Ben Niu
Orcid: 0000-0003-2898-7495Affiliations:
- Chinese Academy of Sciences, Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China
- Xidian University, Xi'an, China (PhD 2014)
- Pennsylvania State University, State College, PA, USA (2011 - 2013)
According to our database1,
Ben Niu
authored at least 87 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024
IEEE Trans. Netw. Serv. Manag., April, 2024
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024
CoRR, 2024
CoRR, 2024
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
IEEE Trans. Dependable Secur. Comput., 2023
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023
Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023
2022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022
PrivacyEye: A Privacy-Preserving and Computationally Efficient Deep Learning-Based Mobile Video Analytics System.
IEEE Trans. Mob. Comput., 2022
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing.
Proceedings of the IEEE Smartworld, 2022
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
Proceedings of the IEEE INFOCOM 2022, 2022
Crafting Text Adversarial Examples to Attack the Deep-Learning-based Malicious URL Detection.
Proceedings of the IEEE International Conference on Communications, 2022
2021
QoE-Aware 3D Video Streaming via Deep Reinforcement Learning in Software Defined Networking Enabled Mobile Edge Computing.
IEEE Trans. Netw. Sci. Eng., 2021
Trans. Emerg. Telecommun. Technol., 2021
Comput. Secur., 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
2020
Achieving Privacy-Preserving Group Recommendation with Local Differential Privacy and Random Transmission.
Wirel. Commun. Mob. Comput., 2020
IEEE Wirel. Commun., 2020
J. Parallel Distributed Comput., 2020
Inf. Sci., 2020
CoRR, 2020
Concurr. Comput. Pract. Exp., 2020
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Proceedings of the Security and Privacy in Communication Networks, 2020
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
2018
IEEE Trans. Veh. Technol., 2018
IACR Cryptol. ePrint Arch., 2018
Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Inf. Sci., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Int. J. Technol. Hum. Interact., 2016
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016
Achieving secure and accurate friend discovery based on friend-of-friend's recommendations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Future Gener. Comput. Syst., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2014
Wirel. Pers. Commun., 2014
CoRR, 2014
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Secur. Commun. Networks, 2012
A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012
Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2012
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011