Pengtao Liu

Orcid: 0000-0002-7027-7828

According to our database1, Pengtao Liu authored at least 37 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Computation Rate Maximization for SCMA-Aided Edge Computing in IoT Networks: A Multi-Agent Reinforcement Learning Approach.
IEEE Trans. Wirel. Commun., August, 2024

Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024

Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024

Grant-Free SCMA Enhanced Mobile Edge Computing: Protocol Design and Performance Analysis.
IEEE Internet Things J., 2024

A Stochastic Geometry Model and Analysis Scheme for SCMA Aided Mobile Edge Computing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023

SCMA-Enabled Multi-Cell Edge Computing Networks: Design and Optimization.
IEEE Trans. Veh. Technol., June, 2023

Learning-Based Latency and Energy Optimization in SCMA-Enhanced UAV-MEC Networks.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

2022
RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping Attacks.
IEEE Trans. Wirel. Commun., 2022

Robust Design for RIS-Assisted Anti-Jamming Communications With Imperfect Angular Information: A Game-Theoretic Perspective.
IEEE Trans. Veh. Technol., 2022

SCMA-Based Multiaccess Edge Computing in IoT Systems: An Energy-Efficiency and Latency Tradeoff.
IEEE Internet Things J., 2022

The overlapping community discovery algorithm based on the local interaction model.
Intell. Data Anal., 2022

Secure and Efficient Cloud Ciphertext Deduplication Based on SGX.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

A Deep Reinforcement Learning Scheme for SCMA-Based Edge Computing in IoT Networks.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Dynamic Group Recommendation Algorithm Based on Member Activity Level.
Sci. Program., 2021

Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021

A Cascaded Adaboost-BP Diabetes Prediction Model.
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021

An Optimization Scheme for SCMA-Based Multi-Access Edge Computing.
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021

2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing.
IEEE Access, 2020

2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019

Parameter Identification of Reed-Solomon Codes Based on Probability Statistics and Galois Field Fourier Transform.
IEEE Access, 2019

Forward Secure Conjunctive-Keyword Searchable Encryption.
IEEE Access, 2019

Public-Key Encryption With Keyword Search via Obfuscation.
IEEE Access, 2019

A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017

2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Public-key encryption with keyword search secure against continual memory attacks.
Secur. Commun. Networks, 2016

Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016

2015
Multi-keyword ranked searchable public-key encryption.
Int. J. Grid Util. Comput., 2015

Anonymous Identity-Based Encryption with Bounded Leakage Resilience.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2013
Public Key Encryption with Ranked Multi-keyword Search.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions.
J. Comput., 2012

2011
A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2009
Nominative Proxy Ring Signature.
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009

A New ID-Based Deniable Ring Authentication with Constant-Size Signature.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

2007
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007


  Loading...