Jianwei Liu

Orcid: 0000-0003-2965-3518

Affiliations:
  • Beihang University, School of Electronic and Information Engineering, Beijing, China


According to our database1, Jianwei Liu authored at least 243 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Trustworthy and Efficient Hierarchical Federated Learning for UAV-Enabled IoT Networks.
IEEE Internet Things J., November, 2024

The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT.
Concurr. Comput. Pract. Exp., November, 2024

UAV-Assisted Covert Federated Learning Over mmWave Massive MIMO.
IEEE Trans. Wirel. Commun., September, 2024

A Security-Enhanced Authentication and Key Agreement Protocol in Smart Grid.
IEEE Trans. Ind. Informatics, September, 2024

Client-Side Gradient Inversion Attack in Federated Learning Using Secure Aggregation.
IEEE Internet Things J., September, 2024

Secure and Distributed IoV Data Sharing Scheme Based on a Hybrid PoS Blockchain Protocol.
IEEE Trans. Veh. Technol., August, 2024

An Enhanced Multifactor Authentication and Key Agreement Protocol in Industrial Internet of Things.
IEEE Internet Things J., May, 2024

Hawk: Rapid Android Malware Detection Through Heterogeneous Graph Attention Networks.
IEEE Trans. Neural Networks Learn. Syst., April, 2024

TaP2-CSS: A Trustworthy and Privacy-Preserving Cooperative Spectrum Sensing Solution Based on Blockchain.
IEEE Internet Things J., April, 2024

Provable Secure Anonymous Device Authentication Protocol in IoT Environment.
IEEE Internet Things J., April, 2024

PIPP: A Practical PUF-Based Intellectual Property Protection Scheme for DNN Model on FPGA.
IEEE Trans. Circuits Syst. II Express Briefs, February, 2024

SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems.
IEEE Internet Things J., February, 2024

Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain.
Veh. Commun., 2024

A Blockchain-Based Cross-Domain Authentication Management System for IoT Devices.
IEEE Trans. Netw. Sci. Eng., 2024

Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network.
IEEE Trans. Dependable Secur. Comput., 2024

BFL-SA: Blockchain-based federated learning via enhanced secure aggregation.
J. Syst. Archit., 2024

SS-DID: A Secure and Scalable Web3 Decentralized Identity Utilizing Multilayer Sharding Blockchain.
IEEE Internet Things J., 2024

FLock: Robust and Privacy-Preserving Federated Learning based on Practical Blockchain State Channels.
IACR Cryptol. ePrint Arch., 2024

GroupCover: A Secure, Efficient and Scalable Inference Framework for On-device Model Protection based on TEEs.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Intelligent and Fair IoV Charging Service Based on Blockchain With Cross-Area Consensus.
IEEE Trans. Intell. Transp. Syst., December, 2023

Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain.
IEEE/ACM Trans. Netw., August, 2023

Dynamic full quantum one-way function based on quantum circuit mapping.
Quantum Inf. Process., August, 2023

Lightweight and Privacy-Preserving Charging Reservation Authentication Protocol for 5G-V2G.
IEEE Trans. Veh. Technol., June, 2023

EScope: Effective Event Validation for IoT Systems Based on State Correlation.
Big Data Min. Anal., June, 2023

Defending against model extraction attacks with physical unclonable function.
Inf. Sci., May, 2023

Epidemic Theory-Inspired Integrated Sensing and Communication Networks: Design and Analysis.
IEEE Commun. Mag., May, 2023

Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems.
IEEE J. Biomed. Health Informatics, February, 2023

Secure Gene Sequence Alignment Based on Garbled Circuit.
IEEE Trans. Serv. Comput., 2023

Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023

A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Counting Query Protocol for Genomic Data.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

PUF-Based Lightweight Authentication Framework for Large-Scale IoT Devices in Distributed Cloud.
IEEE Netw., 2023

Multiuser Personalized Ciphertext Retrieval Scheme Based on Deep Learning.
IEEE Internet Things J., 2023

Privacy-Preserving Cross-Silo Federated Learning Atop Blockchain for IoT.
IEEE Internet Things J., 2023

Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain.
IEEE Internet Things J., 2023

Anti-Jamming Strategy for Satellite Internet of Things: Beam Switching and Optimization.
IEEE Internet Things J., 2023

HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation.
IACR Cryptol. ePrint Arch., 2023

Consensus Control Based on Privacy-Preserving Two-Party Relationship Test Protocol.
IEEE Control. Syst. Lett., 2023

Full Quantum One-way Function Based on Quantum Hypergraph State.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2023

FPHammer: A Device Identification Framework based on DRAM Fingerprinting.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Targeted Defense Against Neuron-Exclusivity-Based Gradient Inversion Attack in Federated Learning.
Proceedings of the 8th IEEE International Conference on Smart Cloud, 2023

Instance-wise Batch Label Restoration via Gradients in Federated Learning.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Lightweight Batch Authentication Protocol for Bus-NB-IoT Hierarchical Network in Smart Grid Using Physically Unclonable Function.
Proceedings of the 9th Intl Conference on Big Data Security on Cloud, 2023

Space-Air-Ground Integrated Network Security
Springer, ISBN: 978-981-99-1124-0, 2023

2022
AACF - Accessible Application-Centric Framework for the Internet of Things Backhauled Smart City Applications.
IEEE Trans. Netw. Sci. Eng., 2022

Age of Information Aware UAV Deployment for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2022

SSHC: A Secure and Scalable Hybrid Consensus Protocol for Sharding Blockchains With a Formal Security Framework.
IEEE Trans. Dependable Secur. Comput., 2022

Instantiation of quantum point obfuscation.
Quantum Inf. Process., 2022

Universal construction of a full quantum one-way function.
Quantum Inf. Process., 2022

Variational Inference Based Sparse Signal Detection for Next Generation Multiple Access.
IEEE J. Sel. Areas Commun., 2022

Blockchain-based authentication for IIoT devices with PUF.
J. Syst. Archit., 2022

An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things.
Int. J. Intell. Syst., 2022

Dory: Asynchronous BFT with Reduced Communication and Improved Efficiency.
IACR Cryptol. ePrint Arch., 2022

DyCAPS: Asynchronous Proactive Secret Sharing for Dynamic Committees.
IACR Cryptol. ePrint Arch., 2022

Practical AgentChain: A compatible cross-chain exchange system.
Future Gener. Comput. Syst., 2022

Building blocks of sharding blockchain systems: Concepts, approaches, and open problems.
Comput. Sci. Rev., 2022

CyberRadar: A PUF-based Detecting and Mapping Framework for Physical Devices.
CoRR, 2022

CLTracer: A Cross-Ledger Tracing framework based on address relationships.
Comput. Secur., 2022

Quantitative Risk Assessment of Threats on SCADA Systems Using Attack Countermeasure Tree.
Proceedings of the 19th Annual International Conference on Privacy, Security & Trust, 2022

Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

PUF-Based Intellectual Property Protection for CNN Model.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Advanced Analysis of Email Sender Spoofing Attack and Related Security Problems.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

A Lightweight and Secure Authentication Protocol for 5G mMTC.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

An Improved Security OLSR Protocol against Black Hole Attack based on FANET.
Proceedings of the 13th Asian Control Conference, 2022

2021
A Secure Structure for UAV-Aided IoT Networks: Space-Time Key.
IEEE Wirel. Commun., 2021

B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs.
IEEE Trans. Emerg. Top. Comput., 2021

Coordinated Beamforming for UAV-Aided Millimeter-Wave Communications Using GPML-Based Channel Estimation.
IEEE Trans. Cogn. Commun. Netw., 2021

Identity-Based Dynamic Data Auditing for Big Data Storage.
IEEE Trans. Big Data, 2021

A multi-valued quantum fully homomorphic encryption scheme.
Quantum Inf. Process., 2021

Quantum network coding reducing decoherence effect.
Quantum Inf. Process., 2021

Themis: An accountable blockchain-based P2P cloud storage scheme.
Peer-to-Peer Netw. Appl., 2021

A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021

A Secure Architecture of Relay-Aided Space Information Networks.
IEEE Netw., 2021

UAV-Aided Backscatter Communications: Performance Analysis and Trajectory Optimization.
IEEE J. Sel. Areas Commun., 2021

Age of Information and Performance Analysis for UAV-Aided IoT Systems.
IEEE Internet Things J., 2021

A Novel Lightweight Authentication Protocol for Emergency Vehicle Avoidance in VANETs.
IEEE Internet Things J., 2021

Traceable ring signatures: general framework and post-quantum security.
Des. Codes Cryptogr., 2021

SM algorithms-based encryption scheme for large genomic data files.
Digit. Commun. Networks, 2021

Making MA-ABE fully accountable: A blockchain-based approach for secure digital right management.
Comput. Networks, 2021

Differential identifiability clustering algorithms for big data analysis.
Sci. China Inf. Sci., 2021

Seamless Group Pre-handover Authentication Scheme for 5G High-Speed Rail Network.
Proceedings of the Smart Computing and Communication - 6th International Conference, 2021

WADS: A Webshell Attack Defender Assisted by Software-Defined Networks.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

Secure Vehicle Platooning Protocol for 5G C-V2X.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Quantum Asymmetric Encryption Based on Quantum Point Obfuscation.
Proceedings of the Computational Science - ICCS 2021, 2021

A Malicious Android Malware Detection System based on Implicit Relationship Mining.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

Blockchain-Based Access Control Approaches.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted Module.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

A Secure and Decentralized Reconfiguration Protocol For Sharding Blockchains.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

A Secure Cross-Shard View-Change Protocol for Sharding Blockchains.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Multiple Delay Estimation Using Genetic Algorithm-Based MCMC in Non-Orthogonal Random Access.
IEEE Wirel. Commun. Lett., 2020

Relay-Aided Random Access in Space-Air-Ground Integrated Networks.
IEEE Wirel. Commun., 2020

Multiple Delay Estimation for Collision Resolution in Non-Orthogonal Random Access.
IEEE Trans. Veh. Technol., 2020

A Precoding Compensation Scheme for Heterogeneous Communication Networks With CSI Feedback Delay.
IEEE Trans. Netw. Sci. Eng., 2020

Rate Splitting on Mobile Edge Computing for UAV-Aided IoT Systems.
IEEE Trans. Cogn. Commun. Netw., 2020

Secure Deep Learning for Intelligent Terahertz Metamaterial Identification.
Sensors, 2020

Secure Outsourced Medical Data against Unexpected Leakage with Flexible Access Control in a Cloud Storage System.
Secur. Commun. Networks, 2020

Quantum network coding utilizing quantum discord resource fully.
Quantum Inf. Process., 2020

Full quantum one-way function for quantum cryptography.
Quantum Eng., 2020

Cognitive AODV routing protocol with novel channel-route failure detection.
Multim. Tools Appl., 2020

Air-to-Ground Wireless Links for High-Speed UAVs.
IEEE J. Sel. Areas Commun., 2020

An inaudible voice attack to context-based device authentication in smart IoT systems.
J. Syst. Archit., 2020

Spatial temporal incidence dynamic graph neural networks for traffic flow forecasting.
Inf. Sci., 2020

Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems.
IEEE Internet Things J., 2020

Random Access and Detection Performance of Internet of Things for Smart Ocean.
IEEE Internet Things J., 2020

Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks.
Int. J. Sens. Networks, 2020

FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices.
Int. J. Inf. Sec., 2020

More realistic analysis of mass surveillance - security in multi-surveillant settings.
IET Inf. Secur., 2020

ECDSA weak randomness in Bitcoin.
Future Gener. Comput. Syst., 2020

Dynamic data auditing scheme for big data storage.
Frontiers Comput. Sci., 2020

A fair selection protocol for committee-based permissionless blockchains.
Comput. Secur., 2020

A Refined Analysis of Zcash Anonymity.
IEEE Access, 2020

Architectural Optimization of Parallel Authenticated Encryption Algorithm for Satellite Application.
IEEE Access, 2020

Orbital Debris Threat for Space Sustainability and Way Forward (Review Article).
IEEE Access, 2020

An Evaluation of Uncle Block Mechanism Effect on Ethereum Selfish and Stubborn Mining Combined With an Eclipse Attack.
IEEE Access, 2020

A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Quantum Homomorphic Encryption Based on Quantum Obfuscation.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Measurement-Device-Independent QKD Based on Orbital Angular Momentum with Dual Detectors.
Proceedings of the 16th International Wireless Communications and Mobile Computing Conference, 2020

Imbalanced Encrypted Traffic Classification Scheme Using Random Forest.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Cross-shard Transaction Processing in Sharding Blockchains.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

FleetChain: A Secure Scalable and Responsive Blockchain Achieving Optimal Sharding.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

An Attack-Immune Trusted Architecture for Supervisory Intelligent Terminal.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Traceable Ring Signatures with Post-quantum Security.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Efficient Scheduling of Weighted Coflows in Data Centers.
IEEE Trans. Parallel Distributed Syst., 2019

DA&FD-Deadline-Aware and Flow Duration-Based Rate Control for Mixed Flows in DCNs.
IEEE/ACM Trans. Netw., 2019

On the obfuscatability of quantum point functions.
Quantum Inf. Process., 2019

IND-secure quantum symmetric encryption based on point obfuscation.
Quantum Inf. Process., 2019

Anomalous Power-Usage Behavior Detection from Smart Home Wireless Communications.
J. Commun. Inf. Networks, 2019

Blockchain-Based GNSS Spoofing Detection for Multiple UAV Systems.
J. Commun. Inf. Networks, 2019

An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network.
Comput. Secur., 2019

Achieving liability in anonymous communication: Auditing and tracing.
Comput. Commun., 2019

Lattice-Based Key-Aggregate (Searchable) Encryption in Cloud Storage.
IEEE Access, 2019

An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance.
IEEE Access, 2019

Efficient CCA2 Secure Flexible and Publicly-Verifiable Fine-Grained Access Control in Fog Computing.
IEEE Access, 2019

Air Traffic Surveillance Using IP-Based Space Information Network.
Proceedings of the 28th Wireless and Optical Communications Conference, 2019

AgentChain: A Decentralized Cross-Chain Exchange System.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Distributed Audit System of SDN Controller Based on Blockchain.
Proceedings of the Smart Blockchain - Second International Conference, 2019

IP-based Space Air Ground Information Network for Air Traffic Control Communication.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

Secure Stern Signatures in Quantum Random Oracle Model.
Proceedings of the Information Security - 22nd International Conference, 2019

The Parallel CMAC Synthetic Initialization Vector Algorithm Implementation on FPGA.
Proceedings of the Second International Conference on Latest trends in Electrical Engineering and Computing Technologies, 2019

Quantum Network Coding Based on Entanglement Distribution.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Traceable Decentralized Anonymous E-Cash System Against Active Attackers.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Two-Layer Group Signature and Application to E-Cash.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

Secure k-Anonymization Linked with Differential Identifiability (Workshop).
Proceedings of the Communications and Networking, 2019

A Trustworthiness-Based Time-Efficient V2I Authentication Scheme for VANETs.
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019

A Combined Micro-block Chain Truncation Attack on Bitcoin-NG.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Security Against Subversion in a Multi-surveillant Setting.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

An Efficient Encryption Algorithm for Perfect Forward Secrecy in Satellite Communication.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Blockchain-Based Solutions to Security and Privacy Issues in the Internet of Things.
IEEE Wirel. Commun., 2018

Efficient subtree-based encryption for fuzzy-entity data sharing.
Soft Comput., 2018

Energy-Aware Computation Offloading of IoT Sensors in Cloudlet-Based Mobile Edge Computing.
Sensors, 2018

A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN.
Secur. Commun. Networks, 2018

Lightweight and Manageable Digital Evidence Preservation System on Bitcoin.
J. Comput. Sci. Technol., 2018

Secure pay-TV for chained hotels.
Int. J. Inf. Sec., 2018

Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature.
Entropy, 2018

Understanding structure-based social network de-anonymization techniques via empirical analysis.
EURASIP J. Wirel. Commun. Netw., 2018

Privacy Preservation for Outsourced Medical Data With Flexible Access Control.
IEEE Access, 2018

OSCO: An Open Security-Enhanced Compatible OpenFlow Platform.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

TBDCT: A Framework of Trusted Big Data Collection and Trade System Based on Blockchain and TSM.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

A Medical Information Service Platform Based on Distributed Cloud and Blockchain.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

Multi-authority Fast Data Cloud-Outsourcing for Mobile Devices.
Proceedings of the Information Security - 21st International Conference, 2018

Comprehensive security management system for Hadoop platforms.
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018

A High Speed VLSI Implementation of 256-bit Scalar Point Multiplier for ECC over GF (p).
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018

Implementation of SM4 on FPGA: Trade-Off Analysis between Area and Speed.
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018

When Machine Learning meets Security Issues: A survey.
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2018

Clustering Algorithm for Privacy Preservation on MapReduce.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Auditable Hierarchy-Private Public-Key Encryption.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Linkable Group Signature for Auditing Anonymous Communication.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Revisiting the Incentive Mechanism of Bitcoin-NG.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking.
J. Signal Process. Syst., 2017

Secure joint Bitcoin trading with partially blind fuzzy signatures.
Soft Comput., 2017

A position-aware Merkle tree for dynamic cloud data integrity verification.
Soft Comput., 2017

Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment.
Secur. Commun. Networks, 2017

Continuous-variable quantum network coding for coherent states.
Quantum Inf. Process., 2017

Continuous-variable quantum homomorphic signature.
Quantum Inf. Process., 2017

Quantum coordinated multi-point communication based on entanglement swapping.
Quantum Inf. Process., 2017

Certificateless and identity-based authenticated asymmetric group key agreement.
Int. J. Inf. Sec., 2017

Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems.
Int. J. Commun. Syst., 2017

Auditing Revocable Privacy-Preserving Access Control for EHRs in Clouds.
Comput. J., 2017

A Reconfigurability-Based Security Service Path Construction Scheme.
IEEE Access, 2017

Provably Secure Self-Extractable Encryption.
Proceedings of the Provable Security, 2017

Continuous-Variable Quantum Network Coding Against Pollution Attacks.
Proceedings of the Quantum Technology and Optimization Problems, 2017

Deeply Understanding Structure-based Social Network De-anonymization.
Proceedings of the 2017 International Conference on Identification, 2017

A Remote Data Integrity Checking Scheme for Big Data Storage.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Secure Role-Based Access Control over Outsourced EMRs Against Unwanted Leakage.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop Platform.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Efficient CCA2 Secure Revocable Multi-authority Large-Universe Attribute-Based Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Predicate Fully Homomorphic Encryption: Achieving Fine-Grained Access Control over Manipulable Ciphertext.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2016
Large-Scale MIMO Detection Using MCMC Approach With Blockwise Sampling.
IEEE Trans. Commun., 2016

SAKE: scalable authenticated key exchange for mobile e-health networks.
Secur. Commun. Networks, 2016

Secure quantum network coding for controlled repeater networks.
Quantum Inf. Process., 2016

Opportunistic quantum network coding based on quantum teleportation.
Quantum Inf. Process., 2016

Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS.
J. Electr. Comput. Eng., 2016

Survey on key security technologies for space information networks.
J. Commun. Inf. Networks, 2016

Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
Int. J. Inf. Sec., 2016

A One-Round Certificateless Authenticated Group Key Agreement Protocol for Mobile Ad Hoc Networks.
IEICE Trans. Inf. Syst., 2016

Quantum Network Coding Against Pollution Attacks.
IEEE Commun. Lett., 2016

Compact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing.
IACR Cryptol. ePrint Arch., 2016

Identity-based proxy re-encryption version 2: Making mobile access easy in cloud.
Future Gener. Comput. Syst., 2016

Batch Public Key Cryptosystem with batch multi-exponentiation.
Future Gener. Comput. Syst., 2016

Efficient group key management for secure big data in predictable large-scale networks.
Concurr. Comput. Pract. Exp., 2016

Distributed Bitcoin Account Management.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Homomorphic Signature for Generation-based Network Coding.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Secure and Anonymous Data Transmission System for Cluster Organised Space Information Network.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control.
Proceedings of the Computer Security - ESORICS 2016, 2016

Anonymous Role-Based Access Control on E-Health Records.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

NSV-GUARD: Constructing Secure Routing Paths in Software Defined Networking.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Accelerating Oblivious Transfer with Batch Multi-exponentiation.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Practical (fully) distributed signatures provably secure in the standard model.
Theor. Comput. Sci., 2015

Quantum homomorphic signature.
Quantum Inf. Process., 2015

Quantum network coding for general repeater networks.
Quantum Inf. Process., 2015

Further ideal multipartite access structures from integer polymatroids.
Sci. China Inf. Sci., 2015

Non-interactive Revocable Identity-Based Access Control over e-Healthcare Records.
Proceedings of the Information Security Practice and Experience, 2015

Batch Blind Signatures on Elliptic Curves.
Proceedings of the Information Security Practice and Experience, 2015

Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Nonlinear Quantum Network Coding with Classical Communication Resource.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

Opportunistic Quantum Network Coding.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.
Inf. Sci., 2014

The effect of hexagonal grid topology on wireless communication networks based on network coding.
Int. J. Commun. Syst., 2014

Quantum Network Coding Based on Controlled Teleportation.
IEEE Commun. Lett., 2014

Hierarchical Solution for Access Control and Authentication in Software Defined Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Provably Secure Certificateless Authenticated Asymmetric Group Key Agreement.
Proceedings of the Information Security Practice and Experience, 2014

Practical Direct Chosen Ciphertext Secure Key-Policy Attribute-Based Encryption with Public Ciphertext Test.
Proceedings of the Computer Security - ESORICS 2014, 2014

Practical Distributed Signatures in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Hierarchical Identity-Based Broadcast Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Throughput-delay analysis of one-to-many wireless multi-hop flows based on random linear network coding.
J. Commun. Networks, 2013

Simultaneous authentication and secrecy in identity-based data upload to cloud.
Clust. Comput., 2013

Identity-Based Dynamic Authenticated Group Key Agreement Protocol for Space Information Network.
Proceedings of the Network and System Security - 7th International Conference, 2013

Light Weight Network Coding Based Key Distribution Scheme for MANETs.
Proceedings of the Network and System Security - 7th International Conference, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

A Generic Construction of Proxy Signatures from Certificateless Signatures.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

2012
A key distribution scheme using network coding for mobile ad hoc network.
Secur. Commun. Networks, 2012

Security and privacy in emerging information technologies.
Secur. Commun. Networks, 2012

A New Identity Based Signcryption Scheme in the Standard Model.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2010
A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks.
J. Commun., 2010

Shorter Verifier-Local Revocation Group Signature with Backward Unlinkability.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

A Probabilistic Approach for Improving TCP Fairness across Multiple Contending WLANs.
Proceedings of the Global Communications Conference, 2010

2009
Analyze a Privacy-Preserving Vehicular Communication Protocol and Propose a New One.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

2007
A Key Management and Authentication Model for Ad hoc Network.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

2006
Computing of Trust in Ad-Hoc Networks.
Proceedings of the Communications and Multimedia Security, 2006


  Loading...