2025
A blockchain-oriented covert communication technology with controlled security level based on addressing confusion ciphertext.
,
,
,
,
,
,
,
,
,
,
Frontiers Comput. Sci., February, 2025
LGTDA: Bandwidth exhaustion attack on Ethereum via dust transactions.
Future Gener. Comput. Syst., 2025
Pheromone-based graph embedding algorithm for Ethereum phishing detection.
Comput. Networks, 2025
2024
Wind power prediction method based on cloud computing and data privacy protection.
J. Cloud Comput., December, 2024
Recognizing BGP Communities Based on Graph Neural Network.
IEEE Netw., November, 2024
BlockSC: A Blockchain Empowered Spatial Crowdsourcing Service in Metaverse While Preserving User Location Privacy.
IEEE J. Sel. Areas Commun., April, 2024
A Novel Smart Contract Reentrancy Vulnerability Detection Model based on BiGAS.
J. Signal Process. Syst., March, 2024
Security analysis of a reversible data hiding scheme in encrypted images by redundant space transfer.
J. King Saud Univ. Comput. Inf. Sci., January, 2024
ICRB: An improved consensus-based redactable blockchain considering contextual consistency.
Trans. Emerg. Telecommun. Technol., January, 2024
Research on Covert Communication Technology Based on Matrix Decomposition of Digital Currency Transaction Amount.
,
,
,
,
,
,
,
,
,
,
KSII Trans. Internet Inf. Syst., 2024
A hybrid framework for effective and efficient machine unlearning.
CoRR, 2024
Data tampering detection and recovery scheme based on multi-branch target extraction for internet of vehicles.
Comput. Networks, 2024
Ada-FFL: Adaptive computing fairness federated learning.
CAAI Trans. Intell. Technol., 2024
2023
Prediction of venting gas explosion overpressure based on a combination of explosive theory and machine learning.
Expert Syst. Appl., December, 2023
A covert channel over blockchain based on label tree without long waiting times.
Comput. Networks, August, 2023
Detecting Smart Contract Project Anomalies in Metaverse.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023
Improving Precision of Detecting Deserialization Vulnerabilities with Bytecode Analysis.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
Smart Contract Firewall: Protecting the on-Chain Smart Contract Projects.
Proceedings of the IEEE Global Communications Conference, 2023
C2MDNIF: A Cross Chain based Method for Domain Name Information Fusion.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023
Privacy-Preserving Federated Learning through Clustered Sampling on Fine-Tuning Distributed non-iid Large Language Models.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
An Efficient Detection Model for Smart Contract Reentrancy Vulnerabilities.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
Smart Contract Vulnerability Detection Model Based on Siamese Network.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
2021
Honeypot Identification in Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Secure Data Sharing Framework via Hierarchical Greedy Embedding in Darknets.
Mob. Networks Appl., 2021
IoT root union: A decentralized name resolving system for IoT based on blockchain.
Inf. Process. Manag., 2021
Smart healthcare-oriented online prediction of lower-limb kinematics and kinetics based on data-driven neural signal decoding.
Future Gener. Comput. Syst., 2021
2020
A Reputation Management Scheme for Efficient Malicious Vehicle Identification over 5G Networks.
IEEE Wirel. Commun., 2020
Nei-TTE: Intelligent Traffic Time Estimation Based on Fine-Grained Time Derivation of Road Segments for Smart City.
IEEE Trans. Ind. Informatics, 2020
User and Entity Behavior Analysis under Urban Big Data.
Trans. Data Sci., 2020
A Light-weighted Data Collection Method for DNS Simulation on the Cyber Range.
KSII Trans. Internet Inf. Syst., 2020
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
IEEE Internet Things J., 2020
A Survey on Access Control in the Age of Internet of Things.
IEEE Internet Things J., 2020
Wearable-sensors Based Activity Recognition for Smart Human Healthcare Using Internet of Things.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
LGMal: A Joint Framework Based on Local and Global Features for Malware Detection.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
A defense scheme of voice control system against DolphinAttack.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Evaluating Reputation Management Schemes of Internet of Vehicles Based on Evolutionary Game Theory.
IEEE Trans. Veh. Technol., 2019
Real-Time Lateral Movement Detection Based on Evidence Reasoning Network for Edge Computing Environment.
IEEE Trans. Ind. Informatics, 2019
Erratum: Wang, Y. et al., A Privacy Preserving Scheme for Nearest Neighbor Query. <i>Sensors</i> 2018, <i>18</i>, 2440.
Sensors, 2019
Block-DEF: A secure digital evidence framework using blockchain.
Inf. Sci., 2019
Towards Privacy-Preserving Location Sharing over Mobile Online Social Networks.
IEICE Trans. Inf. Syst., 2019
A data-driven method for future Internet route decision modeling.
Future Gener. Comput. Syst., 2019
Automated Attack and Defense Framework for 5G Security on Physical and Logical Layers.
CoRR, 2019
Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019
Lightweight Anonymous Geometric Routing for Internet of Things.
IEEE Access, 2019
Broken Bike Recycling Planning for Sharing Bikes System.
IEEE Access, 2019
Preserving Location Privacy in Mobile Edge Computing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Automatically Traceback RDP-Based Targeted Ransomware Attacks.
Wirel. Commun. Mob. Comput., 2018
A Privacy Preserving Scheme for Nearest Neighbor Query.
Sensors, 2018
A feature extraction method for predictive maintenance with time-lagged correlation-based curve-registration model.
Int. J. Netw. Manag., 2018
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus.
IEEE Access, 2018
Enhancing Location Privacy for Geolocation Service Through Perturbation.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Insider Threat Detection Using Characterizing User Behavior.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Predicting the Popularity of Online Content Based on the Weak Ties Theory.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
A Location Privacy-Aware Method for kNN Query in Location Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
A Proactive Service Model Facilitating Stream Data Fusion and Correlation.
Int. J. Web Serv. Res., 2017
Service Hyperlink: Modeling and Reusing Partial Process Knowledge by Mining Event Dependencies among Sensor Data Services.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
A Service-Based Approach to Situational Correlation and Analyses of Stream Sensor Data.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
An Approach to Modeling and Discovering Event Correlation for Service Collaboration.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017
Curve-Registration-Based Feature Extraction for Predictive Maintenance of Industrial Equipment.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017
A Proactive Data Service Model to Encapsulating Stream Sensor Data into Service.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
Extracting Log Patterns Based on Association Analysis for Power Quality Disturbance Detection.
Proceedings of the 14th Web Information Systems and Applications Conference, 2017
2016
Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense.
IEICE Trans. Inf. Syst., 2016
Towards Route Dynamics in AS-Level Path Prediction.
IEICE Trans. Commun., 2016
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Shrinking the Sentiment Analysis for Signed Network Construction.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
A Lightweight Model for Stream Sensor Data Service.
Proceedings of the Advances in Services Computing, 2016
2015
Towards real-time route leak events detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Online Detection of Concurrent Prefix Hijacks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Quantifying AS-level routing policy changes.
Proceedings of the IEEE International Conference on Communications, 2014
Contention-based adaptive position update for intermittently connected VANETs.
Proceedings of the IEEE Global Communications Conference, 2014
2011
A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement.
IEEE J. Sel. Areas Commun., 2011