2025
ESDI: An efficient and secure data integrity verification scheme for indoor navigation.
Future Gener. Comput. Syst., 2025
ATSDetector: An Android Trojan spyware detection approach with multi-features.
Comput. Secur., 2025
2024
SEA: Secure and Efficient Public Auditing for Edge-Assisted IoT Aggregated Data Sharing.
Mob. Networks Appl., October, 2024
Provable secure authentication key agreement for wireless body area networks.
Frontiers Comput. Sci., October, 2024
STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles.
IEEE Trans. Veh. Technol., April, 2024
ARdetector: android ransomware detection framework.
J. Supercomput., April, 2024
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme.
Frontiers Comput. Sci., April, 2024
Probabilistic Model-Based Reinforcement Learning Unmanned Surface Vehicles Using Local Update Sparse Spectrum Approximation.
IEEE Trans. Ind. Informatics, February, 2024
Quantum Routing for Emerging Quantum Networks.
IEEE Netw., January, 2024
Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids.
IEEE Internet Things J., January, 2024
A precise method of identifying Android application family.
Expert Syst. J. Knowl. Eng., January, 2024
Adaptive Denoising-Enhanced LiDAR Odometry for Degeneration Resilience in Diverse Terrains.
IEEE Trans. Instrum. Meas., 2024
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network.
IEEE Trans. Dependable Secur. Comput., 2024
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024
Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections.
IEEE Open J. Comput. Soc., 2024
PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain.
IEEE Internet Things J., 2024
A fair multi-attribute data transaction mechanism supporting cross-chain.
Internet Things, 2024
A secure double spectrum auction scheme.
Digit. Commun. Networks, 2024
An Integrated Burst-Mode 2R Receiver Employing Fast Residual Offset Canceller for XGS-PON in 40-nm CMOS.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE Custom Integrated Circuits Conference, 2024
2023
OWL: A data sharing scheme with controllable anonymity and integrity for group users.
Comput. Commun., September, 2023
Entanglement of Signal Paths via Noisy Superconducting Quantum Devices.
Entropy, January, 2023
Dense Normal Based Degeneration-Aware 2-D Lidar Odometry for Correlative Scan Matching.
IEEE Trans. Instrum. Meas., 2023
HoloParser: Holistic Visual Parsing for Real-Time Semantic Segmentation in Autonomous Driving.
IEEE Trans. Instrum. Meas., 2023
A Deep Learning Framework for Predicting Protein Functions With Co-Occurrence of GO Terms.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
Ambient-Aware LiDAR Odometry in Variable Terrains.
CoRR, 2023
Towards Carbon-Free Electricity: A Comprehensive Flow-Based Framework for Power Grid Carbon Accounting and Decarbonization.
CoRR, 2023
Carbon-Aware Optimal Power Flow.
CoRR, 2023
Boosting External-Reference Image Quality Assessment by Content-Constrain Loss and Attention-based Adaptive Feature Fusion.
Proceedings of the International Joint Conference on Neural Networks, 2023
Semantic and Gradient Guided Scene Text Image Super-Resolution.
Proceedings of the Image and Graphics - 12th International Conference, 2023
Robust Content-Variant Reference Image Quality Assessment Via Similar Patch Matching.
Proceedings of the IEEE International Conference on Acoustics, 2023
Signal Processing And Quantum State Tomography on Noisy Devices.
Proceedings of the IEEE International Conference on Acoustics, 2023
Error-Mitigated Quantum Routing on Noisy Devices.
Proceedings of the IEEE Global Communications Conference, 2023
2022
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection.
IEEE Trans. Netw. Serv. Manag., December, 2022
Attention Gate Based Dual-Pathway Network for Vertebra Segmentation of X-Ray Spine Images.
IEEE J. Biomed. Health Informatics, 2022
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2022
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions.
IEEE Trans. Dependable Secur. Comput., 2022
A Secure Access Control Framework for Cloud Management.
Mob. Networks Appl., 2022
A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network.
Mob. Networks Appl., 2022
Hash-balanced binary tree-based public auditing in vehicular edge computing and networks.
Int. J. Commun. Syst., 2022
DeepDISOBind: accurate prediction of RNA-, DNA- and protein-binding intrinsically disordered residues with deep multi-task learning.
Briefings Bioinform., 2022
Dynamic Self-Maintenance Obstacle Costmap Based on Instance Segmentation and Memory Storage Mechanism.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022
Road Defect Detection Based on Semantic Transformed Disparity Image Segmentation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022
A 10/2.5-Gb/s Hyper-Supplied CMOS Low-Noise Burst-Mode TIA with Loud Burst Protection and Gearbox Automatic Offset Cancellation for XGS-PON.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proceedings of the IEEE Custom Integrated Circuits Conference, 2022
Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022
2021
NeuCheck: A more practical Ethereum smart contract security analysis tool.
Softw. Pract. Exp., 2021
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
Secur. Commun. Networks, 2021
A secure spectrum auction scheme without the trusted party based on the smart contract.
Digit. Commun. Networks, 2021
An efficient combined deep neural network based malware detection framework in 5G environment.
Comput. Networks, 2021
2020
Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme.
J. Supercomput., 2020
Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images.
Remote. Sens., 2020
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity.
Int. J. Inf. Sec., 2020
Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT.
Future Gener. Comput. Syst., 2020
Opcode sequence analysis of Android malware by a convolutional neural network.
Concurr. Comput. Pract. Exp., 2020
A secure and scalable data integrity auditing scheme based on hyperledger fabric.
Comput. Secur., 2020
Generation of Tunable Microwave Frequency Comb Utilizing a Semiconductor Laser Subject to Optical Injection from an SFP Module Modulated by an Arbitrary Periodic Signal.
Complex., 2020
PROBselect: accurate prediction of protein-binding residues from proteins sequences via dynamic predictor selection.
Bioinform., 2020
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues.
IEEE Access, 2020
Incremental Network Configuration Verification.
Proceedings of the HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, 2020
SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020
A Survey on the Application of SGX in Blockchain Area.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020
2019
Privacy-Preserving Distributed Data Fusion Based on Attribute Protection.
IEEE Trans. Ind. Informatics, 2019
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019
Improving efficiency of remote data audit for cloud storage.
KSII Trans. Internet Inf. Syst., 2019
2018
Demand-Response-Based Distributed Preventive Control to Improve Short-Term Voltage Stability.
IEEE Trans. Smart Grid, 2018
Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity.
CoRR, 2018
IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
CoRR, 2018
A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems.
Appl. Soft Comput., 2018
A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol.
Proceedings of the 2018 IEEE SmartWorld, 2018
2017
Real-Time Energy Management in Microgrids.
IEEE Trans. Smart Grid, 2017
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
Soft Comput., 2017
A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Pers. Ubiquitous Comput., 2017
Decentralized and Distributed Temperature Control via HVAC Systems in Energy Efficient Buildings.
CoRR, 2017
A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model.
IEEE Access, 2017
Community-level Geothermal Heat Pump system management via an aggregation-disaggregation framework.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017
Physics-integrated hierarchical/distributed HVAC optimization for multiple buildings with robustness against time delays.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017
An integrated design of optimization and physical dynamics for energy efficient buildings: A passivity approach.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017
Distributed temperature control via Geothermal Heat Pump systems in energy efficient buildings.
Proceedings of the 2017 American Control Conference, 2017
2016
Entry and exit of service providers under cost uncertainty: a real options approach.
J. Oper. Res. Soc., 2016
A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress).
Proceedings of the Provable Security, 2016
Improving AGC performance of a coal-fueled generators with MW-level BESS.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016
A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-Matching.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Decentralized temperature control via HVAC systems in energy efficient buildings: An approximate solution procedure.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016
2015
Distributed Optimal Energy Management in Microgrids.
IEEE Trans. Smart Grid, 2015
Theor. Comput. Sci., 2015
On the security of a certificateless online/offline signcryption for Internet of Things.
Peer-to-Peer Netw. Appl., 2015
A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems.
J. Medical Syst., 2015
Integration of IEC 61850 into a Vehicle-to-Grid system with networked electric vehicles.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015
Performance optimization of the echo state network for time series prediction and spoken digit recognition.
Proceedings of the 11th International Conference on Natural Computation, 2015
2014
Product Remanufacturing: A Real Options Approach.
IEEE Trans. Engineering Management, 2014
Optimal Residential Demand Response in Distribution Networks.
IEEE J. Sel. Areas Commun., 2014
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
Int. J. Inf. Commun. Technol., 2014
A provable secure sealed-bid multi-attribute auction scheme under semi-honest model.
Int. J. Commun. Syst., 2014
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing.
Frontiers Comput. Sci., 2014
A distributed optimal energy management strategy for microgrids.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Evaluating microgrid management and control with an implementable energy management system.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014
Chaos characteristics analysis of transient signals for phase-locked synthesizer based FHC system.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
A single-station location method based on long baseline interferometer.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
Optimal power allocation for heterogeneous data traffic in NAF relay-assisted uplink transmission.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
2013
A Study of Product Weight and Collection Rate in Closed-Loop Supply Chains With Recycling.
IEEE Trans. Engineering Management, 2013
A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy.
Secur. Commun. Networks, 2013
On the security of an authentication scheme for multi-server architecture.
Int. J. Electron. Secur. Digit. Forensics, 2013
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Int. J. Distributed Sens. Networks, 2013
2011
An Energy-Efficient k-connected Scheme for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011
Real-time vehicle-to-grid control algorithm under price uncertainty.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
MDS-Based Localization Algorithm for RFID Systems.
Proceedings of IEEE International Conference on Communications, 2011
2010
An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext.
J. Digit. Content Technol. its Appl., 2010
A Two-Phase Algorithm for Locating Sensors in Irregular Areas.
Proceedings of the Global Communications Conference, 2010
Efficient Password-Proven Key Exchange Protocol against Relay Attack on Ad Hoc Networks.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010
2008
Policy Negotiation System Architecture for Privacy Protection.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Energy-Efficient Location-Independent <i>k</i> -connected Scheme in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008
A Provable Secure Authentication Protocol Given Forward Secure Session Key.
Proceedings of the Progress in WWW Research and Development, 2008
An Efficient Electronic Marketplace Bidding Auction Protocol with Bid Privacy.
Proceedings of the Progress in WWW Research and Development, 2008
2006
Efficient Nonce-Based Authentication Scheme Using Token-Update.
Proceedings of the Computational Science and Its Applications, 2006
2005
Short wavelength infrared images for indigenous coke-making sites monitoring in China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005