Bidi Ying

Orcid: 0000-0002-4961-6952

According to our database1, Bidi Ying authored at least 39 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Collaborative and Verifiable VNF Management for Metaverse With Efficient Modular Designs.
IEEE J. Sel. Areas Commun., March, 2024

Data Protection: Privacy-Preserving Data Collection With Validation.
IEEE Trans. Dependable Secur. Comput., 2024

2022
Authenticated and Prunable Dictionary for Blockchain-Based VNF Management.
IEEE Trans. Wirel. Commun., 2022

Blockchain-Based Data Sharing With Key Update for Future Networks.
IEEE J. Sel. Areas Commun., 2022

Blockchain-Assisted Transparent Cross-Domain Authorization and Authentication for Smart City.
IEEE Internet Things J., 2022

Secure and Flexible Data Sharing for Distributed Storage with Efficient Key Management.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks.
IEEE Open J. Comput. Soc., 2021

Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation.
IEEE Netw., 2021

VG-Raft: An Improved Byzantine Fault Tolerant Algorithm Based on Raft Algorithm.
Proceedings of the 21st International Conference on Communication Technology, 2021

Proof of Freezing Time Algorithm Based on IOTA with Hierarchical Structure.
Proceedings of the 21st International Conference on Communication Technology, 2021

2019
A Distributed Social-Aware Location Protection Method in Untrusted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2019

Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography.
J. Netw. Comput. Appl., 2019

Fair and Social-Aware Message Forwarding Method in Opportunistic Social Networks.
IEEE Commun. Lett., 2019

A Secure Blockchain-based Prescription Drug Supply in Health-care Systems.
Proceedings of the International Conference on Smart Applications, 2019

Authentication Protocol for Real-Time Wearable Medical Sensor Networks Using Biometrics and Continuous Monitoring.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Privacy Protection for E-Health Systems using Three-Factor User Authentication.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Location Privacy Protection Method Based on a Proxy in Un-Trusted Mobile Social Networks.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
A Power-Efficient and Social-Aware Relay Selection Method for Multi-Hop D2D Communications.
IEEE Commun. Lett., 2018

Protecting location privacy in opportunistic mobile social networks.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social Networks.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Anonymous and Lightweight Authentication for Secure Vehicular Networks.
IEEE Trans. Veh. Technol., 2017

FMSLPP: fake-message based sink location privacy preservation for WSNs against global eavesdroppers.
Int. J. Parallel Emergent Distributed Syst., 2017

Social Location privacy Protection method in vehicular social networks.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

Location privacy-protection based on p-destination in mobile social networks: A game theory analysis.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
Motivation for Protecting Selfish Vehicles' Location Privacy in Vehicular Networks.
IEEE Trans. Veh. Technol., 2015

Protecting location privacy in vehicular networks against location-based attacks.
Int. J. Parallel Emergent Distributed Syst., 2015

Sink Privacy Protection with Minimum Network Traffic in WSNs.
Ad Hoc Sens. Wirel. Networks, 2015

Pseudonym Changes scheme based on Candidate-location-list in vehicular networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Reputation-based Pseudonym Change for Location Privacy in vehicular networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Anti-traffic analysis attack for location privacy in WSNs.
EURASIP J. Wirel. Commun. Netw., 2014

Efficient Authentication Protocol for Secure Vehicular Communications.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Protecting Location Privacy with Clustering Anonymization in vehicular networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

2013
Privacy preserving broadcast message authentication protocol for VANETs.
J. Netw. Comput. Appl., 2013

Dynamic Mix-Zone for Location Privacy in Vehicular Networks.
IEEE Commun. Lett., 2013

2011
SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSN.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor Networks.
Proceedings of the Secure and Trust Computing, Data Management and Applications, 2011

A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

2010
Pre-broadcast based time efficient privacy protocol for secure vehicular communications.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

2006
Energy-Based Key Management Scheme in Wireless Sensor Networks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006


  Loading...