2025
Celler:A Genomic Language Model for Long-Tailed Single-Cell Annotation.
CoRR, April, 2025
Robust copy-move detection and localization of digital audio based CFCC feature.
Multim. Tools Appl., March, 2025
Robust Deep Reinforcement Learning in Robotics via Adaptive Gradient-Masked Adversarial Attacks.
,
,
,
,
,
,
,
,
,
,
CoRR, March, 2025
State-Aware Perturbation Optimization for Robust Deep Reinforcement Learning.
CoRR, March, 2025
Evolution of GNSS-Derived Precipitable Water Vapor and Its Driving Factors During the "Dragon Boat Water" Rainfall Event in Guangxi, China.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2025
An effective and verifiable secure aggregation scheme with privacy-preserving for federated learning.
J. Syst. Archit., 2025
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2025
SAGTM: A secure authentication scheme with traceability for avatars in the Metaverse.
Comput. Networks, 2025
An adaptive and large payload audio watermarking against jittering attacks.
Comput. Electr. Eng., 2025
EPPMRRS: An Efficient and Privacy-Preserving Medical Record Retrieval Scheme in WBAN.
Comput. Electr. Eng., 2025
Rethinking Adversarial Attacks in Reinforcement Learning from Policy Distribution Perspective.
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
2024
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices.
J. Cloud Comput., December, 2024
SAEV: Secure Aggregation and Efficient Verification for Privacy-Preserving Federated Learning.
IEEE Internet Things J., December, 2024
Blockchain-based privacy-preserving multi-tasks federated learning framework.
Connect. Sci., December, 2024
A novel SVD-based adaptive robust audio watermarking algorithm.
Multim. Tools Appl., August, 2024
Blockchain-Based Privacy-Preserving Authentication With Hierarchical Access Control Using Polynomial Commitment for Mobile Cloud Computing.
IEEE Internet Things J., May, 2024
Robust audio watermarking algorithm resisting cropping based on SIFT transform.
Multim. Tools Appl., April, 2024
PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.
J. Inf. Secur. Appl., 2024
A flexible and privacy-preserving federated learning framework based on logistic regression.
Comput. Electr. Eng., 2024
Deep Reinforcement Learning-Based Dependent Task Offloading for QoS Optimization in Satellite Edge Computing.
Proceedings of the Web Information Systems Engineering - WISE 2024, 2024
An Efficient Privacy-Preserving Medical Record Query Scheme Over Oblivious Transfer in Wireless Body Area Network.
Proceedings of the 2024 12th International Conference on Communications and Broadband Networking, 2024
An Efficient Privacy-Preserving Face Authentication Scheme Using Local Sensitive Hashing.
Proceedings of the 2024 12th International Conference on Communications and Broadband Networking, 2024
2023
Construction of Two Kinds of Optimal Wide-Gap Frequency-Hopping Sequence Sets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023
An efficient and privacy-preserving query scheme in intelligent transportation systems.
Inf. Sci., November, 2023
LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks.
Peer Peer Netw. Appl., September, 2023
A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing.
J. Syst. Archit., September, 2023
Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023
A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.
Sensors, February, 2023
Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
J. Ambient Intell. Humaniz. Comput., 2023
An Effective WGAN-Based Anomaly Detection Model for IoT Multivariate Time Series.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
A Privacy-Preserving Federated Learning Framework Based on Homomorphic Encryption.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
A Blockchain-Based Conditional Anonymous Authentication Scheme.
Proceedings of the 2023 5th International Conference on Blockchain Technology, 2023
M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC.
IAIC (1), 2023
2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022
A Hierarchical Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
Sensors, 2022
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning.
J. Cloud Comput., 2022
Temporal Attention Splitting Network for Non-invasive Blood Glucose, Cuff-Less Blood Pressure Estimation.
Proceedings of the IEEE Smartworld, 2022
Covid-19 Diagnosis via Voice Using Online Sequential Extreme Learning Machine.
Proceedings of the International Joint Conference on Neural Networks, 2022
Automatic Evaluation System of Aerobics based on Action Recognition Algorithm.
Proceedings of the 4th International Conference on Software Engineering and Development, 2022
A Blockchain-Based Decentralized Privacy-Preserving Mobile Payment Scheme Using Anonymous Credentials.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Hybrid Decision Based Multi-Agent Deep Reinforcement learning for Task Offloading in Collaborative Edge-Cloud Computing.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021
A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications.
J. Organ. End User Comput., 2021
An Efficient Lightweight Anonymous Authentication Scheme for V2G Using Physical Unclonable Function.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
BACPPA: An Effective Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021
2020
Efficient Hierarchical Authentication Protocol for Multiserver Architecture.
Secur. Commun. Networks, 2020
Efficient and privacy-preserving authentication scheme for wireless body area networks.
J. Inf. Secur. Appl., 2020
Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs.
IET Inf. Secur., 2020
A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem.
Comput. Commun., 2020
The Soft Sets and Fuzzy Sets-Based Neural Networks and Application.
IEEE Access, 2020
Image Retrieval Method of Bayonet Vehicle Based on the Improvement of Deep Learning Network.
Proceedings of the AIPR 2020: 3rd International Conference on Artificial Intelligence and Pattern Recognition, 2020
2019
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks.
Secur. Commun. Networks, 2019
An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings.
J. Inf. Sci. Eng., 2019
Anonymous authentication scheme for smart home environment with provable security.
Comput. Secur., 2019
τ-Safe (l,k)-Diversity Privacy Model for Sequential Publication With High Utility.
IEEE Access, 2019
A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019
A Vulnerability Detection Model for Java Systems Based on Complex Networks.
Proceedings of the 2019 IEEE SmartWorld, 2019
2018
A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2018
2017
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.
Sensors, 2017
An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2017
Criminisi-Based Sparse Representation for Image Inpainting.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017
2014
The Research of Matching Area Selection Criterion for Gravity Gradient Aided Navigation.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014
2013
A dual band-notched UWB antenna with hook-shaped slots and folded stubs.
IEICE Electron. Express, 2013