Hui Li
Orcid: 0000-0001-8310-7169Affiliations:
- Xidian University, State Key Laboratory of Integrated Network Services, Xi'an, China
- Xidian University, School of Cyber Engineering, Xi'an, China
According to our database1,
Hui Li
authored at least 442 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024
Peer Peer Netw. Appl., July, 2024
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024
EIV-BT-ABE: Efficient Attribute-Based Encryption With Black-Box Traceability Based on Encrypted Identity Vector.
IEEE Internet Things J., May, 2024
CR-FH-CPABE: Secure File Hierarchy Attribute-Based Encryption Scheme Supporting User Collusion Resistance in Cloud Computing.
IEEE Internet Things J., May, 2024
IEEE Trans. Netw. Serv. Manag., April, 2024
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024
Fault-Tolerant and Collusion-Resistant Lattice-Based Multidimensional Privacy-Preserving Data Aggregation in Edge-Based Smart Grid.
IEEE Internet Things J., March, 2024
PBFL: Privacy-Preserving and Byzantine-Robust Federated-Learning-Empowered Industry 4.0.
IEEE Internet Things J., February, 2024
Public-Key Inverted-Index Keyword Search With Designated Tester and Multiuser Key Decryption in IoT.
IEEE Internet Things J., January, 2024
Ciphertext Retrieval With Identity Bidirectional Authentication and Matrix Index in IoT.
IEEE Internet Things J., January, 2024
FLSG: A Novel Defense Strategy Against Inference Attacks in Vertical Federated Learning.
IEEE Internet Things J., January, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
LSPSS: Constructing Lightweight and Secure Scheme for Private Data Storage and Sharing in Aerial Computing.
IEEE Trans. Serv. Comput., 2024
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles.
Microprocess. Microsystems, 2024
iDP-FL: A fine-grained and privacy-aware federated learning framework for deep neural networks.
Inf. Sci., 2024
Achieving federated logistic regression training towards model confidentiality with semi-honest TEE.
Inf. Sci., 2024
Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things.
IEEE Internet Things J., 2024
IEEE Internet Things J., 2024
Expert Syst. Appl., 2024
Data complexity-based batch sanitization method against poison in distributed learning.
Digit. Commun. Networks, 2024
Enhancing Security and Privacy in Federated Learning using Update Digests and Voting-Based Defense.
CoRR, 2024
Seamless group handover authentication protocol for vehicle networks: Services continuity.
Comput. Networks, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
2023
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption.
Inf. Sci., December, 2023
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023
A Secure and Efficient Two-Party Protocol Enabling Ownership Transfer of RFID Objects.
IEEE Internet Things J., September, 2023
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023
IEEE Internet Things J., August, 2023
Peer Peer Netw. Appl., May, 2023
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data.
IEEE Trans. Inf. Forensics Secur., 2023
Go-Sharing: A Blockchain-Based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
IEEE Trans. Dependable Secur. Comput., 2023
Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression.
IEEE Trans. Cloud Comput., 2023
MSIAP: A Dynamic Searchable Encryption for Privacy-Protection on Smart Grid With Cloud-Edge-End.
IEEE Trans. Cloud Comput., 2023
Secure and Efficient Lightweight Protocol for Emergency Vehicle Avoidance Based on Cloud.
IEEE Netw., 2023
An Automatic Privacy-Aware Framework for Text Data in Online Social Network Based on a Multi-Deep Learning Model.
Int. J. Intell. Syst., 2023
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023
IEEE Access, 2023
Fine-grained Poisoning Attack to Local Differential Privacy Protocols for Mean and Variance Estimation.
Proceedings of the 32nd USENIX Security Symposium, 2023
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023
Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data.
Proceedings of the IEEE Global Communications Conference, 2023
Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022
Privacy Preserving Participant Recruitment for Coverage Maximization in Location Aware Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2022
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022
Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack.
IEEE Trans. Dependable Secur. Comput., 2022
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets.
IEEE Trans. Dependable Secur. Comput., 2022
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022
Blockchain-based trust management for verifiable time synchronization service in IoT.
Peer-to-Peer Netw. Appl., 2022
J. Netw. Comput. Appl., 2022
CORK: A privacy-preserving and lossless federated learning scheme for deep neural network.
Inf. Sci., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Secure and Efficient Data-Privacy-Preserving Scheme for Mobile Cyber-Physical Systems.
IEEE Internet Things J., 2022
Encrypted Data Retrieval and Sharing Scheme in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022
DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices.
IEEE Internet Things J., 2022
Fine-grained Poisoning Attacks to Local Differential Privacy Protocols for Mean and Variance Estimation.
CoRR, 2022
A new RFID ultra-lightweight authentication protocol for medical privacy protection in smart living.
Comput. Commun., 2022
ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data.
Sci. China Inf. Sci., 2022
BiTouch: enabling secure touch-to-access device pairing based on human body's electrical response.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
Enabling secure touch-to-access device pairing based on human body's electrical response.
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
HeHe: Balancing the Privacy and Efficiency in Training CNNs over the Semi-honest Cloud.
Proceedings of the Information Security - 25th International Conference, 2022
A blockchain-based Privacy-Preserving Framework for Cross-Social Network Photo Sharing.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Exploiting Interactions of Multiple Interference for Cooperative Interference Alignment.
IEEE Trans. Wirel. Commun., 2021
IEEE Trans. Ind. Informatics, 2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021
Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data.
IEEE Trans. Cloud Comput., 2021
Secur. Commun. Networks, 2021
A Composable Multifactor Identity Authentication and Authorization Scheme for 5G Services.
Secur. Commun. Networks, 2021
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud.
Peer-to-Peer Netw. Appl., 2021
Multim. Tools Appl., 2021
Cross-domain access control based on trusted third-party and attribute mapping center.
J. Syst. Archit., 2021
Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV.
J. Frankl. Inst., 2021
A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent.
Inf. Sci., 2021
An anomaly detection method based on double encoder-decoder generative adversarial networks.
Ind. Robot, 2021
Data-Driven Optimization for Cooperative Edge Service Provisioning With Demand Uncertainty.
IEEE Internet Things J., 2021
Int. J. Inf. Sec., 2021
Detection and defense against network isolation attacks in software-defined networks.
Trans. Emerg. Telecommun. Technol., 2021
Trans. Emerg. Telecommun. Technol., 2021
Comput. Commun., 2021
Privacy-Preserving and Auditable Federated Deep Reinforcement Learning for Robotic Manipulation.
Proceedings of the Network and System Security - 15th International Conference, 2021
To Talk or to Work: Flexible Communication Compression for Energy Efficient Federated Learning over Heterogeneous Mobile Edge Devices.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021
2020
IEEE Wirel. Commun., 2020
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020
A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
Novel Secure Group Data Exchange Protocol in Smart Home with Physical Layer Network Coding.
Sensors, 2020
A dynamic and verifiable multi-keyword ranked search scheme in the P2P networking environment.
Peer-to-Peer Netw. Appl., 2020
Hyperspectral Imagery Classification Based on Compressed Convolutional Neural Network.
IEEE Geosci. Remote. Sens. Lett., 2020
A secure and efficient outsourced computation on data sharing scheme for privacy computing.
J. Parallel Distributed Comput., 2020
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020
Inf. Sci., 2020
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020
Mining the frequency of time-constrained serial episodes over massive data sequences and streams.
Future Gener. Comput. Syst., 2020
Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack.
CoRR, 2020
Concurr. Comput. Pract. Exp., 2020
IEEE Commun. Surv. Tutorials, 2020
Comput. Secur., 2020
Comput. Commun., 2020
Prediction of dissolved oxygen in aquaculture based on gradient boosting decision tree and long short-term memory network: A study of Chang Zhou fishery demonstration base, China.
Comput. Electron. Agric., 2020
A Collaborative Auditing Blockchain for Trustworthy Data Integrity in Cloud Storage System.
IEEE Access, 2020
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020
Lightweight Secure Data Exchange in Decentralized VANETs with Physical Layer Security.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the 2020 International Conference on Management of Data, 2020
BRUNCH: Branching Structure Inference of Hybrid Multivariate Hawkes Processes with Application to Social Media.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Permutation Matrix Encryption Based Ultralightweight Secure RFID Scheme in Internet of Vehicles.
Sensors, 2019
IEEE Netw., 2019
On distributivity equations of implications over overlap functions and contrapositive symmetry equations of implications.
J. Intell. Fuzzy Syst., 2019
Inf. Sci., 2019
The optimal upper bound of the number of queries for Laplace mechanism under differential privacy.
Inf. Sci., 2019
Guest Editorial Special Issue on Security and Privacy Protection for Big Data and IoT.
IEEE Internet Things J., 2019
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019
Int. J. Inf. Technol. Web Eng., 2019
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019
Light-load efficiency improving boost converter with the hybrid modulation of hysteresis current mode and burst mode.
IEICE Electron. Express, 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Entropy, 2019
Distributed Parallel Databases, 2019
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019
IEEE Access, 2019
An Efficient Multi-Message and Multi-Receiver Signcryption Scheme for Heterogeneous Smart Mobile IoT.
IEEE Access, 2019
IEEE Access, 2019
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Proceedings of the 2019 IEEE SmartWorld, 2019
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
PGSM-DPI: Precisely Guided Signature Matching of Deep Packet Inspection for Traffic Analysis.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Participant Recruitment for Coverage-Aware Mobile Crowdsensing with Location Differential Privacy.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Delay-Aware Adaptive Wireless Video Streaming in Edge Computing Assisted Ultra-Dense Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Closer Look Tells More: A Facial Distortion Based Liveness Detection for Face Authentication.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Ind. Informatics, 2018
EARS-DM: Efficient Auto Correction Retrieval Scheme for Data Management in Edge Computing.
Sensors, 2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Netw. Appl., 2018
Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Netw. Appl., 2018
Peer-to-Peer Netw. Appl., 2018
Secure ultra-lightweight RFID mutual authentication protocol based on transparent computing for IoV.
Peer-to-Peer Netw. Appl., 2018
Peer-to-Peer Netw. Appl., 2018
Secure and Efficient Privacy-Preserving Ciphertext Retrieval in Connected Vehicular Cloud Computing.
IEEE Netw., 2018
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018
J. Medical Syst., 2018
Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks.
Int. J. Distributed Sens. Networks, 2018
Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G.
IET Commun., 2018
IACR Cryptol. ePrint Arch., 2018
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.
Future Gener. Comput. Syst., 2018
ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence.
CoRR, 2018
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018
Sci. China Inf. Sci., 2018
IEEE Access, 2018
Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 IEEE International Conference on Edge Computing, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017
Publicly Verifiable Inner Product Evaluation over Outsourced Data Streams under Multiple Keys.
IEEE Trans. Serv. Comput., 2017
SIRC: A Secure Incentive Scheme for Reliable Cooperative Downloading in Highway VANETs.
IEEE Trans. Intell. Transp. Syst., 2017
Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomed. Health Informatics, 2017
Sensors, 2017
1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity.
Secur. Commun. Networks, 2017
Secur. Commun. Networks, 2017
Pers. Ubiquitous Comput., 2017
Pers. Ubiquitous Comput., 2017
Peer-to-Peer Netw. Appl., 2017
A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach.
Mob. Inf. Syst., 2017
Secret Data Transmission in Wireless Sensor Network with Physical Layer Network Coding.
J. Inf. Sci. Eng., 2017
J. Commun. Inf. Networks, 2017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017
Inf. Sci., 2017
Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services.
IEEE Internet Things J., 2017
An Efficient and Fine-Grained Big Data Access Control Scheme With Privacy-Preserving Policy.
IEEE Internet Things J., 2017
Comput. Stand. Interfaces, 2017
A two-party privacy preserving set intersection protocol against malicious users in cloud computing.
Comput. Stand. Interfaces, 2017
Comput. Secur., 2017
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017
A new method to construct golay complementary set and near-complementary set by paraunitary matrices.
Proceedings of the Eighth International Workshop on Signal Design and Its Applications in Communications, 2017
Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
PCD: A privacy-preserving predictive clinical decision scheme with E-health big data based on RNN.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Australasian Computer Science Week Multiconference, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Wirel. Commun. Mob. Comput., 2016
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Veh. Technol., 2016
Protecting Your Right: Verifiable Attribute-Based Keyword Search with Fine-Grained Owner-Enforced Search Authorization in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2016
Sensors, 2016
EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Secur. Commun. Networks, 2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Lightweight and ultralightweight RFID mutual authentication protocol with cache in the reader for IoT in 5G.
Secur. Commun. Networks, 2016
Pervasive Mob. Comput., 2016
An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks.
Int. J. Technol. Hum. Interact., 2016
PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
Int. J. Embed. Syst., 2016
A Generalized Construction of Non-Square M-QAM Sequences with Low PMEPR for OFDM Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Digit. Signal Process., 2016
GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Comput. Networks, 2016
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Protection of location privacy in continuous LBSs against adversaries with background information.
Proceedings of the 2016 International Conference on Computing, 2016
Match-MORE: An efficient private matching scheme using friends-of-friends' recommendation.
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Serv. Comput., 2015
IEEE Trans. Serv. Comput., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding".
IEEE Trans. Computers, 2015
Secur. Commun. Networks, 2015
PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Secur. Commun. Networks, 2015
V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mob. Inf. Syst., 2015
KSII Trans. Internet Inf. Syst., 2015
Int. J. Grid Util. Comput., 2015
PAS: An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid.
Int. J. Distributed Sens. Networks, 2015
Int. J. Distributed Sens. Networks, 2015
Int. J. Comput. Math., 2015
Future Gener. Comput. Syst., 2015
A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerg. Telecommun. Technol., 2015
Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Commun. Mag., 2015
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services.
Comput. J., 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Catch you if you lie to me: Efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the International Conference on Computing, Networking and Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Wirel. Pers. Commun., 2014
IEEE Trans. Veh. Technol., 2014
Verifiable Privacy-Preserving Multi-Keyword Text Search in the Cloud Supporting Similarity-Based Ranking.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Cloud Comput., 2014
Smart Comput. Rev., 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
J. Commun. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014
Int. J. Grid Util. Comput., 2014
Int. J. Grid Util. Comput., 2014
More DCCA-secure public-key encryptions from KEM + DEM style hybrid paradigms and some observations on the 'inner-outer' structure.
Int. J. Grid Util. Comput., 2014
Int. J. Comput. Math., 2014
IET Commun., 2014
IEEE Commun. Lett., 2014
Frontiers Comput. Sci., 2014
CoRR, 2014
Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurr. Comput. Pract. Exp., 2014
Concurr. Comput. Pract. Exp., 2014
IEEE Commun. Surv. Tutorials, 2014
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014
Protecting your right: Attribute-based keyword search with fine-grained owner-enforced search authorization in the cloud.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the IEEE International Conference on Communications, 2014
SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the 2014 Asia-Pacific Services Computing Conference, 2014
LRMAPC: A Lightweight RFID Mutual Authentication Protocol with Cache in the Reader for IoT.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
Proceedings of the Secure Cloud Computing, 2014
2013
Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks.
Secur. Commun. Networks, 2013
J. Netw. Comput. Appl., 2013
J. Commun. Networks, 2013
Int. J. Grid Util. Comput., 2013
Int. J. Embed. Syst., 2013
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks.
IET Inf. Secur., 2013
The Linear Complexity of a Class of Binary Sequences with Three-Level Autocorrelation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Cyclic code from the first class Whiteman's generalized cyclotomic sequence with order 4
CoRR, 2013
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.
Comput. Networks, 2013
End-to-end security scheme for Machine Type Communication based on Generic Authentication Architecture.
Clust. Comput., 2013
The cross-correlation distribution of a p-ary m-sequence of period p<sup>2k</sup>-1 and its decimated sequence by ( (p<sup>k</sup>+1)<sup>2</sup> / 2(p<sup>e</sup>+1) ).
Adv. Math. Commun., 2013
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
3PLUS: Privacy-preserving pseudo-location updating system in location-based services.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Privacy-preserving multi-keyword text search in the cloud supporting similarity-based ranking.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IEEE Trans. Wirel. Commun., 2012
Secur. Commun. Networks, 2012
A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012
J. Parallel Distributed Comput., 2012
KSII Trans. Internet Inf. Syst., 2012
Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2012
Int. J. Grid Util. Comput., 2012
Frontiers Comput. Sci., 2012
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerg. Telecommun. Technol., 2012
Comput. Networks, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
ESLRAS: A Lightweight RFID Authentication Scheme with High Efficiency and Strong Security for Internet of Things.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012
2011
Wirel. Pers. Commun., 2011
Frontiers Comput. Sci. China, 2011
Frontiers Comput. Sci. China, 2011
The cross-correlation distribution of a p-ary m-sequence of period p<sup>2m</sup>-1 and its decimation by (p<sup>m</sup>+1)<sup>2</sup> / 2(p<sup>e</sup>+1).
CoRR, 2011
On the Cross-Correlation of a Ternary m-sequence of Period 3<sup>4k</sup>-1 and Its Decimated Sequence by (3<sup>2k</sup>+1)<sup>2</sup> / 20.
CoRR, 2011
$p$-ary sequences with six-valued cross-correlation function: a new decimation of Niho type
CoRR, 2011
On the cross-correlation of a ternary m-sequence of period 3<sup>4k</sup> - 1 and its decimated sequence by (3<sup>2k</sup>+1)<sup>2</sup>/20.
Proceedings of the Fifth International Workshop on Signal Design and its Applications in Communications, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Delay Tolerant Networking.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011
2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010
Effective watermarking scheme in the encrypted domain for buyer-seller watermarking protocol.
Inf. Sci., 2010
Frontiers Comput. Sci. China, 2010
Proceedings of the Sixth International Conference on Natural Computation, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
DASR: Distributed Anonymous Secure Routing with Good Scalability for Mobile Ad Hoc Networks.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010
2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
CoRR, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
IET Inf. Secur., 2007
2005
Efficient Identity Based Proxy-Signcryption Schemes with Forward Security and Public Verifiability.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
A Classified Method Based on Support Vector Machine for Grid Computing Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004