Hui Li

Orcid: 0000-0001-8310-7169

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Network Services, Xi'an, China
  • Xidian University, School of Cyber Engineering, Xi'an, China


According to our database1, Hui Li authored at least 442 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024

CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024

Lower rounds lattice-based anonymous AKA under the seCK model for the IoT.
Peer Peer Netw. Appl., July, 2024

UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024

EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector.
IEEE Internet Things J., May, 2024

CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing.
IEEE Internet Things J., May, 2024

A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network.
IEEE Trans. Netw. Serv. Manag., April, 2024

CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024

Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid.
IEEE Internet Things J., March, 2024

PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0.
IEEE Internet Things J., February, 2024

Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT.
IEEE Internet Things J., January, 2024

Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT.
IEEE Internet Things J., January, 2024

FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning.
IEEE Internet Things J., January, 2024

Efficient and Privacy-Preserving Federated Learning Against Poisoning Adversaries.
IEEE Trans. Serv. Comput., 2024

ELXGB: An Efficient and Privacy-Preserving XGBoost for Vertical Federated Learning.
IEEE Trans. Serv. Comput., 2024

LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024

Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
IEEE Trans. Inf. Forensics Secur., 2024

ToNN: An Oblivious Neural Network Prediction Scheme With Semi-Honest TEE.
IEEE Trans. Inf. Forensics Secur., 2024

PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024

Automatic Evasion of Machine Learning-Based Network Intrusion Detection Systems.
IEEE Trans. Dependable Secur. Comput., 2024

ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2024

Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles.
Microprocess. Microsystems, 2024

iDP-FL: A fine-grained and privacy-aware federated learning framework for deep neural networks.
Inf. Sci., 2024

Achieving federated logistic regression training towards model confidentiality with semi-honest TEE.
Inf. Sci., 2024

Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things.
IEEE Internet Things J., 2024

SC-Chain: An Efficient Blockchain Framework for Smart City.
IEEE Internet Things J., 2024

Quartet: A Query Aware Database Adaptive Compilation Decision System.
Expert Syst. Appl., 2024

Data complexity-based batch sanitization method against poison in distributed learning.
Digit. Commun. Networks, 2024

Enhancing Security and Privacy in Federated Learning using Update Digests and Voting-Based Defense.
CoRR, 2024

Seamless group handover authentication protocol for vehicle networks: Services continuity.
Comput. Networks, 2024

RDLNet: A Novel and Accurate Real-world Document Localization Method.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption.
Inf. Sci., December, 2023

A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023

A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects.
IEEE Internet Things J., September, 2023

FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023

A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy.
IEEE Internet Things J., August, 2023

Blockchain-based cloud-edge clock calibration in IoT.
Peer Peer Netw. Appl., May, 2023

Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023

PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data.
IEEE Trans. Inf. Forensics Secur., 2023

Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
IEEE Trans. Dependable Secur. Comput., 2023

Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023

Protecting Regression Models With Personalized Local Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

A Software-Based Remote Attestation Scheme for Internet of Things Devices.
IEEE Trans. Dependable Secur. Comput., 2023

VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression.
IEEE Trans. Cloud Comput., 2023

MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud.
IEEE Netw., 2023

An Automatic Privacy-Aware Framework for Text Data in Online Social Network Based on a Multi-Deep Learning Model.
Int. J. Intell. Syst., 2023

LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023

Identification of Malicious Encrypted Traffic Through Feature Fusion.
IEEE Access, 2023

Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Proceedings of the 32nd USENIX Security Symposium, 2023

RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023

Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data.
Proceedings of the IEEE Global Communications Conference, 2023

Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences.
Proceedings of the IEEE Global Communications Conference, 2023

Class Attention Transfer Based Knowledge Distillation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
A Framework for Personalized Location Privacy.
IEEE Trans. Mob. Comput., 2022

Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022

Privacy Preserving Participant Recruitment for Coverage Maximization in Location Aware Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2022

A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022

PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022

Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack.
IEEE Trans. Dependable Secur. Comput., 2022

Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets.
IEEE Trans. Dependable Secur. Comput., 2022

EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain-based trust management for verifiable time synchronization service in IoT.
Peer-to-Peer Netw. Appl., 2022

A robust authentication scheme for remote diagnosis and maintenance in 5G V2N.
J. Netw. Comput. Appl., 2022

CORK: A privacy-preserving and lossless federated learning scheme for deep neural network.
Inf. Sci., 2022

MARS: Automated Protocol Analysis Framework for Internet of Things.
IEEE Internet Things J., 2022

An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services.
IEEE Internet Things J., 2022

Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems.
IEEE Internet Things J., 2022

Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022

DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022

A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022

RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices.
IEEE Internet Things J., 2022

Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation.
CoRR, 2022

A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022

ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data.
Sci. China Inf. Sci., 2022

BiTouch: enabling secure touch-to-access device pairing based on human body's electrical response.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

Enabling secure touch-to-access device pairing based on human body's electrical response.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022

HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.
Proceedings of the Information Security - 25th International Conference, 2022

A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
Proceedings of the IEEE INFOCOM 2022, 2022

ARCANE: An Efficient Architecture for Exact Machine Unlearning.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment.
IEEE Trans. Wirel. Commun., 2021

Anonymous and Privacy-Preserving Federated Learning With Industrial Big Data.
IEEE Trans. Ind. Informatics, 2021

CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data.
IEEE Trans. Cloud Comput., 2021

PMAB: A Public Mutual Audit Blockchain for Outsourced Data in Cloud Storage.
Secur. Commun. Networks, 2021

A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services.
Secur. Commun. Networks, 2021

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud.
Peer-to-Peer Netw. Appl., 2021

A blockchain-based privacy preservation scheme in multimedia network.
Multim. Tools Appl., 2021

Cross-domain access control based on trusted third-party and attribute mapping center.
J. Syst. Archit., 2021

Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV.
J. Frankl. Inst., 2021

A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent.
Inf. Sci., 2021

An anomaly detection method based on double encoder-decoder generative adversarial networks.
Ind. Robot, 2021

Data-Driven Optimization for Cooperative Edge Service Provisioning With Demand Uncertainty.
IEEE Internet Things J., 2021

Efficient attribute-based encryption with repeated attributes optimization.
Int. J. Inf. Sec., 2021

Smart home: Keeping privacy based on Air-Padding.
IET Inf. Secur., 2021

Detection and defense against network isolation attacks in software-defined networks.
Trans. Emerg. Telecommun. Technol., 2021

Provenance-based data flow control mechanism for Internet of things.
Trans. Emerg. Telecommun. Technol., 2021

An ultra light weight and secure RFID batch authentication scheme for IoMT.
Comput. Commun., 2021

Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation.
Proceedings of the Network and System Security - 15th International Conference, 2021

To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Privacy-preserving Decentralized Federated Deep Learning.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Achieving Fine-Grained QoS for Privacy-Aware Users in LBSs.
IEEE Wirel. Commun., 2020

FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020

A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Inside-Out Precoding to Manage Multiple Interferences From the Same Source.
IEEE Trans. Veh. Technol., 2020

Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding.
Sensors, 2020

A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment.
Peer-to-Peer Netw. Appl., 2020

Hyperspectral Imagery Classification Based on Compressed Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2020

A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020

An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020

CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020

Exploiting location-related behaviors without the GPS data on smartphones.
Inf. Sci., 2020

LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020

LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020

Mining the frequency of time-constrained serial episodes over massive data sequences and streams.
Future Gener. Comput. Syst., 2020

Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.
CoRR, 2020

A personalized range-sensitive privacy-preserving scheme in LBSs.
Concurr. Comput. Pract. Exp., 2020

A Survey on Security Aspects for 3GPP 5G Networks.
IEEE Commun. Surv. Tutorials, 2020

Aggregation-based location privacy: An information theoretic approach.
Comput. Secur., 2020

Privacy-preserving searchable encryption in the intelligent edge computing.
Comput. Commun., 2020

Prediction of dissolved oxygen in aquaculture based on gradient boosting decision tree and long short-term memory network: A study of Chang Zhou fishery demonstration base, China.
Comput. Electron. Agric., 2020

A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Lightweight Secure Data Exchange in Decentralized VANETs with Physical Layer Security.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

CHASSIS: Conformity Meets Online Information Diffusion.
Proceedings of the 2020 International Conference on Management of Data, 2020

BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

Beam Management for Cellular-Connected UAVs: A Fast Link Recovery Approach.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

An Enhanced Handover Scheme for Cellular-Connected UAVs.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A Blockchain-Based Vehicle Platoon Leader Updating Scheme.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Serv. Comput., 2019

Online Location Trace Privacy: An Information Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2019

Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
Sensors, 2019

Pruneable sharding-based blockchain protocol.
Peer-to-Peer Netw. Appl., 2019

A Lightweight Authentication Scheme for Cloud-Based RFID Healthcare Systems.
IEEE Netw., 2019

On distributivity equations of implications over overlap functions and contrapositive symmetry equations of implications.
J. Intell. Fuzzy Syst., 2019

Counting the frequency of time-constrained serial episodes in a streaming sequence.
Inf. Sci., 2019

The optimal upper bound of the number of queries for Laplace mechanism under differential privacy.
Inf. Sci., 2019

Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019

Blockchain-Based Secure Time Protection Scheme in IoT.
IEEE Internet Things J., 2019

Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019

An Attribute-Based Assured Deletion Scheme in Cloud Computing.
Int. J. Inf. Technol. Web Eng., 2019

LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019

Light-load efficiency improving boost converter with the hybrid modulation of hysteresis current mode and burst mode.
IEICE Electron. Express, 2019

A Secure and Efficient Location-based Service Scheme for Smart Transportation.
Future Gener. Comput. Syst., 2019

Efficient and privacy preserving access control scheme for fog-enabled IoT.
Future Gener. Comput. Syst., 2019

A blockchain-based clock synchronization Scheme in IoT.
Future Gener. Comput. Syst., 2019

General Secure Information Exchange Protocol for a Multiuser MIMO Relay Channel.
Entropy, 2019

IHP: improving the utility in differential private histogram publication.
Distributed Parallel Databases, 2019

Verifiable algorithm for outsourced database with updating.
Clust. Comput., 2019

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019

Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare.
IEEE Access, 2019

An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019

A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT.
IEEE Access, 2019

Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Security Formal Model for Multiple Channels Communication.
Proceedings of the 2019 IEEE SmartWorld, 2019

A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019

HideMe: Privacy-Preserving Photo Sharing on Social Networks.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

A Secure Cross-Domain Access Control Scheme in Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Physical Layer Security of OFDM Communication Using Artificial Pilot Noise.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Participant Recruitment for Coverage-Aware Mobile Crowdsensing with Location Differential Privacy.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Delay-Aware Adaptive Wireless Video Streaming in Edge Computing Assisted Ultra-Dense Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Blockchain-Based Hierarchical Reputation Management Scheme in Vehicular Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018

Lightweight RFID Protocol for Medical Privacy Protection in IoT.
IEEE Trans. Ind. Informatics, 2018

EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018

HAC: Hybrid Access Control for Online Social Networks.
Secur. Commun. Networks, 2018

UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Netw. Appl., 2018

Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Netw. Appl., 2018

Secure, efficient and revocable data sharing scheme for vehicular fogs.
Peer-to-Peer Netw. Appl., 2018

Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer-to-Peer Netw. Appl., 2018

Secure and private key management scheme in big data networking.
Peer-to-Peer Netw. Appl., 2018

Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018

MedBlock: Efficient and Secure Medical Data Sharing Via Blockchain.
J. Medical Syst., 2018

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet Things J., 2018

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks.
Int. J. Distributed Sens. Networks, 2018

Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018

Privacy Computing: Concept, Computing Framework And Future Development Trends.
IACR Cryptol. ePrint Arch., 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018

Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.
Future Gener. Comput. Syst., 2018

ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence.
CoRR, 2018

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018

Chameleon all-but-one extractable hash proof and its applications.
Sci. China Inf. Sci., 2018

A Novel Efficient Pairing-Free CP-ABE Based on Elliptic Curve Cryptography for IoT.
IEEE Access, 2018

Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Secure Time Synchronization Scheme in IoT Based on Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

An MEC-Based DoS Attack Detection Mechanism for C-V2X Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Cross-Domain Based Data Sharing Scheme in Cooperative Edge Computing.
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018

Blockchain-Based Privacy Preserving Deep Learning.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017

Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017

SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs.
IEEE Trans. Intell. Transp. Syst., 2017

Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomed. Health Informatics, 2017

A Secure and Verifiable Outsourced Access Control Scheme in Fog-Cloud Computing.
Sensors, 2017

1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017

NFC Secure Payment and Verification Scheme with CS E-Ticket.
Secur. Commun. Networks, 2017

Secure group information exchange scheme for vehicular ad hoc networks.
Pers. Ubiquitous Comput., 2017

Towards privacy protection and malicious behavior traceability in smart health.
Pers. Ubiquitous Comput., 2017

An ultra-lightweight RFID authentication scheme for mobile commerce.
Peer-to-Peer Netw. Appl., 2017

A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach.
Mob. Inf. Syst., 2017

Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding.
J. Inf. Sci. Eng., 2017

Different strategies for differentially private histogram publication.
J. Commun. Inf. Networks, 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

Small-world: Secure friend matching over physical world and social networks.
Inf. Sci., 2017

Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services.
IEEE Internet Things J., 2017

An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy.
IEEE Internet Things J., 2017

Characterizing the semantics of passwords: The role of Pinyin for Chinese Netizens.
Comput. Stand. Interfaces, 2017

A two-party privacy preserving set intersection protocol against malicious users in cloud computing.
Comput. Stand. Interfaces, 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Comput. Secur., 2017

hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017

Pricing Privacy Leakage in Location-Based Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017

A new method to construct golay complementary set and near-complementary set by paraunitary matrices.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017

Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

PCD: A privacy-preserving predictive clinical decision scheme with E-health big data based on RNN.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017

Impact factor-based group recommendation scheme with privacy preservation in MSNs.
Proceedings of the IEEE International Conference on Communications, 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

TrackU: Exploiting User's Mobility Behavior via WiFi List.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Multi-Keyword Fuzzy and Sortable Ciphertext Retrieval Scheme for Big Data.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Privacy Preservation Strategy in Time-Sensitive LBSs.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

An Expressive Hidden Access Policy CP-ABE.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Cloud-Based Lightweight RFID Mutual Authentication Protocol.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Privacy Preserving Authenticating and Billing Scheme for Video Streaming Service.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Target: category-based android malware detection revisited.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

U2F based secure mutual authentication protocol for mobile payment.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Secure machine-type communications in LTE networks.
Wirel. Commun. Mob. Comput., 2016

An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Veh. Technol., 2016

Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2016

Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.
Sensors, 2016

EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Secur. Commun. Networks, 2016

Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Secur. Commun. Networks, 2016

Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Secur. Commun. Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive Mob. Comput., 2016

Efficient multi-party concurrent signature from lattices.
Inf. Process. Lett., 2016

An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Int. J. Technol. Hum. Interact., 2016

PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
Int. J. Embed. Syst., 2016

A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

A Secure RFID Application Revocation Scheme for IoT.
IEICE Trans. Inf. Syst., 2016

MIMO relay channel signal transmission in transformed signal subspace.
Digit. Signal Process., 2016

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Comput. Networks, 2016

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016

Time obfuscation-based privacy-preserving scheme for Location-Based Services.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016

A practical group matching scheme for privacy-aware users in mobile social networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

NFC Secure Payment and Verification Scheme for Mobile Payment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016

Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016

Privacy protection based access control scheme in cloud-based services.
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016

Cloud-Based Lightweight RFID Healthcare Privacy Protection Protocol.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
IEEE Trans. Serv. Comput., 2015

Loss-Tolerant Bundle Fragment Authentication for Space-Based DTNs.
IEEE Trans. Dependable Secur. Comput., 2015

Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding".
IEEE Trans. Computers, 2015

GBAAM: group-based access authentication for MTC in LTE networks.
Secur. Commun. Networks, 2015

PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Secur. Commun. Networks, 2015

V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mob. Inf. Syst., 2015

The Solution for Cooperative Beamforming Design in MIMO Multi-way Relay Networks.
KSII Trans. Internet Inf. Syst., 2015

A reputation-based secure scheme in vehicular ad hoc networks.
Int. J. Grid Util. Comput., 2015

PAS: An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid.
Int. J. Distributed Sens. Networks, 2015

Adaptive Sensing Private Property Protection Protocol Based on Cloud.
Int. J. Distributed Sens. Networks, 2015

Key management for Smart Grid based on asymmetric key-wrapping.
Int. J. Comput. Math., 2015

A novel attack to spatial cloaking schemes in location-based services.
Future Gener. Comput. Syst., 2015

A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerg. Telecommun. Technol., 2015

Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Commun. Mag., 2015

Information Diffusion Model Based on Privacy Setting in Online Social Networking Services.
Comput. J., 2015

ULRAS: Ultra-Lightweight RFID Authentication Scheme for Mobile Device.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

RFID Secure Application Revocation for IoT in 5G.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Achieving secure friend discovery in social strength-aware PMSNs.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Enhancing privacy through caching in location-based services.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fine-Grained Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Circular Range Search on Encrypted Spatial Data.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

A personalized two-tier cloaking scheme for privacy-aware location-based services.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Privacy-preserving strategies in service quality aware Location-Based Services.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Ciphertext Retrieval in Super-Peer P2P Network.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Secure and Efficient Personal Health Record Scheme Using Attribute-Based Encryption.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Privacy and Authentication Protocol for Mobile RFID Systems.
Wirel. Pers. Commun., 2014

Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2014

Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014

Non-Interactive Key Establishment for Bundle Security Protocol of Space DTNs.
IEEE Trans. Inf. Forensics Secur., 2014

Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud.
IEEE Trans. Cloud Comput., 2014

Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart Comput. Rev., 2014

Achieving dynamic privileges in secure data sharing on cloud storage.
Secur. Commun. Networks, 2014

Preserving identity privacy on multi-owner cloud data during public verification.
Secur. Commun. Networks, 2014

Loss-tolerant authentication with digital signatures.
Secur. Commun. Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
J. Commun. Networks, 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014

Group-based authentication and key agreement for machine-type communication.
Int. J. Grid Util. Comput., 2014

Signalling scheme for achieving dynamic degrees of freedom in MIMO Y channel.
Int. J. Grid Util. Comput., 2014

More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
Int. J. Grid Util. Comput., 2014

Authenticated asymmetric group key agreement based on certificateless cryptosystem.
Int. J. Comput. Math., 2014

Complex signal transmission for multi-user multiple-input multiple-output relay.
IET Commun., 2014

Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding".
IEEE Commun. Lett., 2014

Error- and loss-tolerant bundle fragment authentication for space DTNs.
Frontiers Comput. Sci., 2014

Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks.
CoRR, 2014

Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurr. Comput. Pract. Exp., 2014

RSEL: revocable secure efficient lightweight RFID authentication scheme.
Concurr. Comput. Pract. Exp., 2014

A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Commun. Surv. Tutorials, 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Achieving k-anonymity in privacy-aware location-based services.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Efficient Weight-based Private Matching for proximity-based mobile social networks.
Proceedings of the IEEE International Conference on Communications, 2014

SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014

MPPM: Malware propagation and prevention model in online SNS.
Proceedings of the IEEE International Conference on Communications, 2014

Using dynamic pseudo-IDs to protect privacy in location-based services.
Proceedings of the IEEE International Conference on Communications, 2014

Privacy-area aware dummy generation algorithms for Location-Based Services.
Proceedings of the IEEE International Conference on Communications, 2014

SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

Group Key Agreement in Multimedia Service for Machine Type Communication.
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014

LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

Privacy-Preserving Keyword Search Over Encrypted Data in Cloud Computing.
Proceedings of the Secure Cloud Computing, 2014

2013
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
Secur. Commun. Networks, 2013

An novel three-party authenticated key exchange protocol using one-time key.
J. Netw. Comput. Appl., 2013

Key distribution for heterogeneous public-key cryptosystems.
J. Commun. Networks, 2013

Activity clustering for anomaly detection.
Int. J. Intell. Inf. Database Syst., 2013

Privacy-preserving logistic regression outsourcing in cloud computing.
Int. J. Grid Util. Comput., 2013

Interference management strategy for multiuser two-way relay networks.
Int. J. Embed. Syst., 2013

Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks.
IET Inf. Secur., 2013

The Linear Complexity of a Class of Binary Sequences with Three-Level Autocorrelation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Cyclic code from the first class Whiteman's generalized cyclotomic sequence with order 4
CoRR, 2013

SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.
Comput. Networks, 2013

PPAS: privacy protection authentication scheme for VANET.
Clust. Comput., 2013

End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture.
Clust. Comput., 2013

Key-Evolving Hierarchical ID-Based Signcryption.
Comput. J., 2013

The cross-correlation distribution of a p-ary m-sequence of period p<sup>2k</sup>-1 and its decimated sequence by ( (p<sup>k</sup>+1)<sup>2</sup> / 2(p<sup>e</sup>+1) ).
Adv. Math. Commun., 2013

An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Public auditing for shared data with efficient user revocation in the cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Adaptive Feedback Load Balancing Algorithm in HDFS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

CSP-Based General Detection Model of Network Covert Storage Channels.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013

MobiCache: When k-anonymity meets cache.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Weight-aware private matching scheme for Proximity-based Mobile Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wirel. Commun., 2012

Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Secur. Commun. Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012

Group key agreement for secure group communication in dynamic peer systems.
J. Parallel Distributed Comput., 2012

Group Key Agreement From Signcryption.
KSII Trans. Internet Inf. Syst., 2012

Security Issues on Machine to Machine Communications.
KSII Trans. Internet Inf. Syst., 2012

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2012

Message from the Guest Editors.
Int. J. Inf. Sec., 2012

A method for efficient parallel computation of Tate pairing.
Int. J. Grid Util. Comput., 2012

Fairness electronic payment protocol.
Int. J. Grid Util. Comput., 2012

A new proxy blind signature scheme.
Int. J. Grid Util. Comput., 2012

An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerg. Telecommun. Technol., 2012

A simple and robust handover authentication between HeNB and eNB in LTE networks.
Comput. Networks, 2012

Codes Based Tracing and Revoking Scheme with Constant Ciphertext.
Proceedings of the Provable Security - 6th International Conference, 2012

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Unsupervised Human Action Categorization Using Latent Dirichlet Markov Clustering.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Joint Signal Space Alignment and Precoding in Two-Way Relay Multi-user Networks.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Optimization Transmission for Improving Degrees of Freedom in MIMO Y Channel.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

DCCA-Secure Public-Key Encryptions from Hybrid Paradigms.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Smart-blocking file storage method in cloud computing.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Gmatch: Secure and privacy-preserving group matching in social networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2012

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Robustness of Weighting Receive Antenna Selection Algorithm.
Wirel. Pers. Commun., 2011

Identity-based key distribution for mobile Ad Hoc networks.
Frontiers Comput. Sci. China, 2011

Security analysis of two recently proposed RFID authentication protocols.
Frontiers Comput. Sci. China, 2011

The cross-correlation distribution of a p-ary m-sequence of period p<sup>2m</sup>-1 and its decimation by (p<sup>m</sup>+1)<sup>2</sup> / 2(p<sup>e</sup>+1).
CoRR, 2011

On the Cross-Correlation of a Ternary m-sequence of Period 3<sup>4k</sup>-1 and Its Decimated Sequence by (3<sup>2k</sup>+1)<sup>2</sup> / 20.
CoRR, 2011

$p$-ary sequences with six-valued cross-correlation function: a new decimation of Niho type
CoRR, 2011

On the cross-correlation of a ternary m-sequence of period 3<sup>4k</sup> - 1 and its decimated sequence by (3<sup>2k</sup>+1)<sup>2</sup>/20.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011

Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Abuse-freeness Electronic Payment Protocol.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Forward Secure Proxy Blind Signature Scheme.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Security Analysis of Some Recent Authentication Protocols for RFID.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Delay Tolerant Networking.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011

2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010

Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010

ID-based authenticated group key agreement from bilinear maps.
Frontiers Comput. Sci. China, 2010

Performance analysis of optimal antenna scheme in transmit diversity systems.
Proceedings of the Sixth International Conference on Natural Computation, 2010

Behavior Clustering for Anomaly Detection.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

A Stream Pattern Matching Method for Traffic Analysis.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

DASR: Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad Hoc Networks.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
Secure Error-Correction Network Coding in a Randomized Setting.
Proceedings of the Advances in Information Security and Assurance, 2009

An Efficient Fast Authentication Protocol.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A New Abuse-Free Fair Electronic Payment Protocol.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Security Analysis of the Kerberos Protocol Using BAN Logic.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Analysis the Properties of TLS Based on Temporal Logic of Knowledge.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves.
IACR Cryptol. ePrint Arch., 2008

Polynomials for Ate Pairing and Ate<sub>i</sub> Pairing.
IACR Cryptol. ePrint Arch., 2008

Secure Network Coding Against the Contamination and Eavesdropping Adversaries
CoRR, 2008

The Design of Optimal Period Interleaver.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Mobile ip registration in certificateless public key infrastructure.
IET Inf. Secur., 2007

2005
Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

A Token-Based Single Sign-On Protocol.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Classified Method Based on Support Vector Machine for Grid Computing Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...