2024
A CP-ABE and IOTA-Based Lightweight Sensitive Data Access Control Scheme for IoT.
IEEE Internet Things J., December, 2024
2023
Design and implementation of trusted boot based on a new trusted computing dual-architecture.
Comput. Secur., April, 2023
Android malware detection based on sensitive features combination.
Concurr. Comput. Pract. Exp., 2023
2021
Security and privacy issues of physical objects in the IoT: Challenges and opportunities.
Digit. Commun. Networks, 2021
A Hybrid Recommender System based on DeepCF and Wide Linear Model for K12 Online Education.
Proceedings of the AICCC 2021: 4th Artificial Intelligence and Cloud Computing Conference, Kyoto, Japan, December 17, 2021
2020
Advances in Position Based Routing Towards ITS Enabled FoG-Oriented VANET-A Survey.
IEEE Trans. Intell. Transp. Syst., 2020
2019
An Attribute Credential Based Public Key Scheme for Fog Computing in Digital Manufacturing.
IEEE Trans. Ind. Informatics, 2019
User stateless privacy-preserving TPA auditing scheme for cloud storage.
J. Netw. Comput. Appl., 2019
Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks.
IEEE Internet Things J., 2019
Cooperative Privacy Preservation for Wearable Devices in Hybrid Computing-Based Smart Health.
IEEE Internet Things J., 2019
Privacy-preserving TPA Auditing Scheme Based on Skip List for Cloud Storage.
Int. J. Netw. Secur., 2019
An improved clustering algorithm and its application in IoT data analysis.
Comput. Networks, 2019
A semantic-based inference control algorithm for OWL repository privacy protection.
Comput. Networks, 2019
Using Deep Learning in Semantic Classification for Point Cloud Data.
IEEE Access, 2019
A Privacy Aware Architecture for IoT Enabled Systems.
Proceedings of the 2019 IEEE SmartWorld, 2019
Access Control for Physical Objects in Internet of Things.
Proceedings of the 2019 IEEE SmartWorld, 2019
2018
Consistent Data Collection and Assortment in the Progression of Continuous Objects in IoT.
IEEE Access, 2018
GRE: An Adaptive and Personalized Exercise Model for K-12 Online Education.
Proceedings of the 2018 2nd International Conference on Education and E-Learning, 2018
2017
Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things.
IEEE Internet Things J., 2017
Using trust model to ensure reliable data acquisition in VANETs.
Ad Hoc Networks, 2017
An Improved Clustering Algorithm and Its Application in WeChat Sports Users Analysis.
Proceedings of the 2017 International Conference on Identification, 2017
2016
Physical Unclonable Function Based Authentication Protocol for Unit IoT and Ubiquitous IoT.
Proceedings of the International Conference on Identification, 2016
2015
A lightweight attribute-based encryption scheme for the Internet of Things.
Future Gener. Comput. Syst., 2015
Anonymous Credential-Based Access Control Scheme for Clouds.
IEEE Cloud Comput., 2015
RFID System Mutual Authentication Protocols Based on ECC.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
2014
A lightweight access control mechanism for mobile cloud computing.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
A light-weight certificate-less public key cryptography scheme based on ECC.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
A lightweight dynamic multicast authentication scheme.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014
2013
A Task Scheduling Algorithm for Multi-core Processors.
Proceedings of the International Conference on Parallel and Distributed Computing, 2013
2008
A Hexagon-based Key Pre-distribution Scheme for Large Scale Static Wireless Sensor Networks.
J. Commun., 2008
A Secure Routing Scheme Based on Multiple Criteria Decision Making in Wireless Sensor Networks.
Proceedings of the PACIIA 2008, 2008
A Secure Routing Scheme for Static Wireless Sensor Networks.
Proceedings of the PACIIA 2008, 2008
A Secure Routing Scheme Based on Multi-Objective Optimization in Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008