2025
Privacy-enhanced multi-region data aggregation for Internet of Vehicles.
Veh. Commun., 2025
DBFL: Dynamic Byzantine-Robust Privacy Preserving Federated Learning in Heterogeneous Data Scenario.
Inf. Sci., 2025
Membership inference attacks via spatial projection-based relative information loss in MLaaS.
Inf. Process. Manag., 2025
Achieving Efficient Privacy-Preserving Mixed Data Quality Assessment in Mobile Crowdsensing.
IEEE Internet Things J., 2025
2024
CEC-DL: Cloud-Edge Collaborative Delegation Learning Against Covert Adversaries.
IEEE Internet Things J., December, 2024
H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network.
IEEE Internet Things J., October, 2024
RVFL: Rational Verifiable Federated Learning Secure Aggregation Protocol.
IEEE Internet Things J., July, 2024
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives.
IEEE Netw., May, 2024
Computing Power Networking Meets Blockchain: A Reputation-Enhanced Trading Framework for Decentralized IoT Cloud Services.
IEEE Internet Things J., May, 2024
Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update.
IEEE Internet Things J., May, 2024
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024
Trustworthy Federated Learning Against Malicious Attacks in Web 3.0.
IEEE Trans. Netw. Sci. Eng., 2024
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing.
J. King Saud Univ. Comput. Inf. Sci., 2024
Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing.
J. Inf. Secur. Appl., 2024
PSFL: Ensuring Data Privacy and Model Security for Federated Learning.
IEEE Internet Things J., 2024
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT.
Digit. Commun. Networks, 2024
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT.
Comput. Networks, 2024
Enhancing Privacy-Preserving Federated Learning: A Robust and Resilient Approach.
Proceedings of the International Conference on Networking and Network Applications, 2024
Lightweight Federated Learning Secure Aggregation Protocols.
Proceedings of the International Conference on Networking and Network Applications, 2024
Knowledge Distillation Enables Federated Learning: A Data-free Federated Aggregation Scheme.
Proceedings of the International Joint Conference on Neural Networks, 2024
LSTN: A Lightweight Secure Three-Party Inference Framework for Deep Neural Networks.
Proceedings of the IEEE International Conference on Communications, 2024
CPAKE: Dynamic Batch Authenticated Key Exchange with Conditional Privacy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024
FPIM: Fair and Privacy-Preserving Incentive Mechanism in Mobile Crowdsensing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024
Towards Scalable and Secure IoTs Transactions: A New Bi-directional Payment Channel Without Third-Party Monitoring.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing.
J. Syst. Archit., November, 2023
When MetaVerse Meets Computing Power Networking: An Energy-Efficient Framework For Service Placement.
IEEE Wirel. Commun., October, 2023
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism.
Mob. Networks Appl., October, 2023
Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing.
IEEE Internet Things J., September, 2023
Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT.
IEEE Trans. Ind. Informatics, May, 2023
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023
The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles.
Concurr. Comput. Pract. Exp., 2023
DFedXGB: An XGB Vertical Federated Learning Framework with Data Desensitization.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing.
Proceedings of the International Conference on Networking and Network Applications, 2023
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare.
Proceedings of the IEEE International Conference on E-health Networking, 2023
Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual Reality.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Privacy-Preserving Traffic Violation Image Filtering and Searching via Crowdsensing.
Mob. Networks Appl., December, 2022
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
A Blockchain-Based Machine Learning Framework for Edge Services in IIoT.
IEEE Trans. Ind. Informatics, 2022
POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing.
Multim. Tools Appl., 2022
Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022
Special Issue on Knowledge- and Service-Oriented Industrial Internet of Things: Architectures, Challenges, and Methodologies.
IEEE Internet Things J., 2022
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT.
Digit. Commun. Networks, 2022
An incentive mechanism for collaborative intelligence.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2022
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2022
Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data.
Proceedings of the IEEE International Conference on Communications, 2022
Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Location Privacy Protection Scheme for LBS in IoT.
Wirel. Commun. Mob. Comput., 2021
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021
CP-ABE-Based Secure and Verifiable Data Deletion in Cloud.
Secur. Commun. Networks, 2021
Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage.
Secur. Commun. Networks, 2021
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021
Structural Mutual Information and Its Application.
IACR Cryptol. ePrint Arch., 2021
A lightweight privacy protection scheme based on user preference in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021
Privacy and Security Issues in Deep Learning: A Survey.
IEEE Access, 2021
2020
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT.
Wirel. Commun. Mob. Comput., 2020
Edge-Assisted Privacy-Preserving Raw Data Sharing Framework for Connected Autonomous Vehicles.
IEEE Wirel. Commun., 2020
A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2020
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT.
IEEE Trans. Ind. Informatics, 2020
A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs.
IEEE Trans. Ind. Informatics, 2020
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud.
Concurr. Comput. Pract. Exp., 2020
HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth.
IEEE Access, 2020
Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019
An Attribute-Based Assured Deletion Scheme in Cloud Computing.
Int. J. Inf. Technol. Web Eng., 2019
Privacy-preserving edge-assisted image retrieval and classification in IoT.
Frontiers Comput. Sci., 2019
Fine-grained multi-authority access control in IoT-enabled mHealth.
Ann. des Télécommunications, 2019
Secure Encrypted Data With Authorized Deduplication in Cloud.
IEEE Access, 2019
Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach.
IEEE Access, 2019
A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Low-Latency High-Level Data Sharing for Connected and Autonomous Vehicular Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wirel. Commun. Mob. Comput., 2018
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
Mob. Networks Appl., 2018
Local HMM for indoor positioning based on fingerprinting and displacement ranging.
IET Commun., 2018
MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018
D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018
Distributed and Application-Aware Task Scheduling in Edge-Clouds.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
A Novel Data Secure Deletion Scheme for Mobile Devices.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems.
IEEE Access, 2017
Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
DPLK-Means: A Novel Differential Privacy K-Means Mechanism.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
History-aware page replacement algorithm for NAND flash-based consumer electronics.
IEEE Trans. Consumer Electron., 2016
A secure access and associate deleting scheme for multi-replica in multi-cloud environment.
Int. J. High Perform. Syst. Archit., 2016
Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016
An efficient CGA algorithm against DoS attack on duplicate address detection process.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
A Secure Data Deduplication Scheme Based on Differential Privacy.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Role and Time-Based Access Control with Efficient Revocation for Cloud Storage.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
A Multi-replica Associated Deleting Scheme in Cloud.
Proceedings of the 10th International Conference on Complex, 2016
2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015
Large universe decentralized key-policy attribute-based encryption.
Secur. Commun. Networks, 2015
A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Netw. Appl., 2015
Attribute Based Multisignature Scheme for Wireless Communications.
Mob. Inf. Syst., 2015
A Novel Cyberspace-Oriented Access Control Model.
IACR Cryptol. ePrint Arch., 2015
Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014
Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014
Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
2013
Access control requirements for structured document in cloud computing.
Int. J. Grid Util. Comput., 2013
A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013
A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
TNC-eSA: An Echanced Security Access Solution to Office Networks.
Proceedings of the Information Computing and Applications - Third International Conference, 2012
2009
Syncretizing Context Information into the Collaborative Filtering Recommendation.
Proceedings of the First International Workshop on Database Technology and Applications, 2009