Jianfeng Ma

Orcid: 0000-0002-1679-5800

Affiliations:
  • Xidian University, School of Cyber Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
  • Xidian University, School of Computer Science, Xi'an, China


According to our database1, Jianfeng Ma authored at least 770 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Membership inference attacks via spatial projection-based relative information loss in MLaaS.
Inf. Process. Manag., 2025

2024
Target link protection against link-prediction-based attacks via artificial bee colony algorithm based on random walk.
Int. J. Mach. Learn. Cybern., November, 2024

A Survey on Security of Unmanned Aerial Vehicle Systems: Attacks and Countermeasures.
IEEE Internet Things J., November, 2024

PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol With Global-Updated Commitment in IoVs.
IEEE Trans. Intell. Transp. Syst., October, 2024

Dvatar: Simulating the Binary Firmware of Drones.
IEEE Internet Things J., October, 2024

BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems.
IEEE Trans. Knowl. Data Eng., September, 2024

K-Backup: Load- and TCAM-Aware Multi-Backup Fast Failure Recovery in SDNs.
IEEE/ACM Trans. Netw., August, 2024

Adaptive Robust Learning Against Backdoor Attacks in Smart Homes.
IEEE Internet Things J., July, 2024

IMFL: An Incentive Mechanism for Federated Learning With Personalized Protection.
IEEE Internet Things J., July, 2024

PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture.
IEEE Trans. Netw. Serv. Manag., June, 2024

RPPM: A Reputation-Based and Privacy-Preserving Platoon Management Scheme in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., June, 2024

MLDR: An O(|V|/4) and Near-Optimal Routing Scheme for LEO Mega-Constellations.
IEEE Internet Things J., May, 2024

A Survey on Searchable Symmetric Encryption.
ACM Comput. Surv., May, 2024

FlGan: GAN-Based Unbiased Federated Learning Under Non-IID Settings.
IEEE Trans. Knowl. Data Eng., April, 2024

Limitation of Reactance Perturbation Strategy Against False Data Injection Attacks on IoT-Based Smart Grid.
IEEE Internet Things J., April, 2024

Range Specification Bug Detection in Flight Control System Through Fuzzing.
IEEE Trans. Software Eng., March, 2024

$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024

RPAU: Fooling the Eyes of UAVs via Physical Adversarial Patches.
IEEE Trans. Intell. Transp. Syst., March, 2024

Establishing Trustworthy and Privacy-Preserving SAGIVNs in 6G: Architectures, Requirements, and Solutions.
IEEE Netw., March, 2024

Spatio-Temporal Identity Multi-Graph Convolutional Network for Traffic Prediction in the Metaverse.
IEEE J. Sel. Areas Commun., March, 2024

Privacy Protection for Marginal-Sensitive Community Individuals Against Adversarial Community Detection Attacks.
IEEE Trans. Comput. Soc. Syst., February, 2024

Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things.
IEEE Internet Things J., February, 2024

Enabling Efficient Privacy-Preserving Spatiotemporal Location-Based Services for Smart Cities.
IEEE Internet Things J., February, 2024

An Asymmetric Feature Enhancement Network for Multiple Object Tracking of Unmanned Aerial Vehicle.
Remote. Sens., January, 2024

An Efficient Data-Driven Traffic Prediction Framework for Network Digital Twin.
IEEE Netw., January, 2024

Practical Feature Inference Attack in Vertical Federated Learning During Prediction in Artificial Internet of Things.
IEEE Internet Things J., January, 2024

Eyes See Hazy while Algorithms Recognize Who You Are.
ACM Trans. Priv. Secur., 2024

An Anti-Disguise Authentication System Using the First Impression of Avatar in Metaverse.
IEEE Trans. Inf. Forensics Secur., 2024

Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings.
IEEE Trans. Inf. Forensics Secur., 2024

Efficient and Privacy-Preserving Encode-Based Range Query Over Encrypted Cloud Data.
IEEE Trans. Inf. Forensics Secur., 2024

A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects.
IEEE Trans. Inf. Forensics Secur., 2024

Effectively Improving Data Diversity of Substitute Training for Data-Free Black-Box Attack.
IEEE Trans. Dependable Secur. Comput., 2024

ADDITION: Detecting Adversarial Examples With Image-Dependent Noise Reduction.
IEEE Trans. Dependable Secur. Comput., 2024

T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation.
IEEE Trans. Dependable Secur. Comput., 2024

FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination.
IEEE Trans. Dependable Secur. Comput., 2024

Lightweight and Privacy-Preserving Dual Incentives for Mobile Crowdsensing.
IEEE Trans. Cloud Comput., 2024

Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay.
J. Syst. Archit., 2024

GNSS spoofing detection for UAVs using Doppler frequency and Carrier-to-Noise Density Ratio.
J. Syst. Archit., 2024

Defending against membership inference attacks: RM Learning is all you need.
Inf. Sci., 2024

IoT Route Planning Based on Spatiotemporal Interactive Attention Neural Network.
IEEE Internet Things J., 2024

Slot: Provenance-Driven APT Detection through Graph Reinforcement Learning.
CoRR, 2024

Shadow backdoor attack: Multi-intensity backdoor attack against federated learning.
Comput. Secur., 2024

DawnGNN: Documentation augmented windows malware detection using graph neural network.
Comput. Secur., 2024

Efficient privacy-preserving federated learning under dishonest-majority setting.
Sci. China Inf. Sci., 2024

Mitigate noisy data for smart IoT via GAN based machine unlearning.
Sci. China Inf. Sci., 2024

CToMP: a cycle-task-oriented memory protection scheme for unmanned systems.
Sci. China Inf. Sci., 2024

CoDetect: cooperative anomaly detection with privacy protection towards UAV swarm.
Sci. China Inf. Sci., 2024

Adaptive Oriented Adversarial Attacks on Visible and Infrared Image Fusion Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2024

Enhancing Cross-Subject fMRI-to-Video Decoding with Global-Local Functional Alignment.
Proceedings of the Computer Vision - ECCV 2024, 2024

Watch the Rhythm: Breaking Privacy with Accelerometer at the Extremely-Low Sampling Rate of 5Hz.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Boosting Practical Control-Flow Integrity with Complete Field Sensitivity and Origin Awareness.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

ZMAM: A ZKP-Based Mutual Authentication Scheme for the IoMT.
Proceedings of the Artificial Intelligence in Healthcare - First International Conference, 2024

Action-Driven UAV Fingerprint Verification with Perception Data.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Design and implementation of an efficient container tag dynamic taint analysis.
Comput. Secur., December, 2023

Electrocardiogram Based Group Device Pairing for Wearables.
IEEE Trans. Mob. Comput., November, 2023

Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET.
IEEE Trans. Intell. Transp. Syst., November, 2023

Privacy-Preserving Bloom Filter-Based Keyword Search Over Large Encrypted Cloud Data.
IEEE Trans. Computers, November, 2023

TFL-DT: A Trust Evaluation Scheme for Federated Learning in Digital Twin for Mobile Networks.
IEEE J. Sel. Areas Commun., November, 2023

Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database.
IEEE Trans. Big Data, October, 2023

Local Differential Privacy Based Membership-Privacy-Preserving Federated Learning for Deep-Learning-Driven Remote Sensing.
Remote. Sens., October, 2023

BejaGNN: behavior-based Java malware detection via graph neural network.
J. Supercomput., September, 2023

Efficient Anonymous Authentication and Privacy-Preserving Reliability Evaluation for Mobile Crowdsensing in Vehicular Networks.
IEEE Internet Things J., September, 2023

FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily.
Comput. Secur., September, 2023

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023

Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT.
IEEE Trans. Ind. Informatics, May, 2023

A Scalable and Auditable Secure Data Sharing Scheme With Traceability for Fog-Based Smart Logistics.
IEEE Internet Things J., May, 2023

GrpAvoid: Multigroup Collision-Avoidance Control and Optimization for UAV Swarm.
IEEE Trans. Cybern., March, 2023

ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., February, 2023

Privacy-preserving generative framework for images against membership inference attacks.
IET Commun., January, 2023

MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework.
IEEE Trans. Serv. Comput., 2023

Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Serv. Comput., 2023

VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing.
IEEE Trans. Serv. Comput., 2023

Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation.
IEEE Trans. Serv. Comput., 2023

Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks.
IEEE Trans. Serv. Comput., 2023

IRGA: An Intelligent Implicit Real-time Gait Authentication System in Heterogeneous Complex Scenarios.
ACM Trans. Internet Techn., 2023

PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers.
IEEE Trans. Mob. Comput., 2023

SPMA: Stealthy Physics-Manipulated Attack and Countermeasures in Cyber-Physical Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2023

A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse.
IEEE Trans. Inf. Forensics Secur., 2023

IAFDroid: Demystifying Collusion Attacks in Android Ecosystem via Precise Inter-App Analysis.
IEEE Trans. Inf. Forensics Secur., 2023

An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
IEEE Trans. Inf. Forensics Secur., 2023

Forward/Backward and Content Private DSSE for Spatial Keyword Queries.
IEEE Trans. Dependable Secur. Comput., 2023

VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Learn to Forget: Machine Unlearning via Neuron Masking.
IEEE Trans. Dependable Secur. Comput., 2023

Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

Smaug: A TEE-Assisted Secured SQLite for Embedded Systems.
IEEE Trans. Dependable Secur. Comput., 2023

DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023

FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation.
IEEE Trans. Dependable Secur. Comput., 2023

A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2023

Trust-Based Secure Multi-Cloud Collaboration Framework in Cloud-Fog-Assisted IoT.
IEEE Trans. Cloud Comput., 2023

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023

Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap.
IEEE Trans. Cloud Comput., 2023

Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023

Network Slicing in 6G: An Authentication Framework for Unattended Terminals.
IEEE Netw., 2023

A Location-Aware Verifiable Outsourcing Data Aggregation in Multiblockchains.
IEEE Internet Things J., 2023

MSTL-GLTP: A Global-Local Decomposition and Prediction Framework for Wireless Traffic.
IEEE Internet Things J., 2023

Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage.
IACR Cryptol. ePrint Arch., 2023

SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark.
CoRR, 2023

Attacks are Forwarded: Breaking the Isolation of MicroVM-based Containers Through Operation Forwarding.
Proceedings of the 32nd USENIX Security Symposium, 2023

Research on the Distributed Secure Storage of Embedded Terminals Based on the Blockchain.
Proceedings of the 25th ACIS International Winter Conference on Software Engineering, 2023

Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections.
Proceedings of the Provable and Practical Security, 2023

SEBD: Sensor Emulation Based Backdoor for Autopilot.
Proceedings of the 13th International Conference on the Internet of Things, 2023

Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model.
Proceedings of the IEEE International Conference on Communications, 2023

Social Networks Based Robust Federated Learning for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023

MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning.
Proceedings of the IEEE Global Communications Conference, 2023

A Semi-Supervised Anomaly Network Traffic Detection Framework via Multimodal Traffic Information Fusion.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Travelling the Hypervisor and SSD: A Tag-Based Approach Against Crypto Ransomware with Fine-Grained Data Recovery.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

TypeSqueezer: When Static Recovery of Function Signatures for Binary Executables Meets Dynamic Analysis.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon.
IEEE Trans. Veh. Technol., 2022

RumorDecay: Rumor Dissemination Interruption for Target Recipients in Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing.
IEEE Trans. Serv. Comput., 2022

Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud.
IEEE Trans. Serv. Comput., 2022

Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing.
IEEE Trans. Serv. Comput., 2022

TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing.
IEEE Trans. Serv. Comput., 2022

Privacy-Preserving Distributed Multi-Task Learning against Inference Attack in Cloud Computing.
ACM Trans. Internet Techn., 2022

PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things.
IEEE Trans. Ind. Informatics, 2022

A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box.
IEEE Trans. Ind. Informatics, 2022

Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.
IEEE Trans. Ind. Informatics, 2022

A Blockchain-Based Machine Learning Framework for Edge Services in IIoT.
IEEE Trans. Ind. Informatics, 2022

Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning.
IEEE Trans. Ind. Informatics, 2022

ShieldFL: Mitigating Model Poisoning Attacks in Privacy-Preserving Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2022

STOP: A Service Oriented Internet Purification Against Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy.
IEEE Trans. Dependable Secur. Comput., 2022

LibCapsule: Complete Confinement of Third-Party Libraries in Android Applications.
IEEE Trans. Dependable Secur. Comput., 2022

DE-Sword: Incentivized Verifiable Tag Path Query in RFID-Enabled Supply Chain Systems.
IEEE Trans. Dependable Secur. Comput., 2022

LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022

Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks.
IEEE Trans. Dependable Secur. Comput., 2022

Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings.
IEEE Trans. Cloud Comput., 2022

Similarity Search for Encrypted Images in Secure Cloud Computing.
IEEE Trans. Cloud Comput., 2022

DVREI: Dynamic Verifiable Retrieval Over Encrypted Images.
IEEE Trans. Computers, 2022

Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems.
IEEE Syst. J., 2022

Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022

Lightweight and Fine-Grained Privacy-Preserving Data Aggregation Scheme in Edge Computing.
IEEE Syst. J., 2022

Antitampering Scheme of Evidence Transfer Information in Judicial System Based on Blockchain.
Secur. Commun. Networks, 2022

A Secure Access Control Framework for Cloud Management.
Mob. Networks Appl., 2022

CoAvoid: Secure, Privacy-Preserved Tracing of Contacts for Infectious Diseases.
IEEE J. Sel. Areas Commun., 2022

Achieving privacy-preserving sensitive attributes for large universe based on private set intersection.
Inf. Sci., 2022

SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things.
Inf. Sci., 2022

A Double-Benefit Moving Target Defense Against Cyber-Physical Attacks in Smart Grid.
IEEE Internet Things J., 2022

Privacy-Preserving Asynchronous Grouped Federated Learning for IoT.
IEEE Internet Things J., 2022

Revocable and Privacy-Preserving Decentralized Data Sharing Framework for Fog-Assisted Internet of Things.
IEEE Internet Things J., 2022

Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices.
IEEE Internet Things J., 2022

ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV.
IEEE Internet Things J., 2022

Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022

NOSnoop: An Effective Collaborative Meta-Learning Scheme Against Property Inference Attack.
IEEE Internet Things J., 2022

PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022

Energy-Efficient and Secure Communication Toward UAV Networks.
IEEE Internet Things J., 2022

CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles.
IEEE Internet Things J., 2022

Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT.
IEEE Internet Things J., 2022

Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces.
Int. J. Intell. Syst., 2022

A certificateless authentication scheme with fuzzy batch verification for federated UAV network.
Int. J. Intell. Syst., 2022

An efficient and authenticated key establishment scheme based on fog computing for healthcare system.
Frontiers Comput. Sci., 2022

Enabling efficient traceable and revocable time-based data sharing in smart city.
EURASIP J. Wirel. Commun. Netw., 2022

Privacy-preserving Generative Framework Against Membership Inference Attacks.
CoRR, 2022

Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022

Sliding window based ON/OFF flow watermarking on Tor.
Comput. Commun., 2022

SSAPPIDENTIFY: A robust system identifies application over Shadowsocks's traffic.
Comput. Networks, 2022

Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment.
Comput. Networks, 2022

Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election.
Sci. China Inf. Sci., 2022

A Lightweight Privacy-Preserving Participant Selection Scheme for Mobile Crowdsensing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Self-Anomaly-Detection Model Training via Initialized Meta Model.
Proceedings of the International Conference on Networking and Network Applications, 2022

Representing the Topology of Complex Networks Based on Graph Embedding.
Proceedings of the International Conference on Networking and Network Applications, 2022

Backdoor Defense with Machine Unlearning.
Proceedings of the IEEE INFOCOM 2022, 2022

A Survey of Deep Anomaly Detection for System Logs.
Proceedings of the International Joint Conference on Neural Networks, 2022

Control Parameters Considered Harmful: Detecting Range Specification Bugs in Drone Configuration Modules via Learning-Guided Search.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Mixed Color Channels (MCC): A Universal Module for Mixed Sample Data Augmentation Methods.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things.
Proceedings of the IEEE International Conference on Communications, 2022

Community Detection with Graph Neural Network using Markov Stability.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

Blockchain-Based Encrypted Image Storage and Search in Cloud Computing.
Proceedings of the Database Systems for Advanced Applications, 2022

Trajectory Obfuscation and Detection in Internet-of-vehicles.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing.
Wirel. Commun. Mob. Comput., 2021

Secure Semantic-Aware Search Over Dynamic Spatial Data in VANETs.
IEEE Trans. Veh. Technol., 2021

PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys.
IEEE Trans. Serv. Comput., 2021

ReliableBox: Secure and Verifiable Cloud Storage With Location-Aware Backup.
IEEE Trans. Parallel Distributed Syst., 2021

Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging.
IEEE/ACM Trans. Netw., 2021

Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021

A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing.
IEEE Trans. Ind. Informatics, 2021

Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2021

Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network.
IEEE Trans. Emerg. Top. Comput., 2021

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Community Hiding by Link Perturbation in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2021

Safeness-Based Community Penetration.
IEEE Trans. Circuits Syst. II Express Briefs, 2021

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing.
Secur. Commun. Networks, 2021

GNS: Forge High Anonymity Graph by Nonlinear Scaling Spectrum.
Secur. Commun. Networks, 2021

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.
Secur. Commun. Networks, 2021

Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things.
Secur. Commun. Networks, 2021

Audit Outsourced Data in Internet of Things.
Secur. Commun. Networks, 2021

UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things.
Remote. Sens., 2021

An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones.
Peer-to-Peer Netw. Appl., 2021

Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.
Mob. Networks Appl., 2021

Android Malware Detection via Graph Representation Learning.
Mob. Inf. Syst., 2021

xTSeH: A Trusted Platform Module Sharing Scheme Towards Smart IoT-eHealth Devices.
IEEE J. Sel. Areas Commun., 2021

An Explainable Diagnostic Method for Autism Spectrum Disorder Using Neural Network.
J. Inf. Sci. Eng., 2021

Efficient First-Price Sealed-Bid Auction Scheme.
J. Inf. Sci. Eng., 2021

A Differential Privacy Topology Scheme for Average Path Length Query.
J. Inf. Sci. Eng., 2021

Forward and backward secure keyword search with flexible keyword shielding.
Inf. Sci., 2021

Transfer learning based intrusion detection scheme for Internet of vehicles.
Inf. Sci., 2021

Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021

Fast and Secure Location-Based Services in Smart Cities on Outsourced Data.
IEEE Internet Things J., 2021

Attribute-Based Secure Announcement Sharing Among Vehicles Using Blockchain.
IEEE Internet Things J., 2021

Smart Applications in Edge Computing: Overview on Authentication and Data Security.
IEEE Internet Things J., 2021

Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy.
IEEE Internet Things J., 2021

LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications.
Inf. Fusion, 2021

Smart home: Keeping privacy based on Air-Padding.
IET Inf. Secur., 2021

Structural Mutual Information and Its Application.
IACR Cryptol. ePrint Arch., 2021

Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2021

Efficient audit protocol supporting virtual nodes in cloud storage.
Trans. Emerg. Telecommun. Technol., 2021

Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021

Three-factor authentication protocol using physical unclonable function for IoV.
Comput. Commun., 2021

Computation offloading over multi-UAV MEC network: A distributed deep reinforcement learning approach.
Comput. Networks, 2021

App identification based on encrypted multi-smartphone sources traffic fingerprints.
Comput. Networks, 2021

GramMatch: An automatic protocol feature extraction and identification system.
Comput. Networks, 2021

Certificateless designated verifier proxy signature scheme for unmanned aerial vehicle networks.
Sci. China Inf. Sci., 2021

LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2021

LPDBN: A Privacy Preserving Scheme for Deep Belief Network.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Delica: Decentralized Lightweight Collective Attestation for Disruptive IoT Networks.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

ShadowDGA: Toward Evading DGA Detectors with GANs.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Covert Wireless Communications in the Presence of an Active Adversary.
Proceedings of the ICC 2021, 2021

Enabling Efficient and Expressive Spatial Keyword Queries On Encrypted Data.
Proceedings of the IEEE International Conference on Acoustics, 2021

Joint Connection and Content Embedding for Link Prediction in Social Networks.
Proceedings of the IEEE Global Communications Conference, 2021

Attention-aware Multi-encoder for Session-based Recommendation.
Proceedings of the IEEE Global Communications Conference, 2021

FedGR: A Lossless-Obfuscation Approach for Secure Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2021

Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network.
Proceedings of the IEEE Global Communications Conference, 2021

Graph Embedding Based on Euclidean Distance Matrix and its Applications.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Demons in the Shared Kernel: Abstract Resource Attacks Against OS-level Virtualization.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020

A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model.
Wirel. Commun. Mob. Comput., 2020

A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation.
IEEE Trans. Wirel. Commun., 2020

Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET.
IEEE Trans. Veh. Technol., 2020

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain.
IEEE Trans. Veh. Technol., 2020

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.
IEEE Trans. Serv. Comput., 2020

A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs.
IEEE Trans. Ind. Informatics, 2020

Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020

AdCapsule: Practical Confinement of Advertisements in Android Applications.
IEEE Trans. Dependable Secur. Comput., 2020

Similarity-Based and Sybil Attack Defended Community Detection for Social Networks.
IEEE Trans. Circuits Syst., 2020

Traffic Dynamics Evaluation for the Future NFV Deployment.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Trajectory-Based Community Detection.
IEEE Trans. Circuits Syst. II Express Briefs, 2020

Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images.
Remote. Sens., 2020

BTNC: A blockchain based trusted network connection protocol in IoT.
J. Parallel Distributed Comput., 2020

Privacy-Preserving Krawtchouk Moment feature extraction over encrypted image data.
Inf. Sci., 2020

Image splicing forgery detection combining coarse to refined convolutional neural network and adaptive clustering.
Inf. Sci., 2020

User interaction-oriented community detection based on cascading analysis.
Inf. Sci., 2020

Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020

LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020

TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs.
IEEE Internet Things J., 2020

Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band.
IEEE Internet Things J., 2020

PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020

TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning.
IEEE Internet Things J., 2020

Achieving secure and convenient WLAN sharing in personal.
IET Inf. Secur., 2020

SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted Cyber-Physical Systems.
Future Gener. Comput. Syst., 2020

PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020

Cloud-based Federated Boosting for Mobile Crowdsensing.
CoRR, 2020

Learn to Forget: User-Level Memorization Elimination in Federated Learning.
CoRR, 2020

RansomSpector: An introspection-based approach to detect crypto ransomware.
Comput. Secur., 2020

A secured TPM integration scheme towards smart embedded system based collaboration network.
Comput. Secur., 2020

A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS.
Proceedings of the Security and Privacy in Digital Economy, 2020

IMShell-Dec: Pay More Attention to External Links in PowerShell.
Proceedings of the ICT Systems Security and Privacy Protection, 2020

Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT.
Proceedings of the International Conference on Networking and Network Applications, 2020

Android Malware Detection Based on Call Graph via Graph Neural Network.
Proceedings of the International Conference on Networking and Network Applications, 2020

Cooperative Game Model of Delegation Computing: Verifier Separated from Calculators.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Target Privacy Preserving for Social Networks.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

A Preliminary Analysis of Password Guessing Algorithm.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

Medical Privacy-preserving Service Recommendation.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability.
Proceedings of the IEEE Global Communications Conference, 2020

Flexible and Privacy-preserving Framework for Decentralized Collaborative Learning.
Proceedings of the IEEE Global Communications Conference, 2020

Architecture of Security Protection technology for Aviation Cyberspace.
Proceedings of the 7th International Conference on Dependable Systems and Their Applications, 2020

Spatial Dynamic Searchable Encryption with Forward Security.
Proceedings of the Database Systems for Advanced Applications, 2020

Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
SRDPV: secure route discovery and privacy-preserving verification in MANETs.
Wirel. Networks, 2019

Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network.
IEEE Trans. Veh. Technol., 2019

Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing.
IEEE Trans. Veh. Technol., 2019

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Serv. Comput., 2019

Fingerprint Protected Password Authentication Protocol.
Secur. Commun. Networks, 2019

Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing.
Secur. Commun. Networks, 2019

Pruneable sharding-based blockchain protocol.
Peer-to-Peer Netw. Appl., 2019

一种面向二进制的细粒度控制流完整性方法 (Fine-grained Control Flow Integrity Method on Binaries).
计算机科学, 2019

Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme.
J. Parallel Distributed Comput., 2019

Inference attack in Android Activity based on program fingerprint.
J. Netw. Comput. Appl., 2019

Cooperative Jamming for Secrecy of Wireless Communications.
J. Inf. Sci. Eng., 2019

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.
J. Inf. Sci. Eng., 2019

HVDB: a hierarchical verifiable database scheme with scalable updates.
J. Ambient Intell. Humaniz. Comput., 2019

Quaternion weighted spherical Bessel-Fourier moment and its invariant for color image reconstruction and object recognition.
Inf. Sci., 2019

PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data.
Inf. Sci., 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

Privacy-preserving and high-accurate outsourced disease predictor on random forest.
Inf. Sci., 2019

Counting the frequency of time-constrained serial episodes in a streaming sequence.
Inf. Sci., 2019

Lightweight Privacy-Preserving Ensemble Classification for Face Recognition.
IEEE Internet Things J., 2019

Privacy-Preserving Outsourced Speech Recognition for Smart IoT Devices.
IEEE Internet Things J., 2019

Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet Things J., 2019

Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019

Blockchain-based secure and fair crowdsourcing scheme.
Int. J. Distributed Sens. Networks, 2019

User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Commun. Syst., 2019

Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model.
IET Inf. Secur., 2019

Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.
Entropy, 2019

Anomalies Detection and Proactive Defence of Routers Based on Multiple Information Learning.
Entropy, 2019

Research on neural network chaotic encryption algorithm in wireless network security communication.
EURASIP J. Wirel. Commun. Netw., 2019

IHP: improving the utility in differential private histogram publication.
Distributed Parallel Databases, 2019

Hiding Communications in AWGN Channels and THz Band with Interference Uncertainty.
CoRR, 2019

Challenges in Covert Wireless Communications with Active Warden on AWGN channels.
CoRR, 2019

Selfholding: A combined attack model using selfish mining with block withholding attack.
Comput. Secur., 2019

Universally composable secure geographic area verification without pre-shared secret.
Sci. China Inf. Sci., 2019

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain.
Sci. China Inf. Sci., 2019

New efficient constructions of verifiable data streaming with accountability.
Ann. des Télécommunications, 2019

Energy-Aware RFID Authentication in Edge Computing.
IEEE Access, 2019

A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms.
IEEE Access, 2019

DAPV: Diagnosing Anomalies in MANETs Routing With Provenance and Verification.
IEEE Access, 2019

Differentially Privacy-preserving Social IoT.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

A Novel User Membership Leakage Attack in Collaborative Deep Learning.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A DNS Tunneling Detection Method Based on Deep Learning Models to Prevent Data Exfiltration.
Proceedings of the Network and System Security - 13th International Conference, 2019

Edge Weight Differential Privacy Based Spectral Query Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Semantic-Based Dummy Generation Strategy for Location Privacy.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Comparison of Neural Networks' Performance in Early Screening of Autism Spectrum Disorders Under Two MRI Principles.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

An Automatic Crisis Information Recognition Model Based on BP Neural Network.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Research on Resolution Limit of Community Detection in Location-Based Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Fuzzy String Matching Scheme Resistant to Statistical Attack.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Time-Aware Dummy-Based Privacy Protection for Continuous LBSs.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Collective Influence Based Privacy Preservation for Social Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

A Topology Based Differential Privacy Scheme for Average Path Length Query.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Lightweight Security Authentication Mechanism Towards UAV Networks.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

CatraDroid: A Call Trace Driven Detection of Malicious Behaiviors in Android Applications.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Credible Routing Scheme of SDN-Based Cloud Using Blockchain.
Proceedings of the Data Science, 2019

Listen!: Audio-based Smart IoT Device Pairing Protocol.
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019

Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

Detection of Multi-Stage Attacks Based on Multi-Layer Long and Short-Term Memory Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Privacy-Preserving Data Sharing Framework for High-Accurate Outsourced Computation.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Transparent Access and Integration of Heterogeneous Encrypted Database in Hybrid Cloud Environment.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Privacy-Preserving Verification and Root-Cause Tracing Towards UAV Social Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Collaborative Deep Learning for Medical Image Analysis with Differential Privacy.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Continuous Authentication for the Internet of Things Using Channel State Information.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Lightweight Secure Communication Mechanism Towards UAV Networks.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

BQSV: Protecting SDN Controller Cluster's Network Topology View Based on Byzantine Quorum System with Verification Function.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Achieving Efficient and Verifiable Assured Deletion for Outsourced Data Based on Access Right Revocation.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Walk2Privacy: Limiting target link privacy disclosure against the adversarial link prediction.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Covert Wireless Communications in IoT Systems: Hiding Information in Interference.
IEEE Wirel. Commun., 2018

Protecting Operation-Time Privacy of Primary Users in Downlink Cognitive Two-Tier Networks.
IEEE Trans. Veh. Technol., 2018

Dlog: diagnosing router events with syslogs for anomaly detection.
J. Supercomput., 2018

Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018

Fine-CFI: Fine-Grained Control-Flow Integrity for Operating System Kernels.
IEEE Trans. Inf. Forensics Secur., 2018

Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm.
Soft Comput., 2018

On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Syst. J., 2018

Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept.
Sensors, 2018

EOABS: expressive outsourced attribute-based signature.
Peer-to-Peer Netw. Appl., 2018

DOAS: Efficient data owner authorized search over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2018

VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Netw. Appl., 2018

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Netw. Appl., 2018

Trust-based service composition and selection in service oriented architecture.
Peer-to-Peer Netw. Appl., 2018

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing.
IEEE Netw., 2018

A remotely keyed file encryption scheme under mobile cloud computing.
J. Netw. Comput. Appl., 2018

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2018

Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones.
J. Inf. Sci. Eng., 2018

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018

Hidden community identification in location-based social network via probabilistic venue sequences.
Inf. Sci., 2018

Practical Attribute-Based Multi-Keyword Search Scheme in Mobile Crowdsourcing.
IEEE Internet Things J., 2018

PRE<sup>+</sup>: dual of proxy re-encryption for secure cloud data sharing service.
Int. J. Web Grid Serv., 2018

VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner.
Int. J. High Perform. Comput. Netw., 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018

DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing.
Future Gener. Comput. Syst., 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018

Covert Wireless Communications with Active Eavesdropper on AWGN Channels.
CoRR, 2018

ONCE and ONCE+: Counting the Frequency of Time-constrained Serial Episodes in a Streaming Sequence.
CoRR, 2018

SADUS: Secure data deletion in user space for mobile devices.
Comput. Secur., 2018

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018

ProactiveCrowd: Modelling Proactive Steering Behaviours for Agent-Based Crowd Simulation.
Comput. Graph. Forum, 2018

Verifiable keyword search over encrypted cloud data in smart city.
Comput. Electr. Eng., 2018

AHP Aided Decision-Making in Virtual Machine Migration for Green Cloud.
Comput. Informatics, 2018

Image Feature Extraction in Encrypted Domain With Privacy-Preserving Hahn Moments.
IEEE Access, 2018

Ridra: A Rigorous Decentralized Randomized Authentication in VANETs.
IEEE Access, 2018

Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data.
IEEE Access, 2018

CodeTracker: A Lightweight Approach to Track and Protect Authorization Codes in SMS Messages.
IEEE Access, 2018

A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018

A Novel Dynamic Android Malware Detection System With Ensemble Learning.
IEEE Access, 2018

Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018

True Random Number Generation Using Process Scheduling of Android Systems.
Proceedings of the International Conference on Networking and Network Applications, 2018

Cooperative Jamming for Secrecy of Wireless Communications.
Proceedings of the International Conference on Networking and Network Applications, 2018

Preserving Privacy for Hubs and Links in Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2018

Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
Proceedings of the International Conference on Networking and Network Applications, 2018

Anomalies Detection of Routers Based on Multiple Information Learning.
Proceedings of the International Conference on Networking and Network Applications, 2018

EPSMD: An Efficient Privacy-Preserving Sensor Data Monitoring and Online Diagnosis System.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Poster abstract: SALUTE: A strategy-proof auction mechanism for flexible multichannel allocation.
Proceedings of the IEEE INFOCOM 2018, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On Covert Communication with Interference Uncertainty.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Inference Attack in Android Activity based on Program Fingerprint.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

Log-based Anomalies Detection of MANETs Routing with Reasoning and Verification.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks.
IEEE Trans. Veh. Technol., 2017

Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Inf. Forensics Secur., 2017

An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017

Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything.
Secur. Commun. Networks, 2017

The postprocessing of quantum digital signatures.
Quantum Inf. Process., 2017

VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel.
Peer-to-Peer Netw. Appl., 2017

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive Mob. Comput., 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017

Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mob. Inf. Syst., 2017

Selecting Critical Data Flows in Android Applications for Abnormal Behavior Detection.
Mob. Inf. Syst., 2017

ICASME: An Improved Cloud-Based Authentication Scheme for Medical Environment.
J. Medical Syst., 2017

An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

A Multi-Party Secret Handshake Scheme Based on Chaotic Maps.
Inf. Technol. Control., 2017

A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud.
Inf. Sci., 2017

Sampling-based adaptive bounding evolutionary algorithm for continuous optimization problems.
Inf. Sci., 2017

A fair data access control towards rational users in cloud storage.
Inf. Sci., 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017

Reusable garbled gates for new fully homomorphic encryption service.
Int. J. Web Grid Serv., 2017

New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
Int. J. Web Grid Serv., 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017

An efficient revocable ID-based encryption scheme in the standard model.
Int. J. Embed. Syst., 2017

Analysis and improvement of the Internet-Draft IKEv3 protocol.
Int. J. Commun. Syst., 2017

Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017

The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.
CoRR, 2017

Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization.
CoRR, 2017

Identifying opinion leaders in social networks with topic limitation.
Clust. Comput., 2017

An efficient and practical threshold gateway-oriented password-authenticated key exchange protocol in the standard model.
Sci. China Inf. Sci., 2017

hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017

VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings.
Sci. China Inf. Sci., 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017

FCT: a fully-distributed context-aware trust model for location based service recommendation.
Sci. China Inf. Sci., 2017

Reconstruction methodology for rational secret sharing based on mechanism design.
Sci. China Inf. Sci., 2017

NetPro: detecting attacks in MANET routing with provenance and verification.
Sci. China Inf. Sci., 2017

APRS: a privacy-preserving location-aware recommender system based on differentially private histogram.
Sci. China Inf. Sci., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

A Privacy-Preserving Mutual Authentication Resisting DoS Attacks in VANETs.
IEEE Access, 2017

Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access, 2017

A Secure Collaborative Spectrum Sensing Strategy in Cyber-Physical Systems.
IEEE Access, 2017

Efficient and Consistent Key Extraction Based on Received Signal Strength for Vehicular Ad Hoc Networks.
IEEE Access, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

Certia: Certifying Interface Automata for Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
Proceedings of the International Conference on Networking and Network Applications, 2017

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

APDL: A Practical Privacy-Preserving Deep Learning Model for Smart Devices.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A Hierarchical VDB Scheme with Scalable Verification and Tampered Record Localization.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Spatiotemporal correlation-aware dummy-based privacy protection scheme for location-based services.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Double-Edged Sword: Incentivized Verifiable Product Path Query for RFID-Enabled Supply Chain.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy-Preserving Comparable Encryption Scheme in Cloud Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Data-Oriented Instrumentation against Information Leakages of Android Applications.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

Multi-hop Based Centrality of a Path in Complex Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

A Survey of Network Reconstruction on Social Network.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

Centrality Based Privacy Preserving for Weighted Social Networks.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
A privacy preserving three-factor authentication protocol for e-Health clouds.
J. Supercomput., 2016

Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.
IEEE Trans. Computers, 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Dynamic game model of botnet DDoS attack and defense.
Secur. Commun. Networks, 2016

Efficient keyword search over encrypted data in multi-cloud setting.
Secur. Commun. Networks, 2016

A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities.
Secur. Commun. Networks, 2016

Measuring the risk value of sensitive dataflow path in Android applications.
Secur. Commun. Networks, 2016

A new method to deduce counterexamples in secure routing protocols based on strand space model.
Secur. Commun. Networks, 2016

Cooperative Jammer Placement for Physical Layer Security Enhancement.
IEEE Netw., 2016

LSOT: A Lightweight Self-Organized Trust Model in VANETs.
Mob. Inf. Syst., 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016

A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016

m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Syst., 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Syst., 2016

Position based key exchange: defnitions and implementations.
J. Commun. Inf. Networks, 2016

On the architecture and development life cycle of secure cyber-physical systems.
J. Commun. Inf. Networks, 2016

LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment.
KSII Trans. Internet Inf. Syst., 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
Inf. Technol. Control., 2016

An intelligent movie recommendation system through group-level sentiment analysis in microblogs.
Neurocomputing, 2016

Efficiency optimisation signature scheme for time-critical multicast data origin authentication.
Int. J. Grid Util. Comput., 2016

Improved algorithm for secure outsourcing of modular exponentiations with high checkability.
Int. J. Ad Hoc Ubiquitous Comput., 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Gener. Comput. Syst., 2016

Revocable and anonymous searchable encryption in multi-user setting.
Concurr. Comput. Pract. Exp., 2016

DALP: A demand-aware location privacy protection scheme in continuous location-based services.
Concurr. Comput. Pract. Exp., 2016

Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016

A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016

Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating.
Sci. China Inf. Sci., 2016

Efficient privacy preserving predicate encryption with fine-grained searchable capability for Cloud storage.
Comput. Electr. Eng., 2016

Feasibility study of context-awareness device comfort calculation methods and their application to comfort-based access control.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags.
Proceedings of the 3rd ACM Workshop on Mobile Sensing, Computing and Communication, 2016

Divide-and-conquer based cooperative jamming: Addressing multiple eavesdroppers in close proximity.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

On cooperative jamming in wireless networks with eavesdroppers at arbitrary locations.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Modeling Gap Seeking Behaviors for Agent-based Crowd Simulation.
Proceedings of the 29th International Conference on Computer Animation and Social Agents, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Improving the utility in differential private histogram publishing: Theoretical study and practice.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
LTPPM: a location and trajectory privacy protection mechanism in participatory sensing.
Wirel. Commun. Mob. Comput., 2015

Throughput and Delay Tradeoffs for Mobile Ad Hoc Networks With Reference Point Group Mobility.
IEEE Trans. Wirel. Commun., 2015

New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
IEEE Trans. Inf. Forensics Secur., 2015

New Publicly Verifiable Databases with Efficient Updates.
IEEE Trans. Dependable Secur. Comput., 2015

Efficient algorithms for secure outsourcing of bilinear pairings.
Theor. Comput. Sci., 2015

Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015

Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Comput. Collect. Intell., 2015

Protocol Derivation System for the Needham-Schroeder family.
Secur. Commun. Networks, 2015

Provable ownership of files in deduplication cloud storage.
Secur. Commun. Networks, 2015

Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015

Large universe decentralized key-policy attribute-based encryption.
Secur. Commun. Networks, 2015

A full lifecycle privacy protection scheme for sensitive data in cloud computing.
Peer-to-Peer Netw. Appl., 2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mob. Inf. Syst., 2015

基于离散Hermite多项式的图像压缩 (Image Compression Based on Discrete Hermite Polynomials).
计算机科学, 2015

Social Influence Study in Online Networks: A Three-Level Review.
J. Comput. Sci. Technol., 2015

New access control systems based on outsourced attribute-based encryption.
J. Comput. Secur., 2015

A new proxy re-encryption scheme for protecting critical information systems.
J. Ambient Intell. Humaniz. Comput., 2015

A Provably Secure Three-Party Password Authenticated Key Exchange Protocol without Using Server's Public-Keys and Symmetric Cryptosystems.
Inf. Technol. Control., 2015

A Security Quantitative Analysis Method For Access Control Based on Security Entropy.
Int. J. Netw. Secur., 2015

A two-factor authenticated key exchange protocol based on RSA with dynamic passwords.
Int. J. Embed. Syst., 2015

Energy-Efficient Collaborative Communication for Optimization Cluster Heads Selection Based on Genetic Algorithms in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

A Collaborative Self-Governing Privacy-Preserving Wireless Sensor Network Architecture Based on Location Optimization for Dynamic Service Discovery in MANET Environment.
Int. J. Distributed Sens. Networks, 2015

Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Commun. Syst., 2015

Improvement of robust smart-card-based password authentication scheme.
Int. J. Commun. Syst., 2015

Secure service composition with information flow control in service clouds.
Future Gener. Comput. Syst., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Gener. Comput. Syst., 2015

Device-to-Device Communication in LTE-Advanced Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2015

Stability analysis of an <i>e</i>-<i>SEIAR</i> model with point-to-group worm propagation.
Commun. Nonlinear Sci. Numer. Simul., 2015

A delegation based cross trusted domain direct anonymous attestation scheme.
Comput. Networks, 2015

CRM: A New Dynamic Cross-Layer Reputation Computation Model in Wireless Networks.
Comput. J., 2015

Universally composable secure positioning in the bounded retrieval model.
Sci. China Inf. Sci., 2015

Survey on cyberspace security.
Sci. China Inf. Sci., 2015

Bayesian mechanism for rational secret sharing scheme.
Sci. China Inf. Sci., 2015

A privacy-preserving data collection model for digital community.
Sci. China Inf. Sci., 2015

An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information.
Sci. China Inf. Sci., 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc Sens. Wirel. Networks, 2015

Fine-Grained Searchable Encryption over Encrypted Data in Multi-clouds.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

GetReal: Towards Realistic Selection of Influence Maximization Strategies in Competitive Networks.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Data Owner Based Attribute Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

New Compact CCA Secure Elgamal Scheme in the Random Oracle Model.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

Continuous Context-Aware Device Comfort Evaluation Method.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

CRVad: Confidential Reasoning and Verification Towards Secure Routing in Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

A Lightweight Anonymous Authentication Protocol Using k-Pseudonym Set in Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An Improved Algorithm for Secure Outsourcing of Modular Exponentiations.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Outsourcing Decryption of Attribute Based Encryption with Energy Efficiency.
Proceedings of the 10th International Conference on P2P, 2015

Another Look at Ciphertext Updating Algorithms for Cloud Storage.
Proceedings of the 10th International Conference on P2P, 2015

2014
A Role Based Privacy-Aware Secure Routing Protocol for Wireless Mesh Networks.
Wirel. Pers. Commun., 2014

An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wirel. Pers. Commun., 2014

FLAP: An Efficient WLAN Initial Access Authentication Protocol.
IEEE Trans. Parallel Distributed Syst., 2014

New Algorithms for Secure Outsourcing of Modular Exponentiations.
IEEE Trans. Parallel Distributed Syst., 2014

A Secure Data Self-Destructing Scheme in Cloud Computing.
IEEE Trans. Cloud Comput., 2014

Reliable Enhanced Secure Code Dissemination with Rateless Erasure Codes in WSNs.
J. Softw., 2014

Balancing trajectory privacy and data utility using a personalized anonymization model.
J. Netw. Comput. Appl., 2014

Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng., 2014

Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms.
J. Comput., 2014

Access Control Capability Assessment Method Based on Security Entropy.
J. Comput., 2014

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud.
KSII Trans. Internet Inf. Syst., 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014

Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014

New and efficient conditional e-payment systems with transferability.
Future Gener. Comput. Syst., 2014

From high-availability to collapse: quantitative analysis of "Cloud-Droplet-Freezing" attack threats to virtual machine migration in cloud computing.
Clust. Comput., 2014

Trust-based service composition in multi-domain environments under time constraint.
Sci. China Inf. Sci., 2014

Automated enforcement for relaxed information release with reference points.
Sci. China Inf. Sci., 2014

Multi-domain Direct Anonymous Attestation Scheme from Pairings.
Proceedings of the Network and System Security - 8th International Conference, 2014

TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

Throughput-delay tradeoff in mobile ad hoc networks with correlated mobility.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

A demand-aware location privacy protection scheme in continuous location-based services.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

Secure Networking Protocol with Identity Protection for Cooperation of Unmanned Platforms.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2013

An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation.
IEEE Trans. Smart Grid, 2013

TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing.
IEEE Trans. Inf. Forensics Secur., 2013

An Engine for Automatic Code Generation of Security Protocols in Multiple Languages.
Smart Comput. Rev., 2013

A Collaborative QoS-Aware Service Evaluation Method for Service Selection.
J. Networks, 2013

An novel three-party authenticated key exchange protocol using one-time key.
J. Netw. Comput. Appl., 2013

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

Constructing Verifiable Random Number in Finite Field.
J. Internet Serv. Inf. Secur., 2013

An Improved Password-Based Remote User Authentication Protocol without Smart Cards.
Inf. Technol. Control., 2013

A rational framework for secure communication.
Inf. Sci., 2013

Access control requirements for structured document in cloud computing.
Int. J. Grid Util. Comput., 2013

MAP: Towards Authentication for Multiple Tags.
Int. J. Distributed Sens. Networks, 2013

Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes.
Int. J. Distributed Sens. Networks, 2013

Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Fair (t, n) threshold secret sharing scheme.
IET Inf. Secur., 2013

Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks
CoRR, 2013

Flexible relay selection for secure communication in two-hop wireless networks.
Proceedings of the 11th International Symposium and Workshops on Modeling and Optimization in Mobile, 2013

Domino of the smart grid: An empirical study of system behaviors in the interdependent network architecture.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Secure and Reliable Transmission with Cooperative Relays in Two-Hop Wireless Networks.
Proceedings of the Information Technology Convergence, 2013

Fault and Intrusion Tolerance of Complex Networks: A Controllability View.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Content Based Spam Text Classification: An Empirical Comparison between English and Chinese.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Secure Document Self-Destruction Scheme with Identity Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

A Secure Document Self-Destruction Scheme: An ABE Approach.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2013, 2013

Attribute Based Multi-signature Scheme in the Standard Model.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
Data security in unattended wireless sensor networks with mobile sinks.
Wirel. Commun. Mob. Comput., 2012

Security enhancement of the communication-efficient AUTHMAC_DH protocols.
Secur. Commun. Networks, 2012

A security enhanced authentication and key distribution protocol for wireless networks.
Secur. Commun. Networks, 2012

Combined blur, translation, scale and rotation invariant image recognition by Radon and pseudo-Fourier-Mellin transforms.
Pattern Recognit., 2012

Radial Tchebichef moment invariants for image recognition.
J. Vis. Commun. Image Represent., 2012

Vulnerability analysis of lightweight secure search protocols for low-cost RFID systems.
Int. J. Radio Freq. Identif. Technol. Appl., 2012

Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
Int. J. Netw. Secur., 2012

Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings.
Int. J. Netw. Secur., 2012

A method for efficient parallel computation of Tate pairing.
Int. J. Grid Util. Comput., 2012

Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems.
Int. J. Distributed Sens. Networks, 2012

Secrecy Transfer.
Int. J. Distributed Sens. Networks, 2012

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.
Trans. Emerg. Telecommun. Technol., 2012

PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks.
EURASIP J. Wirel. Commun. Netw., 2012

User authentication via keystroke dynamics based on difference subspace and slope correlation degree.
Digit. Signal Process., 2012

Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System
CoRR, 2012

Exploring Relay Cooperation for Secure and Reliable Transmission in Two-Hop Wireless Networks
CoRR, 2012

Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A simple energy-efficient routing algorithm for Wireless Sensor Networks based on Artificial Potential Field.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An efficient WLAN initial access authentication protocol.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Verifying Location-Based Services with Declassification Enforcement.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

2011
Authentications and Key Management in 3G-WLAN Interworking.
Mob. Networks Appl., 2011

A novel re-authentication scheme based on tickets in wireless local area networks.
J. Parallel Distributed Comput., 2011

A New Evaluation Model for Security Protocols.
J. Commun., 2011

Game-Theoretic Analyses and Simulations of Adoptions of Security Policies for Drm in Contents Sharing Scenario.
Intell. Autom. Soft Comput., 2011

Reasonable routing in delay/disruption tolerant networks.
Frontiers Comput. Sci. China, 2011

Security analysis of two recently proposed RFID authentication protocols.
Frontiers Comput. Sci. China, 2011

A USIM-Based Uniform Access Authentication Framework in Mobile Communication.
EURASIP J. Wirel. Commun. Netw., 2011

Secret Sharing Scheme with Fairness.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Towards Location and Trajectory Privacy Protection in Participatory Sensing.
Proceedings of the Mobile Computing, Applications, and Services, 2011

From security to vulnerability: Data authentication undermines message delivery in smart grid.
Proceedings of the MILCOM 2011, 2011

Fast Parallel Computation of Tate Pairing.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

MS2HM: A Multimedia Service Session Handoff Method between Heterogeneous Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Invariant Image Recognition Using Radial Jacobi Moment Invariants.
Proceedings of the Sixth International Conference on Image and Graphics, 2011

A Multi-compositional Enforcement on Information Flow Security.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP.
Proceedings of the Global Communications Conference, 2011

PSO-BP Neural Network in Reservoir Parameter Dynamic Prediction.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Key Management Protocol Based on Finely Granular Multi-level Security Method in Wireless Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Analysis of the Authentication Protocols Based on Game Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

Secure Data Aggregation Scheme for Clustered Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks.
IEEE Trans. Wirel. Commun., 2010

Image analysis by Bessel-Fourier moments.
Pattern Recognit., 2010

Rotation invariant analysis and orientation estimation method for texture classification based on Radon transform and correlation analysis.
J. Vis. Commun. Image Represent., 2010

Efficient and Identity-based Signcryption with Provably-secure.
J. Digit. Content Technol. its Appl., 2010

A highly secure identity-based authenticated key-exchange protocol for satellite communication.
J. Commun. Networks, 2010

A Hierarchical Hybrid Routing Protocol for Wireless Mesh Network.
J. Convergence Inf. Technol., 2010

A high performance MQ encoder architecture in JPEG2000.
Integr., 2010

An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing.
Int. J. Netw. Secur., 2010

Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks.
Int. J. Netw. Secur., 2010

An Efficient Authentication Protocol for WLAN Mesh Networks in Trusted Environment.
IEICE Trans. Inf. Syst., 2010

Secure Message Distribution Scheme with Configurable Privacy in Heterogeneous Wireless Sensor Networks.
IEICE Trans. Inf. Syst., 2010

SAM: Secure Access of Media Independent Information Service with User Anonymity.
EURASIP J. Wirel. Commun. Netw., 2010

Stability analysis of a SEIQV epidemic model for rapid spreading worms.
Comput. Secur., 2010

Universally composable one-time signature and broadcast authentication.
Sci. China Inf. Sci., 2010

Universally composable secure TNC model and EAP-TNC protocol in IF-T.
Sci. China Inf. Sci., 2010

Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2010

Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A novel data communication approach in wireless sensor networks.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A Digital Rights Management scheme based on rational share content.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010

Changeable Threshold Signature Scheme Based on Lattice Theory.
Proceedings of the International Conference on E-Business and E-Government, 2010

Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Wireless Mesh Networks-Based Multinetwork Convergence and Security Access.
Proceedings of the Guide to Wireless Mesh Networks, 2009

Modeling and analysis of a self-learning worm based on good point set scanning.
Wirel. Commun. Mob. Comput., 2009

Asymmetric Key Pre-distribution Scheme for sensor networks.
IEEE Trans. Wirel. Commun., 2009

Security and Trust in Digital Rights Management: A Survey.
Int. J. Netw. Secur., 2009

Robust Node Positioning in Wireless Sensor Networks.
IEICE Trans. Commun., 2009

UC-Secure Source Routing Protocol.
IACR Cryptol. ePrint Arch., 2009

Defending passive worms in unstructured P2P networks based on healthy file dissemination.
Comput. Secur., 2009

Key hierarchies for hierarchical access control in secure group communications.
Comput. Networks, 2009

Secure Error-Correction Network Coding in a Randomized Setting.
Proceedings of the Advances in Information Security and Assurance, 2009

Multi-path Protocol for High Data Confidentiality and Reliability in Wireless Sensor Networks Using Non-dominated Dynamic Compensation.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

The Development Mode of Trust E-commerce Services.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Hybrid Routing Protocol for Wireless Mesh Network.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Predators Combat Good Point Set Scanning-Based Self-Learning Worms.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A Routing Algorithm Based on Ant-Colony in Wireless Sensor Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Cooperative and Non-Cooperative Game-Theoretic Analyses of Adoptions of Security Policies for DRM.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

An Active Defense Model and Framework of Insider Threats Detection and Sense.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A New Hybrid Routing Protocol in Heterogeneous Wireless Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Towards Provably Secure On-demand Source Routing in MANET.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Action-Based Access Control for Web Services.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Analysis the Properties of TLS Based on Temporal Logic of Knowledge.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Node-failure Tolerance of Topology in Wireless Sensor Networks.
Int. J. Netw. Secur., 2008

Factoring Polynomials for Constructing Pairing-friendly Elliptic Curves.
IACR Cryptol. ePrint Arch., 2008

Polynomials for Ate Pairing and Ate<sub>i</sub> Pairing.
IACR Cryptol. ePrint Arch., 2008

Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing.
EURASIP J. Wirel. Commun. Netw., 2008

Secure Network Coding Against the Contamination and Eavesdropping Adversaries
CoRR, 2008

A new approach for UC security concurrent deniable authentication.
Sci. China Ser. F Inf. Sci., 2008

Keying Material Based Key Pre-distribution Scheme for Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2008

Adaptive Algorithms to Mitigate Inefficiency in Reliability Differentiation Mechanisms for Wireless Sensor Networks.
Proceedings of the MSN 2008, 2008

SMNDP: A Practical and Provably Secure Multi-path Source Routing.
Proceedings of the MSN 2008, 2008

A Congestion Avoidance and Performance Enhancement Scheme for Mobile Ad Hoc Networks.
Proceedings of the MSN 2008, 2008

A pairwise key establishment scheme for heterogeneous sensor networks.
Proceedings of the 1st ACM International Workshop on Heterogeneous Sensor and Actor Networks, 2008

Keying material based key pre-distribution scheme.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

A Secure and Efficient Group Key Agreement for Ad Hoc Networks.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Enhanced Architecture of TPM.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

CRMS: A Collusion-Resistant Matrix System for Group Key Management in Wireless Networks.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

An Aggregate Signature Scheme with Constant Pairing Operations.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

A Fine-Grained Digital Rights Transfer Policy and Trusted Distribution and Enforcement.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

ECC-Based Threshold Digital Signature Scheme without a Trusted Party.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Towards Provably Secure On-Demand Distance Vector Routing in MANET.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Scaling and rotation invariant analysis approach to object recognition based on Radon and Fourier-Mellin transforms.
Pattern Recognit., 2007

Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor.
Int. J. Autom. Control., 2007

Universally composable anonymous Hash certification model.
Sci. China Ser. F Inf. Sci., 2007

Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2007

Research on the Resilience of Key Management in Sensor Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Fault and intrusion tolerance of wireless sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Ternary Tree Based Group Key Management in Dynamic Peer Networks.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

An Intelligent Digital Content Protection Framework Between Home Network Receiver Devices.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

On the Security of the Authentication Module of Chinese WLAN Standard Implementation Plan.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Security extension for the Canetti-Krawczyk model in identity-based systems.
Sci. China Ser. F Inf. Sci., 2005

Efficient Group Key Management for Dynamic Peer Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Security Analysis on Chinese Wireless LAN Standard and Its Solution.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

Design and Implementation of Survivable Network Systems.
Proceedings of the Advances in Intelligent Computing, 2005

An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure.
Proceedings of the Computational Science, 2005

A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Worm Propagation Modeling and Analysis on Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On the Security of the Canetti-Krawczyk Model.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A new authentication scheme with anonymity for wireless environments.
IEEE Trans. Consumer Electron., 2004

An efficient and secure fault-tolerant conference-key distribution scheme.
IEEE Trans. Consumer Electron., 2004

An intrusion-tolerant authorization and authentication scheme in distributed environments.
ACM SIGOPS Oper. Syst. Rev., 2004

Practical Secret Sharing Scheme Realizing Generalized Adversary Structure.
J. Comput. Sci. Technol., 2004

Enhancing the Content of the Intrusion Alerts Using Logic Correlation.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

Availability Analysis and Comparison of Different Intrusion-Tolerant Systems.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004

2003
Pseudorandom number generators based on evolutionary algorithm.
Proceedings of the IEEE Congress on Evolutionary Computation, 2003


  Loading...