Jianfeng Ma
Orcid: 0000-0002-1679-5800Affiliations:
- Xidian University, School of Cyber Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Xidian University, School of Computer Science, Xi'an, China
According to our database1,
Jianfeng Ma
authored at least 770 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Membership inference attacks via spatial projection-based relative information loss in MLaaS.
Inf. Process. Manag., 2025
2024
Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk.
Int. J. Mach. Learn. Cybern., November, 2024
A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures.
IEEE Internet Things J., November, 2024
PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol With Global-Updated Commitment in IoVs.
IEEE Trans. Intell. Transp. Syst., October, 2024
IEEE Internet Things J., October, 2024
IEEE Trans. Knowl. Data Eng., September, 2024
IEEE/ACM Trans. Netw., August, 2024
IEEE Internet Things J., July, 2024
IEEE Internet Things J., July, 2024
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture.
IEEE Trans. Netw. Serv. Manag., June, 2024
RPPM: A Reputation-Based and Privacy-Preserving Platoon Management Scheme in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., June, 2024
IEEE Internet Things J., May, 2024
IEEE Trans. Knowl. Data Eng., April, 2024
Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-Based Smart Grid.
IEEE Internet Things J., April, 2024
IEEE Trans. Software Eng., March, 2024
$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024
IEEE Trans. Intell. Transp. Syst., March, 2024
Establishing Trustworthy and Privacy-Preserving SAGIVNs in 6G: Architectures, Requirements, and Solutions.
IEEE Netw., March, 2024
Spatio-Temporal Identity Multi-Graph Convolutional Network for Traffic Prediction in the Metaverse.
IEEE J. Sel. Areas Commun., March, 2024
Privacy Protection for Marginal-Sensitive Community Individuals Against Adversarial Community Detection Attacks.
IEEE Trans. Comput. Soc. Syst., February, 2024
Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things.
IEEE Internet Things J., February, 2024
Enabling Efficient Privacy-Preserving Spatiotemporal Location-Based Services for Smart Cities.
IEEE Internet Things J., February, 2024
An Asymmetric Feature Enhancement Network for Multiple Object Tracking of Unmanned Aerial Vehicle.
Remote. Sens., January, 2024
IEEE Netw., January, 2024
Practical Feature Inference Attack in Vertical Federated Learning During Prediction in Artificial Internet of Things.
IEEE Internet Things J., January, 2024
An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse.
IEEE Trans. Inf. Forensics Secur., 2024
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Cloud Comput., 2024
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay.
J. Syst. Archit., 2024
GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio.
J. Syst. Archit., 2024
Inf. Sci., 2024
IEEE Internet Things J., 2024
CoRR, 2024
Comput. Secur., 2024
DawnGNN: Documentation augmented windows malware detection using graph neural network.
Comput. Secur., 2024
Sci. China Inf. Sci., 2024
Sci. China Inf. Sci., 2024
Sci. China Inf. Sci., 2024
Sci. China Inf. Sci., 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2024
Enhancing Cross-Subject fMRI-to-Video Decoding with Global-Local Functional Alignment.
Proceedings of the Computer Vision - ECCV 2024, 2024
Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Artificial Intelligence in Healthcare - First International Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Comput. Secur., December, 2023
IEEE Trans. Mob. Comput., November, 2023
IEEE Trans. Intell. Transp. Syst., November, 2023
Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data.
IEEE Trans. Computers, November, 2023
TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks.
IEEE J. Sel. Areas Commun., November, 2023
IEEE Trans. Big Data, October, 2023
Local Differential Privacy Based Membership-Privacy-Preserving Federated Learning for Deep-Learning-Driven Remote Sensing.
Remote. Sens., October, 2023
J. Supercomput., September, 2023
Efficient Anonymous Authentication and Privacy-Preserving Reliability Evaluation for Mobile Crowdsensing in Vehicular Networks.
IEEE Internet Things J., September, 2023
FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily.
Comput. Secur., September, 2023
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023
IEEE Trans. Ind. Informatics, May, 2023
A Scalable and Auditable Secure Data Sharing Scheme With Traceability for Fog-Based Smart Logistics.
IEEE Internet Things J., May, 2023
IEEE Trans. Cybern., March, 2023
IEEE Trans. Intell. Transp. Syst., February, 2023
Privacy-preserving generative framework for images against membership inference attacks.
IET Commun., January, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation.
IEEE Trans. Serv. Comput., 2023
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks.
IEEE Trans. Serv. Comput., 2023
IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios.
ACM Trans. Internet Techn., 2023
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023
SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2023
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse.
IEEE Trans. Inf. Forensics Secur., 2023
IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis.
IEEE Trans. Inf. Forensics Secur., 2023
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation.
IEEE Trans. Dependable Secur. Comput., 2023
A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2023
A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023
IEEE Netw., 2023
IEEE Internet Things J., 2023
MSTL-GLTP: A Global-Local Decomposition and Prediction Framework for Wireless Traffic.
IEEE Internet Things J., 2023
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage.
IACR Cryptol. ePrint Arch., 2023
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023
Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Proceedings of the 32nd USENIX Security Symposium, 2023
Research on the Distributed Secure Storage of Embedded Terminals Based on the Blockchain.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023
Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.
Proceedings of the Provable and Practical Security, 2023
Proceedings of the 13th International Conference on the Internet of Things, 2023
Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model.
Proceedings of the IEEE International Conference on Communications, 2023
Social Networks Based Robust Federated Learning for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023
MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning.
Proceedings of the IEEE Global Communications Conference, 2023
A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon.
IEEE Trans. Veh. Technol., 2022
RumorDecay: Rumor Dissemination Interruption for Target Recipients in Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2022
Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing.
IEEE Trans. Serv. Comput., 2022
Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing.
ACM Trans. Internet Techn., 2022
PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems.
IEEE Trans. Dependable Secur. Comput., 2022
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
IEEE Syst. J., 2022
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022
Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022
Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain.
Secur. Commun. Networks, 2022
IEEE J. Sel. Areas Commun., 2022
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection.
Inf. Sci., 2022
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things.
Inf. Sci., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Revocable and Privacy-Preserving Decentralized Data Sharing Framework for Fog-Assisted Internet of Things.
IEEE Internet Things J., 2022
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022
NOSnoop: An Effective Collaborative Meta-Learning Scheme Against Property Inference Attack.
IEEE Internet Things J., 2022
PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT.
IEEE Internet Things J., 2022
Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces.
Int. J. Intell. Syst., 2022
A certificateless authentication scheme with fuzzy batch verification for federated UAV network.
Int. J. Intell. Syst., 2022
An efficient and authenticated key establishment scheme based on fog computing for healthcare system.
Frontiers Comput. Sci., 2022
EURASIP J. Wirel. Commun. Netw., 2022
CoRR, 2022
Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022
Comput. Networks, 2022
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment.
Comput. Networks, 2022
Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election.
Sci. China Inf. Sci., 2022
A Lightweight Privacy-Preserving Participant Selection Scheme for Mobile Crowdsensing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Mixed Color Channels (MCC): A Universal Module for Mixed Sample Data Augmentation Methods.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022
Proceedings of the Database Systems for Advanced Applications, 2022
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Parallel Distributed Syst., 2021
IEEE/ACM Trans. Netw., 2021
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Ind. Informatics, 2021
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2021
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Comput. Soc. Syst., 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.
Secur. Commun. Networks, 2021
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things.
Secur. Commun. Networks, 2021
UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things.
Remote. Sens., 2021
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones.
Peer-to-Peer Netw. Appl., 2021
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.
Mob. Networks Appl., 2021
IEEE J. Sel. Areas Commun., 2021
J. Inf. Sci. Eng., 2021
J. Inf. Sci. Eng., 2021
Inf. Sci., 2021
Inf. Sci., 2021
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications.
Inf. Fusion, 2021
Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2021
Trans. Emerg. Telecommun. Technol., 2021
Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021
Comput. Commun., 2021
Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach.
Comput. Networks, 2021
Comput. Networks, 2021
Comput. Networks, 2021
Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks.
Sci. China Inf. Sci., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the IEEE Symposium on Computers and Communications, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model.
Wirel. Commun. Mob. Comput., 2020
IEEE Trans. Wirel. Commun., 2020
IEEE Trans. Veh. Technol., 2020
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020
TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Ind. Informatics, 2020
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Circuits Syst., 2020
IEEE Trans. Circuits Syst. II Express Briefs, 2020
IEEE Trans. Circuits Syst. II Express Briefs, 2020
Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images.
Remote. Sens., 2020
J. Parallel Distributed Comput., 2020
Inf. Sci., 2020
Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering.
Inf. Sci., 2020
Inf. Sci., 2020
Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020
LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020
CoRR, 2020
Comput. Secur., 2020
A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Wirel. Networks, 2019
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Serv. Comput., 2019
Secur. Commun. Networks, 2019
Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing.
Secur. Commun. Networks, 2019
计算机科学, 2019
Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme.
J. Parallel Distributed Comput., 2019
J. Netw. Comput. Appl., 2019
Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Quaternion weighted spherical Bessel-Fourier moment and its invariant for color image reconstruction and object recognition.
Inf. Sci., 2019
PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data.
Inf. Sci., 2019
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019
Inf. Sci., 2019
Inf. Sci., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet Things J., 2019
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019
Int. J. Distributed Sens. Networks, 2019
User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Commun. Syst., 2019
Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model.
IET Inf. Secur., 2019
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.
Entropy, 2019
Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
Entropy, 2019
Research on neural network chaotic encryption algorithm in wireless network security communication.
EURASIP J. Wirel. Commun. Netw., 2019
Distributed Parallel Databases, 2019
CoRR, 2019
CoRR, 2019
Selfholding: A combined attack model using selfish mining with block withholding attack.
Comput. Secur., 2019
Universally composable secure geographic area verification without pre-shared secret.
Sci. China Inf. Sci., 2019
Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
Sci. China Inf. Sci., 2019
Ann. des Télécommunications, 2019
A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.
Proceedings of the 18th IEEE International Conference On Trust, 2019
A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Comparison of Neural Networks' Performance in Early Screening of Autism Spectrum Disorders Under Two MRI Principles.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Research on Resolution Limit of Community Detection in Location-Based Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the Data Science, 2019
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019
Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Transparent Access and Integration of Heterogeneous Encrypted Database in Hybrid Cloud Environment.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Continuous Authentication for the Internet of Things Using Channel State Information.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
World Wide Web, 2018
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices.
Wirel. Commun. Mob. Comput., 2018
IEEE Wirel. Commun., 2018
Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks.
IEEE Trans. Veh. Technol., 2018
J. Supercomput., 2018
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Syst. J., 2018
Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept.
Sensors, 2018
Peer-to-Peer Netw. Appl., 2018
Peer-to-Peer Netw. Appl., 2018
VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Netw. Appl., 2018
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Netw. Appl., 2018
Peer-to-Peer Netw. Appl., 2018
IEEE Netw., 2018
J. Netw. Comput. Appl., 2018
BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2018
J. Inf. Sci. Eng., 2018
J. Inf. Sci. Eng., 2018
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018
Hidden community identification in location-based social network via probabilistic venue sequences.
Inf. Sci., 2018
IEEE Internet Things J., 2018
Int. J. Web Grid Serv., 2018
Int. J. High Perform. Comput. Netw., 2018
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018
DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing.
Future Gener. Comput. Syst., 2018
Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018
ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence.
CoRR, 2018
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018
ProactiveCrowd: Modelling Proactive Steering Behaviours for Agent-Based Crowd Simulation.
Comput. Graph. Forum, 2018
Comput. Electr. Eng., 2018
Comput. Informatics, 2018
IEEE Access, 2018
IEEE Access, 2018
Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data.
IEEE Access, 2018
CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.
IEEE Access, 2018
A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018
IEEE Access, 2018
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the International Conference on Networking and Network Applications, 2018
EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018
2017
Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks.
IEEE Trans. Veh. Technol., 2017
IEEE Trans. Inf. Forensics Secur., 2017
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017
Secur. Commun. Networks, 2017
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel.
Peer-to-Peer Netw. Appl., 2017
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive Mob. Comput., 2017
VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017
Mob. Inf. Syst., 2017
Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mob. Inf. Syst., 2017
J. Medical Syst., 2017
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017
J. Comput. Syst. Sci., 2017
Inf. Technol. Control., 2017
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud.
Inf. Sci., 2017
Sampling-based adaptive bounding evolutionary algorithm for continuous optimization problems.
Inf. Sci., 2017
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017
Int. J. Web Grid Serv., 2017
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
Int. J. Web Grid Serv., 2017
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017
Int. J. Embed. Syst., 2017
Int. J. Commun. Syst., 2017
Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017
Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization.
CoRR, 2017
Clust. Comput., 2017
An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.
Sci. China Inf. Sci., 2017
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017
FCT: a fully-distributed context-aware trust model for location based service recommendation.
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
Sci. China Inf. Sci., 2017
APRS: a privacy-preserving location-aware recommender system based on differentially private histogram.
Sci. China Inf. Sci., 2017
Comput. Electr. Eng., 2017
IEEE Access, 2017
IEEE Access, 2017
IEEE Access, 2017
Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the International Conference on Networking and Network Applications, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
J. Supercomput., 2016
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
A new method to deduce counterexamples in secure routing protocols based on strand space model.
Secur. Commun. Networks, 2016
IEEE Netw., 2016
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Syst., 2016
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Syst., 2016
J. Commun. Inf. Networks, 2016
J. Commun. Inf. Networks, 2016
KSII Trans. Internet Inf. Syst., 2016
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
Inf. Technol. Control., 2016
An intelligent movie recommendation system through group-level sentiment analysis in microblogs.
Neurocomputing, 2016
Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016
Improved algorithm for secure outsourcing of modular exponentiations with high checkability.
Int. J. Ad Hoc Ubiquitous Comput., 2016
Future Gener. Comput. Syst., 2016
Concurr. Comput. Pract. Exp., 2016
DALP: A demand-aware location privacy protection scheme in continuous location-based services.
Concurr. Comput. Pract. Exp., 2016
Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016
Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating.
Sci. China Inf. Sci., 2016
Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.
Comput. Electr. Eng., 2016
Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016
Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 29th International Conference on Computer Animation and Social Agents, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
Improving the utility in differential private histogram publishing: Theoretical study and practice.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
LTPPM: a location and trajectory privacy protection mechanism in participatory sensing.
Wirel. Commun. Mob. Comput., 2015
Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility.
IEEE Trans. Wirel. Commun., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Theor. Comput. Sci., 2015
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Comput. Collect. Intell., 2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Peer-to-Peer Netw. Appl., 2015
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2015
Mob. Inf. Syst., 2015
计算机科学, 2015
J. Comput. Sci. Technol., 2015
J. Comput. Secur., 2015
J. Ambient Intell. Humaniz. Comput., 2015
A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems.
Inf. Technol. Control., 2015
A Security Quantitative Analysis Method For Access Control Based on Security Entropy.
Int. J. Netw. Secur., 2015
A two-factor authenticated key exchange protocol based on RSA with dynamic passwords.
Int. J. Embed. Syst., 2015
Energy-Efficient Collaborative Communication for Optimization Cluster Heads Selection Based on Genetic Algorithms in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment.
Int. J. Distributed Sens. Networks, 2015
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Commun. Syst., 2015
Int. J. Commun. Syst., 2015
Future Gener. Comput. Syst., 2015
Future Gener. Comput. Syst., 2015
IEEE Commun. Surv. Tutorials, 2015
Stability analysis of an <i>e</i>-<i>SEIAR</i> model with point-to-group worm propagation.
Commun. Nonlinear Sci. Numer. Simul., 2015
Comput. Networks, 2015
Comput. J., 2015
Sci. China Inf. Sci., 2015
Sci. China Inf. Sci., 2015
An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information.
Sci. China Inf. Sci., 2015
Ad Hoc Sens. Wirel. Networks, 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Wirel. Pers. Commun., 2014
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wirel. Pers. Commun., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Cloud Comput., 2014
J. Softw., 2014
Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Netw. Comput. Appl., 2014
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014
J. Inf. Sci. Eng., 2014
J. Comput., 2014
J. Comput., 2014
KSII Trans. Internet Inf. Syst., 2014
Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014
Future Gener. Comput. Syst., 2014
From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014
Sci. China Inf. Sci., 2014
Sci. China Inf. Sci., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
Proceedings of the Information and Communication Technology, 2014
A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014
2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2013
An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation.
IEEE Trans. Smart Grid, 2013
IEEE Trans. Inf. Forensics Secur., 2013
Smart Comput. Rev., 2013
J. Networks, 2013
J. Netw. Comput. Appl., 2013
J. Medical Syst., 2013
J. Internet Serv. Inf. Secur., 2013
Inf. Technol. Control., 2013
Int. J. Grid Util. Comput., 2013
Int. J. Distributed Sens. Networks, 2013
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
Int. J. Distributed Sens. Networks, 2013
Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
CoRR, 2013
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013
Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Secur. Commun. Networks, 2012
A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012
Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms.
Pattern Recognit., 2012
J. Vis. Commun. Image Represent., 2012
Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2012
Int. J. Netw. Secur., 2012
Int. J. Netw. Secur., 2012
Int. J. Grid Util. Comput., 2012
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems.
Int. J. Distributed Sens. Networks, 2012
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerg. Telecommun. Technol., 2012
PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2012
User authentication via keystroke dynamics based on difference subspace and slope correlation degree.
Digit. Signal Process., 2012
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
CoRR, 2012
Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
CoRR, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
A simple energy-efficient routing algorithm for Wireless Sensor Networks based on Artificial Potential Field.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
2011
Mob. Networks Appl., 2011
J. Parallel Distributed Comput., 2011
Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario.
Intell. Autom. Soft Comput., 2011
Frontiers Comput. Sci. China, 2011
Frontiers Comput. Sci. China, 2011
EURASIP J. Wirel. Commun. Netw., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Mobile Computing, Applications, and Services, 2011
From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Sixth International Conference on Image and Graphics, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
IEEE Trans. Wirel. Commun., 2010
Rotation invariant analysis and orientation estimation method for texture classification based on Radon transform and correlation analysis.
J. Vis. Commun. Image Represent., 2010
J. Digit. Content Technol. its Appl., 2010
A highly secure identity-based authenticated key-exchange protocol for satellite communication.
J. Commun. Networks, 2010
J. Convergence Inf. Technol., 2010
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
Int. J. Netw. Secur., 2010
Int. J. Netw. Secur., 2010
IEICE Trans. Inf. Syst., 2010
Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2010
EURASIP J. Wirel. Commun. Netw., 2010
Comput. Secur., 2010
Sci. China Inf. Sci., 2010
Sci. China Inf. Sci., 2010
Ad Hoc Sens. Wirel. Networks, 2010
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010
Proceedings of the International Conference on E-Business and E-Government, 2010
Proceedings of the International Conference on E-Business and E-Government, 2010
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the Guide to Wireless Mesh Networks, 2009
Wirel. Commun. Mob. Comput., 2009
IEEE Trans. Wirel. Commun., 2009
Int. J. Netw. Secur., 2009
Defending passive worms in unstructured P2P networks based on healthy file dissemination.
Comput. Secur., 2009
Comput. Networks, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Int. J. Netw. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wirel. Commun. Netw., 2008
CoRR, 2008
Sci. China Ser. F Inf. Sci., 2008
Ad Hoc Sens. Wirel. Networks, 2008
Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008
Proceedings of the MSN 2008, 2008
A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks.
Proceedings of the MSN 2008, 2008
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms.
Pattern Recognit., 2007
Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor.
Int. J. Autom. Control., 2007
Sci. China Ser. F Inf. Sci., 2007
Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Proceedings of the Computational Intelligence and Security, International Conference, 2006
On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Sci. China Ser. F Inf. Sci., 2005
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005
Proceedings of the Advances in Intelligent Computing, 2005
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
IEEE Trans. Consumer Electron., 2004
IEEE Trans. Consumer Electron., 2004
An intrusion-tolerant authorization and authentication scheme in distributed environments.
ACM SIGOPS Oper. Syst. Rev., 2004
J. Comput. Sci. Technol., 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004
2003
Proceedings of the IEEE Congress on Evolutionary Computation, 2003