Jianwei Liu
Orcid: 0000-0003-2965-3518Affiliations:
- Beihang University, School of Electronic and Information Engineering, Beijing, China
According to our database1,
Jianwei Liu
authored at least 246 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proc. Priv. Enhancing Technol., 2025
2024
Blockchain-Based Trustworthy and Efficient Hierarchical Federated Learning for UAV-Enabled IoT Networks.
IEEE Internet Things J., November, 2024
The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT.
Concurr. Comput. Pract. Exp., November, 2024
IEEE Trans. Wirel. Commun., September, 2024
IEEE Trans. Ind. Informatics, September, 2024
Client-Side Gradient Inversion Attack in Federated Learning Using Secure Aggregation.
IEEE Internet Things J., September, 2024
Secure and Distributed IoV Data Sharing Scheme Based on a Hybrid PoS Blockchain Protocol.
IEEE Trans. Veh. Technol., August, 2024
An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things.
IEEE Internet Things J., May, 2024
Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks.
IEEE Trans. Neural Networks Learn. Syst., April, 2024
TaP2-CSS: A Trustworthy and Privacy-Preserving Cooperative Spectrum Sensing Solution Based on Blockchain.
IEEE Internet Things J., April, 2024
IEEE Internet Things J., April, 2024
PIPP: A Practical PUF-Based Intellectual Property Protection Scheme for DNN Model on FPGA.
IEEE Trans. Circuits Syst. II Express Briefs, February, 2024
SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems.
IEEE Internet Things J., February, 2024
Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain.
Veh. Commun., 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Netw. Sci. Eng., 2024
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024
CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network.
IEEE Trans. Dependable Secur. Comput., 2024
J. Syst. Archit., 2024
SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain.
IEEE Internet Things J., 2024
FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels.
IACR Cryptol. ePrint Arch., 2024
GroupCover: A Secure, Efficient and Scalable Inference Framework for On-device Model Protection based on TEEs.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
2023
Intelligent and Fair IoV Charging Service Based on Blockchain With Cross-Area Consensus.
IEEE Trans. Intell. Transp. Syst., December, 2023
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain.
IEEE/ACM Trans. Netw., August, 2023
Quantum Inf. Process., August, 2023
Lightweight and Privacy-Preserving Charging Reservation Authentication Protocol for 5G-V2G.
IEEE Trans. Veh. Technol., June, 2023
Big Data Min. Anal., June, 2023
Inf. Sci., May, 2023
Epidemic Theory-Inspired Integrated Sensing and Communication Networks: Design and Analysis.
IEEE Commun. Mag., May, 2023
Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems.
IEEE J. Biomed. Health Informatics, February, 2023
IEEE Trans. Serv. Comput., 2023
Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023
A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
PUF-Based Lightweight Authentication Framework for Large-Scale IoT Devices in Distributed Cloud.
IEEE Netw., 2023
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
Anti-Jamming Strategy for Satellite Internet of Things: Beam Switching and Optimization.
IEEE Internet Things J., 2023
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation.
IACR Cryptol. ePrint Arch., 2023
IEEE Control. Syst. Lett., 2023
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Targeted Defense Against Neuron-Exclusivity-Based Gradient Inversion Attack in Federated Learning.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Lightweight Batch Authentication Protocol for Bus-NB-IoT Hierarchical Network in Smart Grid Using Physically Unclonable Function.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023
2022
AACF - Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework.
IEEE Trans. Dependable Secur. Comput., 2022
Quantum Inf. Process., 2022
Variational Inference Based Sparse Signal Detection for Next Generation Multiple Access.
IEEE J. Sel. Areas Commun., 2022
An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things.
Int. J. Intell. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Future Gener. Comput. Syst., 2022
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems.
Comput. Sci. Rev., 2022
CoRR, 2022
Comput. Secur., 2022
Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022
Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Knowledge Science, Engineering and Management, 2022
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
Proceedings of the 13th Asian Control Conference, 2022
2021
IEEE Wirel. Commun., 2021
B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021
Coordinated Beamforming for UAV-Aided Millimeter-Wave Communications Using GPML-Based Channel Estimation.
IEEE Trans. Cogn. Commun. Netw., 2021
IEEE Trans. Big Data, 2021
Quantum Inf. Process., 2021
Peer-to-Peer Netw. Appl., 2021
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021
UAV-Aided Backscatter Communications: Performance Analysis and Trajectory Optimization.
IEEE J. Sel. Areas Commun., 2021
IEEE Internet Things J., 2021
A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021
Des. Codes Cryptogr., 2021
Digit. Commun. Networks, 2021
Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management.
Comput. Networks, 2021
Sci. China Inf. Sci., 2021
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the Computational Science - ICCS 2021, 2021
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021
UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Multiple Delay Estimation Using Genetic Algorithm-Based MCMC in Non-Orthogonal Random Access.
IEEE Wirel. Commun. Lett., 2020
IEEE Wirel. Commun., 2020
IEEE Trans. Veh. Technol., 2020
A Precoding Compensation Scheme for Heterogeneous Communication Networks With CSI Feedback Delay.
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Cogn. Commun. Netw., 2020
Sensors, 2020
Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.
Secur. Commun. Networks, 2020
Quantum Inf. Process., 2020
Multim. Tools Appl., 2020
An inaudible voice attack to context-based device authentication in smart IoT systems.
J. Syst. Archit., 2020
Spatial temporal incidence dynamic graph neural networks for traffic flow forecasting.
Inf. Sci., 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Int. J. Sens. Networks, 2020
Int. J. Inf. Sec., 2020
More realistic analysis of mass surveillance - security in multi-surveillant settings.
IET Inf. Secur., 2020
Comput. Secur., 2020
Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application.
IEEE Access, 2020
IEEE Access, 2020
An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack.
IEEE Access, 2020
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Measurement-Device-Independent QKD Based on Orbital Angular Momentum with Dual Detectors.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
IEEE/ACM Trans. Netw., 2019
Quantum Inf. Process., 2019
J. Commun. Inf. Networks, 2019
J. Commun. Inf. Networks, 2019
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network.
Comput. Secur., 2019
Comput. Commun., 2019
IEEE Access, 2019
An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance.
IEEE Access, 2019
Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing.
IEEE Access, 2019
Proceedings of the 28th Wireless and Optical Communications Conference, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Smart Blockchain - Second International Conference, 2019
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019
Proceedings of the Information Security - 22nd International Conference, 2019
Proceedings of the Second International Conference on Latest trends in Electrical Engineering and Computing Technologies, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Proceedings of the Communications and Networking, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication.
Proceedings of the Advances in Cyber Security - First International Conference, 2019
2018
IEEE Wirel. Commun., 2018
Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing.
Sensors, 2018
Secur. Commun. Networks, 2018
J. Comput. Sci. Technol., 2018
Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature.
Entropy, 2018
Understanding structure-based social network de-anonymization techniques via empirical analysis.
EURASIP J. Wirel. Commun. Netw., 2018
IEEE Access, 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
TBDCT: A Framework of Trusted Big Data Collection and Trade System Based on Blockchain and TSM.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018
A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p).
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking.
J. Signal Process. Syst., 2017
Soft Comput., 2017
Soft Comput., 2017
Secur. Commun. Networks, 2017
Quantum Inf. Process., 2017
Quantum Inf. Process., 2017
Int. J. Inf. Sec., 2017
Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems.
Int. J. Commun. Syst., 2017
Comput. J., 2017
IEEE Access, 2017
Proceedings of the Provable Security, 2017
Proceedings of the Quantum Technology and Optimization Problems, 2017
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017
2016
IEEE Trans. Commun., 2016
Secur. Commun. Networks, 2016
Quantum Inf. Process., 2016
Quantum Inf. Process., 2016
Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS.
J. Electr. Comput. Eng., 2016
J. Commun. Inf. Networks, 2016
Int. J. Inf. Sec., 2016
A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2016
Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016
Future Gener. Comput. Syst., 2016
Future Gener. Comput. Syst., 2016
Efficient group key management for secure big data in predictable large-scale networks.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Secure and Anonymous Data Transmission System for Cluster Organised Space Information Network.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016
Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Theor. Comput. Sci., 2015
Sci. China Inf. Sci., 2015
Proceedings of the Information Security Practice and Experience, 2015
Proceedings of the Information Security Practice and Experience, 2015
Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
2014
Inf. Sci., 2014
The effect of hexagonal grid topology on wireless communication networks based on network coding.
Int. J. Commun. Syst., 2014
Hierarchical Solution for Access Control and Authentication in Software Defined Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Throughput-delay analysis of one-to-many wireless multi-hop flows based on random linear network coding.
J. Commun. Networks, 2013
Clust. Comput., 2013
Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2010
A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks.
J. Commun., 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
A Probabilistic Approach for Improving TCP Fairness across Multiple Contending WLANs.
Proceedings of the Global Communications Conference, 2010
2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
2006
Proceedings of the Communications and Multimedia Security, 2006