Hongwei Li

Orcid: 0000-0002-1961-7946

Affiliations:
  • University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, China
  • University of Waterloo, Department of Electrical and Computer Engineering, Canada (former)
  • University of Electronic Science and Technology of China, Chengdu, China (PhD 2008)


According to our database1, Hongwei Li authored at least 217 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Vertical Federated Learning Across Heterogeneous Regions for Industry 4.0.
IEEE Trans. Ind. Informatics, August, 2024

Privacy-Preserving Arbitrary Geometric Range Query in Mobile Internet of Vehicles.
IEEE Trans. Mob. Comput., July, 2024

Robust Indoor Location Identification for Smartphones Using Echoes From Dominant Reflectors.
IEEE Trans. Mob. Comput., May, 2024

Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024

Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution.
IEEE Trans. Computers, April, 2024

Gradient Leakage Attacks in Federated Learning: Research Frontiers, Taxonomy, and Future Directions.
IEEE Netw., March, 2024

Secure Mobile Two-Factor Authentication Leveraging Active Sound Sensing.
IEEE Trans. Mob. Comput., February, 2024

Privacy-Preserving and Poisoning-Defending Federated Learning in Fog Computing.
IEEE Internet Things J., February, 2024

Efficient Byzantine-Robust and Privacy-Preserving Federated Learning on Compressive Domain.
IEEE Internet Things J., February, 2024

SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning.
Peer Peer Netw. Appl., January, 2024

Efficient and Privacy-Preserving Outsourcing of Gradient Boosting Decision Tree Inference.
IEEE Trans. Serv. Comput., 2024

BASUV: A Blockchain-Enabled UAV Authentication Scheme for Internet of Vehicles.
IEEE Trans. Inf. Forensics Secur., 2024

RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings.
IEEE Trans. Inf. Forensics Secur., 2024

Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery.
IEEE Trans. Inf. Forensics Secur., 2024

Stealthy Targeted Backdoor Attacks Against Image Captioning.
IEEE Trans. Inf. Forensics Secur., 2024

SIMC 2.0: Improved Secure ML Inference Against Malicious Clients.
IEEE Trans. Dependable Secur. Comput., 2024

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder.
IEEE Trans. Dependable Secur. Comput., 2024

Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System.
IEEE Trans. Dependable Secur. Comput., 2024

Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024

AnotherMe: A Location Privacy Protection System Based on Online Virtual Trajectory Generation.
IEEE Trans. Dependable Secur. Comput., 2024

Incremental Learning, Incremental Backdoor Threats.
IEEE Trans. Dependable Secur. Comput., 2024

A Comprehensive Defense Framework Against Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud.
CoRR, 2024

ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition.
CoRR, 2024

DDFAD: Dataset Distillation Framework for Audio Data.
CoRR, 2024

Backdoor Attacks against Image-to-Image Networks.
CoRR, 2024

BAZAM: A Blockchain-Assisted Zero-Trust Authentication in Multi-UAV Wireless Networks.
CoRR, 2024

Talk Too Much: Poisoning Large Language Models under Token Limit.
CoRR, 2024

Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization.
CoRR, 2024

Instruction Backdoor Attacks Against Customized LLMs.
Proceedings of the 33rd USENIX Security Symposium, 2024

Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

Privacy-Preserving Data Evaluation via Functional Encryption, Revisited.
Proceedings of the IEEE INFOCOM 2024, 2024

SecSCS: A User-Centric Secure Smart Camera System Based on Blockchain.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

An Efficient and Secure Privacy-Preserving Federated Learning Via Lattice-Based Functional Encryption.
Proceedings of the IEEE International Conference on Communications, 2024

2023
FedVAE: Communication-Efficient Federated Learning With Non-IID Private Data.
IEEE Syst. J., September, 2023

Secure Decentralized Image Classification With Multiparty Homomorphic Encryption.
IEEE Trans. Circuits Syst. Video Technol., July, 2023

Privacy-Preserving Ranked Spatial Keyword Query in Mobile Cloud-Assisted Fog Computing.
IEEE Trans. Mob. Comput., June, 2023

Physical Black-Box Adversarial Attacks Through Transformations.
IEEE Trans. Big Data, June, 2023

User Identification Leveraging Whispered Sound for Wearable Devices.
IEEE Trans. Mob. Comput., March, 2023

ESA-FedGNN: Efficient secure aggregation for federated graph neural networks.
Peer Peer Netw. Appl., March, 2023

TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023

A Reversible Framework for Efficient and Secure Visual Privacy Protection.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Model-Contrastive Federated Learning With Improved Compressive Sensing.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference.
IEEE Trans. Inf. Forensics Secur., 2023

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023

PriVDT: An Efficient Two-Party Cryptographic Framework for Vertical Decision Trees.
IEEE Trans. Inf. Forensics Secur., 2023

Hercules: Boosting the Performance of Privacy-Preserving Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Enabling Simultaneous Content Regulation and Privacy Protection for Cloud Storage Image.
IEEE Trans. Cloud Comput., 2023

Unbalanced Circuit-PSI from Oblivious Key-Value Retrieval.
IACR Cryptol. ePrint Arch., 2023

A Comprehensive Overview of Backdoor Attacks in Large Language Models within Communication Networks.
CoRR, 2023

Extracting Cloud-based Model with Prior Knowledge.
CoRR, 2023

Efficient Homomorphic Convolution for Secure Deep Learning Inference.
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023

Privacy-Driven Fine-Grained Data Trading.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

Fast Generation-Based Gradient Leakage Attacks against Highly Compressed Gradients.
Proceedings of the IEEE INFOCOM 2023, 2023

Secure and Robust Two Factor Authentication via Acoustic Fingerprinting.
Proceedings of the IEEE INFOCOM 2023, 2023

GuardHFL: Privacy Guardian for Heterogeneous Federated Learning.
Proceedings of the International Conference on Machine Learning, 2023

EchoImage: User Authentication on Smart Speakers Using Acoustic Signals.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Toward Efficient and End-to-End Privacy-Preserving Distributed Gradient Boosting Decision Trees.
Proceedings of the IEEE International Conference on Communications, 2023

TriFSS: Secure Trigonometric Function Evaluation via Function Secret Sharing.
Proceedings of the IEEE International Conference on Communications, 2023

SecMath: An Efficient 2-Party Cryptographic Framework for Math Functions.
Proceedings of the IEEE International Conference on Communications, 2023

Membership Inference Attacks Against the Graph Classification.
Proceedings of the IEEE Global Communications Conference, 2023

Privacy-Preserving Feature Selection based on Mutual Information.
Proceedings of the IEEE Global Communications Conference, 2023

Practical and Privacy-Preserving Density-Based Clustering via Shuffling.
Proceedings of the IEEE Global Communications Conference, 2023

Privacy-Preserving and Verifiable Outsourcing Inference Against Malicious Servers.
Proceedings of the IEEE Global Communications Conference, 2023

Color Backdoor: A Robust Poisoning Attack in Color Space.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2022

SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IEEE Trans. Software Eng., 2022

Privacy-Preserving Reverse Nearest Neighbor Query Over Encrypted Spatial Data.
IEEE Trans. Serv. Comput., 2022

Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-Preserving Federated Deep Learning With Irregular Users.
IEEE Trans. Dependable Secur. Comput., 2022

DNA Similarity Search With Access Control Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2022

Enabling Secure and Versatile Packet Inspection With Probable Cause Privacy for Outsourced Middlebox.
IEEE Trans. Cloud Comput., 2022

Privacy-Preserving Efficient Verifiable Deep Packet Inspection for Cloud-Assisted Middlebox.
IEEE Trans. Cloud Comput., 2022

Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing.
IEEE Trans. Cloud Comput., 2022

Deniable-Based Privacy-Preserving Authentication Against Location Leakage in Edge Computing.
IEEE Syst. J., 2022

Privacy-preserving "Check-in Award" Service in Location-based Social Networks.
Peer-to-Peer Netw. Appl., 2022

PIPC: Privacy- and Integrity-Preserving Clustering Analysis for Load Profiling in Smart Grids.
IEEE Internet Things J., 2022

Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.
IEEE Internet Things J., 2022

Efficient Privacy-Preserving Federated Learning With Unreliable Users.
IEEE Internet Things J., 2022

Acoustic-Sensing-Based Location Semantics Identification Using Smartphones.
IEEE Internet Things J., 2022

Secure Batch Deduplication Without Dual Servers in Backup System.
IACR Cryptol. ePrint Arch., 2022

Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data.
CoRR, 2022

New Secure Sparse Inner Product with Applications to Machine Learning.
CoRR, 2022

SIMC 2.0: Improved Secure ML Inference Against Malicious Clients.
CoRR, 2022

Privacy-preserving Decentralized Deep Learning with Multiparty Homomorphic Encryption.
CoRR, 2022

Iron: Private Inference on Transformers.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Secure Feature Selection for Vertical Federated Learning in eHealth Systems.
Proceedings of the IEEE International Conference on Communications, 2022

Efficient and Privacy-Preserving Federated Learning with Irregular Users.
Proceedings of the IEEE International Conference on Communications, 2022

CryptoFE: Practical and Privacy-Preserving Federated Learning via Functional Encryption.
Proceedings of the IEEE Global Communications Conference, 2022

Fast Secure Aggregation for Privacy-Preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2022

2021
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage.
IEEE Trans. Mob. Comput., 2021

Guest Editorial: Softwarized Networking for Next Generation Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Enhanced Federated Learning Against Poisoning Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2021

Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings.
IEEE Trans. Dependable Secur. Comput., 2021

AEALV: Accurate and Efficient Aircraft Location Verification for ADS-B.
IEEE Trans. Cogn. Commun. Netw., 2021

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage.
IEEE Trans. Cloud Comput., 2021

One radish, One hole: Specific adversarial training for enhancing neural network's robustness.
Peer-to-Peer Netw. Appl., 2021

Enhanced Mixup Training: a Defense Method Against Membership Inference Attack.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Proximity-Echo: Secure Two Factor Authentication Using Active Sound Sensing.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Breathing Sound-based Exercise Intensity Monitoring via Smartphones.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Generating Audio Adversarial Examples with Ensemble Substituted Models.
Proceedings of the ICC 2021, 2021

Towards Lightweight and Efficient Distributed Intrusion Detection Framework.
Proceedings of the IEEE Global Communications Conference, 2021

Stand-in Backdoor: A Stealthy and Powerful Backdoor Attack.
Proceedings of the IEEE Global Communications Conference, 2021

Efficient, Private and Robust Federated Learning.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Accurate Image-Based Pedestrian Detection With Privacy Preservation.
IEEE Trans. Veh. Technol., 2020

Guest Editorial Introduction to the Special Section on Blockchains in Emerging Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020

Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage.
IEEE Trans. Serv. Comput., 2020

Efficient and Privacy-Enhanced Federated Learning for Industrial Artificial Intelligence.
IEEE Trans. Ind. Informatics, 2020

VerifyNet: Secure and Verifiable Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2020

Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data.
IEEE Trans. Cloud Comput., 2020

Adaptive privacy-preserving federated learning.
Peer-to-Peer Netw. Appl., 2020

Security and privacy of machine learning assisted P2P networks.
Peer-to-Peer Netw. Appl., 2020

Secure and Efficient k NN Classification for Industrial Internet of Things.
IEEE Internet Things J., 2020

PADL: Privacy-Aware and Asynchronous Deep Learning for IoT Applications.
IEEE Internet Things J., 2020

Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020

Accelerating Poisoning Attack Through Momentum and Adam Algorithms.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Privacy-preserving HE-based clustering for load profiling over encrypted smart meter data.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Privacy-aware and Resource-saving Collaborative Learning for Healthcare in Cloud Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Achieving Privacy-preserving Federated Learning with Irrelevant Updates over E-Health Applications.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Practical Black-Box Attack Against Autonomous Speech Recognition Model.
Proceedings of the IEEE Global Communications Conference, 2020

Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems.
IEEE Trans. Veh. Technol., 2019

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Serv. Comput., 2019

Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2019

Secure Multi-Party Computation: Theory, practice and applications.
Inf. Sci., 2019

A Practical and Compatible Cryptographic Solution to ADS-B Security.
IEEE Internet Things J., 2019

Noninvasive Fine-Grained Sleep Monitoring Leveraging Smartphones.
IEEE Internet Things J., 2019

Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019

Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.
IEEE Internet Things J., 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019

Data Security Issues in Deep Learning: Attacks, Countermeasures, and Opportunities.
IEEE Commun. Mag., 2019

Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Toward Efficient and Secure Deep Packet Inspection for Outsourced Middlebox.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Flexible Poisoning Attack Against Machine Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Efficient and Privacy-Preserving Federated Deep Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

EPPS: Efficient Privacy-Preserving Scheme in Distributed Deep Learning.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Water-Filling Exact Solutions for Load Balancing of Smart Power Grid Systems.
IEEE Trans. Smart Grid, 2018

HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018

Personalized Search Over Encrypted Data With Efficient and Secure Updates in Mobile Clouds.
IEEE Trans. Emerg. Top. Comput., 2018

Tor anonymous traffic identification based on gravitational clustering.
Peer-to-Peer Netw. Appl., 2018

Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities.
IEEE Netw., 2018

Security and Privacy of Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability.
IEEE Internet Things J., 2018

Achieving Fine-grained Multi-keyword Ranked Search over Encrypted Cloud Data.
IACR Cryptol. ePrint Arch., 2018

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018

Privacy-enhanced Deep Packet Inspection at Outsourced Middlebox.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Towards practical personalized recommendation with multi-level differential privacy controls.
Proceedings of the IEEE INFOCOM 2018, 2018

Efficient and Secure kNN Classification over Encrypted Data Using Vector Homomorphic Encryption.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

EFRS: Enabling Efficient and Fine-Grained Range Search on Encrypted Spatial Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Efficient and Secure Outsourced Linear Regression.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Achieving Adaptive Linkability for Cellular V2X Group Communications in 5G.
Proceedings of the IEEE Global Communications Conference, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

An adaptive resource allocation model in anti-money laundering system.
Peer-to-Peer Netw. Appl., 2017

Guest Editorial Big Security Challenges in Big Data Era.
IEEE Internet Things J., 2017

Achieving efficient and privacy-preserving truth discovery in crowd sensing systems.
Comput. Secur., 2017

CryptMDB: A practical encrypted MongoDB over big data.
Proceedings of the IEEE International Conference on Communications, 2017

EPP-DMM: An Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Enabling Fine-Grained Multi-Keyword Search Supporting Classified Sub-Dictionaries over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2016

Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.
Sensors, 2016

Practical blacklist-based anonymous authentication scheme for mobile crowd sensing.
Peer-to-Peer Netw. Appl., 2016

Cryptographic Public Verification of Data Integrity for Cloud Storage Systems.
IEEE Cloud Comput., 2016

Efficient privacy-preserving circular range search on outsourced spatial data.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Hybrid Machine Learning Model for Range Estimation of Electric Vehicles.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Efficient Secure Outsourcing Computation of Matrix Multiplication in Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Towards Efficient Privacy-Preserving Truth Discovery in Crowd Sensing Systems.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
Engineering searchable encryption of mobile cloud networks: when QoE meets QoP.
IEEE Wirel. Commun., 2015

Enabling Efficient Multi-Keyword Ranked Search Over Encrypted Mobile Cloud Data Through Blind Storage.
IEEE Trans. Emerg. Top. Comput., 2015

SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015

Guest editorial: Security and privacy of P2P networks in emerging smart city.
Peer-to-Peer Netw. Appl., 2015

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid.
KSII Trans. Internet Inf. Syst., 2015

Achieving efficient and privacy-preserving multi-feature search for mobile sensing.
Comput. Commun., 2015

Enabling efficient publicly verifiable outsourcing computation for matrix multiplication.
Proceedings of the International Telecommunication Networks and Applications Conference, 2015

Diverse multi-keyword ranked search over encrypted cloud data supporting range query.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Achieving authorized and ranked multi-keyword search over encrypted cloud data.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Efficient e-health data release with consistency guarantee under differential privacy.
Proceedings of the 17th International Conference on E-health Networking, 2015

Enabling Efficient and Secure Outsourcing of Large Matrix Multiplications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Enabling Secure and Privacy Preserving Communications in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04945-8, 2014

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014

An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid.
IEEE Syst. J., 2014

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014

EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market.
KSII Trans. Internet Inf. Syst., 2014

Privacy-preserving personalized search over encrypted cloud data supporting multi-keyword ranking.
Proceedings of the Sixth International Conference on Wireless Communications and Signal Processing, 2014

DCD: Distributed charging and discharging scheme for EVs in microgrids.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

PALDA: Efficient privacy-preserving authentication for lossless data aggregation in Smart Grids.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Achieving ranked range query in smart grid auction market.
Proceedings of the IEEE International Conference on Communications, 2014

Achieving Multi-Authority Access Control with Efficient Attribute Revocation in smart grid.
Proceedings of the IEEE International Conference on Communications, 2014

Secure dynamic searchable symmetric encryption with constant document update cost.
Proceedings of the IEEE Global Communications Conference, 2014

2013
An Efficient Broadcast Authentication Scheme with Batch Verification for ADS-B Messages.
KSII Trans. Internet Inf. Syst., 2013

An Efficient Somewhat HE scheme over Integers and Its Variation.
KSII Trans. Internet Inf. Syst., 2013

ESO: An efficient and secure outsourcing scheme for smart grid.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Improved ID-based Ring Signature Scheme with Constant-size Signatures.
Informatica (Slovenia), 2011

Identity-Based Cryptography for Cloud Security.
IACR Cryptol. ePrint Arch., 2011

2009
Identity-Based Authentication for Cloud Computing.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009


  Loading...