2025
A robust unified spoofing audio detection scheme.
Comput. Electr. Eng., 2025
2024
Telemedicine data secure sharing scheme based on heterogeneous federated learning.
Cybersecur., December, 2024
A metaheuristic image cryptosystem using improved parallel model and many-objective optimization.
IET Image Process., September, 2024
A framework for efficient cross-chain token transfers in blockchain networks.
J. King Saud Univ. Comput. Inf. Sci., February, 2024
General Pairwise Modification Framework for Reversible Data Hiding in JPEG Images.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
Double Landmines: Invisible Textual Backdoor Attacks based on Dual-Trigger.
CoRR, 2024
EVeCA: Efficient and Verifiable On-Chain Data Query Framework Using Challenge-Based Authentication.
CoRR, 2024
An attribute-encryption-based cross-chain model in urban internet of vehicles.
Comput. Electr. Eng., 2024
Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM.
IEEE Access, 2024
2023
A data sharing method for remote medical system based on federated distillation learning and consortium blockchain.
Connect. Sci., December, 2023
A zero trust and blockchain-based defense model for smart electric vehicle chargers.
J. Netw. Comput. Appl., April, 2023
2022
A brain-inspired multibranch parallel interactive vision mechanism for advanced driver assistance systems.
Int. J. Sens. Networks, 2022
An overview of brain-like computing: Architecture, applications, and future trends.
Frontiers Neurorobotics, 2022
A novel zero-watermarking scheme based on NSCT-SVD and blockchain for video copyright.
EURASIP J. Wirel. Commun. Netw., 2022
An overview on cross-chain: Mechanism, platforms, challenges and advances.
Comput. Networks, 2022
A Novel Security Scheme for Mobile Healthcare in Digital Twin.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
FedTD: Efficiently Share Telemedicine Data with Federated Distillation Learning.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
2021
BSVMS: Novel Autonomous Trustworthy Scheme for Video Monitoring.
Wirel. Commun. Mob. Comput., 2021
BFLP: An Adaptive Federated Learning Framework for Internet of Vehicles.
Mob. Inf. Syst., 2021
2017
Accountable CP-ABE with Public Verifiability: How to Effectively Protect the Outsourced Data in Cloud.
Int. J. Found. Comput. Sci., 2017
New strategy for searching disturbance vector of SHA-1 collision attack.
Sci. China Inf. Sci., 2017
2016
SHA-1充分条件自动化求解算法 (New Algorithm for Automatic Deriving Sufficient Conditions of SHA-1).
计算机科学, 2016
Construction of Extended Multivariate Public Key Cryptosystems.
Int. J. Netw. Secur., 2016
Accountable Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Public Verifiability and Nonrepudiation.
Proceedings of the Provable Security, 2016
2015
Ticket-Based Authentication for Fast Handover in Wireless Mesh Networks.
Wirel. Pers. Commun., 2015
基于身份的跨信任域签密方案 (Identity-based Signcryption Cross Autonomous Domains).
计算机科学, 2015
缩减轮数Crypton算法中间相遇攻击的改进 (Improved Meet-in-the-middle Attack on Reduced-round Crypton Cipher).
计算机科学, 2015
A Novel ID-based Multi-domain Handover Protocol for Mesh Points in WMNs.
KSII Trans. Internet Inf. Syst., 2015
Trace self-orthogonal relations of normal bases.
Finite Fields Their Appl., 2015
Information diffusion network inferring and pathway tracking.
Sci. China Inf. Sci., 2015
Survey on cyberspace security.
Sci. China Inf. Sci., 2015
Classification of disturbance vectors for collision attack in SHA-1.
Sci. China Inf. Sci., 2015
2014
Symbolic Execution of Network Software Based on Unit Testing.
Proceedings of the 9th IEEE International Conference on Networking, 2014
2013
The Improved Cube Attack on Grain-v1.
IACR Cryptol. ePrint Arch., 2013
SECloud: Binary Analyzing Using Symbolic Execution in the Cloud.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2013
2011
Efficient Certificateless Signcryption Scheme from Weil Pairing.
J. Networks, 2011
2010
Provable secure identity based generalized signcryption scheme.
Theor. Comput. Sci., 2010
Certificateless generalized signcryption.
IACR Cryptol. ePrint Arch., 2010
2009
Research on Trust Evaluation Model Based on TPM.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
Word Oriented Cascade Jump sigma-LFSR.
Proceedings of the Applied Algebra, 2009
2008
New construction of Boolean functions with maximun algebraic immunity.
IACR Cryptol. ePrint Arch., 2008
Reducible Polynomial over F<sub>2</sub> Constructed by Trinomial sigma-LFSR.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
High Efficiency Feedback Shift Register: sigma-LFSR.
IACR Cryptol. ePrint Arch., 2007
Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method.
Finite Fields Their Appl., 2007
Primitive normal polynomials with multiple coefficients prescribed: An asymptotic result.
Finite Fields Their Appl., 2007
A trinomial type of σ-LFSR oriented toward software implementation.
Sci. China Ser. F Inf. Sci., 2007
2006
Nonexistence of a Kind of Generalized Perfect Binary Array.
Proceedings of the Sequences and Their Applications, 2006
2005
A New Scheme for Key Management in Ad Hoc Networks.
Proceedings of the Networking, 2005
2004
Primitive polynomial with three coefficients prescribed.
Finite Fields Their Appl., 2004
Character sums over Galois rings and primitive polynomials over finite fields.
Finite Fields Their Appl., 2004
Primitive Polynomials over Finite Fields of Characteristic Two.
Appl. Algebra Eng. Commun. Comput., 2004
2003
Random properties of the highest level sequences of primitive sequences over Z(2<sup>e</sup>).
IEEE Trans. Inf. Theory, 2003