Ling Xiong

Orcid: 0000-0003-1274-0711

According to our database1, Ling Xiong authored at least 52 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks.
Future Gener. Comput. Syst., 2025

2024
MTG_CD: Multi-scale learnable transformation graph for fault classification and diagnosis in microservices.
J. Cloud Comput., December, 2024

Blockchain-based privacy-preserving multi-tasks federated learning framework.
Connect. Sci., December, 2024

A novel SVD-based adaptive robust audio watermarking algorithm.
Multim. Tools Appl., August, 2024

Blockchain-Based Privacy-Preserving Authentication With Hierarchical Access Control Using Polynomial Commitment for Mobile Cloud Computing.
IEEE Internet Things J., May, 2024

Robust audio watermarking algorithm resisting cropping based on SIFT transform.
Multim. Tools Appl., April, 2024

PCPHE: A privacy comparison protocol for vulnerability detection based on homomorphic encryption.
J. Inf. Secur. Appl., 2024

A flexible and privacy-preserving federated learning framework based on logistic regression.
Comput. Electr. Eng., 2024

An Efficient Privacy-Preserving Medical Record Query Scheme Over Oblivious Transfer in Wireless Body Area Network.
Proceedings of the 2024 12th International Conference on Communications and Broadband Networking, 2024

An Efficient Privacy-Preserving Face Authentication Scheme Using Local Sensitive Hashing.
Proceedings of the 2024 12th International Conference on Communications and Broadband Networking, 2024

2023
Construction of Two Kinds of Optimal Wide-Gap Frequency-Hopping Sequence Sets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023

An efficient and privacy-preserving query scheme in intelligent transportation systems.
Inf. Sci., November, 2023

LGAAFS: A lightweight group anonymous mutual authentication and forward security scheme for wireless body area networks.
Peer Peer Netw. Appl., September, 2023

A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing.
J. Syst. Archit., September, 2023

Privacy-Preserving Authentication Scheme With Revocability for Multi-WSN in Industrial IoT.
IEEE Syst. J., March, 2023

A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.
Sensors, February, 2023

Blockchain-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
J. Ambient Intell. Humaniz. Comput., 2023

An Effective WGAN-Based Anomaly Detection Model for IoT Multivariate Time Series.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023

A Privacy-Preserving Federated Learning Framework Based on Homomorphic Encryption.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

A Blockchain-Based Conditional Anonymous Authentication Scheme.
Proceedings of the 2023 5th International Conference on Blockchain Technology, 2023

M-GFCC: Audio Copy-Move Forgery Detection Algorithm Based on Fused Features of MFCC and GFCC.
IAIC (1), 2023

2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022

A Hierarchical Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
Sensors, 2022

Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning.
J. Cloud Comput., 2022

Temporal Attention Splitting Network for Non-invasive Blood Glucose, Cuff-Less Blood Pressure Estimation.
Proceedings of the IEEE Smartworld, 2022

Covid-19 Diagnosis via Voice Using Online Sequential Extreme Learning Machine.
Proceedings of the International Joint Conference on Neural Networks, 2022

Automatic Evaluation System of Aerobics based on Action Recognition Algorithm.
Proceedings of the 4th International Conference on Software Engineering and Development, 2022

A Blockchain-Based Decentralized Privacy-Preserving Mobile Payment Scheme Using Anonymous Credentials.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Hybrid Decision Based Multi-Agent Deep Reinforcement learning for Task Offloading in Collaborative Edge-Cloud Computing.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

A Federated Learning Based Privacy-Preserving Data Sharing Scheme for Internet of Vehicles.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
An Efficient Lightweight Authentication Scheme With Adaptive Resilience of Asynchronization Attacks for Wireless Sensor Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021

A Lightweight Three-Factor Anonymous Authentication Scheme With Privacy Protection for Personalized Healthcare Applications.
J. Organ. End User Comput., 2021

An Efficient Lightweight Anonymous Authentication Scheme for V2G Using Physical Unclonable Function.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

BACPPA: An Effective Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 94th IEEE Vehicular Technology Conference, 2021

2020
Efficient Hierarchical Authentication Protocol for Multiserver Architecture.
Secur. Commun. Networks, 2020

Efficient and privacy-preserving authentication scheme for wireless body area networks.
J. Inf. Secur. Appl., 2020

Lightweight and privacy-preserving authentication scheme with the resilience of desynchronisation attacks for WBANs.
IET Inf. Secur., 2020

A secure authentication scheme with forward secrecy for industrial internet of things using Rabin cryptosystem.
Comput. Commun., 2020

The Soft Sets and Fuzzy Sets-Based Neural Networks and Application.
IEEE Access, 2020

Image Retrieval Method of Bayonet Vehicle Based on the Improvement of Deep Learning Network.
Proceedings of the AIPR 2020: 3rd International Conference on Artificial Intelligence and Pattern Recognition, 2020

2019
Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks.
Secur. Commun. Networks, 2019

An Efficient Privacy-aware Authentication Scheme for Distributed Mobile Cloud Computing Services without Bilinear Pairings.
J. Inf. Sci. Eng., 2019

Anonymous authentication scheme for smart home environment with provable security.
Comput. Secur., 2019

τ-Safe (l,k)-Diversity Privacy Model for Sequential Publication With High Utility.
IEEE Access, 2019

A Blockchain-Based Privacy-Awareness Authentication Scheme With Efficient Revocation for Multi-Server Architectures.
IEEE Access, 2019

A Vulnerability Detection Model for Java Systems Based on Complex Networks.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
A Realistic Distributed Conditional Privacy- Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Access, 2018

2017
A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.
Sensors, 2017

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
KSII Trans. Internet Inf. Syst., 2017

Criminisi-Based Sparse Representation for Image Inpainting.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017

2014
The Research of Matching Area Selection Criterion for Gravity Gradient Aided Navigation.
Proceedings of the Pattern Recognition - 6th Chinese Conference, 2014

2013
A dual band-notched UWB antenna with hook-shaped slots and folded stubs.
IEICE Electron. Express, 2013


  Loading...