Rongxing Lu

Orcid: 0000-0001-5720-0941

Affiliations:
  • University of New Brunswick, Fredericton, NB, Canada
  • Nanyang Technological University, Singapore (2013 - 2016)
  • University of Waterloo, ON, Canada (PhD 2012)
  • Shanghai Jiao Tong University, China (PhD 2006)


According to our database1, Rongxing Lu authored at least 646 papers between 2004 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2021, "for contributions to security and privacy in vehicular communications".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Comprehensive Overview of Backdoor Attacks in Large Language Models Within Communication Networks.
IEEE Netw., November, 2024

Toward Goal-Oriented Semantic Communications: New Metrics, Framework, and Open Challenges.
IEEE Wirel. Commun., October, 2024

PPRP: Preserving Location Privacy for Range-Based Positioning in Mobile Networks.
IEEE Trans. Mob. Comput., October, 2024

Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data.
IEEE Trans. Intell. Transp. Syst., October, 2024

Achieving Efficient and Privacy-Preserving Worker Selection With Arbitrary Spatial Ranges for Vehicular Crowdsensing.
IEEE Trans. Veh. Technol., September, 2024

Multi-UAV Aided Multi-Access Edge Computing in Marine Communication Networks: A Joint System-Welfare and Energy-Efficient Design.
IEEE Trans. Commun., September, 2024

CPBW: A Change-Point-Detection and Bag-of-Words-Based Mechanism Utilizing Smartphone Triaxial Accelerometer Data for Driver Identification.
IEEE Internet Things J., September, 2024

A Self-Attention Mechanism-Based Model for Early Detection of Fake News.
IEEE Trans. Comput. Soc. Syst., August, 2024

Split Learning with Differential Privacy for Integrated Terrestrial and Non-Terrestrial Networks.
IEEE Wirel. Commun., June, 2024

Age of Incorrect Information Minimization for Semantic-Empowered NOMA System in S-IoT.
IEEE Trans. Wirel. Commun., June, 2024

Edge Intelligence Oriented Integrated Sensing and Communication: A Multi-Cell Cooperative Approach.
IEEE Trans. Veh. Technol., June, 2024

Predictive Computation Offloading and Resource Allocation in DT-Empowered Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., June, 2024

An Efficient Heap Tree-Based Range Query Scheme Under Local Differential Privacy.
IEEE Internet Things J., June, 2024

NOMA Assisted Two-Tier VR Content Transmission: A Tile-Based Approach for QoE Optimization.
IEEE Trans. Mob. Comput., May, 2024

A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks in Smart Grid.
IEEE Internet Things J., May, 2024

Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI.
IEEE Internet Things J., May, 2024

Achieving Privacy-Preserving Location Management in LEO-Satellite Integrated Vehicular Network With Dense Ground Stations.
IEEE Trans. Veh. Technol., April, 2024

Efficient and Privacy-Preserving Aggregate Query Over Public Property Graphs.
IEEE Trans. Big Data, April, 2024

Towards Synchronized Privacy-Preserving Authentication for MDTEN-Driven VANETs.
IEEE Trans. Veh. Technol., March, 2024

Secured and Cooperative Publish/Subscribe Scheme in Autonomous Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., March, 2024

Gradient Leakage Attacks in Federated Learning: Research Frontiers, Taxonomy, and Future Directions.
IEEE Netw., March, 2024

Efficient Privacy-Preserving Task Allocation With Secret Sharing for Vehicular Crowdsensing.
IEEE Internet Things J., March, 2024

PMRK: Privacy-Preserving Multidimensional Range Query With Keyword Search Over Spatial Data.
IEEE Internet Things J., March, 2024

Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices.
IEEE Trans. Consumer Electron., February, 2024

Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things.
IEEE Internet Things J., February, 2024

Quantum-Empowered Federated Learning in Space-Air-Ground Integrated Networks.
IEEE Netw., January, 2024

Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing.
IEEE Internet Things J., January, 2024

Blockchain-Based Lightweight and Privacy-Preserving Quality Assurance Framework in Crowdsensing Systems.
IEEE Internet Things J., January, 2024

Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification.
IEEE Internet Things J., January, 2024

Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems.
Comput. Stand. Interfaces, January, 2024

EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data.
IEEE Trans. Serv. Comput., 2024

Efficient and Privacy-Preserving Federated Learning Against Poisoning Adversaries.
IEEE Trans. Serv. Comput., 2024

An Efficient and Multi-Private Key Secure Aggregation Scheme for Federated Learning.
IEEE Trans. Serv. Comput., 2024

A Federated Learning Architecture for Blockchain DDoS Attacks Detection.
IEEE Trans. Serv. Comput., 2024

Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024

A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid.
IEEE Trans. Serv. Comput., 2024

Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems.
IEEE Trans. Netw. Sci. Eng., 2024

Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
IEEE Trans. Inf. Forensics Secur., 2024

CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024

Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions.
IEEE Trans. Inf. Forensics Secur., 2024

Dynamic Group Time-Based One-Time Passwords.
IEEE Trans. Inf. Forensics Secur., 2024

Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2024

PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024

Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2024

Anonymous Multi-Hop Payment for Payment Channel Networks.
IEEE Trans. Dependable Secur. Comput., 2024

The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput., 2024

A Comprehensive Defense Framework Against Model Extraction Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2024

$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data.
IEEE Trans. Dependable Secur. Comput., 2024

Synodic Period Channel Modeling and Coding Scheme for Deep Space Optical Communications.
IEEE Trans. Aerosp. Electron. Syst., 2024

Area in circle: A novel evaluation metric for object detection.
Knowl. Based Syst., 2024

Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data.
Inf. Sci., 2024

KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare.
IEEE Internet Things J., 2024

WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data.
Int. J. Appl. Cryptogr., 2024

Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things.
Future Gener. Comput. Syst., 2024

Backdoor Attacks against Image-to-Image Networks.
CoRR, 2024

Semantics-Empowered Space-Air-Ground-Sea Integrated Network: New Paradigm, Frameworks, and Challenges.
CoRR, 2024

Chronos: An Efficient Asynchronous Byzantine Ordered Consensus.
Comput. J., 2024

Two-layer Lagrange-based relay network topology and trajectory design for solar system explorations.
Sci. China Inf. Sci., 2024

Low-Complexity Decoder of Analog Fountain Codes for Industrial Internet of Things.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

Universal Weighted-Knowledge Bases for Task-Unaware Semantic Communication Systems.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

FastLearn: A Rapid Learning Agent for Chat Models to Acquire Latest Knowledge.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Semantic-Empowered Utility Loss of Information Transmission Policy in Satellite-Integrated Internet.
Proceedings of the IEEE INFOCOM 2024, 2024

An Efficient Range Sum Query Scheme Under Local Differential Privacy.
Proceedings of the IEEE International Conference on Communications, 2024

Efficient Privacy-Preserving Multi-Location Task Allocation in Fog-Assisted Vehicular Crowdsourcing.
Proceedings of the IEEE International Conference on Communications, 2024

EADD: An Intelligent Edge-Based Anomaly Detection Platform for Car Driving.
Proceedings of the IEEE International Conference on Communications, 2024

Poisoning Attack Mitigation for Privacy-Preserving Federated Learning-Based Energy Theft Detection.
Proceedings of the IEEE International Conference on Communications, 2024

An Efficient Multicast Authenticated Encryption Scheme for Smart Elderly Care Systems.
Proceedings of the IEEE International Conference on Communications, 2024

Fingerprinting Image-to-Image Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

DIEM: Decomposition-Integration Enhancing Multimodal Insights.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Energy-Efficient Integrated Sensing and Communication: A Multi-Access Edge Computing Design.
IEEE Wirel. Commun. Lett., December, 2023

Age of Information Minimization for Frameless ALOHA in Grant-Free Massive Access.
IEEE Trans. Wirel. Commun., December, 2023

Covert Communication in Two-Hop Cooperative Cognitive Radio System.
IEEE Trans. Veh. Technol., December, 2023

A Longitudinal and Comprehensive Measurement of DNS Strict Privacy.
IEEE/ACM Trans. Netw., December, 2023

Low-Correlation Superimposed Pilot Grant-Free Massive Access for Satellite Internet of Things.
IEEE Trans. Commun., December, 2023

Efficient and privacy-preserving tree-based inference via additive homomorphic encryption.
Inf. Sci., December, 2023

Lightweight and Bilateral Controllable Data Sharing for Secure Autonomous Vehicles Platooning Service.
IEEE Trans. Veh. Technol., November, 2023

Latency Minimization Oriented Hybrid Offshore and Aerial-Based Multi-Access Computation Offloading for Marine Communication Networks.
IEEE Trans. Commun., November, 2023

Digital Twin Enabled Remote Data Sharing for Internet of Vehicles: System and Incentive Design.
IEEE Trans. Veh. Technol., October, 2023

Incentive-Based Federated Learning for Digital-Twin-Driven Industrial Mobile Crowdsensing.
IEEE Internet Things J., October, 2023

Age-Critical Long Erasure Coding-CCSDS File Delivery Protocol for Dual-Hop S-IoT.
IEEE Internet Things J., October, 2023

Age-Optimal Downlink NOMA Resource Allocation for Satellite-Based IoT Network.
IEEE Trans. Veh. Technol., September, 2023

Security and Privacy in Vehicular Digital Twin Networks: Challenges and Solutions.
IEEE Wirel. Commun., August, 2023

A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy.
IEEE Internet Things J., August, 2023

Code-Domain Collision Resolution Grant-Free Random Access for Massive Access in IoT.
IEEE Trans. Wirel. Commun., July, 2023

CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
Sensors, July, 2023

Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Trans. Big Data, June, 2023

Physical Black-Box Adversarial Attacks Through Transformations.
IEEE Trans. Big Data, June, 2023

A Secure One-to-Many Authentication and Key Agreement Scheme for Industrial IoT.
IEEE Syst. J., June, 2023

Extended Moving Target Defense for AC State Estimation in Smart Grids.
IEEE Trans. Smart Grid, May, 2023

IoT malware: An attribute-based taxonomy, detection mechanisms and challenges.
Peer Peer Netw. Appl., May, 2023

G-SC-IRSA: Graph-Based Spatially Coupled IRSA for Age-Critical Grant-Free Massive Access.
IEEE Internet Things J., May, 2023

PriTAEC: Privacy-Preserving Task Assignment Based on Oblivious Transfer and Edge Computing in VANET.
IEEE Trans. Veh. Technol., April, 2023

Efficient Learned Spatial Index With Interpolation Function Based Learned Model.
IEEE Trans. Big Data, April, 2023

A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications.
IEEE Trans. Veh. Technol., March, 2023

Blockchain-Assisted Personalized Car Insurance With Privacy Preservation and Fraud Resistance.
IEEE Trans. Veh. Technol., March, 2023

$\bm {P}^{\bm {3}}$: Privacy-Preserving Prediction of Real-Time Energy Demands in EV Charging Networks.
IEEE Trans. Ind. Informatics, March, 2023

Fully privacy-preserving location recommendation in outsourced environments.
Ad Hoc Networks, March, 2023

Multitype Services Coexistence in Uplink NOMA for Dual-Layer LEO Satellite Constellation.
IEEE Internet Things J., February, 2023

Non-Interactive DSSE for Medical Data Sharing With Forward and Backward Privacy.
IEEE Trans. Sustain. Comput., 2023

EPPFM: Efficient and Privacy-Preserving Querying of Electronic Medical Records With Forward Privacy in Multiuser Setting.
IEEE Trans. Sustain. Comput., 2023

An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images.
IEEE Trans. Serv. Comput., 2023

Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query.
IEEE Trans. Serv. Comput., 2023

Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage.
IEEE Trans. Serv. Comput., 2023

SecBerg: Secure and Practical Iceberg Queries in Cloud.
IEEE Trans. Serv. Comput., 2023

Towards Efficient and Privacy-Preserving High-Dimensional Range Query in Cloud.
IEEE Trans. Serv. Comput., 2023

PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments.
IEEE Trans. Serv. Comput., 2023

Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023

PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data.
IEEE Trans. Inf. Forensics Secur., 2023

Cross-Chain Virtual Payment Channels.
IEEE Trans. Inf. Forensics Secur., 2023

TCPP: Achieving Privacy-Preserving Trajectory Correlation With Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2023

PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2023

Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2023

A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Privacy-Preserving Discrete Fréchet Distance Range Queries.
IEEE Trans. Dependable Secur. Comput., 2023

Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data.
IEEE Trans. Cloud Comput., 2023

VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression.
IEEE Trans. Cloud Comput., 2023

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data.
IEEE Trans. Cloud Comput., 2023

Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud.
IEEE Trans. Cloud Comput., 2023

EBDL: Effective blockchain-based covert storage channel with dynamic labels.
J. Netw. Comput. Appl., 2023

PPTA: Privacy-Preserving Task Assignment Based on Inner Product Functional Encryption in SAM.
IEEE Internet Things J., 2023

A Comprehensive Overview of Backdoor Attacks in Large Language Models within Communication Networks.
CoRR, 2023

An Efficient and Multi-private Key Secure Aggregation for Federated Learning.
CoRR, 2023

Age of Information Minimization for Short-Packet Communications RSMA in Satellite-based IoT.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

An Efficient Bloom Filter-based Range Query Scheme Under Local Differential Privacy.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

A Lightweight Mutual Authentication Scheme with Fault Tolerance in Smart Elderly Care System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Soft OSD-Sliding Window Decoding for Staircase LDPC Codes in Deep Space Communications.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

An Efficient and Privacy-Preserving Outsourced Heavy Hitter Query Scheme with LDP Technique.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

An Efficient Dynamic Key Management Scheme for IoT Devices in Aging in Place Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

A Scheme for Robust Federated Learning with Privacy-preserving Based on Krum AGR.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

PRRkNN: Efficient and Privacy-Preserving Range-Based Reverse kNN over Encrypted Data.
Proceedings of the IEEE International Conference on Communications, 2023

Traceable and Privacy-Preserving Worker Selection Scheme with Arbitrary Spatial Ranges in MCS.
Proceedings of the IEEE International Conference on Communications, 2023

Unequal Timeliness Protection Random Access Scheme for Satellite Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2023

Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation Over Encrypted Data.
Proceedings of the IEEE International Conference on Communications, 2023

PLPR: Towards Efficient and Privacy-Preserving LBSNs-Based POI Recommendation in Cloud.
Proceedings of the IEEE International Conference on Communications, 2023

RISAC: Rate-splitting Multiple Access Enabled Integrated Sensing and Communication Systems.
Proceedings of the IEEE International Conference on Communications, 2023

An Age-Critical LEC-CFDP Scheme for Dual-Hop Space-Air-Ground Integrated Networks.
Proceedings of the IEEE International Conference on Communications, 2023

Efficient and Privacy-Preserving Subgraph Matching Queries in Graph Federation.
Proceedings of the IEEE International Conference on Communications, 2023

Towards Efficient and Privacy-Preserving Federated Learning for HMM Training.
Proceedings of the IEEE Global Communications Conference, 2023

Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data.
Proceedings of the IEEE Global Communications Conference, 2023

ERQ: An Efficient Range Query Scheme Under Local Differential Privacy.
Proceedings of the IEEE Global Communications Conference, 2023

Efficient and Privacy-Preserving Eclipse Query Over Encrypted Data.
Proceedings of the IEEE Global Communications Conference, 2023

Improving Decision Tree Privacy with Bloom Filters.
Proceedings of the IEEE Global Communications Conference, 2023

Achieve Edge-Based Privacy-Preserving Dynamic Aggregation Query in Smart Transportation Systems.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Intrinsic Security: A Robust Framework for Cloud-Native Network Slicing via a Proactive Defense Paradigm.
IEEE Wirel. Commun., 2022

Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated Networks.
IEEE Trans. Wirel. Commun., 2022

Age-Critical and Secure Blockchain Sharding Scheme for Satellite-Based Internet of Things.
IEEE Trans. Wirel. Commun., 2022

A Secure Intra-Regional-Inter-Regional Peer-to-Peer Electricity Trading System for Electric Vehicles.
IEEE Trans. Veh. Technol., 2022

APPB: Anti-Counterfeiting and Privacy-Preserving Blockchain-Based Vehicle Supply Chains.
IEEE Trans. Veh. Technol., 2022

Practical Privacy-Preserving Federated Learning in Vehicular Fog Computing.
IEEE Trans. Veh. Technol., 2022

SecCDV: A Security Reference Architecture for Cybertwin-Driven 6G V2X.
IEEE Trans. Veh. Technol., 2022

Age-Optimal Network Coding HARQ Transmission Scheme for Dual-Hop Satellite-Integrated Internet.
IEEE Trans. Veh. Technol., 2022

Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud.
IEEE Trans. Serv. Comput., 2022

Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare.
IEEE Trans. Serv. Comput., 2022

Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2022

Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud.
IEEE Trans. Serv. Comput., 2022

Fair Outsourcing Polynomial Computation Based on the Blockchain.
IEEE Trans. Serv. Comput., 2022

FEEL: Federated End-to-End Learning With Non-IID Data for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022

Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare.
IEEE Trans. Inf. Forensics Secur., 2022

PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022

Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2022

Toward Privacy-Preserving Aggregate Reverse Skyline Query With Strong Security.
IEEE Trans. Inf. Forensics Secur., 2022

Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022

Achieving Efficient Secure Deduplication With User-Defined Access Control in Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022

Grant Free Age-Optimal Random Access Protocol for Satellite-Based Internet of Things.
IEEE Trans. Commun., 2022

SOREL: Efficient and Secure ORE-Based Range Query Over Outsourced Data.
IEEE Trans. Big Data, 2022

Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud.
IEEE Trans. Big Data, 2022

Achieving Efficient and Secure Handover in LEO Constellation-Assisted Beyond 5G Networks.
IEEE Open J. Commun. Soc., 2022

Audio-Based Security Techniques for Secure Device-to-Device Communications.
IEEE Netw., 2022

Improved fault analysis on SIMECK ciphers.
J. Cryptogr. Eng., 2022

CORK: A privacy-preserving and lossless federated learning scheme for deep neural network.
Inf. Sci., 2022

A Fine-Grained Differentially Private Federated Learning Against Leakage From Gradients.
IEEE Internet Things J., 2022

Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud.
IEEE Internet Things J., 2022

PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare.
IEEE Internet Things J., 2022

PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks.
IEEE Internet Things J., 2022

Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis.
IEEE Internet Things J., 2022

FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing.
IEEE Internet Things J., 2022

An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services.
IEEE Internet Things J., 2022

DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022

A Privacy-Preserving Multidimensional Range Query Scheme for Edge-Supported Industrial IoT.
IEEE Internet Things J., 2022

Efficient Privacy-Preserving Federated Learning With Unreliable Users.
IEEE Internet Things J., 2022

EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks.
IEEE Internet Things J., 2022

Age-Optimal Network Coding HARQ Scheme for Satellite-Based Internet of Things.
IEEE Internet Things J., 2022

An entity matching-based image topic verification framework for online fact-checking.
Int. J. Multim. Intell. Secur., 2022

Building blocks of sharding blockchain systems: Concepts, approaches, and open problems.
Comput. Sci. Rev., 2022

Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data.
CoRR, 2022

New Secure Sparse Inner Product with Applications to Machine Learning.
CoRR, 2022

Deep Learning for Encrypted Traffic Classification and Unknown Data Detection.
CoRR, 2022

Everything you control is not everything: Achieving intention-concealed visit on social networks.
Comput. Secur., 2022

Advanced computing and communication technologies for Internet of Drones.
Comput. Commun., 2022

ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data.
Sci. China Inf. Sci., 2022

Interactions between artificial intelligence and cybersecurity to protect future networks.
Ann. des Télécommunications, 2022

An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Non-orthogonal Superimposed Pilot Grant-free Random Access Scheme in Satellite-based IoT.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

Achieving Privacy-Preserving Weighted Similarity Range Query over Outsourced eHealthcare Data.
Proceedings of the IEEE International Conference on Communications, 2022

Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints.
Proceedings of the IEEE International Conference on Communications, 2022

Grant-Free Code-Domain Random Access for Massive Access in Internet of Things.
Proceedings of the IEEE International Conference on Communications, 2022

Deep Reinforcement Learning-Assisted NOMA Age-Optimal Power Allocation for S-IoT Network.
Proceedings of the IEEE International Conference on Communications, 2022

Graph-based Spatially Coupled IRSA Random Access for Age-Critical Grant-Free Massive Access.
Proceedings of the IEEE International Conference on Communications, 2022

QoS-Aware Uplink NOMA with Multi-Type Service Coexistence for LEO Satellite Constellation.
Proceedings of the IEEE International Conference on Communications, 2022

EVRQ: Achieving Efficient and Verifiable Range Query over Encrypted Traffic Data.
Proceedings of the IEEE International Conference on Communications, 2022

Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation.
Proceedings of the IEEE Global Communications Conference, 2022

Efficiency-Improved Privacy-Preserving Weighted Similarity Query over Outsourced eHealthcare Data.
Proceedings of the IEEE Global Communications Conference, 2022

PPsky: Privacy-Preserving Skyline Queries with Secret Sharing in eHealthcare.
Proceedings of the IEEE Global Communications Conference, 2022

Resource Management for Heterogeneous Aerial Networks with Backhaul Constraints.
Proceedings of the IEEE Global Communications Conference, 2022

Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition.
Proceedings of the IEEE Global Communications Conference, 2022

LoS-Aware Handover Uplink NOMA Transmissions for Multi-Layer LEO Satellite Constellation.
Proceedings of the IEEE Global Communications Conference, 2022

Privacy-Preserving Outsourced Task Scheduling in Mobile Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Massive Access in Space-Based Internet of Things: Challenges, Opportunities, and Future Directions.
IEEE Wirel. Commun., 2021

An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol., 2021

Blockchain-Based Privacy-Preserving Driver Monitoring for MaaS in the Vehicular IoT.
IEEE Trans. Veh. Technol., 2021

Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud.
IEEE Trans. Serv. Comput., 2021

Introduction to the Special Section on Security and Privacy of Smart Network Systems.
IEEE Trans. Netw. Sci. Eng., 2021

Privacy-Preserving Continuous Data Collection for Predictive Maintenance in Vehicular Fog-Cloud.
IEEE Trans. Intell. Transp. Syst., 2021

DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021

Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog.
IEEE Trans. Ind. Informatics, 2021

Achieving Accountable and Efficient Data Sharing in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2021

Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2021

Privacy-Enhanced Federated Learning Against Poisoning Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021

Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021

Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data.
IEEE Trans. Cloud Comput., 2021

On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage.
IEEE Trans. Big Data, 2021

Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
Secur. Commun. Networks, 2021

Efficient and privacy-preserving range-max query in fog-based agricultural IoT.
Peer-to-Peer Netw. Appl., 2021

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud.
Peer-to-Peer Netw. Appl., 2021

A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT.
Peer-to-Peer Netw. Appl., 2021

A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021

DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains.
Inf. Sci., 2021

A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent.
Inf. Sci., 2021

Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing.
IEEE Internet Things J., 2021

Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing.
IEEE Internet Things J., 2021

Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2021

Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things.
IEEE Internet Things J., 2021

IoT-Praetor: Undesired Behaviors Detection for IoT Devices.
IEEE Internet Things J., 2021

Scalar Product Lattice Computation for Efficient Privacy-Preserving Systems.
IEEE Internet Things J., 2021

Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2021

MSPA: Multislot Pilot Allocation Random Access Protocol for mMTC-Enabled IoT System.
IEEE Internet Things J., 2021

Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era.
IEEE Internet Things J., 2021

Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities.
IEEE Internet Things J., 2021

Spatial Interpolation-based Learned Index for Range and kNN Queries.
CoRR, 2021

Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
Comput. Secur., 2021

Achieve space-efficient key management in lightning network.
Comput. Networks, 2021

IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021

SPRIG: A Learned Spatial Index for Range and kNN Queries.
Proceedings of the 17th International Symposium on Spatial and Temporal Databases, 2021

Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

On Secure and Efficient Data Sharing for Smart Grids: An Anti-Collusion Scheme.
Proceedings of the ICC 2021, 2021

Age-Optimal Power Allocation Scheme for NOMA-based S-IoT Downlink Network.
Proceedings of the ICC 2021, 2021

Towards Privacy-Preserving Online Medical Monitoring with Reverse Skyline Query.
Proceedings of the IEEE Global Communications Conference, 2021

Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2021

Towards Lightweight and Efficient Distributed Intrusion Detection Framework.
Proceedings of the IEEE Global Communications Conference, 2021

Age-Critical Pilot Allocation Random Access Protocol for Space-Air-Ground Integrated Networks.
Proceedings of the IEEE Global Communications Conference, 2021

Age-Critical Frameless ALOHA Protocol for Grant-Free Massive Access.
Proceedings of the IEEE Global Communications Conference, 2021

Privacy-Preserving Fog-Based Multi-Location Task Allocation in Mobile Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2021

Efficient Contact Similarity Query over Uncertain Trajectories.
Proceedings of the 24th International Conference on Extending Database Technology, 2021

2020
Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems
Wireless Networks, Springer, ISBN: 978-3-030-58671-3, 2020

Software Defined Internet of Things Security: Properties, State of the Art, and Future Research.
IEEE Wirel. Commun., 2020

Unequal Access Latency Random Access Protocol for Massive Machine-Type Communications.
IEEE Trans. Wirel. Commun., 2020

Guest Editorial Introduction to the Special Section on Blockchains in Emerging Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020

DAPA: A Decentralized, Accountable, and Privacy-Preserving Architecture for Car Sharing Services.
IEEE Trans. Veh. Technol., 2020

On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices.
IEEE Trans. Ind. Informatics, 2020

Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data".
IEEE Trans. Inf. Forensics Secur., 2020

Introduction to the Special Issue on User-Centric Security and Safety for CPS.
ACM Trans. Cyber Phys. Syst., 2020

An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms.
Secur. Priv., 2020

Toward efficient and effective bullying detection in online social network.
Peer-to-Peer Netw. Appl., 2020

Achieve privacy-preserving simplicial depth query over collaborative cloud servers.
Peer-to-Peer Netw. Appl., 2020

Adaptive privacy-preserving federated learning.
Peer-to-Peer Netw. Appl., 2020

Security and privacy of machine learning assisted P2P networks.
Peer-to-Peer Netw. Appl., 2020

5G Vehicle-to-Everything Services: Gearing Up for Security and Privacy.
Proc. IEEE, 2020

Security and Privacy Challenges in 5G-Enabled Vehicular Networks.
IEEE Netw., 2020

A privacy-preserving data aggregation scheme for dynamic groups in fog computing.
Inf. Sci., 2020

Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS.
IEEE Internet Things J., 2020

Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2020

PADL: Privacy-Aware and Asynchronous Deep Learning for IoT Applications.
IEEE Internet Things J., 2020

Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020

Scalar Product Lattice Computation for Efficient Privacy-preserving Systems.
CoRR, 2020

An Adversarial Attack with Fusion of Polarization for Unmanned Scenes.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Accelerating Poisoning Attack Through Momentum and Adam Algorithms.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

I Know If the Journey Changes: Flexible Source and Path Validation.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Efficient Privacy-Preserving Similarity Range Query based on Pre-computed Distances in eHealthcare.
Proceedings of the IEEE Global Communications Conference, 2020

Age-optimal Transmission Policy for Markov Source with Differential Encoding.
Proceedings of the IEEE Global Communications Conference, 2020

Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2020

A Practical Black-Box Attack Against Autonomous Speech Recognition Model.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems.
IEEE Trans. Veh. Technol., 2019

A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination.
IEEE Trans. Veh. Technol., 2019

Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era.
IEEE Trans. Smart Grid, 2019

Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things.
IEEE Trans. Circuits Syst. Video Technol., 2019

A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory.
ACM Trans. Cyber Phys. Syst., 2019

On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
ACM Trans. Cyber Phys. Syst., 2019

Privacy-Preserving iVector-Based Speaker Verification.
IEEE ACM Trans. Audio Speech Lang. Process., 2019

Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
J. Medical Syst., 2019

An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare.
J. Inf. Secur. Appl., 2019

Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019

A Practical and Compatible Cryptographic Solution to ADS-B Security.
IEEE Internet Things J., 2019

An Efficient and Privacy-Preserving Disease Risk Prediction Scheme for E-Healthcare.
IEEE Internet Things J., 2019

Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019

Pystin: Enabling Secure LBS in Smart Cities With Privacy-Preserving Top-k Spatial-Textual Query.
IEEE Internet Things J., 2019

A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT.
IEEE Internet Things J., 2019

CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query.
IEEE Internet Things J., 2019

Cooperative jamming-based physical-layer security of cooperative cognitive radio networks: system model and enabling techniques.
IET Commun., 2019

Towards insider threats detection in smart grid communication systems.
IET Commun., 2019

A privacy-preserving sensory data sharing scheme in Internet of Vehicles.
Future Gener. Comput. Syst., 2019

UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks.
Sci. China Inf. Sci., 2019

Efficient Group Proof of Storage With Malicious-Member Distinction and Revocation.
IEEE Access, 2019

Achieving Efficient and Privacy-Preserving Multi-Keyword Conjunctive Query Over Cloud.
IEEE Access, 2019

Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019

Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare.
IEEE Access, 2019

Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System.
IEEE Access, 2019

Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT.
IEEE Access, 2019

A Certificateless Verifiable Strong Designated Verifier Signature Scheme.
IEEE Access, 2019

Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

APRNET: Achieving Privacy-Preserving Real-Name Authentication over Blockchain for Online Services.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Achieve Revocable Access Control for Fog-Based Smart Grid System.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019

Tell Them from Me: An Encrypted Application Profiler.
Proceedings of the Network and System Security - 13th International Conference, 2019

Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Online Advertising with Verifiable Fairness.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

EPPS: Efficient Privacy-Preserving Scheme in Distributed Deep Learning.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Exploring Anonymous User Reviews: Linkability Analysis Based on Machine Learning.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Joint Resource Allocation in NOMA Systems with Imperfect SIC.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Scalable Privacy-Preserving Query Processing over Ethereum Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2019

Adversarial attack against scene recognition system for unmanned vehicles.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018

Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2018

A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks.
IEEE Trans. Ind. Informatics, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Netw. Appl., 2018

FGDA: Fine-grained data analysis in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2018

Security and Privacy of Connected Vehicular Cloud Computing.
IEEE Netw., 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Netw., 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE J. Sel. Areas Commun., 2018

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet Things J., 2018

Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability.
IEEE Internet Things J., 2018

Design of Secret Reconstruction With Optimal Communication Efficiency.
IEEE Commun. Lett., 2018

PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system.
Future Gener. Comput. Syst., 2018

Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Gener. Comput. Syst., 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018

Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment.
IEEE Commun. Mag., 2018

Enabling Efficient and Privacy-Preserving Health Query Over Outsourced Cloud.
IEEE Access, 2018

Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018

Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018

A Privacy-Preserving Online Medical Prediagnosis Scheme for Cloud Environment.
IEEE Access, 2018

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

An Efficient and Privacy-Preserving $k$-NN Query Scheme for eHealthcare Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Anomalous Path Detection for Spatial Crowdsourcing-Based Indoor Navigation System.
Proceedings of the IEEE Global Communications Conference, 2018

PAMA: A Proactive Approach to Mitigate False Data Injection Attacks in Smart Grids.
Proceedings of the IEEE Global Communications Conference, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

Practical and Privacy-Aware Truth Discovery in Mobile Crowd Sensing Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
A Reliable and Energy-Efficient Opportunistic Routing Protocol for Dense Lossy Networks.
IEEE Wirel. Commun. Lett., 2017

REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET.
IEEE Trans. Veh. Technol., 2017

Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomed. Health Informatics, 2017

False Data Injection on State Estimation in Power Systems - Attacks, Impacts, and Defense: A Survey.
IEEE Trans. Ind. Informatics, 2017

Defending Against False Data Injection Attacks on Power System State Estimation.
IEEE Trans. Ind. Informatics, 2017

PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems.
Sensors, 2017

Achieve Location Privacy-Preserving Range Query in Vehicular Sensing.
Sensors, 2017

Security and Privacy in Emerging Wireless Networks.
Secur. Commun. Networks, 2017

A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities.
Peer-to-Peer Netw. Appl., 2017

TPSQ: Trust-based platoon service query via vehicular communications.
Peer-to-Peer Netw. Appl., 2017

PTRS: A privacy-preserving trust-based relay selection scheme in VANETs.
Peer-to-Peer Netw. Appl., 2017

A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance.
Peer-to-Peer Netw. Appl., 2017

Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distributed Comput., 2017

Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
J. Comput. Syst. Sci., 2017

Privacy-friendly spatial crowdsourcing in vehicular networks.
J. Commun. Inf. Networks, 2017

Guest Editorial Big Security Challenges in Big Data Era.
IEEE Internet Things J., 2017

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks.
IEEE Internet Things J., 2017

An Efficient Fog-Assisted Unstable Sensor Detection Scheme with Privacy Preserved.
CoRR, 2017

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.
IEEE Commun. Mag., 2017

Securing the Internet of Things in a Quantum World.
IEEE Commun. Mag., 2017

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.
Appl. Math. Comput., 2017

TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning.
IEEE Access, 2017

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.
IEEE Access, 2017

A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017

Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017

EPP-DMM: An Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications
Wireless Networks, Springer, ISBN: 978-3-319-32899-7, 2016

Secure machine-type communications in LTE networks.
Wirel. Commun. Mob. Comput., 2016

An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Veh. Technol., 2016

A Threshold Anonymous Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2016

Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016

Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid".
IEEE Trans. Ind. Informatics, 2016

Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving Outsourced Calculation on Floating Point Numbers.
IEEE Trans. Inf. Forensics Secur., 2016

Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Inf. Forensics Secur., 2016

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Inf. Forensics Secur., 2016

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016

A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016

TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.
Sensors, 2016

EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Secur. Commun. Networks, 2016

SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems.
Secur. Commun. Networks, 2016

Secure bidirectional proxy re-encryption for cryptographic cloud storage.
Pervasive Mob. Comput., 2016

Security and Privacy Challenges in Vehicular Cloud Computing.
Mob. Inf. Syst., 2016

EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data.
IEEE Internet Things J., 2016

Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption.
IEEE Internet Things J., 2016

BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid.
IEEE Internet Things J., 2016

A New Digital Signature Scheme from Layered Cellular Automata.
Int. J. Netw. Secur., 2016

Efficient and privacy-preserving skyline computation framework across domains.
Future Gener. Comput. Syst., 2016

Recent advances in security and privacy in large-scale networks.
Concurr. Comput. Pract. Exp., 2016

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Comput. Networks, 2016

SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking.
Big Data Res., 2016

An Energy-Efficient and Self-Regioning Based RPL for Low-Power and Lossy Networks.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Proxy Re-encryption with Delegatable Verifiability.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication.
Wirel. Commun. Mob. Comput., 2015

Social on the road: enabling secure and efficient social networking on highways.
IEEE Wirel. Commun., 2015

Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System.
IEEE Trans. Veh. Technol., 2015

Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications.
IEEE Trans. Smart Grid, 2015

Fast Distributed Demand Response With Spatially and Temporally Coupled Constraints in Smart Grid.
IEEE Trans. Ind. Informatics, 2015

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Soc. Syst., 2015

Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding".
IEEE Trans. Computers, 2015

Duth: a user-friendly dual-factor authentication for Android smartphone devices.
Secur. Commun. Networks, 2015

Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
Secur. Commun. Networks, 2015

ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Secur. Commun. Networks, 2015

PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Secur. Commun. Networks, 2015

EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks.
Peer-to-Peer Netw. Appl., 2015

MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2015

PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications.
Peer-to-Peer Netw. Appl., 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Netw., 2015

Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015

A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications.
IEEE Internet Things J., 2015

Privacy Concerns for Photo Sharing in Online Social Networks.
IEEE Internet Comput., 2015

Trust-Based Anomaly Detection in Emerging Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Commun. Mag., 2015

SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Exploiting mobile social behaviors for Sybil detection.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Fine-grained data sharing in cloud computing for mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

New threshold anonymous authentication for VANETs.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

EFPA: Efficient and flexible privacy-preserving mining of association rule in cloud.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

DDPFT: Secure data aggregation scheme with differential privacy and fault tolerance.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare.
Proceedings of the 10th International Conference on Information, 2015

A sybil attack detection scheme for privacy-preserving mobile social networks.
Proceedings of the 10th International Conference on Information, 2015

2014
Querying over Encrypted Data in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014

Time Synchronization for Random Mobile Sensor Networks.
IEEE Trans. Veh. Technol., 2014

PEACE: Polarization Enabled Active Cooperation Scheme Between Primary and Secondary Networks.
IEEE Trans. Veh. Technol., 2014

EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014

An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid.
IEEE Syst. J., 2014

Call for papers: systematic network optimizations for security parameters (security and communication networks).
Secur. Commun. Networks, 2014

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014

SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection.
Secur. Commun. Networks, 2014

Toward efficient and privacy-preserving computing in big data era.
IEEE Netw., 2014

RCare: Extending Secure Health Care to Rural Area Using VANETs.
Mob. Networks Appl., 2014

EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014

A New Public Key Encryption Scheme based on Layered Cellular Automata.
KSII Trans. Internet Inf. Syst., 2014

EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market.
KSII Trans. Internet Inf. Syst., 2014

PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014

Sybil Attacks and Their Defenses in the Internet of Things.
IEEE Internet Things J., 2014

CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014

Comment on "A Novel Homomorphic MAC Scheme for Authentication in Network Coding".
IEEE Commun. Lett., 2014

A regular expression matching engine with hybrid memories.
Comput. Stand. Interfaces, 2014

Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Commun. Mag., 2014

RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security.
Proceedings of the Provable Security - 8th International Conference, 2014

FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PLAM: A privacy-preserving framework for local-area mobile social networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

PAD: Privacy-preserving data dissemination in mobile social networks.
Proceedings of the IEEE International Conference on Communication Systems, 2014

Achieving ranked range query in smart grid auction market.
Proceedings of the IEEE International Conference on Communications, 2014

SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014

Incentive mechanism design for crowdsourcing-based cooperative transmission.
Proceedings of the IEEE Global Communications Conference, 2014

Optimal decentralized security software deployment in multihop wireless networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Security and Privacy in Mobile Social Networks.
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013

UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid.
IEEE Trans. Smart Grid, 2013

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
IEEE Trans. Parallel Distributed Syst., 2013

An Efficient Data-Driven Particle PHD Filter for Multitarget Tracking.
IEEE Trans. Ind. Informatics, 2013

PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network.
IEEE Trans. Emerg. Top. Comput., 2013

Fully Anonymous Profile Matching in Mobile Social Networks.
IEEE J. Sel. Areas Commun., 2013

A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems.
IEEE Intell. Syst., 2013

SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.
Comput. Networks, 2013

Real-time path planning for optimized spatial utilization and travel cost in vanet-enhanced transportation system.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013

Particle filter based grid synchronization with voltage unbalance and frequency variation in smart grid.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013

SND: Secure neighbor discovery for 60 GHz network with directional antenna.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

EATH: An efficient aggregate authentication protocol for smart grid communications.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A novel low-power mixed-mode implementation of weight update in particle PHD filters.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

On optimal communication strategies for cooperative cognitive radio networking.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013

ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

APED: An efficient aggregation protocol with error detection for smart grid communications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Robust group key management with revocation and collusion resistance for SCADA in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

SPS: Secure personal health information sharing with patient-centric access control in cloud computing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Enabling pervasive healthcare through continuous remote health monitoring.
IEEE Wirel. Commun., 2012

Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2012

Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Veh. Technol., 2012

BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distributed Syst., 2012

A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2012

HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Comput. Commun., 2012

Securing smart grid: cyber attacks, countermeasures, and challenges.
IEEE Commun. Mag., 2012

Toward secure targeted broadcast in smart grid.
IEEE Commun. Mag., 2012

Network selection strategy for cognitive radios with heterogeneous primary networks.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

A lightweight key management scheme for 60 GHz WPAN.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

Trust-based anomaly detection in wireless sensor networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

Energy-efficient and trust-aware cooperation in cognitive radio networks.
Proceedings of IEEE International Conference on Communications, 2012

Enabling pervasive healthcare with privacy preservation in smart community.
Proceedings of IEEE International Conference on Communications, 2012

PMDS: A probabilistic misbehavior detection scheme in DTN.
Proceedings of IEEE International Conference on Communications, 2012

VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
A Lightweight Message Authentication Scheme for Smart Grid Communications.
IEEE Trans. Smart Grid, 2011

An efficient and provably secure public key encryption scheme based on coding theory.
Secur. Commun. Networks, 2011

A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network.
Mob. Networks Appl., 2011

PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
J. Commun. Networks, 2011

ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing.
Int. J. Secur. Networks, 2011

GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Commun. Mag., 2011

Smart community: an internet of things application.
IEEE Commun. Mag., 2011

Toward Reliable Actor Services in Wireless Sensor and Actor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011

Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks.
Proceedings of IEEE International Conference on Communications, 2011

Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011

An Efficient and Secure User Revocation Scheme in Mobile Social Networks.
Proceedings of the Global Communications Conference, 2011

Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011

Health-Post: A Delay-Tolerant Secure Long-Term Health Care Scheme in Rural Area.
Proceedings of the Global Communications Conference, 2011

A Routing-Compatible Credit-Based Incentive Scheme for DTNs.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011

2010
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2010

Complementing public key infrastructure to secure vehicular ad hoc networks.
IEEE Wirel. Commun., 2010

Pi: a practical incentive protocol for delay tolerant networks.
IEEE Trans. Wirel. Commun., 2010

An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Veh. Technol., 2010

REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks.
Comput. Networks, 2010

PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks.
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010

An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs.
Proceedings of IEEE International Conference on Communications, 2010

A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2010

TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010

FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010

Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010

Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010

An Efficient Searchable Encryption Scheme and Its Application in Network Forensics.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010

Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010

2009
Security in service-oriented vehicular networks.
IEEE Wirel. Commun., 2009

SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2009

A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Veh. Technol., 2009

Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems.
IEEE J. Sel. Areas Commun., 2009

SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Location-Release Signature for Vehicular Communications.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wirel. Commun., 2008

TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2008

An Efficient Message Authentication Scheme for Vehicular Communications.
IEEE Trans. Veh. Technol., 2008

Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Secur. Commun. Networks, 2008

New (t, n) threshold directed signature scheme with provable security.
Inf. Sci., 2008

A Simple User Authentication Scheme for Grid Computing.
Int. J. Netw. Secur., 2008

A simple deniable authentication protocol based on the Diffie-Hellman algorithm.
Int. J. Comput. Math., 2008

Efficient and secure protocol in fair document exchange.
Comput. Stand. Interfaces, 2008

Security in vehicular ad hoc networks.
IEEE Commun. Mag., 2008

Designing efficient proxy signature schemes for mobile communication.
Sci. China Ser. F Inf. Sci., 2008

A Location Privacy Preserving Authentication Scheme in Vehicular Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A New Dynamic Group Key Management Scheme with Low Rekeying Cost.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008

AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008

Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008

BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Improvement of Yang et al.'s threshold proxy signature scheme.
J. Syst. Softw., 2007

A New ID-Based Deniable Authentication Protocol.
Informatica, 2007

On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
Int. J. Netw. Secur., 2007

Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings.
Int. J. Netw. Secur., 2007

Efficient Password-based Authenticated Key Exchange without Public Information.
IACR Cryptol. ePrint Arch., 2007

A New Practical Limited Identity-Based Encryption Scheme.
Fundam. Informaticae, 2007

An enhanced authenticated key agreement protocol for wireless mobile communication.
Comput. Stand. Interfaces, 2007

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Stand. Interfaces, 2007

Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405].
Comput. Stand. Interfaces, 2007

Simple three-party key exchange protocol.
Comput. Secur., 2007

Threshold password authentication against guessing attacks in Ad hoc networks.
Ad Hoc Networks, 2007

A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007

Secure Localized Authentication and Billing for Wireless Mesh Networks.
Proceedings of the Global Communications Conference, 2007

2006
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wirel. Commun. Mob. Comput., 2006

An improved deniable authentication protocol.
Networks, 2006

A Directed Signature Scheme Based on RSA Assumption.
Int. J. Netw. Secur., 2006

Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication.
Int. J. Netw. Secur., 2006

Provably secure robust threshold partial blind signature.
Sci. China Ser. F Inf. Sci., 2006

Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
Proceedings of the Wireless Algorithms, 2006

Group Oriented Deniable Authentication Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Designated Verifier Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

An Efficient ID-Based Multi-proxy Multi-Signature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Remote Authentication with Forward Security.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Pairing-Based Two-Party Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2005

ID-based Encryption Scheme Secure against Chosen Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2005

Non-interactive deniable authentication protocol based on factoring.
Comput. Stand. Interfaces, 2005

Efficient remote user authentication scheme using smart card.
Comput. Networks, 2005

Provably secure proxy-protected signature schemes based on factoring.
Appl. Math. Comput., 2005

A robust (k, n) + 1 threshold proxy signature scheme based on factoring.
Appl. Math. Comput., 2005

Proxy blind multi-signature scheme without a secure channel.
Appl. Math. Comput., 2005

Threshold undeniable signature scheme based on conic.
Appl. Math. Comput., 2005

Designated verifier proxy signature scheme with message recovery.
Appl. Math. Comput., 2005

A new deniable authentication protocol from bilinear pairings.
Appl. Math. Comput., 2005

Proxy signature scheme using self-certified public keys.
Appl. Math. Comput., 2005

Identity Based Conference Key Distribution Scheme from Parings.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Constructing Secure Warrant-Based Proxy Signcryption Schemes.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
An efficient digital signature using self-certified public keys.
Proceedings of the 3rd International Conference on Information Security, 2004

A proxy-protected signature scheme based on conic.
Proceedings of the 3rd International Conference on Information Security, 2004

Robust ID-based threshold signcryption scheme from pairings.
Proceedings of the 3rd International Conference on Information Security, 2004

ID-based threshold decryption without random oracles and its application in key escrow.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...