Guishan Dong

Orcid: 0009-0008-3599-0952

According to our database1, Guishan Dong authored at least 22 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
iPMRSS: An Improved privacy-preserving medical record searching scheme for intelligent diagnosis in IoMT.
Expert Syst. Appl., 2024

2023
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems.
Sensors, October, 2023

A Dynamic Access Control Method Based on User Behavior Trust Evaluation in Edge Cloud Environment.
Proceedings of the 3rd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum, 2023

2022
Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

2021
A projection and contraction method for circular cone programming support vector machines.
Int. J. Mach. Learn. Cybern., 2021

Access Control Scheme Supporting Attribute Revocation in Cloud Computing.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Generating Audio Adversarial Examples with Ensemble Substituted Models.
Proceedings of the ICC 2021, 2021

Application and Challenges of Blockchain in Heterogeneous Identity Trust.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
A novel second-order cone programming support vector machine model for binary data classification.
J. Intell. Fuzzy Syst., 2020

Searchable encryption scheme with limited search scope for group users.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Unified Trust Service Scheme for Heterogeneous Identity Alliance.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
区块链应用中的隐私保护策略研究 (Research on Privacy Protection Strategies in Blockchain Application).
计算机科学, 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019

Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

An Open Identity Authentication Scheme Based on Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Trust Enhancement Scheme for Cross Domain Authentication of PKI System.
Proceedings of the 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2019

Anonymous cross-domain authentication scheme for medical PKI system.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
基于区块链的身份管理认证研究 (Research on Identity Management Authentication Based on Blockchain).
计算机科学, 2018

GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid.
IEEE Access, 2018

A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

2007
A MLS Cooperation System Based on Virtual Machine Monitor.
Proceedings of the 2007 International Conference on Security & Management, 2007


  Loading...