2025
Blockchain-based cross-domain query integrity verification mechanism for outsourced database.
Comput. Stand. Interfaces, 2025
2024
Distributed Medical Data Storage Mechanism Based on Proof of Retrievability and Vector Commitment for Metaverse Services.
IEEE J. Biomed. Health Informatics, November, 2024
A Multitask Dynamic Graph Attention Autoencoder for Imbalanced Multilabel Time Series Classification.
IEEE Trans. Neural Networks Learn. Syst., September, 2024
Spatio-Temporal Big Data Collaborative Storage Mechanism Based on Incremental Aggregation Subvector Commitment in On-Chain and Off-Chain Systems.
ISPRS Int. J. Geo Inf., August, 2024
HCNCT: A Cross-chain Interaction Scheme for the Blockchain-based Metaverse.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024
Deep Learning-Enhanced Internet of Things for Activity Recognition in Post-Stroke Rehabilitation.
IEEE J. Biomed. Health Informatics, July, 2024
Virtual human pose estimation in a fire education system for children with autism spectrum disorders.
Multim. Syst., April, 2024
ACRS-Raft: A Raft Consensus Protocol for Adaptive Data Maintenance in the Metaverse Based on Cauchy Reed-Solomon Codes.
IEEE Trans. Consumer Electron., February, 2024
SHT-based public auditing protocol with error tolerance in FDL-empowered IoVs.
Digit. Commun. Networks, 2024
2023
BTDSI: A blockchain-based trusted data storage mechanism for Industry 5.0.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
S-BDS: An Effective Blockchain-based Data Storage Scheme in Zero-Trust IoT.
ACM Trans. Internet Techn., August, 2023
Continuous trajectory similarity search with result diversification.
Future Gener. Comput. Syst., June, 2023
Access control mechanism for the Internet of Things based on blockchain and inner product encryption.
J. Inf. Secur. Appl., May, 2023
Blockchain Data Availability Scheme with Strong Data Privacy Protection.
Inf., February, 2023
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems.
Future Gener. Comput. Syst., 2023
BSMD: A blockchain-based secure storage mechanism for big spatio-temporal data.
Future Gener. Comput. Syst., 2023
Multimodal Spatiotemporal Feature Map for Dynamic Gesture Recognition.
Comput. Syst. Sci. Eng., 2023
Distributed Timestamp Mechanism Based on Verifiable Delay Functions.
Comput. Syst. Sci. Eng., 2023
Block Verification Mechanism Based on Zero-Knowledge Proof in Blockchain.
Comput. Syst. Sci. Eng., 2023
NVAS: A non-interactive verifiable federated learning aggregation scheme for COVID-19 based on game theory.
Comput. Commun., 2023
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Novel Vote Scheme for Decision-Making Feedback Based on Blockchain in Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
Verifiable Delay Function and Its Blockchain-Related Application: A Survey.
Sensors, 2022
Nonnegative matrix factorization-based privacy-preserving collaborative filtering on cloud computing.
Trans. Emerg. Telecommun. Technol., 2022
Data security storage mechanism based on blockchain industrial Internet of Things.
Comput. Ind. Eng., 2022
2021
Integrity Verification Mechanism of Sensor Data Based on Bilinear Map Accumulator.
ACM Trans. Internet Techn., 2021
Privacy-Preserving Smart Road-Pricing System with Trustworthiness Evaluation in VANETs.
Sensors, 2021
Threshold Key Management Scheme for Blockchain-Based Intelligent Transportation Systems.
Secur. Commun. Networks, 2021
Blockchain-based trust establishment mechanism in the internet of multimedia things.
Multim. Tools Appl., 2021
An Integrated Artificial Neural Network-based Precipitation Revision Model.
KSII Trans. Internet Inf. Syst., 2021
Lightning location method based on improved fuzzy C-means clustering algorithm.
Int. J. Sens. Networks, 2021
Multiple cloud storage mechanism based on blockchain in smart homes.
Future Gener. Comput. Syst., 2021
Front-end Control Mechanism of Electronic Records.
Comput. Syst. Sci. Eng., 2021
Key Exposure Resistant Group Key Agreement Protocol.
Proceedings of the Provable and Practical Security, 2021
A Provable Data Possession Protocol in Cloud Storage Systems with Fault Tolerance.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Secure and Intelligent Energy Data Management Scheme for Smart IoT Devices.
Wirel. Commun. Mob. Comput., 2020
Data Query Mechanism Based on Hash Computing Power of Blockchain in Internet of Things.
Sensors, 2020
Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde.
Int. J. Embed. Syst., 2020
Multi-source Meteorological Observation Data Quality Control Algorithm Based on Data Mining.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
2019
Data Storage Mechanism Based on Blockchain with Privacy Protection in Wireless Body Area Network.
Sensors, 2019
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
J. Inf. Secur. Appl., 2019
Local outlier detection based on information entropy weighting.
Int. J. Sens. Networks, 2019
A new method of text information hiding based on open channel.
Int. J. High Perform. Comput. Netw., 2019
An efficient method for meteorological nephogram recognition in cloud environment.
EURASIP J. Wirel. Commun. Netw., 2019
A hierarchical clustering based method to evaluate reuse of rare earth tailings under cloud computing environment.
Clust. Comput., 2019
A Nephogram Recognition Algorithm Based on Cloud Computing Platform.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
NMF-Based Privacy-Preserving Collaborative Filtering on Cloud Computing.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
2018
A Novel Security Scheme Based on Instant Encrypted Transmission for Internet of Things.
Secur. Commun. Networks, 2018
Implicit authentication protocol and self-healing key management for WBANs.
Multim. Tools Appl., 2018
Incentive Mechanism of Data Storage Based on Blockchain for Wireless Sensor Networks.
Mob. Inf. Syst., 2018
Digital Continuity Guarantee of Electronic Record Based on Data Usability in Big Data Environment.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Preservation Mechanism of Electronic Record Based on Erasure Code and Multi Copies in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Digital Continuity Guarantee Based on Data Consistency in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Consistency Guarantee Method of Electronic Record Based on Blockchain in Cloud Storage.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2016
Efficient data integrity auditing for storage security in mobile health cloud.
Peer-to-Peer Netw. Appl., 2016
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles.
Comput. J., 2016
A RFID Based Localization Algorithm for Wireless Sensor Networks.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
一种基于区域划分的DTN路由算法 (DTN Routing Algorithm Based on Region Segmentation).
计算机科学, 2015
Reliable access control for multi-authority in cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015
Outsourced data tagging via authority and delegable auditing for cloud storage.
Proceedings of the International Carnahan Conference on Security Technology, 2015
Privacy-preserving proof of storage in large group.
Proceedings of the International Carnahan Conference on Security Technology, 2015
Data protection based on multifunction digital watermark in wireless sensor network.
Proceedings of the International Carnahan Conference on Security Technology, 2015
A Mobile-Sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
A Novel Hash-Based RFID Grouping Authentication Protocol on Tag Groups and Multiple Readers.
Proceedings of the Intelligent Systems and Applications, 2014
A Comparative Survey on RFID Grouping Authentication Protocols.
Proceedings of the Intelligent Systems and Applications, 2014
Attributed Based Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Oriented Group Provable Data Possession in Public Cloud.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Leakage Resilient Provable Data Possession in Public Cloud Storage.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
2013
Fuzzy conditional proxy re-encryption.
Sci. China Inf. Sci., 2013
Efficient Key Management Scheme for SCADA System.
Proceedings of the Advanced Technologies, Embedded and Multimedia for Human-centric Computing, 2013
2010
Decryptable Public Key Encryption with Keyword Search Schemes.
J. Digit. Content Technol. its Appl., 2010
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes.
J. Digit. Content Technol. its Appl., 2010
An efficient unlinkable secret handshake protocol without ROM.
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Improved unidirectional chosen-ciphertext secure proxy re-encryption.
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM.
IACR Cryptol. ePrint Arch., 2008
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Identity-Based Key Issuing Protocol for Ad Hoc Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007