Pengtao Liu
Orcid: 0000-0002-7027-7828
According to our database1,
Pengtao Liu
authored at least 37 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Computation Rate Maximization for SCMA-Aided Edge Computing in IoT Networks: A Multi-Agent Reinforcement Learning Approach.
IEEE Trans. Wirel. Commun., August, 2024
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party.
Trans. Emerg. Telecommun. Technol., April, 2024
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting.
IEEE Internet Things J., January, 2024
Grant-Free SCMA Enhanced Mobile Edge Computing: Protocol Design and Performance Analysis.
IEEE Internet Things J., 2024
A Stochastic Geometry Model and Analysis Scheme for SCMA Aided Mobile Edge Computing.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
2023
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security.
IEEE Syst. J., December, 2023
IEEE Trans. Veh. Technol., June, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
2022
RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping Attacks.
IEEE Trans. Wirel. Commun., 2022
Robust Design for RIS-Assisted Anti-Jamming Communications With Imperfect Angular Information: A Game-Theoretic Perspective.
IEEE Trans. Veh. Technol., 2022
SCMA-Based Multiaccess Edge Computing in IoT Systems: An Energy-Efficiency and Latency Tradeoff.
IEEE Internet Things J., 2022
Intell. Data Anal., 2022
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Sci. Program., 2021
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks.
Mob. Networks Appl., 2021
Proceedings of the 13th International Conference on Wireless Communications and Signal Processing, 2021
Proceedings of the 93rd IEEE Vehicular Technology Conference, 2021
2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020
Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing.
IEEE Access, 2020
2019
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience.
J. Supercomput., 2019
Parameter Identification of Reed-Solomon Codes Based on Probability Statistics and Galois Field Fourier Transform.
IEEE Access, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2017
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application.
Int. J. High Perform. Comput. Netw., 2017
2016
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016
Secur. Commun. Networks, 2016
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs.
J. Ambient Intell. Humaniz. Comput., 2016
2015
Int. J. Grid Util. Comput., 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions.
J. Comput., 2012
2011
A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2009
Proceedings of the 10th ACIS International Conference on Software Engineering, 2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009
2007
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked.
Proceedings of the Multimedia Content Analysis and Mining, International Workshop, 2007