Ben Niu

Orcid: 0000-0003-2898-7495

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
  • Xidian University, Xi'an, China (PhD 2014)
  • Pennsylvania State University, State College, PA, USA (2011 - 2013)


According to our database1, Ben Niu authored at least 87 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024

CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024

UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024

A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network.
IEEE Trans. Netw. Serv. Manag., April, 2024

CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024

Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
CoRR, 2024

Bypassing DARCY Defense: Indistinguishable Universal Adversarial Triggers.
CoRR, 2024

ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024

Interpreting Memorization in Deep Learning from Data Distribution.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023

Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
IEEE Trans. Dependable Secur. Comput., 2023

LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023

Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Framework for Personalized Location Privacy.
IEEE Trans. Mob. Comput., 2022

Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022

PrivacyEye: A Privacy-Preserving and Computationally Efficient Deep Learning-Based Mobile Video Analytics System.
IEEE Trans. Mob. Comput., 2022

EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022

DP-Opt: Identify High Differential Privacy Violation by Optimization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing.
Proceedings of the IEEE Smartworld, 2022

A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
Proceedings of the IEEE INFOCOM 2022, 2022

Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection.
Proceedings of the IEEE International Conference on Communications, 2022

2021
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing.
IEEE Trans. Netw. Sci. Eng., 2021

Provenance-based data flow control mechanism for Internet of things.
Trans. Emerg. Telecommun. Technol., 2021

Weighted distributed differential privacy ERM: Convex and non-convex.
Comput. Secur., 2021

AdaPDP: Adaptive Personalized Differential Privacy.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.
Wirel. Commun. Mob. Comput., 2020

Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs.
IEEE Wirel. Commun., 2020

Privbus: A privacy-enhanced crowdsourced bus service via fog computing.
J. Parallel Distributed Comput., 2020

Exploiting location-related behaviors without the GPS data on smartphones.
Inf. Sci., 2020

Input Perturbation: A New Paradigm between Central and Local Differential Privacy.
CoRR, 2020

A personalized range-sensitive privacy-preserving scheme in LBSs.
Concurr. Comput. Pract. Exp., 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting.
Proceedings of the Security and Privacy in Communication Networks, 2020

Towards compression-resistant privacy-preserving photo sharing on social networks.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

A Framework to Preserve User Privacy for Machine Learning as a Service.
Proceedings of the IEEE Global Communications Conference, 2020

Membership Inference Attacks against MemGuard : IEEE CNS 20 Poster.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019

Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

HideMe: Privacy-Preserving Photo Sharing on Social Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
Privacy-Preserving Partner Selection for Ride-Sharing Services.
IEEE Trans. Veh. Technol., 2018

HAC: Hybrid Access Control for Online Social Networks.
Secur. Commun. Networks, 2018

Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptol. ePrint Arch., 2018

Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Server-aided private set intersection based on reputation.
Inf. Sci., 2017

Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017

Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Privacy Preservation Strategy in Time-Sensitive LBSs.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Int. J. Technol. Hum. Interact., 2016

Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

Hunting abnormal configurations for permission-sensitive role mining.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Achieving lightweight, time-specific and secure access control in cloud storage.
Proceedings of the 2016 International Conference on Computing, 2016

Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016

Achieving secure and accurate friend discovery based on friend-of-friend's recommendations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
A novel attack to spatial cloaking schemes in location-based services.
Future Gener. Comput. Syst., 2015

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wirel. Pers. Commun., 2014

Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Privacy-area aware dummy generation algorithms for Location-Based Services.
Proceedings of the IEEE International Conference on Communications, 2014

2013
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Secur. Commun. Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2012

2011
Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...