Guojun Wang

Orcid: 0000-0001-9875-4182

Affiliations:
  • Guangzhou University, School of Computer Science and Technology, China
  • Hong Kong Polytechnic University (former)
  • Central South University, Changsha, China (PhD 2002)


According to our database1, Guojun Wang authored at least 507 papers between 2001 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model.
Int. J. Inf. Sec., February, 2025

EAOS: Exposing attacks in smart contracts through analyzing opcode sequences with operands.
Comput. Networks, 2025

2024
A smart contract vulnerability detection method based on deep learning with opcode sequences.
Peer Peer Netw. Appl., September, 2024

MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain.
IEEE Trans. Knowl. Data Eng., July, 2024

Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing.
IEEE Trans. Intell. Transp. Syst., July, 2024

FSAIR: Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing.
IEEE Internet Things J., July, 2024

Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning.
IEEE Trans. Mob. Comput., June, 2024

Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing.
IEEE Trans. Mob. Comput., May, 2024

veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases.
IEEE Trans. Knowl. Data Eng., May, 2024

Redactable Blockchain-Based Secure and Accountable Data Management.
IEEE Trans. Netw. Serv. Manag., April, 2024

A Qualitative Study of App Acquisition and Management.
IEEE Trans. Comput. Soc. Syst., April, 2024

GFL-ALDPA: a gradient compression federated learning framework based on adaptive local differential privacy budget allocation.
Multim. Tools Appl., March, 2024

Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing.
IEEE Internet Things J., January, 2024

Hardware-Assisted Live Kernel Function Updating on Intel Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient task offloading with swarm intelligence evolution for edge-cloud collaboration in vehicular edge computing.
Softw. Pract. Exp., 2024

CLFLDP: Communication-efficient layer clipping federated learning with local differential privacy.
J. Syst. Archit., 2024

Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing.
J. Netw. Comput. Appl., 2024

Forward-porting and its limitations in fuzzer evaluation.
Inf. Sci., 2024

Detecting unknown vulnerabilities in smart contracts using opcode sequences.
Connect. Sci., 2024

TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication.
Comput. Commun., 2024

Detecting abnormal behaviors in smart contracts using opcode sequences.
Comput. Commun., 2024

Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model.
Comput. Electr. Eng., 2024

A Vulnerability Detection Method for Smart Contract Using Opcode Sequences with Variable Length.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing.
J. Syst. Archit., November, 2023

Prediction of Parkinson's disease based on artificial neural networks using speech datasets.
J. Ambient Intell. Humaniz. Comput., October, 2023

A decentralized trust management mechanism for crowdfunding.
Inf. Sci., August, 2023

ALPS: Achieving accuracy-aware location privacy service via assisted regions.
Future Gener. Comput. Syst., August, 2023

Analysis of multimodal data fusion from an information theory perspective.
Inf. Sci., April, 2023

Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications.
IEEE Trans. Ind. Informatics, 2023

SlimBox: Lightweight Packet Inspection over Encrypted Traffic.
IEEE Trans. Dependable Secur. Comput., 2023

Membership inference attack on differentially private block coordinate descent.
PeerJ Comput. Sci., 2023

A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse.
J. Syst. Archit., 2023

Dual-Task Network Embeddings for Influence Prediction in Social Internet of Things.
IEEE Internet Things J., 2023

A blockchain-based mobile crowdsensing scheme with enhanced privacy.
Concurr. Comput. Pract. Exp., 2023

A new federated learning-based wireless communication and client scheduling solution for combating COVID-19.
Comput. Commun., 2023

Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and U<sup>EN</sup>-PDNet.
IEEE Access, 2023

A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory.
IEEE Access, 2023

FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model.
Proceedings of the Ubiquitous Security, 2023

Privacy Preserving Elder Fall Detection Using Deep Learning.
Proceedings of the Ubiquitous Security, 2023

Bilateral Personalized Information Fusion in Mobile Crowdsensing.
Proceedings of the Ubiquitous Security, 2023

Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution Network.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

FL-HSDP: Client-Side Defense for Federated Learning via Hessian Optimization and Shuffled Differential Privacy.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

2022
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data.
IEEE Trans. Serv. Comput., 2022

Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search.
IEEE Trans. Serv. Comput., 2022

Incremental Group-Level Popularity Prediction in Online Social Networks.
ACM Trans. Internet Techn., 2022

cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking.
J. Supercomput., 2022

A closed-loop healthcare processing approach based on deep reinforcement learning.
Multim. Tools Appl., 2022

Cognitive population initialization for swarm intelligence and evolutionary computing.
J. Ambient Intell. Humaniz. Comput., 2022

Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating.
IEEE Internet Things J., 2022

AI bot to detect fake COVID-19 vaccine certificate.
IET Inf. Secur., 2022

Research on Ni<sub>3</sub>Sn<sub>4</sub> intermetallic compound for 5μm diameter Cu/Ni/Sn-3.0Ag micro bumps.
IEICE Electron. Express, 2022

Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications.
Future Gener. Comput. Syst., 2022

Re-ranking with multiple objective optimization in recommender system.
Trans. Emerg. Telecommun. Technol., 2022

Personalised context-aware re-ranking in recommender system.
Connect. Sci., 2022

On authenticated skyline query processing over road networks.
Concurr. Comput. Pract. Exp., 2022

A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks.
Ad Hoc Networks, 2022

A Malware Detection Approach Using Autoencoder in Deep Learning.
IEEE Access, 2022

Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Personalized Privacy-Preserving Information Fusion in Mobile Crowdsensing.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Improving the Efficiency of Customer's Credit Rating with Machine Learning in Big Data Cloud Computing.
Wirel. Pers. Commun., 2021

Exploring Weather Data to Predict Activity Attendance in Event-based Social Network: From the Organizer's View.
ACM Trans. Web, 2021

Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios.
ACM Trans. Web, 2021

Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing.
IEEE Trans. Netw. Serv. Manag., 2021

Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services.
IEEE Trans. Netw. Sci. Eng., 2021

Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect Level.
ACM Trans. Knowl. Discov. Data, 2021

A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services.
IEEE Trans. Emerg. Top. Comput., 2021

A Coprocessor-Based Introspection Framework Via Intel Management Engine.
IEEE Trans. Dependable Secur. Comput., 2021

In-network generalized trustworthy data collection for event detection in cyber-physical systems.
PeerJ Comput. Sci., 2021

SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems.
J. Syst. Archit., 2021

Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks.
Inf. Sci., 2021

Maximizing positive influence in competitive social networks: A trust-based solution.
Inf. Sci., 2021

Mobile edge-enabled trust evaluation for the Internet of Things.
Inf. Fusion, 2021

A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities.
Neurocomputing, 2021

OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city.
Future Gener. Comput. Syst., 2021

On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications.
Comput. Stand. Interfaces, 2021

Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system.
Concurr. Comput. Pract. Exp., 2021

Efficient personalized search over encrypted data for mobile edge-assisted cloud storage.
Comput. Commun., 2021

Reliable and Controllable Data Sharing Based on Blockchain.
Proceedings of the Ubiquitous Security - First International Conference, 2021

Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS).
Proceedings of the Ubiquitous Security - First International Conference, 2021

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
Resource Management in a Peer to Peer Cloud Network for IoT.
Wirel. Pers. Commun., 2020

Optimal Execution Strategy for Large Orders in Big Data: Order Type using Q-learning Considerations.
Wirel. Pers. Commun., 2020

SDN based communications privacy-preserving architecture for VANETs using fog computing.
Veh. Commun., 2020

Personalized Review Recommendation based on Users' Aspect Sentiment.
ACM Trans. Internet Techn., 2020

Guest Editorial: Trustworthiness in Industrial Internet of Things Systems and Applications.
IEEE Trans. Ind. Informatics, 2020

Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.
IEEE Trans. Engineering Management, 2020

Event Detection Through Differential Pattern Mining in Cyber-Physical Systems.
IEEE Trans. Big Data, 2020

A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks.
Sci. Program., 2020

Fast curvelet transform through genetic algorithm for multimodal medical image fusion.
Soft Comput., 2020

A deep inference learning framework for healthcare.
Pattern Recognit. Lett., 2020

Edge-based differential privacy computing for sensor-cloud systems.
J. Parallel Distributed Comput., 2020

Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones.
J. Netw. Comput. Appl., 2020

Smart world systems, applications, and technologies.
J. Netw. Comput. Appl., 2020

Optimization of communication in VANETs using fuzzy logic and artificial Bee colony.
J. Intell. Fuzzy Syst., 2020

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.
Inf. Sci., 2020

Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications.
Inf. Sci., 2020

Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things.
IEEE Internet Things J., 2020

Toward Wi-Fi Halow Signal Coverage Modeling in Collapsed Structures.
IEEE Internet Things J., 2020

Cloud-based service oriented architecture for social vehicular ad hoc network communications.
Int. J. Commun. Networks Distributed Syst., 2020

Foreword.
IEICE Trans. Inf. Syst., 2020

Semi-Disentangled Representation Learning in Recommendation System.
CoRR, 2020

A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm.
CoRR, 2020

Detecting Straggler MapReduce Tasks in Big Data Processing Infrastructure by Neural Network.
CoRR, 2020

An efficient privacy-enhanced attribute-based access control mechanism.
Concurr. Comput. Pract. Exp., 2020

A multimodal deep architecture for traditional Chinese medicine diagnosis.
Concurr. Comput. Pract. Exp., 2020

An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City.
Comput. Electr. Eng., 2020

RAitc: Securely Auditing the Remotely Executed Applications.
IEEE Access, 2020

Towards Recommendation in Internet of Things: An Uncertainty Perspective.
IEEE Access, 2020

Service Composition and Optimal Selection in Cloud Manufacturing: State-of-the-Art and Research Challenges.
IEEE Access, 2020

Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering.
IEEE Access, 2020

Directional and Explainable Serendipity Recommendation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

A Privacy-Preserving Crowdsensing System with Muti-Blockchain.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Independent Worker Selection In Crowdsourcing.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Function-Centric Risk Assessment Approach for Android Applications.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Integration of 5G, VANETs and Blockchain Technology.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Deep Hierarchical App Recommendation with Dynamic Behaviors.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

The Future Prospects of Adversarial Nets.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Location Based Communication Privacy in Internet of Vehicles Using Fog Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Malware Detection Approach Using Malware Images and Autoencoders.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Intelligent Surveillance in Smart City Using 3D Road Monitoring.
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020

Prediction of Parkinson's Disease using Principal Component Analysis and the Markov Chains.
Proceedings of the 8th IEEE International Conference on Smart City and Informatization, 2020

Welcome Messages from IEEE EUC 2020 General Chairs.
Proceedings of the 18th IEEE International Conference on Embedded and Ubiquitous Computing, 2020

KShot: Live Kernel Patching with SMM and SGX.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System.
Proceedings of the 23rd IEEE International Conference on Computational Science and Engineering, 2020

2019
A survey on security attacks in VANETs: Communication, applications and challenges.
Veh. Commun., 2019

Sustainable and Efficient Data Collection from WSNs to Cloud.
IEEE Trans. Sustain. Comput., 2019

Towards Profit Optimization During Online Participant Selection in Compressive Mobile Crowdsensing.
ACM Trans. Sens. Networks, 2019

A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

An Immunization Framework for Social Networks Through Big Data Based Influence Modeling.
IEEE Trans. Dependable Secur. Comput., 2019

A channel-aware expected energy consumption minimization strategy in wireless networks.
Soft Comput., 2019

Generic attribute revocation systems for attribute-based encryption in cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2019

Intelligent route planning on large road networks with efficiency and privacy.
J. Parallel Distributed Comput., 2019

Influence maximization by leveraging the crowdsensing data in information diffusion network.
J. Netw. Comput. Appl., 2019

Enabling Cooperative Privacy-preserving Personalized search in cloud environments.
Inf. Sci., 2019

Fog-Based Computing and Storage Offloading for Data Synchronization in IoT.
IEEE Internet Things J., 2019

A hybrid filtering-based network document recommendation system in cloud storage.
Int. J. Comput. Sci. Eng., 2019

A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services.
Future Gener. Comput. Syst., 2019

An adaptive and configurable protection framework against android privilege escalation threats.
Future Gener. Comput. Syst., 2019

Economic perspective analysis of protecting big data security and privacy.
Future Gener. Comput. Syst., 2019

Multidimensional privacy preservation in location-based services.
Future Gener. Comput. Syst., 2019

Wi-Fi frequency selection concept for effective coverage in collapsed structures.
Future Gener. Comput. Syst., 2019

A Novel S-Box Design Algorithm Based on a New Compound Chaotic System.
Entropy, 2019

A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking.
Comput. Secur., 2019

A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues.
Ad Hoc Sens. Wirel. Networks, 2019

Efficient Authentication of Multi-Dimensional Top-k Queries.
IEEE Access, 2019

Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library.
IEEE Access, 2019

Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures.
IEEE Access, 2019

A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Early Detection of Parkinson Disease Using Wavelet Transform Along with Fourier Transform.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Trustworthy Data Collection for Cyber Systems: A Taxonomy and Future Directions.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A High Throughput MAC Protocol for Wireless Body Area Networks in Intensive Care.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Superior Prosthetic Member Based on Assistive Technologies.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Libra Critique Towards Global Decentralized Financial System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Semantic Knowledge Based Graph Model in Smart Cities.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference System.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Data Reduction through Decision-Making Based on Event-Sensitivity in IoT-Enabled Event Monitoring.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Nighthawk: Transparent System Introspection from Ring -3.
Proceedings of the Computer Security - ESORICS 2019, 2019

Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Recommender System for Decentralized Cloud Manufacturing.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Towards Secure Network Computing Services for Lightweight Clients Using Blockchain.
Wirel. Commun. Mob. Comput., 2018

Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things.
IEEE Wirel. Commun., 2018

A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing.
IEEE Trans. Emerg. Top. Comput. Intell., 2018

A trajectory privacy-preserving scheme based on query exchange in mobile social networks.
Soft Comput., 2018

A Feasible Fuzzy-Extended Attribute-Based Access Control Technique.
Secur. Commun. Networks, 2018

Conceptual alignment deep neural networks.
J. Intell. Fuzzy Syst., 2018

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
IEEE Internet Things J., 2018

Area coverage estimation model for directional sensor networks.
Int. J. Embed. Syst., 2018

An Anonymous Offline RFID Grouping-Proof Protocol.
Future Internet, 2018

Enhancing privacy through uniform grid and caching in location-based services.
Future Gener. Comput. Syst., 2018

HEPart: A balanced hypergraph partitioning algorithm for big data applications.
Future Gener. Comput. Syst., 2018

Maximizing positive influence spread in online social networks via fluid dynamics.
Future Gener. Comput. Syst., 2018

Acoustic sensor networks in the Internet of Things applications.
Future Gener. Comput. Syst., 2018

Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective.
IEEE Commun. Mag., 2018

Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring.
IEEE Commun. Mag., 2018

PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems.
IEEE Commun. Mag., 2018

PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data.
IEEE Access, 2018

Analyzing Tongue Images Using a Conceptual Alignment Deep Autoencoder.
IEEE Access, 2018

Aggregating Author Profiles from Multiple Publisher Networks to Build a List of Potential Collaborators.
IEEE Access, 2018

Personalized Search with Secure Updates in Educational Resources.
Proceedings of the 2018 IEEE SmartWorld, 2018

Hypergraph Partitioning for Big Data Applications.
Proceedings of the 2018 IEEE SmartWorld, 2018

Low-Dimensional Vectors Learning for Influence Maximization.
Proceedings of the 2018 IEEE SmartWorld, 2018

Multidimensional QoS Resource Scheduling Method with Stakeholder Perspective in Clouds.
Proceedings of the 2018 IEEE SmartWorld, 2018

Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance.
Proceedings of the 2018 IEEE SmartWorld, 2018

Towards Wi-Fi Radar in Collapsed Structures.
Proceedings of the 2018 IEEE SmartWorld, 2018

Power Curtailment in Cloud Environment Utilising Load Balancing Machine Allocation.
Proceedings of the 2018 IEEE SmartWorld, 2018

Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN Networks.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Body Simulator with Delayed Health State Transition.
Proceedings of the 2018 IEEE SmartWorld, 2018

Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph.
Proceedings of the 2018 IEEE SmartWorld, 2018

Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing.
Proceedings of the 2018 IEEE SmartWorld, 2018

Achieving Secure and Effective Search Services in Cloud Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Blockchain-Based Decentralized Data Storage and Access Framework for PingER.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Authentication of Skyline Query over Road Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

SDN-Based Secure VANETs Communication with Fog Computing.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Privacy-Preserving Attribute-Based Access Control Scheme.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

A Survey of Modern Gene Expression Based Techniques for Cancer Detection and Diagnosis.
Proceedings of the Soft Computing Applications, 2018

Portable Non-invasive Device for Measuring Saturated Oxygen of the Blood.
Proceedings of the Soft Computing Applications, 2018

"Smart" Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors.
Proceedings of the Soft Computing Applications, 2018

Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid.
Proceedings of the Smart Grid and Internet of Things - Second EAI International Conference, 2018

Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.
Proceedings of the Information Security Practice and Experience, 2018

Wi-Fi Radar Placement for Coverage in Collapsed Structures.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

A Method for Privacy-Preserving in IoT-SDN Integration Environment.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Blockchain and Big Data to Transform the Healthcare.
Proceedings of the International Conference on Data Processing and Applications, 2018

Internet Performance Prediction Framework Based on PingER Dataset.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Android Malware Detection Using Category-Based Permission Vectors.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Temporal Topic-Based Multi-Dimensional Social Influence Evaluation in Online Social Networks.
Wirel. Pers. Commun., 2017

A Load-Balanced Multicast Routing Algorithm Using Diversity Rate in CWMNs.
Wirel. Pers. Commun., 2017

Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks.
IEEE Trans. Parallel Distributed Syst., 2017

Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks.
IEEE Trans. Ind. Informatics, 2017

Dependable Structural Health Monitoring Using Wireless Sensor Networks.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities.
ACM Trans. Cyber Phys. Syst., 2017

e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems.
ACM Trans. Auton. Adapt. Syst., 2017

Enhanced Location Privacy Preserving Scheme in Location-Based Services.
IEEE Syst. J., 2017

Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges.
IEEE Netw., 2017

Hypergraph partitioning for social networks based on information entropy modularity.
J. Netw. Comput. Appl., 2017

Effective Query Grouping Strategy in Clouds.
J. Comput. Sci. Technol., 2017

Collaborative trajectory privacy preserving scheme in location-based services.
Inf. Sci., 2017

U-Search: usage-based search with collective intelligence.
Int. J. High Perform. Comput. Netw., 2017

An optimal energy-saving real-time task-scheduling algorithm for mobile terminals.
Int. J. Distributed Sens. Networks, 2017

Package balancing k-means algorithm for physical distribution.
Int. J. Comput. Sci. Eng., 2017

A cooperation guarantee mechanism based on altruistic punishment for nodes in distributed environments.
Int. J. Auton. Adapt. Commun. Syst., 2017

Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks.
Future Gener. Comput. Syst., 2017

Preface: Security and privacy in big data clouds.
Future Gener. Comput. Syst., 2017

A Multilevel Access Control Scheme for Data Security in Transparent Computing.
Comput. Sci. Eng., 2017

Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures.
Concurr. Comput. Pract. Exp., 2017

Research and improvement of ECG compression algorithm based on EZW.
Comput. Methods Programs Biomed., 2017

Achieving reliable and secure services in cloud computing environments.
Comput. Electr. Eng., 2017

Efficient and secure attribute-based signature for monotone predicates.
Acta Informatica, 2017

Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications.
Proceedings of the 2017 IEEE SmartWorld, 2017

Exploring user topic influence for group recommendation on learning resources.
Proceedings of the 2017 IEEE SmartWorld, 2017

Naturalistic driving data for a smart cloud-based abnormal driving detector.
Proceedings of the 2017 IEEE SmartWorld, 2017

Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study.
Proceedings of the 2017 IEEE SmartWorld, 2017

Building deep architectures for traditional chinese medicine diagnosis.
Proceedings of the 2017 IEEE SmartWorld, 2017

A Dual Privacy Preserving Scheme in Continuous Location-Based Services.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An ECC-Based Off-line Anonymous Grouping-Proof Protocol.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Smartphone Bloatware: An Overlooked Privacy Problem.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Module-Level Software Streaming Loading Model Based on Hypervisor.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Security and Attack Vector Analysis of IoT Devices.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Privacy-Protected Data Collection in Wireless Medical Sensor Networks.
Proceedings of the 2017 International Conference on Networking, Architecture, and Storage, 2017

The Strength of Dithering in Recommender System.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Attribute-Based Encryption with Personalized Search.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

An Adaptive Android Security Extension against Privilege Escalation Attacks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Data-Driven Influence Learning in Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Lightweight Privacy Aware Friend Locator in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Segmentation of Calcification and Brain Hemorrhage with Midline Detection.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Achieving Flow-Oriented Reliable Services in Cloud Computing.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Feature Selection and Intrusion Detection in Cloud Environment Based on Machine Learning Algorithms.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Privacy-Aware Conceptual Framework for Coordination.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Using Deep Neural Networks to Simulate Human Body.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Who Should Be My Co-Author? Recommender System to Suggest a List of Collaborators.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

DABKS: Dynamic attribute-based keyword search in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

Content-Centric Event-Insensitive Big Data Reduction in Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Survey on Deep Learning in Big Data.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Unsupervised learning of indoor localization based on received signal strength.
Wirel. Commun. Mob. Comput., 2016

Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring.
IEEE Trans. Ind. Informatics, 2016

Trust Evaluation in Online Social Networks Using Generalized Network Flow.
IEEE Trans. Computers, 2016

Forming Opinions via Trusted Friends: Time-Evolving Rating Prediction Using Fluid Dynamics.
IEEE Trans. Computers, 2016

Blood typing for families: a novel hybrid human-computer application.
Int. J. Parallel Emergent Distributed Syst., 2016

Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks.
IEEE Internet Things J., 2016

An efficient spatial query processing algorithm in multi-sink wireless sensor networks.
Int. J. Sens. Networks, 2016

Heterogeneous educational resource recommender system based on user preferences.
Int. J. Auton. Adapt. Commun. Syst., 2016

Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks.
IEEE Commun. Lett., 2016

Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph.
Future Gener. Comput. Syst., 2016

Trust, Security and Privacy in Emerging Distributed Systems.
Future Gener. Comput. Syst., 2016

Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges.
ACM Comput. Surv., 2016

Decentralized group key management for hierarchical access control using multilinear forms.
Concurr. Comput. Pract. Exp., 2016

IDSPlanet: A Novel Radial Visualization of Intrusion Detection Alerts.
Proceedings of the 9th International Symposium on Visual Information Communication and Interaction, 2016

A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Enhancing Location Privacy through User-Defined Grid in Location-Based Services.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fuzzy and Semantic Search over Encrypted Data in the Cloud.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Software Detection Mechanism Based on SMM in Network Computing.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Privacy Preserving Scheme for Location and Content Protection in Location-Based Services.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare.
Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2016

Building Bayesian Inference Graphs for Healthcare Statistic Evidence.
Proceedings of the 45th International Conference on Parallel Processing Workshops, 2016

Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

A Distributed Algorithm for Balanced Hypergraph Partitioning.
Proceedings of the Advances in Services Computing, 2016

Maximizing the Spread of Positive Influence Under LT-MLA Model.
Proceedings of the Advances in Services Computing, 2016

DHMRF: A Dynamic Hybrid Movie Recommender Framework.
Proceedings of the Advances in Services Computing, 2016

Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks.
Proceedings of the Advances in Services Computing, 2016

Exploring Body Constitution in Traditional Chinese Medicine with K-Means Clustering.
Proceedings of the Advances in Services Computing, 2016

2015
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce.
IEEE Trans. Parallel Distributed Syst., 2015

On Selecting Recommenders for Trust Evaluation in Online Social Networks.
ACM Trans. Internet Techn., 2015

Recent advances in autonomic provisioning of big data applications on clouds.
IEEE Trans. Cloud Comput., 2015

Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks.
IEEE Trans. Computers, 2015

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring.
IEEE Trans. Computers, 2015

Modeling malicious activities in cyber space.
IEEE Netw., 2015

κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph.
Inf. Sci., 2015

A square-based coverage and connectivity probability model for WSNs.
Int. J. Sens. Networks, 2015

Energy-efficient healthcare monitoring with smartphones and IoT technologies.
Int. J. High Perform. Comput. Netw., 2015

Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring.
Int. J. Embed. Syst., 2015

Energy-Balanced Data Gathering and Aggregating in WSNs: A Compressed Sensing Scheme.
Int. J. Distributed Sens. Networks, 2015

A weighted throttled load balancing approach for virtual machines in cloud environment.
Int. J. Comput. Sci. Eng., 2015

Selective partial recovery optimisation strategy for SSL connection migration.
Int. J. Auton. Adapt. Commun. Syst., 2015

Dependable Structural Helath Monitoring Using Wireless Sensor Networks.
CoRR, 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015

Research on Key Management for Multi-privileged Group Communications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Deviation-Based Location Switching Protocol for Trajectory Privacy Protection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Application Streaming: A Mobile Application Distribution Method.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Illegal Indirect Access Prevention Method in Transparent Computing System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Streaming Computing Technology for Android Applications: Design Model and Case Study.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Resource-Efficient Vibration Data Collection in Cyber-Physical Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

User-Controlled Security Mechanism in Data-Centric Clouds.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Design and Implementation of Streaming Application Execution Platform in Android.
Proceedings of the 12th Web Information System and Application Conference, 2015

2014
Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming.
Wirel. Commun. Mob. Comput., 2014

Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Towards Differential Query Services in Cost-Efficient Clouds.
IEEE Trans. Parallel Distributed Syst., 2014

Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2014

Sensor Placement with Multiple Objectives for Structural Health Monitoring.
ACM Trans. Sens. Networks, 2014

Consistency as a Service: Auditing Cloud Consistency.
IEEE Trans. Netw. Serv. Manag., 2014

Group formation with neighbor similarity trust in P2P E-commerce.
Peer-to-Peer Netw. Appl., 2014

Message matching-based greedy behavior detection in delay tolerant networks.
J. Comput. Syst. Sci., 2014

Time-based proxy re-encryption scheme for secure data sharing in a cloud environment.
Inf. Sci., 2014

A distributed resource conservation multicast and spectrum allocation algorithm in cognitive wireless mesh networks.
Int. J. Embed. Syst., 2014

Achieving energy efficient advertisements traffic for smartphones.
Int. J. Embed. Syst., 2014

Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks.
Future Gener. Comput. Syst., 2014

Generating trusted graphs for trust evaluation in online social networks.
Future Gener. Comput. Syst., 2014

Editorial: Special issue on trust in cyber, physical and social computing.
Comput. Secur., 2014

Propagation model of smartphone worms based on semi-Markov process and social relationship graph.
Comput. Secur., 2014

Containing smartphone worm propagation with an influence maximization algorithm.
Comput. Networks, 2014

Reliable Shortest Paths in Wireless Sensor Networks: Refocusing on Link Failure Scenarios from Applications.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Security from the transparent computing aspect.
Proceedings of the International Conference on Computing, Networking and Communications, 2014

Unified Security Architecture Research for 5G Wireless System.
Proceedings of the 11th Web Information System and Application Conference, 2014

2013
Trust, security and privacy for pervasive applications.
J. Supercomput., 2013

A scalable encryption scheme for multi-privileged group communications.
J. Supercomput., 2013

User requirements-aware security ranking in SSL protocol.
J. Supercomput., 2013

A secure self-destructing scheme for electronic data.
J. Comput. Syst. Sci., 2013

Special issue of JCSS on UbiSafe computing and communications.
J. Comput. Syst. Sci., 2013

Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones.
J. Comput. Syst. Sci., 2013

Practical secure and fast handoff framework for pervasive Wi-Fi access.
IET Inf. Secur., 2013

Practical distributed secret key generation for delay tolerant networks.
Concurr. Comput. Pract. Exp., 2013

Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Modeling Malware Propagation in Smartphone Social Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Local Monitoring and Maintenance for Operational Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

RATE: Recommendation-aware Trust Evaluation in Online Social Networks.
Proceedings of the 2013 IEEE 12th International Symposium on Network Computing and Applications, 2013

Data Gathering and Processing for Large-Scale Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Outsourcing privacy-preserving social networks to a cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Wireless Multicast for Mobile Transparent Computing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Cross Layer Design for Improving Trivial File Transfer Protocol in Mobile Transparent Computing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

NFS Protocol Performance Analysis and Improvement for Mobile Transparent Computing.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Privacy Preserving for Location-Based Services Using Location Transformation.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Securing Recommendations in Grouped P2P E-Commerce Trust Model.
IEEE Trans. Netw. Serv. Manag., 2012

Cooperative private searching in clouds.
J. Parallel Distributed Comput., 2012

Special issue on trusted computing and communications.
J. Netw. Comput. Appl., 2012

Secure and privacy preserving keyword searching for cloud storage services.
J. Netw. Comput. Appl., 2012

Fault tolerance analysis of mesh networks with uniform versus nonuniform node failure probability.
Inf. Process. Lett., 2012

Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2012

Evaluating User Community Influence in Online Social Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Efficient information retrieval for ranked queries in cost-effective cloud environments.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Sensor Placement with Multiple Objectives for Structural Health Monitoring in WSNs.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Dynamic Grouping Strategy in Cloud Computing.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
Guest editorial: Trusted computing and communications.
Secur. Commun. Networks, 2011

SSL-enabled trusted communication: Spoofing and protecting the non-cautious users.
Secur. Commun. Networks, 2011

Multi-dimensional evidence-based trust management with multi-trusted paths.
Future Gener. Comput. Syst., 2011

FlowTrust: trust inference with network flows.
Frontiers Comput. Sci. China, 2011

Achieving fine-grained access control for secure data sharing on cloud servers.
Concurr. Comput. Pract. Exp., 2011

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers.
Comput. Secur., 2011

Distributed Private-Key Generation Scheme with Self-Certified Identity.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Routing with Virtual Region Coordinates in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs.
Proceedings of the IEEE 10th International Conference on Trust, 2011

SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Reliable Re-Encryption in Unreliable Clouds.
Proceedings of the Global Communications Conference, 2011

Fault tolerant WSN-based structural health monitoring.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

2010
Designing energy efficient target tracking protocol with quality monitoring in wireless sensor networks.
J. Supercomput., 2010

Foreword.
IEICE Trans. Inf. Syst., 2010

Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks.
IEICE Trans. Inf. Syst., 2010

Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks.
Concurr. Comput. Pract. Exp., 2010

Node-Disjoint Multipath Routing with Group Mobility in MANETs.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Integer Programming Scheme for Target Coverage in Heterogeneous Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

Target Trajectory Querying in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

A Scalable Encryption Scheme for Multi-Privileged Group Communications.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Hierarchical attribute-based encryption for fine-grained access control in cloud storage services.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Fuzzy Location Service for Mobile Ad Hoc Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

Efficient Sharing of Secure Cloud Storage Services.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Adaptive location updates for mobile sinks in wireless sensor networks.
J. Supercomput., 2009

Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks.
J. Comput. Sci. Technol., 2009

Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks.
J. Comput., 2009

Analysis of channel allocation scheme for wireless cellular networks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks.
IEICE Trans. Inf. Syst., 2009

Modelling of heterogeneous wireless networks under batch arrival traffic with communication locality.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Herd-Based Target Tracking Protocol in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

QoS-aware Optimization Strategy for Security Ranking in SSL Protocol.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Cross-layer Approach for Energy Efficient Routing in WANETs.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Designing fair flow fuzzy controller using genetic algorithm for computer networks.
Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, 2009

A Fuzzy Mechanism to Avoid Packet Accumulation in Fair Flow Control.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Square region-based coverage and connectivity probability model in wireless sensor networks.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Hole-shadowing routing in large-scale MANETs.
Int. J. Sens. Networks, 2008

Link Lifetime-Based Segment-by-Segment Routing Protocol in MANETs.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2008

A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Attacks vs. Countermeasures of SSL Protected Trust Model.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Multipath-Based Segment-by-Segment Routing Protocol in MANETs.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Virtual Ring-Based Hole Avoiding Routing in Mobile Ad Hoc Networks.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

Node-Disjoint Multipath Routing with Zoning Method in MANETs.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
A Fault-Tolerant Group Communication Protocol in Large Scale and Highly Dynamic Mobile Next-Generation Networks.
IEEE Trans. Computers, 2007

Probabilistic analysis on mesh network fault tolerance.
J. Parallel Distributed Comput., 2007

Efficient group key management for multi-privileged groups.
Comput. Commun., 2007

Energy-Efficient Dual Prediction-Based Data Gathering for Environmental Monitoring Applications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Hole Avoiding in Advance Routing in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Local Retransmission-Based Gossip Protocol in Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

RARE: An Energy-Efficient Target Tracking Protocol for Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

A Support Method for Improving Learner's Learning Habit Using Behavior Analysis in a Ubiquitous Environment.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks.
Proceedings of IEEE International Conference on Communications, 2007

Design of a Stabilizing Second-Order Congestion Controller for Large-Delay Networks.
Proceedings of IEEE International Conference on Communications, 2007

ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications.
Proceedings of the Global Communications Conference, 2007

Polynomial Regression for Data Gathering in Environmental Monitoring Applications.
Proceedings of the Global Communications Conference, 2007

Designing Piecewise QoS Routing Protocol in Large-Scale MANETs.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2007

An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks.
Proceedings of the Seventh International Conference on Computer and Information Technology (CIT 2007), 2007

2006
Scalable key management for secure multicast communication in the mobile environment.
Pervasive Mob. Comput., 2006

A self-organizable topology maintenance protocol for mobile group communications in mobile next-generation networks.
Comput. Commun., 2006

SSR: Segment-by-Segment Routing in Large-Scale Mobile Ad Hoc Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

Logical Location-based Routing with Hole-shadowing in Large-scale MANETs.
Proceedings of IEEE International Conference on Communications, 2006

A Proxy-based Mobile Group Membership Protocol for Large Scale and Highly Dynamic Groups.
Proceedings of IEEE International Conference on Communications, 2006

2005
A protocol for partitionable group membership service in mobile Internet.
Wirel. Commun. Mob. Comput., 2005

A novel group communication protocol using the RingNet hierarchy in mobile Internet.
Parallel Algorithms Appl., 2005

Hypercube Network Fault Tolerance: A Probabilistic Approach.
J. Interconnect. Networks, 2005

Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Prediction-Based Multicast Mobility Management in Mobile Internet.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A Novel QoS Multicast Model in Mobile Ad Hoc Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Available Bandwidth Measurement Schemes over Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Modeling and Performance Evaluation of Handover Service in Wireless Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Scalable and Reliable Multiple Home Regions Based Location Service in Mobile Ad Hoc Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2005

2004
On Fault Tolerance of 3-Dimensional Mesh Networks.
J. Comput. Sci. Technol., 2004

Fault Tolerant Routing Algorithm in Hypercube Networks with Load Balancing Support.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

QoSRHMM: A QoS-Aware Ring-Based Hierarchical Multi-path Multicast Routing Protocol.
Proceedings of the Parallel and Distributed Processing and Applications, 2004

A Reliable Totally-Ordered Group Multicast Protocol for Mobile Internet.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

RGB: A Scalable and Reliable Group Membership Protocol in Mobile Internet.
Proceedings of the 33rd International Conference on Parallel Processing (ICPP 2004), 2004

Key Management for Secure Multicast Using the RingNet Hierarchy.
Proceedings of the Computational and Information Science, First International Symposium, 2004

2003
Probabilistic Analysis of Connectivity on Mesh Networks.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

A Probabilistic Approach to Fault Tolerant Broadcast Routing Algorithms on Mesh Networks.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Probability Model for Faults in Large-Scale Multicomputer Systems.
Proceedings of the 12th Asian Test Symposium (ATS 2003), 17-19 November 2003, Xian, China, 2003

2002
Locally Subcube-Connected Hypercube Networks: Theoretical Analysis and Experimental Results.
IEEE Trans. Computers, 2002

2001
Routing in Hypercube Networks with a Constant Fraction of Faulty Nodes.
J. Interconnect. Networks, 2001


  Loading...