Cheng Guo
Orcid: 0000-0001-7489-7381Affiliations:
- Dalian University of Technology, School of Software Technology, China
According to our database1,
Cheng Guo
authored at least 90 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SVCA: Secure and Verifiable Chained Aggregation for Privacy-Preserving Federated Learning.
IEEE Internet Things J., May, 2024
Expert Syst. Appl., March, 2024
A game-theory-based scheme to facilitate consensus latency minimization in sharding blockchain.
Inf. Sci., February, 2024
Eng. Appl. Artif. Intell., January, 2024
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2024
Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.
IEEE Trans. Dependable Secur. Comput., 2024
An incentive compatible ZD strategy-based data sharing model for federated learning: A perspective of iterated prisoner's dilemma.
Eur. J. Oper. Res., 2024
A secure and lightweight cloud data deduplication scheme with efficient access control and key management.
Comput. Commun., 2024
2023
A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems.
IEEE Internet Things J., September, 2023
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems.
J. Inf. Secur. Appl., May, 2023
Two-party interactive secure deduplication with efficient data ownership management in cloud storage.
J. Inf. Secur. Appl., March, 2023
2022
IEEE Trans. Cloud Comput., 2022
EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.
IEEE Syst. J., 2022
A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022
A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems.
IEEE Internet Things J., 2022
2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Comput. Soc. Syst., 2021
A game-theoretic approach for the location of terror response facilities with both disruption risk and hidden information.
Int. Trans. Oper. Res., 2021
A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.
Comput. Networks, 2021
Privacy-Preserving Range Query for High-Dimensional Uncertain Data in a Two-Party Scenario.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption.
IEEE Trans. Serv. Comput., 2020
A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration.
Mob. Networks Appl., 2020
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity.
J. Netw. Comput. Appl., 2020
Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.
IEEE Internet Things J., 2020
Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization.
IEEE Internet Things J., 2020
Lightweight privacy preserving data aggregation with batch verification for smart grid.
Future Gener. Comput. Syst., 2020
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images.
Comput. Secur., 2020
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.
Appl. Math. Comput., 2020
IEEE Access, 2020
2019
A new construction of compressed sensing matrices for signal processing via vector spaces over finite fields.
Multim. Tools Appl., 2019
RIMNet: Recommendation Incentive Mechanism based on evolutionary game dynamics in peer-to-peer service networks.
Knowl. Based Syst., 2019
Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
IET Inf. Secur., 2019
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.
Future Gener. Comput. Syst., 2019
IEEE Access, 2019
An Intelligent Information Hiding Scheme Based on Histogram Translation in Frequency Domain.
Proceedings of the 14th IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Recent Trends and Advances in Wireless and IoT-enabled Networks, 2019
2018
Reputation-based multi-auditing algorithmic mechanism for reliable mobile crowdsensing.
Pervasive Mob. Comput., 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
J. Parallel Distributed Comput., 2018
A Secure and Efficient Mutual Authentication and Key Agreement Protocol with Smart Cards for Wireless Communications.
Int. J. Netw. Secur., 2018
Future Gener. Comput. Syst., 2018
Efficient method to verify the integrity of data with supporting dynamic data in cloud computing.
Sci. China Inf. Sci., 2018
Dynamic Data Integrity Auditing Method Supporting Privacy Protection in Vehicular Cloud Environment.
IEEE Access, 2018
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping.
IEEE Access, 2018
An Efficient Distributed Approach on High Dimensional Data Similarity Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Multim. Tools Appl., 2017
Newly deterministic construction of compressed sensing matrices via singular linear spaces over finite fields.
J. Comb. Optim., 2017
Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network.
KSII Trans. Internet Inf. Syst., 2017
Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Systems, 2017
Proceedings of the 14th International Symposium on Pervasive Systems, 2017
2016
Secur. Commun. Networks, 2016
A multi-threshold secret image sharing scheme based on the generalized Chinese reminder theorem.
Multim. Tools Appl., 2016
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016
An Efficient Protocol With Bidirectional Verification for Storage Security in Cloud Computing.
IEEE Access, 2016
Proceedings of the 2016 International Conference on Computing, 2016
A Novel Reputation Management Mechanism with Forgiveness in P2P File Sharing Networks.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
2015
Secur. Commun. Networks, 2015
A Novel Threshold Conference-Key Agreement Protocol Based on Generalized Chinese Remainder Theorem.
Int. J. Netw. Secur., 2015
LPSSE: Lightweight Phrase Search with Symmetric Searchable Encryption in Cloud Storage.
Proceedings of the 12th International Conference on Information Technology, 2015
RIMBED: Recommendation Incentive Mechanism Based on Evolutionary Dynamics in P2P Networks.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
2014
Multim. Tools Appl., 2014
Int. J. Netw. Secur., 2014
An authenticated group key distribution protocol based on the generalized Chinese remainder theorem.
Int. J. Commun. Syst., 2014
2013
Chaotic Maps-Based Mutual Authentication and Key Agreement using Smart Cards for Wireless Communications.
J. Inf. Hiding Multim. Signal Process., 2013
J. Inf. Hiding Multim. Signal Process., 2013
Int. J. Commun. Syst., 2013
Traceable, group-oriented, signature scheme with multiple signing policies in group-based trust management.
IET Inf. Secur., 2013
Commun. Nonlinear Sci. Numer. Simul., 2013
2012
Secur. Commun. Networks, 2012
Pattern Recognit. Lett., 2012
2011
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction.
J. Multim., 2011
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007