2024
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks.
IEEE Trans. Inf. Forensics Secur., 2024
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024
2023
Enhanced covertness class discriminative universal adversarial perturbations.
Neural Networks, August, 2023
Publishing locally private high-dimensional synthetic data efficiently.
Inf. Sci., July, 2023
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain.
IEEE Internet Things J., July, 2023
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds.
IEEE Trans. Cloud Comput., 2023
2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing.
IEEE Trans. Serv. Comput., 2022
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022
KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys.
IEEE Internet Things J., 2022
Generating natural adversarial examples with universal perturbations for text classification.
Neurocomputing, 2022
Forward privacy multikeyword ranked search over encrypted database.
Int. J. Intell. Syst., 2022
A rORAM scheme with logarithmic bandwidth and logarithmic locality.
Int. J. Intell. Syst., 2022
KRTunnel: DNS channel detector for mobile devices.
Comput. Secur., 2022
Secure and Differentiated Fog-Assisted Data Access for Internet of Things.
Comput. J., 2022
2021
PPFilter: Provider Privacy-Aware Encrypted Filtering System.
IEEE Trans. Serv. Comput., 2021
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data.
Secur. Commun. Networks, 2021
2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems".
IEEE Trans. Inf. Forensics Secur., 2020
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020
Adaptively secure broadcast encryption with authenticated content distributors.
Multim. Tools Appl., 2020
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020
Practical Attribute-Based Conjunctive Keyword Search Scheme.
Comput. J., 2020
2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019
Authenticated public key broadcast encryption with short ciphertexts.
Multim. Tools Appl., 2019
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search.
IACR Cryptol. ePrint Arch., 2019
An efficient blind filter: Location privacy protection and the access control in FinTech.
Future Gener. Comput. Syst., 2019
Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures.
Comput. J., 2019
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption.
IEEE Access, 2019
2018
An Anonymous Authentication Protocol Based on Cloud for Telemedical Systems.
Wirel. Commun. Mob. Comput., 2018
Attribute-based fuzzy identity access control in multicloud computing environments.
Soft Comput., 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners.
J. Syst. Softw., 2018
Webshell Traffic Detection With Character-Level Features Based on Deep Learning.
IEEE Access, 2018
An Anti-Quantum Transaction Authentication Approach in Blockchain.
IEEE Access, 2018
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method.
IEEE Access, 2018
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow.
IEEE Access, 2018
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion.
Proceedings of the Information Security Practice and Experience, 2018
2017
Succinct multi-authority attribute-based access control for circuits with authenticated outsourcing.
Soft Comput., 2017
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System.
J. Comput. Sci. Technol., 2017
Identity Based Proxy Re-encryption Scheme under LWE.
KSII Trans. Internet Inf. Syst., 2017
2016
A Three-Factor Based Remote User Authentication Scheme: Strengthening Systematic Security and Personal Privacy for Wireless Communications.
Wirel. Pers. Commun., 2016
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2016
Adaptively Secure Broadcast Encryption With Constant Ciphertexts.
IEEE Trans. Broadcast., 2016
Transparent Discovery of Hidden Service.
IEICE Trans. Inf. Syst., 2016
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption.
Sci. China Inf. Sci., 2016
2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015
2014
Cryptanalysis of a sessional blind signature based on quantum cryptography.
Quantum Inf. Process., 2014
Cryptanalysis of enhancement on "quantum blind signature based on two-state vector formalism".
Quantum Inf. Process., 2014
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
A Fuzzy Identity-Based Signcryption Scheme from Lattices.
KSII Trans. Internet Inf. Syst., 2014
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks.
Comput. Math. Methods Medicine, 2014
2013
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013
2012
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network.
Comput. Commun., 2012
An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2012
2009
A constant rounds group key agreement protocol without using hash functions.
Int. J. Netw. Manag., 2009
2008
Efficient Verifier-Based Password-Authentication Key Exchange Protocol via Elliptic Curves.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008