Jinbo Xiong
Orcid: 0000-0001-9985-1953
According to our database1,
Jinbo Xiong
authored at least 109 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Membership inference attacks via spatial projection-based relative information loss in MLaaS.
Inf. Process. Manag., 2025
2024
H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network.
IEEE Internet Things J., October, 2024
IEEE Internet Things J., July, 2024
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives.
IEEE Netw., May, 2024
Computing Power Networking Meets Blockchain: A Reputation-Enhanced Trading Framework for Decentralized IoT Cloud Services.
IEEE Internet Things J., May, 2024
Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update.
IEEE Internet Things J., May, 2024
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing.
J. King Saud Univ. Comput. Inf. Sci., 2024
Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing.
J. Inf. Secur. Appl., 2024
IEEE Internet Things J., 2024
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT.
Digit. Commun. Networks, 2024
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT.
Comput. Networks, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Knowledge Distillation Enables Federated Learning: A Data-free Federated Aggregation Scheme.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Towards Scalable and Secure IoTs Transactions: A New Bi-directional Payment Channel Without Third-Party Monitoring.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
J. Syst. Archit., November, 2023
When MetaVerse Meets Computing Power Networking: An Energy-Efficient Framework For Service Placement.
IEEE Wirel. Commun., October, 2023
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism.
Mob. Networks Appl., October, 2023
Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing.
IEEE Internet Things J., September, 2023
IEEE Trans. Ind. Informatics, May, 2023
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2023
The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles.
Concurr. Comput. Pract. Exp., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the International Conference on Networking and Network Applications, 2023
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare.
Proceedings of the IEEE International Conference on E-health Networking, 2023
Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual Reality.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Mob. Networks Appl., December, 2022
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing.
Multim. Tools Appl., 2022
Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022
Special Issue on Knowledge- and Service-Oriented Industrial Internet of Things: Architectures, Challenges, and Methodologies.
IEEE Internet Things J., 2022
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT.
IEEE Internet Things J., 2022
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT.
Digit. Commun. Networks, 2022
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2022
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles.
Proceedings of the International Conference on Networking and Network Applications, 2022
Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data.
Proceedings of the IEEE International Conference on Communications, 2022
Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT.
Proceedings of the IEEE Global Communications Conference, 2022
2021
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT.
IEEE Trans. Ind. Informatics, 2021
Secur. Commun. Networks, 2021
Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage.
Secur. Commun. Networks, 2021
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme.
Inf. Sci., 2021
A lightweight privacy protection scheme based on user preference in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021
2020
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT.
Wirel. Commun. Mob. Comput., 2020
Edge-Assisted Privacy-Preserving Raw Data Sharing Framework for Connected Autonomous Vehicles.
IEEE Wirel. Commun., 2020
A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud.
Concurr. Comput. Pract. Exp., 2020
IEEE Access, 2020
Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
2019
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT.
IEEE Internet Things J., 2019
Int. J. Inf. Technol. Web Eng., 2019
Frontiers Comput. Sci., 2019
Ann. des Télécommunications, 2019
IEEE Access, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
2018
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services.
Wirel. Commun. Mob. Comput., 2018
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data.
Mob. Networks Appl., 2018
IET Commun., 2018
MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing.
IEEE Access, 2018
D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption.
IEEE Access, 2018
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
2017
Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems.
IEEE Access, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
2016
IEEE Trans. Consumer Electron., 2016
A secure access and associate deleting scheme for multi-replica in multi-cloud environment.
Int. J. High Perform. Syst. Archit., 2016
Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016
An efficient CGA algorithm against DoS attack on duplicate address detection process.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the 10th International Conference on Complex, 2016
2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Peer-to-Peer Netw. Appl., 2015
Mob. Inf. Syst., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
IEEE Trans. Cloud Comput., 2014
KSII Trans. Internet Inf. Syst., 2014
Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
2013
Int. J. Grid Util. Comput., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
Proceedings of the Information Computing and Applications - Third International Conference, 2012
2009
Proceedings of the First International Workshop on Database Technology and Applications, 2009