method based on Q-learning to invalidate criminal smart contracts.
Inf. Sci., 2019
Randomness invalidates criminal smart contracts.
Inf. Sci., 2019
Design of Anonymous Communication Protocol Based on Group Signature.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Privacy-Awareness Fair Contract Signing Protocol Based on Blockchain.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Research and Application of Trusted Service Evaluation Model in Social Network.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2017
TSQM: Trust-based Secure Query Method in Anonymous Communication System.
Proceedings of the 2017 International Conference on Identification, 2017
ACS-DFP: Anonymous Communication Scheme Based on Decreased Forwarding Probability.
Proceedings of the 2017 International Conference on Identification, 2017
2016
Research on dynamic trust model based on recommendation trust iteration.
Int. J. Comput. Sci. Math., 2016
2015
An Efficient and Impartial Buyer-Seller Watermarking Protocol.
J. Commun., 2015
2007
A New Threshold Group Signature Scheme Based on Discrete Logarithm Problem .
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007