2025
Contrastive Graph Semantic Learning via prototype for recommendation.
Inf. Sci., 2025
LGAT: A novel model for multivariate time series anomaly detection with improved anomaly transformer and learning graph structures.
Neurocomputing, 2025
2024
DPG: a model to build feature subspace against adversarial patch attack.
Mach. Learn., July, 2024
An improved multi-scale and knowledge distillation method for efficient pedestrian detection in dense scenes.
J. Real Time Image Process., July, 2024
A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks in Smart Grid.
IEEE Internet Things J., May, 2024
Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation.
IEEE Trans. Consumer Electron., February, 2024
Enhancing the transferability of adversarial samples with random noise techniques.
Comput. Secur., January, 2024
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024
DCENet: a tiny object detection network for aerial images based on deformable cross-attention and enhanced classifier.
J. Electronic Imaging, 2024
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
Comput. J., 2024
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024
PDTNet: An Image-Based Model for PV Panel Defect Detection.
Proceedings of the Data Science, 2024
MST: A Comprehensive Approach for Short-Term Power Load Forecasting Based on Data Decomposition, Local and Global Modeling.
Proceedings of the Data Science, 2024
Anomaly Segmentation in Foggy Weather for Autonomous Driving with Adaptive Learnable Filters.
Proceedings of the Data Science, 2024
AMNeuzz: A Strongly Directed Fuzz Testing Method Based on Attention Mechanism.
Proceedings of the 2024 10th International Conference on Computing and Data Engineering, 2024
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024
2023
DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., April, 2023
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving.
Peer Peer Netw. Appl., January, 2023
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023
Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2023
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
IEEE Trans. Cloud Comput., 2023
Long-term Incentive Mechanism for Federated Learning: A Dynamic Repeated Game Approach.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
An Improved Traffic Forecasting Model based on Efficient Spatiotemporal Graph Convolutional Network.
Proceedings of the 12th International Conference on Informatics, 2023
A Scheme for Robust Federated Learning with Privacy-preserving Based on Krum AGR.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
An Approach for Attack Scenario Construction Based on Dynamic Attack Path Graph.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
2022
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids.
Wirel. Pers. Commun., 2022
FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid.
IEEE Internet Things J., 2022
Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices.
IEEE Internet Things J., 2022
MLPNeuzz: A Novel Neural Program Smoothing Method Based on Multi-Layer Perceptron.
Proceedings of the ICCDE 2022: The 8th International Conference on Computing and Data Engineering, Bangkok, Thailand, January 11, 2022
Attribute-Based Collaborative Access Control Scheme with Constant Ciphertext Length for Smart Grid.
Proceedings of the IEEE International Conference on Communications, 2022
2021
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol., 2021
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021
Traffic sign detection algorithm based on feature expression enhancement.
Multim. Tools Appl., 2021
Text Content Tag Recommendation Algorithm Based on Knowledge Map Fusion Reasoning.
Proceedings of the ICCIR 2021: International Conference on Control and Intelligent Robotics, 2021
2020
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.
Secur. Commun. Networks, 2020
Toward efficient and effective bullying detection in online social network.
Peer-to-Peer Netw. Appl., 2020
Cloud-assisted secure and conjunctive publish/subscribe service in smart grids.
IET Inf. Secur., 2020
An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020
Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection.
IEEE Access, 2020
An Adversarial Attack with Fusion of Polarization for Unmanned Scenes.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2019
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems.
IEEE Trans. Veh. Technol., 2019
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer-to-Peer Netw. Appl., 2019
Energy Theft Detection With Energy Privacy Preservation in the Smart Grid.
IEEE Internet Things J., 2019
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019
A new VRSA-based pairing-free certificateless signature scheme for fog computing.
Concurr. Comput. Pract. Exp., 2019
Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019
Achieve Revocable Access Control for Fog-Based Smart Grid System.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Adversarial attack against scene recognition system for unmanned vehicles.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
Symmetry, 2018
Efficient steganographer detection over social networks with sampling reconstruction.
Peer-to-Peer Netw. Appl., 2018
Unsupervised steganalysis over social networks based on multi-reference sub-image sets.
Multim. Tools Appl., 2018
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018
2017
A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2017
A privacy-aware data dissemination scheme for smart grid with abnormal data traceability.
Comput. Networks, 2017
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles.
IEEE Trans. Inf. Forensics Secur., 2016
CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Secur. Commun. Networks, 2016
PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks, 2016
Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks.
IEEE Internet Things J., 2016
PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS.
IEEE Trans. Comput. Soc. Syst., 2015
EAPA: An efficient authentication protocol against pollution attack for smart grid.
Peer-to-Peer Netw. Appl., 2015
Achieving efficient and privacy-preserving multi-feature search for mobile sensing.
Comput. Commun., 2015
Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
A Novel Deduplication-Based Covert Channel in Cloud Storage Service.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
2014
Querying over Encrypted Data in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014
EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market.
KSII Trans. Internet Inf. Syst., 2014
Achieving ranked range query in smart grid auction market.
Proceedings of the IEEE International Conference on Communications, 2014
Secure dynamic searchable symmetric encryption with constant document update cost.
Proceedings of the IEEE Global Communications Conference, 2014
2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013
SSE: A Secure Searchable Encryption Scheme for Urban Sensing and Querying.
Int. J. Distributed Sens. Networks, 2013
ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2010
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks.
Wirel. Sens. Netw., 2010
Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010
Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
When is a key establishment protocol correct?
Secur. Commun. Networks, 2009
Towards Provable Security for Data Transmission Protocols in Sensor Network.
J. Inf. Sci. Eng., 2009
A key management protocol with robust continuity for sensor networks.
Comput. Stand. Interfaces, 2009
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN.
Proceedings of the Advances in Information Security and Assurance, 2009
2007
Protocol Engineering Principles for Cryptographic Protocols Design.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
A Secure Time Synchronization Protocol for Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
2006
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006