Entao Luo
Orcid: 0000-0002-7147-5893
According to our database1,
Entao Luo
authored at least 45 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Outage performance and energy efficiency optimization of wireless-powered millimeter-wave sensor networks.
EURASIP J. Wirel. Commun. Netw., December, 2024
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing.
IEEE Trans. Intell. Transp. Syst., July, 2024
IEEE Trans Autom. Sci. Eng., July, 2024
IEEE Internet Things J., January, 2024
Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing.
J. Netw. Comput. Appl., 2024
Comput. Methods Programs Biomed., 2024
CRT-Paillier Homomorphic Privacy Protection Scheme Based on BLS Signatures in Mobile Vehicular Networks.
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
Proceedings of the 2024 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2024
2023
J. Syst. Archit., November, 2023
Future Gener. Comput. Syst., August, 2023
IEEE Trans. Veh. Technol., June, 2023
Neural Comput. Appl., March, 2023
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse.
J. Syst. Archit., 2023
Concurr. Comput. Pract. Exp., 2023
2022
Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT.
IEEE Trans. Ind. Informatics, 2022
2021
Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning.
Mob. Inf. Syst., 2021
J. Parallel Distributed Comput., 2021
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks.
Inf. Sci., 2021
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the IEEE Intl Conf on Dependable, 2021
2020
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things.
Secur. Commun. Networks, 2020
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020
Hidden the true identity and dating characteristics based on quick private matching in mobile social networks.
Future Gener. Comput. Syst., 2020
EURASIP J. Wirel. Commun. Netw., 2020
2019
SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application.
J. Netw. Comput. Appl., 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
A Decentralized and Anonymous Data Transaction Scheme Based on Blockchain and Zero-Knowledge Proof in Vehicle Networking (Workshop Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems.
IEEE Commun. Mag., 2018
Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting.
Ad Hoc Networks, 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Gener. Comput. Syst., 2017
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Secure Beamforming Design with Bidirectional Secondary Transmissions in Wireless-Powered Cognitive Radio Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
2016
位置信息记录中基于期望最大化的名称消重算法 (Expectation Maximization Based Name Deduplicating Algorithm in Spatial Records).
计算机科学, 2016
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Commun. Lett., 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016
2015
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015