2024
CFAuditChain: Audit BlockChain Based On Cuckoo Filter.
Comput. J., 2024
2022
DPLogChain: A Dynamic Packaging LogChain based on Random Witness.
Proceedings of the IEEE International Conference on Communications, 2022
ESUM: an efficient UTXO schedule model.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022
2021
Risk-averse flexible policy on ambulance allocation in humanitarian operations under uncertainty.
Int. J. Prod. Res., 2021
OverlapShard: Overlap-based Sharding Mechanism.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Associated Lattice-BERT for Spoken Language Understanding.
Proceedings of the Neural Information Processing - 28th International Conference, 2021
2020
HoneyHash: Honeyword Generation Based on Transformed Hashes.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records.
Proceedings of the Financial Cryptography and Data Security, 2020
2018
A Method for Partner Selection of Supply Chain Using Interval-Valued Fuzzy Sets - Fuzzy Choquet Integral and Improved Dempster-Shafer Theory.
Int. J. Inf. Technol. Decis. Mak., 2018
2015
Location Semantics Protection Based on Bayesian Inference.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
PassApp: My App is My Password!
Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2015
Access Control Model Based on Trust and Risk Evaluation in IDMaaS.
Proceedings of the 12th International Conference on Information Technology, 2015
Accelerating RSA with Fine-Grained Parallelism Using GPU.
Proceedings of the Information Security Practice and Experience, 2015
2014
Cache-Aware Query Processing with User Privacy Protection in Location-Based Services.
Proceedings of the Web-Age Information Management, 2014
Privacy Protection against Query Prediction in Location-Based Services.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
2013
Authenticating Users of Recommender Systems Using Naive Bayes.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013
A Hybrid Approach for Privacy Preservation in Location Based Queries.
Proceedings of the Web-Age Information Management, 2013
CQArank: jointly model topics and expertise in community question answering.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
Color Transfer Based on Earth Mover's Distance and Color Categorization.
Proceedings of the Computer Analysis of Images and Patterns, 2013
An Efficient Privacy-Preserving RFID Ownership Transfer Protocol.
Proceedings of the Web Technologies and Applications - 15th Asia-Pacific Web Conference, 2013
2012
A RFID Path-Checking Protocol Based on Ordered Multisignatures.
Proceedings of the Radio Frequency Identification System Security, 2012
Permission-Based Abnormal Application Detection for Android.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
A Privacy-Preserving Path-Checking Solution for RFID-Based Supply Chains.
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Towards privacy-preserving RFID-based location-based services.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012
PUF-Based RFID Authentication Protocol against Secret Key Leakage.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
2011
Sorcery: Overcoming deceptive votes in P2P content sharing systems.
Peer-to-Peer Netw. Appl., 2011
Lightweight RFID Mutual Authentication Protocol against Feasible Problems.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Supermarket Service Modeling and Evaluation.
Int. J. Serv. Sci. Manag. Eng. Technol., 2010
Survey of Authentication in Mobile IPv6 Network.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
2009
Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009
Hash-Based Tag Ownership Transfer Protocol against Traceability.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
SpamClean: Towards Spam-Free Tagging Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Filtering Spam in Social Tagging System with Dynamic Behavior Analysis.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009
2008
A Game Theoretic Approach Based Access Control Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Efficient Identity-Based Key Issue with TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
A Trust and Risk Framework to Enhance Reliable Interaction in E-Commerce.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
An Improved Scheme for Delegation Based on Usage Control.
Proceedings of the Second International Conference on Future Generation Communication and Networking, 2008