Jianhua Li

Orcid: 0000-0002-6831-3973

Affiliations:
  • Shanghai Jiao Tong University, Shanghai Key Laboratory of Integrated Administration Technologies for Information Security, China


According to our database1, Jianhua Li authored at least 302 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
HSESR: Hierarchical Software Execution State Representation for Ultralow-Latency Threat Alerting Over Internet of Things.
IEEE Internet Things J., November, 2024

Personalized Privacy-Preserving Distributed Artificial Intelligence for Digital-Twin-Driven Vehicle Road Cooperation.
IEEE Internet Things J., November, 2024

Large-Scale Mean-Field Federated Learning for Detection and Defense: A Byzantine Robustness Approach in IoT.
IEEE Internet Things J., November, 2024

Joint Top-K Sparsification and Shuffle Model for Communication-Privacy-Accuracy Tradeoffs in Federated-Learning-Based IoV.
IEEE Internet Things J., June, 2024

Leveraging Digital Twin and DRL for Collaborative Context Offloading in C-V2X Autonomous Driving.
IEEE Trans. Veh. Technol., April, 2024

Blockchain and Multi-Agent Learning Empowered Incentive IRS Resource Scheduling for Intelligent Reconfigurable Networks.
IEEE/ACM Trans. Netw., April, 2024

Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent Threats via Federated Meta Learning.
IEEE Trans. Netw. Sci. Eng., 2024

From Control Application to Control Logic: PLC Decompile Framework for Industrial Control System.
IEEE Trans. Inf. Forensics Secur., 2024

Generative AI for Software Security Analysis: Fundamentals, Applications, and Challenges.
IEEE Softw., 2024

SupRTE: Suppressing Backdoor Injection in Federated Learning via Robust Trust Evaluation.
IEEE Intell. Syst., 2024

SFR-GNN: Simple and Fast Robust GNNs against Structural Attacks.
CoRR, 2024

rLLM: Relational Table Learning with LLMs.
CoRR, 2024

Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions.
CoRR, 2024

Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness.
CoRR, 2024

Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices.
CoRR, 2024

LinkGuard: Link Locally Privacy-Preserving Graph Neural Networks with Integrated Denoising and Private Learning.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Local Differential Private Spatio- Temporal Dynamic Graph Learning for Wireless Social Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Covert and Reliable Semantic Communication Against Cross-Layer Privacy Inference over Wireless Edge Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Leveraging Neural Radiance Field and Semantic Communication for Robust 3D Reconstruction.
Proceedings of the 100th IEEE Vehicular Technology Conference, 2024

Towards Multi-Task Generative-AI Edge Services with an Attention-based Diffusion DRL Approach.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024

Digital Twin Enhanced Data Protection Based on Cloud-Edge Collaboration in Healthcare System.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024

ZeroTKS: Zero-trust Knowledge Synchronization via Federated Fine-tuning for Secure Semantic Communications.
Proceedings of the Twenty-fifth International Symposium on Theory, 2024

How to Efficiently Manage Critical Infrastructure Vulnerabilities? Toward Large Code-graph Models.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

Multi-Agent RL-Based Industrial AIGC Service Offloading over Wireless Edge Networks.
Proceedings of the IEEE INFOCOM 2024, 2024

Adaptively Compressed Swarm Learning for Distributed Traffic Prediction over IoV-Web3.0.
Proceedings of the International Joint Conference on Neural Networks, 2024

Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain Eavesdropper.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

A Binary Level Verification Framework for Real-Time Performance of PLC Program in Backhaul/Fronthaul Networks.
Proceedings of the IEEE International Conference on Communications, 2024

Scale Wisely, Secure Wholly: P2P Swarm Learning Over Consortium Blockchain in Edge Networks.
Proceedings of the IEEE International Conference on Communications, 2024

Learning-Based DApp Task Scheduling for Elastic Hybrid Computing in Edge Web 3.0.
Proceedings of the IEEE International Conference on Communications, 2024

OpticGAI: Generative AI-aided Deep Reinforcement Learning for Optical Networks Optimization.
Proceedings of the 1st SIGCOMM Workshop on Hot Topics in Optical Technologies and Applications in Networking, 2024

Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoT.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

BlockAgents: Towards Byzantine-Robust LLM-Based Multi-Agent Coordination via Blockchain.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

2023
Digital Twin and Artificial Intelligence-Empowered Panoramic Video Streaming: Reducing Transmission Latency in the Extended Reality-Assisted Vehicular Metaverse.
IEEE Veh. Technol. Mag., December, 2023

Stochastic Digital-Twin Service Demand With Edge Response: An Incentive-Based Congestion Control Approach.
IEEE Trans. Mob. Comput., April, 2023

Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., April, 2023

Multicore Federated Learning for Mobile-Edge Computing Platforms.
IEEE Internet Things J., April, 2023

Recurrent Semantic Learning-Driven Fast Binary Vulnerability Detection in Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Friend-as-Learner: Socially-Driven Trustworthy and Efficient Wireless Federated Edge Learning.
IEEE Trans. Mob. Comput., 2023

Heterogeneous Differential-Private Federated Learning: Trading Privacy for Utility Truthfully.
IEEE Trans. Dependable Secur. Comput., 2023

Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources.
IEEE Trans. Cloud Comput., 2023

Blockchain and digital twin empowered trustworthy self-healing for edge-AI enabled industrial Internet of things.
Inf. Sci., 2023

Reinforcement Learning-Empowered Decentralized Channel Selection for Dense Wi-Fi 7 Networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detection Scheme for ICS.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

DPG-DT: Differentially Private Generative Digital Twin for Imbalanced Learning in Industrial IoT.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Wireless Coded Distributed Learning with Gaussian-based Local Differential Privacy.
Proceedings of the IEEE International Symposium on Information Theory, 2023

SemSBA: Semantic-perturbed Stealthy Backdoor Attack on Federated Semi-supervised Learning.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Swarm Reinforcement Learning for Collaborative Content Caching in Information Centric Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Hierarchical Swarm Learning for Edge-Assisted Collaborative Vehicle Trajectory Prediction.
Proceedings of the IEEE International Conference on Communications, 2023

Black-Box Graph Backdoor Defense.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

PBE-Plan: Periodic Backdoor Erasing Plan for Trustworthy Federated Learning.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning.
Proceedings of the Emerging Information Security and Applications, 2023

AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction Sequences.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node Classification.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AI.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Blockchain and AI Enabled Configurable Reflection Resource Allocation for IRS-Aided Coexisting Drone-Terrestrial Networks.
IEEE Wirel. Commun., 2022

Malicious encrypted traffic features extraction model based on unsupervised feature adaptive learning.
J. Comput. Virol. Hacking Tech., 2022

FLAG: Few-Shot Latent Dirichlet Generative Learning for Semantic-Aware Traffic Detection.
IEEE Trans. Netw. Serv. Manag., 2022

Cognitive Balance for Fog Computing Resource in Internet of Things: An Edge Learning Approach.
IEEE Trans. Mob. Comput., 2022

Artificial Intelligence-Based Energy Efficient Communication System for Intelligent Reflecting Surface-Driven VANETs.
IEEE Trans. Intell. Transp. Syst., 2022

Digital Twin Consensus for Blockchain-Enabled Intelligent Transportation Systems in Smart Cities.
IEEE Trans. Intell. Transp. Syst., 2022

Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach.
IEEE Trans. Ind. Informatics, 2022

Side-Channel Fuzzy Analysis-Based AI Model Extraction Attack With Information-Theoretic Perspective in Intelligent IoT.
IEEE Trans. Fuzzy Syst., 2022

Differential Privacy and IRS Empowered Intelligent Energy Harvesting for 6G Internet of Things.
IEEE Internet Things J., 2022

Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design.
IEEE Internet Things J., 2022

Information-Centric Wireless Sensor Networking Scheme With Water-Depth-Awareness Content Caching for Underwater IoT.
IEEE Internet Things J., 2022

Metric Learning-based Few-Shot Malicious Node Detection for IoT Backhaul/Fronthaul Networks.
Proceedings of the IEEE Global Communications Conference, 2022

Contrastive GNN-based Traffic Anomaly Analysis Against Imbalanced Dataset in IoT-based ITS.
Proceedings of the IEEE Global Communications Conference, 2022

Multi-Agent Learning Automata for Online Adaptive Control of Large-Scale Traffic Signal Systems.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Trustworthy Edge Storage Orchestration in Intelligent Transportation Systems Using Reinforcement Learning.
IEEE Trans. Intell. Transp. Syst., 2021

Leveraging Energy Function Virtualization With Game Theory for Fault-Tolerant Smart Grid.
IEEE Trans. Ind. Informatics, 2021

Blockchain-Based On-Demand Computing Resource Trading in IoV-Assisted Smart City.
IEEE Trans. Emerg. Top. Comput., 2021

Privacy-Accuracy Trade-Off in Differentially-Private Distributed Classification: A Game Theoretical Approach.
IEEE Trans. Big Data, 2021

Privacy Preserved Cyber-Physical Searching for Information-Centric Intelligent Agriculture.
IEEE Open J. Comput. Soc., 2021

Weakly-supervised learning for community detection based on graph convolution in attributed networks.
Int. J. Mach. Learn. Cybern., 2021

Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones.
IEEE Internet Things Mag., 2021

Deep-Reinforcement-Learning-Based Cybertwin Architecture for 6G IIoT: An Integrated Design of Control, Communication, and Computing.
IEEE Internet Things J., 2021

Information-Centric Massive IoT-Based Ubiquitous Connected VR/AR in 6G: A Proposed Caching Consensus Approach.
IEEE Internet Things J., 2021

Unsupervised learning for community detection in attributed networks based on graph convolutional network.
Neurocomputing, 2021

Blockchain-Based Trust Edge Knowledge Inference of Multi-Robot Systems for Collaborative Tasks.
IEEE Commun. Mag., 2021

Side-Channel Analysis-Based Model Extraction on Intelligent CPS: An Information Theory Perspective.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Communication Modeling for Targeted Delivery under Bio-DoS Attack in 6G Molecular Networks.
Proceedings of the ICC 2021, 2021

MT-MTD: Muti-Training based Moving Target Defense Trojaning Attack in Edged-AI network.
Proceedings of the ICC 2021, 2021

Deep Reinforcement Learning for Intelligent Computing and Content Edge Service in ICN-based IoV.
Proceedings of the IEEE International Conference on Communications Workshops, 2021

GradMFL: Gradient Memory-Based Federated Learning for Hierarchical Knowledge Transferring Over Non-IID Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

PFCC: Predictive Fast Consensus Convergence for Mobile Blockchain over 5G Slicing-enabled IoT.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Processing capability and QoE driven optimized computation offloading scheme in vehicular fog based F-RAN.
World Wide Web, 2020

Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing.
IEEE Trans. Sustain. Comput., 2020

Fog-based Secure Service Discovery for Internet of Multimedia Things: A Cross-blockchain Approach.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Cognitive Popularity Based AI Service Sharing for Software-Defined Information-Centric Networks.
IEEE Trans. Netw. Sci. Eng., 2020

DeSVig: Decentralized Swift Vigilance Against Adversarial Attacks in Industrial Artificial Intelligence Systems.
IEEE Trans. Ind. Informatics, 2020

Preserving Edge Knowledge Sharing Among IoT Services: A Blockchain-Based Approach.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Application-Aware Consensus Management for Software-Defined Intelligent Blockchain in IoT.
IEEE Netw., 2020

Blockchain and AI Empowered Trust-Information-Centric Network for Beyond 5G.
IEEE Netw., 2020

Integrating NFV and ICN for Advanced Driver-Assistance Systems.
IEEE Internet Things J., 2020

Leveraging AI and Intelligent Reflecting Surface for Energy-Efficient Communication in 6G IoT.
CoRR, 2020

Proof-of-Balance: Game-Theoretic Consensus for Controller Load Balancing of SDN.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Big Data Management Architecture for Standardized IoT Based on Smart Scalable SNMP.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

RALaaS: Resource-Aware Learning-as-a-Service in Edge-Cloud Collaborative Smart Connected Communities.
Proceedings of the IEEE Global Communications Conference, 2020

A Token Level Multi-target Stance Detection Dataset.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach.
IEEE Trans. Ind. Informatics, 2019

FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks.
IEEE Trans. Emerg. Top. Comput., 2019

Decentralized On-Demand Energy Supply for Blockchain in Internet of Things: A Microgrids Approach.
IEEE Trans. Comput. Soc. Syst., 2019

EdgeLaaS: Edge Learning as a Service for Knowledge-Centric Connected Healthcare.
IEEE Netw., 2019

CDLB: a cross-domain load balancing mechanism for software defined networks in cloud data centre.
Int. J. Comput. Sci. Eng., 2019

Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet.
IEEE Commun. Mag., 2019

MBID: Micro-Blockchain-Based Geographical Dynamic Intrusion Detection for V2X.
IEEE Commun. Mag., 2019

Edge-MapReduce-Based Intelligent Information-Centric IoV: Cognitive Route Planning.
IEEE Access, 2019

Fog-Enabled Vehicle as a Service for Computing Geographical Migration in Smart Cities.
IEEE Access, 2019

Vehicle-to-Cloudlet: Game-Based Computation Demand Response for Mobile Edge Computing through Vehicles.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Edge Learning based Green Content Distribution for Information-Centric Internet of Things.
Proceedings of the 42nd International Conference on Telecommunications and Signal Processing, 2019

Emergent LBS: If GNSS Fails, How Can 5G-enabled Vehicles Get Locations Using Fogs?
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

Toward Software Defined Dynamic Defense as a Service for 5G-Enabled Vehicular Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Smart NCAP supporting Low-Rate DDoS Detection for IEEE 21451-1-5 Internet of Things.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019

Shape-Unconstrained Privacy-Preserving Range Query for Fog Computing Supported Vehicular Networks Using Image.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

SCTD: Smart Reasoning Based Content Threat Defense in Semantics Knowledge Enhanced ICN.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

NSTN: Name-Based Smart Tracking for Network Status in Information-Centric Internet of Things.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Edge-to-Edge Cooperative Artificial Intelligence in Smart Cities with On-Demand Learning Offloading.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

SCEH: Smart Customized E-Health Framework for Countryside Using Edge AI and Body Sensor Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Making Big Data Intelligent Storable at the Edge: Storage Resource Intelligent Orchestration.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Toward Dynamic Computation Offloading for Data Processing in Vehicular Fog Based F-RAN.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Distributed Data Privacy Preservation in IoT Applications.
IEEE Wirel. Commun., 2018

Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Service Popularity-Based Smart Resources Partitioning for Fog Computing-Enabled Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Big Data Analysis-Based Security Situational Awareness for Smart Grid.
IEEE Trans. Big Data, 2018

Security for cyberspace: challenges and opportunities.
Frontiers Inf. Technol. Electron. Eng., 2018

Cyber security meets artificial intelligence: a survey.
Frontiers Inf. Technol. Electron. Eng., 2018

Check in or Not? A Stochastic Game for Privacy Preserving in Point-of-Interest Recommendation System.
IEEE Internet Things J., 2018

Detecting Domain-Flux Malware Using DNS Failure Traffic.
Int. J. Softw. Eng. Knowl. Eng., 2018

Software-defined dynamic QoS provisioning for smart metering in energy Internet using fog computing and network calculus.
IET Cyper-Phys. Syst.: Theory & Appl., 2018

Fog-enabled Edge Learning for Cognitive Content-Centric Networking in 5G.
CoRR, 2018

QoS-Predicted Energy Efficient Routing for Information-Centric Smart Grid: A Network Calculus Approach.
IEEE Access, 2018

Energy-Efficient Location Privacy Preserving in Vehicular Networks Using Social Intimate Fogs.
IEEE Access, 2018

SLA-Aware Fine-Grained QoS Provisioning for Multi-Tenant Software-Defined Networks.
IEEE Access, 2018

Fog Computing-Enabled Secure Demand Response for Internet of Energy Against Collusion Attacks Using Consensus and ACE.
IEEE Access, 2018

A Novel Airbnb Matching Scheme in Shared Economy Using Confidence and Prediction Uncertainty Analysis.
IEEE Access, 2018

A UCB1-Based Online Job Dispatcher for Heterogeneous Mobile Edge Computing System.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Caching Strategy for Scalable Video Coding in Information-Centric Networking.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Reputation-based Distributed Knowledge Sharing System in Blockchain.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

Efficient Secure Access to IEEE 21451 Based Wireless IIoT Using Optimized TEDS and MIB.
Proceedings of the IECON 2018, 2018

A Hierarchical Access Control Encryption Scheme Based on Partially Ordered Set.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

K-Loop Free Assignment in Conference Review Systems.
Proceedings of the 2018 International Conference on Computing, 2018

MapReduce Enabling Content Analysis Architecture for Information-Centric Networks Using CNN.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Resource-Efficient Secure Data Sharing for Information Centric E-Health System Using Fog Computing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Sema-ICN: Toward Semantic Information-Centric Networking Supporting Smart Anomalous Access Detection.
Proceedings of the IEEE Global Communications Conference, 2018

Vehicle Mobility-Based Geographical Migration of Fog Resource for Satellite-Enabled Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2018

On-Demand Fog Caching Service for ICN Using Synthetical Popularity, Cost, and Importance Status.
Proceedings of the IEEE Global Communications Conference, 2018

Privacy-Preserving and Unforgeable Searchable Encrypted Audit Logs for Cloud Storage.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

An Effective Verifiable Database Protocol in Severe Untrusted Environment.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks.
Proceedings of the 23rd IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2018

2017
Dynamic Privacy Pricing: A Multi-Armed Bandit Approach With Time-Variant Rewards.
IEEE Trans. Inf. Forensics Secur., 2017

Crowd Sensing-Enabling Security Service Recommendation for Social Fog Computing Systems.
Sensors, 2017

An Untraceable ECC-Based Remote User Authentication Scheme.
KSII Trans. Internet Inf. Syst., 2017

A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle.
IEEE Internet Things J., 2017

A lightweight authentication scheme based on self-updating strategy for space information network.
Int. J. Satell. Commun. Netw., 2017

A novel parallel framework for pursuit learning schemes.
Neurocomputing, 2017

Detecting malware based on expired command-and-control traffic.
Int. J. Distributed Sens. Networks, 2017

Software-defined networking model for smart transformers with ISO/IEC/IEEE 21451 sensors.
ICT Express, 2017

Overlapping Community Detection Based on Structural Centrality in Complex Networks.
IEEE Access, 2017

Proposed Matching Scheme with Confidence and Prediction Uncertainty in Shared Economy.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

A Novel Image Classification Method with CNN-XGBoost Model.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

SDN Based Content-Centric QoS-Guaranteed for Wireless Multimedia Sensor Networks.
Proceedings of the Industrial Networks and Intelligent Systems, 2017

Fog computing based content-aware taxonomy for caching optimization in information-centric networks.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Towards QoE named content-centric wireless multimedia sensor networks with mobile sinks.
Proceedings of the IEEE International Conference on Communications, 2017

CC-fog: Toward content-centric fog networks for E-health.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Privacy Preserving Distributed Classification: A Satisfaction Equilibrium Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Software-Defined Efficient Service Reconstruction in Fog Using Content Awareness and Weighted Graph.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SD-OPTS: Software-Defined On-Path Time Synchronization for Information-Centric Smart Grid.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Learning Automata Based Approach for Influence Maximization Problem on Social Networks.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Security Analysis of Simple Network Management Protocol Based IEEE P21451 Internet of Things.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

2016
A multi-stage attack mitigation mechanism for software-defined home networks.
IEEE Trans. Consumer Electron., 2016

Estimator Goore Game based quality of service control with incomplete information for wireless sensor networks.
Signal Process., 2016

A Safety Resource Allocation Mechanism against Connection Fault for Vehicular Cloud Computing.
Mob. Inf. Syst., 2016

Strongly secure identity-based authenticated key agreement protocols without bilinear pairings.
Inf. Sci., 2016

Uncovering fuzzy communities in networks with structural similarity.
Neurocomputing, 2016

Security-Aware Distributed Service Composition for Wireless Sensor Networks Based Smart Metering in Smart Grid Using Software Defined Networks.
Proceedings of the Wireless Internet - 9th International Conference, 2016

Improving Energy Efficiency in Industrial Wireless Sensor Networks Using SDN and NFV.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

How to Defend against Sophisticated Intrusions in Home Networks Using SDN and NFV.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Toward interests drift mechanism for social network.
Proceedings of the International Conference on Security of Smart Cities, 2016

Cube attack on reduced-round Enhanced-Bivium.
Proceedings of the International Conference on Security of Smart Cities, 2016

Channel aware resource allocation for device-to-device communication underlaying cellular networks.
Proceedings of the International Conference on Security of Smart Cities, 2016

Analysis and design of an authentication protocol for space information network.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Software-defined QoS provisioning for fog computing advanced wireless sensor networks.
Proceedings of the 2016 IEEE SENSORS, Orlando, FL, USA, October 30 - November 3, 2016, 2016

Two Approaches on Accelerating Bayesian Two Action Learning Automata.
Proceedings of the Intelligent Computing Methodologies - 12th International Conference, 2016

An anonymous distributed key management system based on CL-PKC for space information network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Deep Packet Inspection Based Application-Aware Traffic Control for Software Defined Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Name-Based Secure Communication Mechanism for Smart Grid Employing Wireless Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Survey on Domain Name System Security.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

GEV Regression with Convex Loss Applied to Imbalanced Binary Classification.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Automatic Threshold Calculation Based Label Propagation Algorithm for Overlapping Community.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication Systems.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

State Recovering Attack Against Quavium.
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016

2015
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
IEEE Trans. Inf. Forensics Secur., 2015

Passive Image-Splicing Detection by a 2-D Noncausal Markov Model.
IEEE Trans. Circuits Syst. Video Technol., 2015

A Security Assessment Mechanism for Software-Defined Networking-Based Mobile Networks.
Sensors, 2015

A novel estimator based learning automata algorithm.
Appl. Intell., 2015

A new genetic-based rumor diffusion model for social networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

Matrix Based Community Evolution Events Detection in Online Social Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Context-Aware Traffic Forwarding Service for Applications in SDN.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Toward Vulnerability Assessment for 5G Mobile Communication Networks.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Overlapping Community Detection Using NVPA.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

A Security Mechanism for Demand Response Using RBAC and Pub/sub.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Defense Mechanism for Distributed Denial of Service Attack in Software-Defined Networks.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

2014
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electr. Comput. Eng., 2014

Provably secure E-cash system with practical and efficient complete tracing.
Int. J. Inf. Sec., 2014

Analysis and Extension of Safety Mechanisms for Standardized Control Networks in Smart Grid.
Int. J. Distributed Sens. Networks, 2014

Detection of shifted double JPEG compression by an adaptive DCT coefficient model.
EURASIP J. Adv. Signal Process., 2014

A Fine-Grained Cross-Domain Access Control Mechanism for Social Internet of Things.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

A Distributed Local Margin Learning based scheme for high-dimensional feature processing in image tampering detection.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A denial of service attack in advanced metering infrastructure network.
Proceedings of the IEEE International Conference on Communications, 2014

A detecting community method in complex networks with fuzzy clustering.
Proceedings of the International Conference on Data Science and Advanced Analytics, 2014

An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Multiple evidence fusion based information diffusion model for social network.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

Abnormal crowd behavior detection using interest points.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2014

An modularity-based overlapping community structure detecting algorithm.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014

2013
Escrowable identity-based authenticated key agreement protocol with strong security.
Comput. Math. Appl., 2013

Strongly secure identity-based authenticated key agreement protocols in the escrow mode.
Sci. China Inf. Sci., 2013

A Distributed Scheme for Image Splicing Detection.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

Image splicing detection based on noncausal Markov model.
Proceedings of the IEEE International Conference on Image Processing, 2013

Chinese SNS blog classification using semantic similarity.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013

Implementing quasi-parallel breadth-first search in MapReduce for large-scale social network mining.
Proceedings of the Fifth International Conference on Computational Aspects of Social Networks, 2013

A complex network-based approach to estimating the number of people in video surveillance.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2013

2012
Quavium - A New Stream Cipher Inspired by Trivium.
J. Comput., 2012

A New Ultralightweight RFID Authentication Protocol with Permutation.
IEEE Commun. Lett., 2012

Optimal chroma-like channel design for passive color image splicing detection.
EURASIP J. Adv. Signal Process., 2012

An Image Super-Resolution Scheme Based on Compressive Sensing with PCA Sparse Representation.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Countering Universal Image Tampering Detection with Histogram Restoration.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Constructing the On/Off Covert Channel on Xen.
Proceedings of the Eighth International Conference on Computational Intelligence and Security, 2012

Hierarchical activeness state evaluation model for BBS network community.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

A complex network-based approach for interest point detection in images.
Proceedings of the IEEE international Symposium on Broadband Multimedia Systems and Broadcasting, 2012

Network Vulnerability Analysis Using Text Mining.
Proceedings of the Intelligent Information and Database Systems - 4th Asian Conference, 2012

Perceptual Compressive Sensing Scheme Based on Human Vision System.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Quantitative Similarity Evaluation of Internet Social Network Entities Based on Supernetwork.
J. Comput. Networks Commun., 2011

Speedup of bit-parallel Karatsuba multiplier in GF(2<sup>m</sup>) generated by trinomials.
Inf. Process. Lett., 2011

Gossip-based scalable directed diffusion for wireless sensor networks.
Int. J. Commun. Syst., 2011

An alternative class of irreducible polynomials for optimal extension fields.
Des. Codes Cryptogr., 2011

An Anti-attack Model Based on Complex Network Theory in P2P networks
CoRR, 2011

Evaluating the transmission rate of covert timing channels in a network.
Comput. Networks, 2011

Strongly secure identity-based authenticated key agreement protocols.
Comput. Electr. Eng., 2011

A Comprehensive Study on Third Order Statistical Features for Image Splicing Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

New Feature Presentation of Transition Probability Matrix for Image Tampering Detection.
Proceedings of the Digital Forensics and Watermarking - 10th International Workshop, 2011

An efficient angle-based shape matching approach towards object recognition.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

2010
An extension of TYT inversion algorithm in polynomial basis.
Inf. Process. Lett., 2010

Enhancing DDoS Flood Attack Detection via Intelligent Fuzzy Logic.
Informatica (Slovenia), 2010

Delegatability of an Identity Based Strong Designated Verifier Signature Scheme.
Informatica, 2010

Fast file dissemination in peer-to-peer networks with upstream bandwidth constraint.
Future Gener. Comput. Syst., 2010

Implementing a passive network covert timing channel.
Comput. Secur., 2010

Detecting Digital Image Splicing in Chroma Spaces.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Fast Forth Power and Its Application in Inversion Computation for a Special Class of Trinomials.
Proceedings of the Computational Science and Its Applications, 2010

An Anonymity Scheme Based on Pseudonym in P2P Networks.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

An Approach to Privacy-Preserving Alert Correlation and Analysis.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
On the Design of Trivium.
IACR Cryptol. ePrint Arch., 2009

A study of on/off timing channel based on packet delay distribution.
Comput. Secur., 2009

Real-Time and Self-adaptive Method for Abnormal Traffic Detection Based on Self-similarity.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A LoSS Based On-line Detection of Abnormal Traffic Using Dynamic Detection Threshold.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2008
Peer-to-Peer Based Fast File Dissemination in UMTS Networks.
IEICE Trans. Commun., 2008

Identity-Based Directed Signature Scheme from Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2008

Building network attack graph for alert causal correlation.
Comput. Secur., 2008

A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

A Novel Original Streaming Video Wavelet Domain Watermarking Algorithm in Copyright Protection.
Proceedings of the Advances in Multimedia Information Processing, 2008

A Novel Real-Time MPEG-2 Video Watermarking Scheme in Copyright Protection.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

Group-Based Trust Model in P2P System Based on Trusted Computing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Group-oriented encryption secure against collude attack.
IACR Cryptol. ePrint Arch., 2007

Group-based Proxy Re-encryption scheme.
IACR Cryptol. ePrint Arch., 2007

Scalable Storage Scheme from Forward Key Rotation.
IACR Cryptol. ePrint Arch., 2007

Provable password-based tripartite key agreement protocol.
IACR Cryptol. ePrint Arch., 2007

ACKDs: An Authenticated Combinatorial Key Distribution Scheme for Wireless Sensor Networks.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Combating P2P File Pollution with Co-alerting.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

An Adaptive Collaborative Filtering Algorithm for Online Reputation Systems.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

A Discussion on Personalized Trust Management for Flat P2P Communities.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

The Necessity of Combining ELN and SACK to Improve TCP Performance over Heterogeneous Networks.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

The Application of Wavelet & DCSK Watermarking in Multimedia Security.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

An Efficient Video Watermarking Scheme with Luminance Differential DC Coefficient Modification.
Proceedings of the Advances in Multimedia Information Processing, 2007

A Novel Verifier-Based Authenticated Key Agreement Protocol.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 2007

Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery.
Proceedings of the Online Communities and Social Computing, 2007

2006
A New Construction of Time Capsule Signature.
IACR Cryptol. ePrint Arch., 2006

Chameleon-Based Deniable Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2006

Lower Bounds on the Algebraic Immunity of Boolean Functions
CoRR, 2006

Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
CoRR, 2006

Cryptanalysis and improvement on Yang-Shieh authentication schemes.
Proceedings of the 2006 International Conference on Privacy, 2006

Efficient ID-based Proxy Chameleon Signature from Bilinear Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Adaptable Designated Group Signature.
Proceedings of the Intelligent Computing, 2006

An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
An improvement on efficient anonymous auction protocols.
Comput. Secur., 2005

An Improved Network Intrusion Detection Method based on VQ-SVM.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

ID-Based One Round Authenticated Group Key Agreement Protocol with Bilinear Pairings.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

The Application of Collaborative Filtering for Trust Management in P2P Communities.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Using Double-Layer One-Class Classification for Anti-jamming Information Filtering.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Enforce Mandatory Access Control Policy on XML Documents.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Constructing Fair-Exchange P2P File Market.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

An Efficient Topic-Specific Web Text Filtering Framework.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

Topic-Specific Text Filtering Based on Multiple Reducts.
Proceedings of the Autonomous Intelligent Systems: Agents and Data Mining, 2005

2004
Further analysis of password authentication schemes based on authentication tests.
Comput. Secur., 2004

Cryptanalysis on a Blind Signature Scheme Based on ElGamal Signature.
Proceedings of the 4th IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2004), 2004

New Feature Selection and Weighting Methods Based on Category Information.
Proceedings of the Digital Libraries: International Collaboration and Cross-Fertilization, 2004

An Efficient Key Management for Large Dynamic Groups.
Proceedings of the 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 2004

Evaluation Incompleteness of Knowledge in Data Mining.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004


  Loading...