Jin Cao

Orcid: 0000-0003-1372-7252

Affiliations:
  • Xidian University, Xi'an, China


According to our database1, Jin Cao authored at least 76 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024

CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024

UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024

A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network.
IEEE Trans. Netw. Serv. Manag., April, 2024

CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024

Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles.
Microprocess. Microsystems, 2024

Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine?
CoRR, 2024

Interpreting Memorization in Deep Learning from Data Distribution.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023

FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks.
IEEE Internet Things J., August, 2023

A Software-Based Remote Attestation Scheme for Internet of Things Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Smart Healthcare System Based on Federated Learning.
Int. J. Intell. Syst., 2023

LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023

Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics.
Proceedings of the Information Security Practice and Experience, 2023

A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning.
Proceedings of the IEEE Global Communications Conference, 2023

DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022

EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022

A robust authentication scheme for remote diagnosis and maintenance in 5G V2N.
J. Netw. Comput. Appl., 2022

Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022

Verifiable and privacy preserving federated learning without fully trusted centers.
J. Ambient Intell. Humaniz. Comput., 2022

A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022

RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices.
IEEE Internet Things J., 2022

DP-Opt: Identify High Differential Privacy Violation by Optimization.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing.
Proceedings of the IEEE Smartworld, 2022

2021
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021

AdaPDP: Adaptive Personalized Differential Privacy.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

2020
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2020

An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks.
J. Netw. Comput. Appl., 2020

LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks.
IEEE Internet Things J., 2020

LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020

A personalized range-sensitive privacy-preserving scheme in LBSs.
Concurr. Comput. Pract. Exp., 2020

A Survey on Security Aspects for 3GPP 5G Networks.
IEEE Commun. Surv. Tutorials, 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

A Framework to Preserve User Privacy for Machine Learning as a Service.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System.
IEEE Internet Things J., 2019

Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network.
IEEE Internet Things J., 2019

LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
Int. J. Commun. Syst., 2019

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019

Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks.
IEEE Access, 2019

A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT.
IEEE Access, 2019

Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks.
Proceedings of the 2019 IEEE SmartWorld, 2019

Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2018
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks.
Secur. Commun. Networks, 2018

EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks.
J. Netw. Comput. Appl., 2018

Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
Wirel. Pers. Commun., 2017

G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
IEEE Trans. Veh. Technol., 2017

An Automata Based Intrusion Detection Method for Internet of Things.
Mob. Inf. Syst., 2017

A secure SDN based multi-RANs architecture for future 5G networks.
Comput. Secur., 2017

Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks.
Proceedings of the IEEE International Conference on Communications, 2017

2015
GBAAM: group-based access authentication for MTC in LTE networks.
Secur. Commun. Networks, 2015

A novel group access authentication and key agreement protocol for machine-type communication.
Trans. Emerg. Telecommun. Technol., 2015

UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Access Authentication of Mass Device Connections for MTC in LTE Networks.
Smart Comput. Rev., 2014

Group-based authentication and key agreement for machine-type communication.
Int. J. Grid Util. Comput., 2014

A Survey on Security Aspects for LTE and LTE-A Networks.
IEEE Commun. Surv. Tutorials, 2014

2013
A New Roaming Authentication Framework For Wireless Communication.
KSII Trans. Internet Inf. Syst., 2013

A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card.
KSII Trans. Internet Inf. Syst., 2013

2012
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks.
IEEE Trans. Wirel. Commun., 2012

Security Issues on Machine to Machine Communications.
KSII Trans. Internet Inf. Syst., 2012

An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

A simple and robust handover authentication between HeNB and eNB in LTE networks.
Comput. Networks, 2012

Dynamic Group Based Authentication Protocol for Machine Type Communications.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A lightweight roaming authentication protocol for anonymous wireless communication.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Unified handover authentication between heterogeneous access systems in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A group-based authentication and key agreement for MTC in LTE networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012


  Loading...