2024
AdaDpFed: A Differentially Private Federated Learning Algorithm With Adaptive Noise on Non-IID Data.
IEEE Trans. Consumer Electron., February, 2024
KeyLight: Intelligent Traffic Signal Control Method Based on Improved Graph Neural Network.
IEEE Trans. Consumer Electron., February, 2024
BTIDEC: A Novel Detection Scheme for CPU Security of Consumer Electronics.
IEEE Trans. Consumer Electron., February, 2024
Ins Finder: A Practical CPU Undocumented Instruction Detection Framework.
J. Circuits Syst. Comput., February, 2024
2023
DRMT: A Decentralized IoT Device Recognition and Management Technology in Smart Cities.
J. Circuits Syst. Comput., July, 2023
DroidHook: a novel API-hook based Android malware dynamic analysis sandbox.
Autom. Softw. Eng., June, 2023
Web-based practical privacy-preserving distributed image storage for financial services in cloud computing.
World Wide Web (WWW), May, 2023
Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023
Hedera: A Permissionless and Scalable Hybrid Blockchain Consensus Algorithm in Multiaccess Edge Computing for IoT.
IEEE Internet Things J., 2023
Potentially Unwanted App Detection for Blockchain-Based Android App Marketplace.
IEEE Internet Things J., 2023
BcIIS: Blockchain-Based Intelligent Identification Scheme of Massive IoT Devices.
Proceedings of the IEEE Global Communications Conference, 2023
2022
PMRSS: Privacy-Preserving Medical Record Searching Scheme for Intelligent Diagnosis in IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022
An Effective Reconstruction Method of the APT Attack Based on Hidden Markov Model.
J. Circuits Syst. Comput., 2022
2021
High-Performance Isolation Computing Technology for Smart IoT Healthcare in Cloud Environments.
IEEE Internet Things J., 2021
SDMP: A secure detector for epidemic disease file based on DNN.
Inf. Fusion, 2021
Effective malware detection scheme based on classified behavior graph in IIoT.
Ad Hoc Networks, 2021
IIS: Intelligent Identification Scheme of Massive IoT Devices.
Proceedings of the IEEE 45th Annual Computers, Software, and Applications Conference, 2021
2020
Minimizing Response Time of IoT-Based Traffic Information System through Decentralized Server System.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
2019
Smart e-commerce integration with recommender systems.
Electron. Mark., 2019
A Novel Approach to Detect Malware Variants Based on Classified Behaviors.
IEEE Access, 2019
2018
Editorial: Intelligent Industrial IoT Integration with Cognitive Computing.
Mob. Networks Appl., 2018
A Secure Encryption-Based Malware Detection System.
KSII Trans. Internet Inf. Syst., 2018
2016
Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach.
IEEE Trans. Veh. Technol., 2016
A Multilayer Perceptron Based Smart Pathological Brain Detection System by Fractional Fourier Entropy.
J. Medical Syst., 2016
Fractal Dimension Estimation for Developing Pathological Brain Detection System Based on Minkowski-Bouligand Method.
IEEE Access, 2016
A completely fair secret sharing scheme without dealer.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016
2015
Resource Allocation for Multicell Device-to-Device Communications in Cellular Network: A Game Theoretic Approach.
EAI Endorsed Trans. Serious Games, 2015
A general two-party bi-input private function evaluation protocol.
Secur. Commun. Networks, 2015
GALLERY: A Game-Theoretic Resource Allocation Scheme for Multicell Device-to-Device Communications Underlaying Cellular Networks.
IEEE Internet Things J., 2015
A Distributed Game-Theoretic Power Control Mechanism for Device-to-Device Communications Underlaying Cellular Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
A source-location privacy protection strategy via pseudo normal distribution-based phantom routing in WSNs.
Proceedings of the 30th Annual ACM Symposium on Applied Computing, 2015
Multiple Service Providers with IP Flow Mobility: From an Economic Perspective.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Game theoretic resource allocation for multicell D2D communications with incomplete information.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
A New Economic Model in Cloud Computing: Cloud Service Provider vs. Network Service Provider.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks.
Comput. Math. Methods Medicine, 2014
FAMOUS: a novel fast multi-constrained multicast routing algorithm.
Proceedings of the 2014 Conference on Research in Adaptive and Convergent Systems, 2014
Modeling and analysis on congestion control in the Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2014
2012
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
2010
A Secure Protocol for Point-Segment Position Problem.
Proceedings of the Web Information Systems and Mining - International Conference, 2010