Rongxing Lu
Orcid: 0000-0001-5720-0941Affiliations:
- University of New Brunswick, Fredericton, NB, Canada
- Nanyang Technological University, Singapore (2013 - 2016)
- University of Waterloo, ON, Canada (PhD 2012)
- Shanghai Jiao Tong University, China (PhD 2006)
According to our database1,
Rongxing Lu
authored at least 646 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2021, "for contributions to security and privacy in vehicular communications".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.unb.ca
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
A Comprehensive Overview of Backdoor Attacks in Large Language Models Within Communication Networks.
IEEE Netw., November, 2024
Toward Goal-Oriented Semantic Communications: New Metrics, Framework, and Open Challenges.
IEEE Wirel. Commun., October, 2024
IEEE Trans. Mob. Comput., October, 2024
Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data.
IEEE Trans. Intell. Transp. Syst., October, 2024
Achieving Efficient and Privacy-Preserving Worker Selection With Arbitrary Spatial Ranges for Vehicular Crowdsensing.
IEEE Trans. Veh. Technol., September, 2024
Multi-UAV Aided Multi-Access Edge Computing in Marine Communication Networks: A Joint System-Welfare and Energy-Efficient Design.
IEEE Trans. Commun., September, 2024
CPBW: A Change-Point-Detection and Bag-of-Words-Based Mechanism Utilizing Smartphone Triaxial Accelerometer Data for Driver Identification.
IEEE Internet Things J., September, 2024
IEEE Trans. Comput. Soc. Syst., August, 2024
Split Learning with Differential Privacy for Integrated Terrestrial and Non-Terrestrial Networks.
IEEE Wirel. Commun., June, 2024
Age of Incorrect Information Minimization for Semantic-Empowered NOMA System in S-IoT.
IEEE Trans. Wirel. Commun., June, 2024
Edge Intelligence Oriented Integrated Sensing and Communication: A Multi-Cell Cooperative Approach.
IEEE Trans. Veh. Technol., June, 2024
Predictive Computation Offloading and Resource Allocation in DT-Empowered Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., June, 2024
IEEE Internet Things J., June, 2024
NOMA Assisted Two-Tier VR Content Transmission: A Tile-Based Approach for QoE Optimization.
IEEE Trans. Mob. Comput., May, 2024
A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks in Smart Grid.
IEEE Internet Things J., May, 2024
Privacy-Preserving Medical Data Sharing Scheme Based on Two-Party Cloud-Assisted PSI.
IEEE Internet Things J., May, 2024
Achieving Privacy-Preserving Location Management in LEO-Satellite Integrated Vehicular Network With Dense Ground Stations.
IEEE Trans. Veh. Technol., April, 2024
IEEE Trans. Big Data, April, 2024
IEEE Trans. Veh. Technol., March, 2024
IEEE Trans. Intell. Transp. Syst., March, 2024
Gradient Leakage Attacks in Federated Learning: Research Frontiers, Taxonomy, and Future Directions.
IEEE Netw., March, 2024
Efficient Privacy-Preserving Task Allocation With Secret Sharing for Vehicular Crowdsensing.
IEEE Internet Things J., March, 2024
PMRK: Privacy-Preserving Multidimensional Range Query With Keyword Search Over Spatial Data.
IEEE Internet Things J., March, 2024
Guest Editorial Special Section on Security, Privacy and Trust for Consumer Smart Devices.
IEEE Trans. Consumer Electron., February, 2024
Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of Things.
IEEE Internet Things J., February, 2024
IEEE Netw., January, 2024
Guest Editorial Special Issue on Recent Advances of Security, Privacy, and Trust in Mobile Crowdsourcing.
IEEE Internet Things J., January, 2024
Blockchain-Based Lightweight and Privacy-Preserving Quality Assurance Framework in Crowdsensing Systems.
IEEE Internet Things J., January, 2024
Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification.
IEEE Internet Things J., January, 2024
Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems.
Comput. Stand. Interfaces, January, 2024
EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys.
IEEE Trans. Serv. Comput., 2024
A Secure Satellite-Edge Computing Framework for Collaborative Line Outage Identification in Smart Grid.
IEEE Trans. Serv. Comput., 2024
Robust and Lightweight Data Aggregation With Histogram Estimation in Edge-Cloud Systems.
IEEE Trans. Netw. Sci. Eng., 2024
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
IEEE Trans. Inf. Forensics Secur., 2024
CHERUBIM: A Secure and Highly Parallel Cross-Shard Consensus Using Quadruple Pipelined Two-Phase Commit for Sharding Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024
Efficiently Achieving Privacy Preservation and Poisoning Attack Resistance in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions.
IEEE Trans. Inf. Forensics Secur., 2024
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2024
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data.
IEEE Trans. Dependable Secur. Comput., 2024
Synodic Period Channel Modeling and Coding Scheme for Deep Space Optical Communications.
IEEE Trans. Aerosp. Electron. Syst., 2024
Knowl. Based Syst., 2024
Towards privacy-preserving category-aware POI recommendation over encrypted LBSN data.
Inf. Sci., 2024
KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare.
IEEE Internet Things J., 2024
WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data.
Int. J. Appl. Cryptogr., 2024
Blockchain-assisted verifiable certificate-based searchable encryption against untrusted cloud server for Industrial Internet of Things.
Future Gener. Comput. Syst., 2024
Semantics-Empowered Space-Air-Ground-Sea Integrated Network: New Paradigm, Frameworks, and Challenges.
CoRR, 2024
Two-layer Lagrange-based relay network topology and trajectory design for solar system explorations.
Sci. China Inf. Sci., 2024
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024
Semantic-Empowered Utility Loss of Information Transmission Policy in Satellite-Integrated Internet.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Efficient Privacy-Preserving Multi-Location Task Allocation in Fog-Assisted Vehicular Crowdsourcing.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Poisoning Attack Mitigation for Privacy-Preserving Federated Learning-Based Energy Theft Detection.
Proceedings of the IEEE International Conference on Communications, 2024
An Efficient Multicast Authenticated Encryption Scheme for Smart Elderly Care Systems.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
2023
Energy-Efficient Integrated Sensing and Communication: A Multi-Access Edge Computing Design.
IEEE Wirel. Commun. Lett., December, 2023
IEEE Trans. Wirel. Commun., December, 2023
IEEE Trans. Veh. Technol., December, 2023
IEEE/ACM Trans. Netw., December, 2023
Low-Correlation Superimposed Pilot Grant-Free Massive Access for Satellite Internet of Things.
IEEE Trans. Commun., December, 2023
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption.
Inf. Sci., December, 2023
Lightweight and Bilateral Controllable Data Sharing for Secure Autonomous Vehicles Platooning Service.
IEEE Trans. Veh. Technol., November, 2023
Latency Minimization Oriented Hybrid Offshore and Aerial-Based Multi-Access Computation Offloading for Marine Communication Networks.
IEEE Trans. Commun., November, 2023
Digital Twin Enabled Remote Data Sharing for Internet of Vehicles: System and Incentive Design.
IEEE Trans. Veh. Technol., October, 2023
Incentive-Based Federated Learning for Digital-Twin-Driven Industrial Mobile Crowdsensing.
IEEE Internet Things J., October, 2023
IEEE Internet Things J., October, 2023
IEEE Trans. Veh. Technol., September, 2023
IEEE Wirel. Commun., August, 2023
IEEE Internet Things J., August, 2023
IEEE Trans. Wirel. Commun., July, 2023
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
Sensors, July, 2023
Efficient Strong Privacy-Preserving Conjunctive Keyword Search Over Encrypted Cloud Data.
IEEE Trans. Big Data, June, 2023
IEEE Trans. Big Data, June, 2023
IEEE Syst. J., June, 2023
IEEE Trans. Smart Grid, May, 2023
Peer Peer Netw. Appl., May, 2023
G-SC-IRSA: Graph-Based Spatially Coupled IRSA for Age-Critical Grant-Free Massive Access.
IEEE Internet Things J., May, 2023
PriTAEC: Privacy-Preserving Task Assignment Based on Oblivious Transfer and Edge Computing in VANET.
IEEE Trans. Veh. Technol., April, 2023
IEEE Trans. Big Data, April, 2023
A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications.
IEEE Trans. Veh. Technol., March, 2023
Blockchain-Assisted Personalized Car Insurance With Privacy Preservation and Fraud Resistance.
IEEE Trans. Veh. Technol., March, 2023
$\bm {P}^{\bm {3}}$: Privacy-Preserving Prediction of Real-Time Energy Demands in EV Charging Networks.
IEEE Trans. Ind. Informatics, March, 2023
Ad Hoc Networks, March, 2023
Multitype Services Coexistence in Uplink NOMA for Dual-Layer LEO Satellite Constellation.
IEEE Internet Things J., February, 2023
IEEE Trans. Sustain. Comput., 2023
EPPFM: Efficient and Privacy-Preserving Querying of Electronic Medical Records With Forward Privacy in Multiuser Setting.
IEEE Trans. Sustain. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Non-Interactive Multi-Client Searchable Symmetric Encryption With Small Client Storage.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments.
IEEE Trans. Serv. Comput., 2023
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023
Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2023
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud.
IEEE Trans. Dependable Secur. Comput., 2023
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud.
IEEE Trans. Dependable Secur. Comput., 2023
Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data.
IEEE Trans. Cloud Comput., 2023
VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
Searchable Encryption With Autonomous Path Delegation Function and Its Application in Healthcare Cloud.
IEEE Trans. Cloud Comput., 2023
J. Netw. Comput. Appl., 2023
PPTA: Privacy-Preserving Task Assignment Based on Inner Product Functional Encryption in SAM.
IEEE Internet Things J., 2023
A Comprehensive Overview of Backdoor Attacks in Large Language Models within Communication Networks.
CoRR, 2023
CoRR, 2023
Age of Information Minimization for Short-Packet Communications RSMA in Satellite-based IoT.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
A Lightweight Mutual Authentication Scheme with Fault Tolerance in Smart Elderly Care System.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Soft OSD-Sliding Window Decoding for Staircase LDPC Codes in Deep Space Communications.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
An Efficient and Privacy-Preserving Outsourced Heavy Hitter Query Scheme with LDP Technique.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
An Efficient Dynamic Key Management Scheme for IoT Devices in Aging in Place Systems.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
PRRkNN: Efficient and Privacy-Preserving Range-Based Reverse kNN over Encrypted Data.
Proceedings of the IEEE International Conference on Communications, 2023
Traceable and Privacy-Preserving Worker Selection Scheme with Arbitrary Spatial Ranges in MCS.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation Over Encrypted Data.
Proceedings of the IEEE International Conference on Communications, 2023
PLPR: Towards Efficient and Privacy-Preserving LBSNs-Based POI Recommendation in Cloud.
Proceedings of the IEEE International Conference on Communications, 2023
RISAC: Rate-splitting Multiple Access Enabled Integrated Sensing and Communication Systems.
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Achieve Edge-Based Privacy-Preserving Dynamic Aggregation Query in Smart Transportation Systems.
Proceedings of the IEEE Global Communications Conference, 2023
2022
Intrinsic Security: A Robust Framework for Cloud-Native Network Slicing via a Proactive Defense Paradigm.
IEEE Wirel. Commun., 2022
Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated Networks.
IEEE Trans. Wirel. Commun., 2022
Age-Critical and Secure Blockchain Sharding Scheme for Satellite-Based Internet of Things.
IEEE Trans. Wirel. Commun., 2022
A Secure Intra-Regional-Inter-Regional Peer-to-Peer Electricity Trading System for Electric Vehicles.
IEEE Trans. Veh. Technol., 2022
APPB: Anti-Counterfeiting and Privacy-Preserving Blockchain-Based Vehicle Supply Chains.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Veh. Technol., 2022
Age-Optimal Network Coding HARQ Transmission Scheme for Dual-Hop Satellite-Integrated Internet.
IEEE Trans. Veh. Technol., 2022
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud.
IEEE Trans. Serv. Comput., 2022
Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare.
IEEE Trans. Serv. Comput., 2022
Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2022
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
IEEE J. Biomed. Health Informatics, 2022
Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare.
IEEE Trans. Inf. Forensics Secur., 2022
PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022
Attack-Resilient Optimal PMU Placement via Reinforcement Learning Guided Tree Search in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets.
IEEE Trans. Dependable Secur. Comput., 2022
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022
Grant Free Age-Optimal Random Access Protocol for Satellite-Based Internet of Things.
IEEE Trans. Commun., 2022
IEEE Trans. Big Data, 2022
Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud.
IEEE Trans. Big Data, 2022
Achieving Efficient and Secure Handover in LEO Constellation-Assisted Beyond 5G Networks.
IEEE Open J. Commun. Soc., 2022
IEEE Netw., 2022
CORK: A privacy-preserving and lossless federated learning scheme for deep neural network.
Inf. Sci., 2022
A Fine-Grained Differentially Private Federated Learning Against Leakage From Gradients.
IEEE Internet Things J., 2022
Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud.
IEEE Internet Things J., 2022
PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare.
IEEE Internet Things J., 2022
PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks.
IEEE Internet Things J., 2022
Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis.
IEEE Internet Things J., 2022
FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022
A Privacy-Preserving Multidimensional Range Query Scheme for Edge-Supported Industrial IoT.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
An entity matching-based image topic verification framework for online fact-checking.
Int. J. Multim. Intell. Secur., 2022
Building blocks of sharding blockchain systems: Concepts, approaches, and open problems.
Comput. Sci. Rev., 2022
CoRR, 2022
CoRR, 2022
Everything you control is not everything: Achieving intention-concealed visit on social networks.
Comput. Secur., 2022
Comput. Commun., 2022
ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data.
Sci. China Inf. Sci., 2022
Interactions between artificial intelligence and cybersecurity to protect future networks.
Ann. des Télécommunications, 2022
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Non-orthogonal Superimposed Pilot Grant-free Random Access Scheme in Satellite-based IoT.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
Achieving Privacy-Preserving Weighted Similarity Range Query over Outsourced eHealthcare Data.
Proceedings of the IEEE International Conference on Communications, 2022
Privacy-preserving Worker Selection in Mobile Crowdsensing over Spatial-temporal Constraints.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Deep Reinforcement Learning-Assisted NOMA Age-Optimal Power Allocation for S-IoT Network.
Proceedings of the IEEE International Conference on Communications, 2022
Graph-based Spatially Coupled IRSA Random Access for Age-Critical Grant-Free Massive Access.
Proceedings of the IEEE International Conference on Communications, 2022
QoS-Aware Uplink NOMA with Multi-Type Service Coexistence for LEO Satellite Constellation.
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation.
Proceedings of the IEEE Global Communications Conference, 2022
Efficiency-Improved Privacy-Preserving Weighted Similarity Query over Outsourced eHealthcare Data.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
LoS-Aware Handover Uplink NOMA Transmissions for Multi-Layer LEO Satellite Constellation.
Proceedings of the IEEE Global Communications Conference, 2022
Proceedings of the IEEE Global Communications Conference, 2022
2021
Massive Access in Space-Based Internet of Things: Challenges, Opportunities, and Future Directions.
IEEE Wirel. Commun., 2021
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud.
IEEE Trans. Serv. Comput., 2021
Introduction to the Special Section on Security and Privacy of Smart Network Systems.
IEEE Trans. Netw. Sci. Eng., 2021
Privacy-Preserving Continuous Data Collection for Predictive Maintenance in Vehicular Fog-Cloud.
IEEE Trans. Intell. Transp. Syst., 2021
DeepFed: Federated Deep Learning for Intrusion Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Privacy-Preserving Aggregation for Federated Learning-Based Navigation in Vehicular Fog.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Inf. Forensics Secur., 2021
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021
Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data.
IEEE Trans. Cloud Comput., 2021
On Security of an Identity-Based Dynamic Data Auditing Protocol for Big Data Storage.
IEEE Trans. Big Data, 2021
Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials.
Secur. Commun. Networks, 2021
Peer-to-Peer Netw. Appl., 2021
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud.
Peer-to-Peer Netw. Appl., 2021
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT.
Peer-to-Peer Netw. Appl., 2021
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021
DRBFT: Delegated randomization Byzantine fault tolerance consensus protocol for blockchains.
Inf. Sci., 2021
A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent.
Inf. Sci., 2021
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing.
IEEE Internet Things J., 2021
Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing.
IEEE Internet Things J., 2021
Cryptanalysis and Improvement of a Pairing-Free Certificateless Aggregate Signature in Healthcare Wireless Medical Sensor Networks.
IEEE Internet Things J., 2021
Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
Comput. Secur., 2021
IEEE Access Special Section Editorial: Internet-of-Things Attacks and Defenses: Recent Advances and Challenges.
IEEE Access, 2021
Proceedings of the 17th International Symposium on Spatial and Temporal Databases, 2021
Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Age-Critical Pilot Allocation Random Access Protocol for Space-Air-Ground Integrated Networks.
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the 24th International Conference on Extending Database Technology, 2021
2020
Wireless Networks, Springer, ISBN: 978-3-030-58671-3, 2020
Software Defined Internet of Things Security: Properties, State of the Art, and Future Research.
IEEE Wirel. Commun., 2020
Unequal Access Latency Random Access Protocol for Massive Machine-Type Communications.
IEEE Trans. Wirel. Commun., 2020
Guest Editorial Introduction to the Special Section on Blockchains in Emerging Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020
DAPA: A Decentralized, Accountable, and Privacy-Preserving Architecture for Car Sharing Services.
IEEE Trans. Veh. Technol., 2020
On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices.
IEEE Trans. Ind. Informatics, 2020
Game Theory and Reinforcement Learning Based Secure Edge Caching in Mobile Social Networks.
IEEE Trans. Inf. Forensics Secur., 2020
Comments on "A Public Auditing Protocol With Novel Dynamic Structure for Cloud Data".
IEEE Trans. Inf. Forensics Secur., 2020
ACM Trans. Cyber Phys. Syst., 2020
An evaluation framework for privacy-preserving solutions applicable for blockchain-based internet-of-things platforms.
Secur. Priv., 2020
Peer-to-Peer Netw. Appl., 2020
Peer-to-Peer Netw. Appl., 2020
Peer-to-Peer Netw. Appl., 2020
Proc. IEEE, 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Toward Secure and Privacy-Preserving Distributed Deep Learning in Fog-Cloud Computing.
IEEE Internet Things J., 2020
CoRR, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Privacy-Preserving Computation Offloading for Time-Series Activities Classification in eHealthcare.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Achieving Efficient and Privacy-Preserving Range Query in Fog-enhanced IoT with Bloom Filter.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Efficient Privacy-Preserving Similarity Range Query based on Pre-computed Distances in eHealthcare.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
IEEE Trans. Veh. Technol., 2019
A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination.
IEEE Trans. Veh. Technol., 2019
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era.
IEEE Trans. Smart Grid, 2019
Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things.
IEEE Trans. Circuits Syst. Video Technol., 2019
A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory.
ACM Trans. Cyber Phys. Syst., 2019
On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
ACM Trans. Cyber Phys. Syst., 2019
IEEE ACM Trans. Audio Speech Lang. Process., 2019
Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
J. Medical Syst., 2019
An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare.
J. Inf. Secur. Appl., 2019
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019
Pystin: Enabling Secure LBS in Smart Cities With Privacy-Preserving Top-k Spatial-Textual Query.
IEEE Internet Things J., 2019
A New Communication-Efficient Privacy-Preserving Range Query Scheme in Fog-Enhanced IoT.
IEEE Internet Things J., 2019
CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query.
IEEE Internet Things J., 2019
Cooperative jamming-based physical-layer security of cooperative cognitive radio networks: system model and enabling techniques.
IET Commun., 2019
IET Commun., 2019
Future Gener. Comput. Syst., 2019
UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks.
Sci. China Inf. Sci., 2019
IEEE Access, 2019
Achieving Efficient and Privacy-Preserving Multi-Keyword Conjunctive Query Over Cloud.
IEEE Access, 2019
Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019
IEEE Access, 2019
Achieve Privacy-Preserving Priority Classification on Patient Health Data in Remote eHealthcare System.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
APRNET: Achieving Privacy-Preserving Real-Name Authentication over Blockchain for Online Services.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Achieving Privacy-Preserving Edit Distance Query in Cloud and Its Application to Genomic Data.
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018
Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2018
A Secure Content Caching Scheme for Disaster Backup in Fog Computing Enabled Mobile Social Networks.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Netw. Appl., 2018
Peer-to-Peer Netw. Appl., 2018
Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Netw., 2018
An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE J. Sel. Areas Commun., 2018
Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet Things J., 2018
Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability.
IEEE Internet Things J., 2018
IEEE Commun. Lett., 2018
PPDP: An efficient and privacy-preserving disease prediction scheme in cloud-based e-Healthcare system.
Future Gener. Comput. Syst., 2018
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Gener. Comput. Syst., 2018
A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018
IEEE Commun. Mag., 2018
IEEE Access, 2018
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data.
IEEE Access, 2018
Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018
IEEE Access, 2018
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
XRQuery: Achieving Communication-Efficient Privacy-Preserving Query for Fog-Enhanced IoT.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
A Reliable and Energy-Efficient Opportunistic Routing Protocol for Dense Lossy Networks.
IEEE Wirel. Commun. Lett., 2017
IEEE Trans. Veh. Technol., 2017
Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomed. Health Informatics, 2017
False Data Injection on State Estimation in Power Systems - Attacks, Impacts, and Defense: A Survey.
IEEE Trans. Ind. Informatics, 2017
IEEE Trans. Ind. Informatics, 2017
Sensors, 2017
A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities.
Peer-to-Peer Netw. Appl., 2017
Peer-to-Peer Netw. Appl., 2017
Peer-to-Peer Netw. Appl., 2017
A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance.
Peer-to-Peer Netw. Appl., 2017
Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distributed Comput., 2017
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
J. Comput. Syst. Sci., 2017
J. Commun. Inf. Networks, 2017
IEEE Internet Things J., 2017
Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks.
IEEE Internet Things J., 2017
CoRR, 2017
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.
IEEE Commun. Mag., 2017
A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.
Appl. Math. Comput., 2017
IEEE Access, 2017
IEEE Access, 2017
A Lightweight Privacy-Preserving Data Aggregation Scheme for Fog Computing-Enhanced IoT.
IEEE Access, 2017
Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017
A Flexible Privacy-Preserving Framework for Singular Value Decomposition Under Internet of Things Environment.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017
EPP-DMM: An Efficient and Privacy-Protected Delegation Scheme for Matrix Multiplication.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
HMM-Based Fast Detection of False Data Injections in Advanced Metering Infrastructure.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
2016
Wireless Networks, Springer, ISBN: 978-3-319-32899-7, 2016
Wirel. Commun. Mob. Comput., 2016
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Veh. Technol., 2016
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016
Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid".
IEEE Trans. Ind. Informatics, 2016
Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Inf. Forensics Secur., 2016
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Inf. Forensics Secur., 2016
User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption.
IEEE Trans. Computers, 2016
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016
TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs.
Sensors, 2016
EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Secur. Commun. Networks, 2016
SPGS: a secure and privacy-preserving group setup framework for platoon-based vehicular cyber-physical systems.
Secur. Commun. Networks, 2016
Pervasive Mob. Comput., 2016
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data.
IEEE Internet Things J., 2016
Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption.
IEEE Internet Things J., 2016
IEEE Internet Things J., 2016
Int. J. Netw. Secur., 2016
Future Gener. Comput. Syst., 2016
Concurr. Comput. Pract. Exp., 2016
GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications.
Comput. Networks, 2016
SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking.
Big Data Res., 2016
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication.
Wirel. Commun. Mob. Comput., 2015
IEEE Wirel. Commun., 2015
IEEE Trans. Veh. Technol., 2015
Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications.
IEEE Trans. Smart Grid, 2015
Fast Distributed Demand Response With Spatially and Temporally Coupled Constraints in Smart Grid.
IEEE Trans. Ind. Informatics, 2015
PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks.
IEEE Trans. Comput. Soc. Syst., 2015
Comment on "An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding".
IEEE Trans. Computers, 2015
Secur. Commun. Networks, 2015
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
Secur. Commun. Networks, 2015
ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Secur. Commun. Networks, 2015
PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications.
Secur. Commun. Networks, 2015
EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks.
Peer-to-Peer Netw. Appl., 2015
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2015
PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications.
Peer-to-Peer Netw. Appl., 2015
IEEE Netw., 2015
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015
A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications.
IEEE Internet Things J., 2015
IEEE Internet Comput., 2015
Int. J. Distributed Sens. Networks, 2015
Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions.
IEEE Commun. Mag., 2015
SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 10th International Conference on Information, 2015
Proceedings of the 10th International Conference on Information, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014
IEEE Trans. Veh. Technol., 2014
PEACE: Polarization Enabled Active Cooperation Scheme Between Primary and Secondary Networks.
IEEE Trans. Veh. Technol., 2014
EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Syst. J., 2014
Call for papers: systematic network optimizations for security parameters (security and communication networks).
Secur. Commun. Networks, 2014
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Mob. Networks Appl., 2014
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs.
Inf. Sci., 2014
IEEE Internet Things J., 2014
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service.
IEEE Internet Things J., 2014
IEEE Commun. Lett., 2014
Comput. Stand. Interfaces, 2014
Exploiting multimedia services in mobile social networks from security and privacy perspectives.
IEEE Commun. Mag., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the IEEE International Conference on Communication Systems, 2014
Proceedings of the IEEE International Conference on Communications, 2014
SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013
IEEE Trans. Smart Grid, 2013
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE Trans. Ind. Informatics, 2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013
A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network.
IEEE Trans. Emerg. Top. Comput., 2013
IEEE J. Sel. Areas Commun., 2013
A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems.
IEEE Intell. Syst., 2013
SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks.
Comput. Networks, 2013
Real-time path planning for optimized spatial utilization and travel cost in vanet-enhanced transportation system.
Proceedings of the 10th Annual Conference on Wireless On-demand Network Systems and Services, 2013
Particle filter based grid synchronization with voltage unbalance and frequency variation in smart grid.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
A novel low-power mixed-mode implementation of weight update in particle PHD filters.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks.
Proceedings of IEEE International Conference on Communications, 2013
ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
APED: An efficient aggregation protocol with error detection for smart grid communications.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Robust group key management with revocation and collusion resistance for SCADA in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
SPS: Secure personal health information sharing with patient-centric access control in cloud computing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
IEEE Wirel. Commun., 2012
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2012
IEEE Trans. Veh. Technol., 2012
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distributed Syst., 2012
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2012
HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Comput. Commun., 2012
IEEE Commun. Mag., 2012
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012
PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
IEEE Trans. Smart Grid, 2011
An efficient and provably secure public key encryption scheme based on coding theory.
Secur. Commun. Networks, 2011
Mob. Networks Appl., 2011
PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
J. Commun. Networks, 2011
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing.
Int. J. Secur. Networks, 2011
GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Commun. Mag., 2011
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011
EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks.
Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
A Routing-Compatible Credit-Based Incentive Scheme for DTNs.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011
2010
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2010
IEEE Wirel. Commun., 2010
IEEE Trans. Wirel. Commun., 2010
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Veh. Technol., 2010
An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Veh. Technol., 2010
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks.
Comput. Networks, 2010
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010
Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010
Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010
Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010
2009
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2009
A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Veh. Technol., 2009
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems.
IEEE J. Sel. Areas Commun., 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wirel. Commun., 2008
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Veh. Technol., 2008
Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal.
Secur. Commun. Networks, 2008
Inf. Sci., 2008
Int. J. Comput. Math., 2008
Comput. Stand. Interfaces, 2008
Sci. China Ser. F Inf. Sci., 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008
RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
Int. J. Netw. Secur., 2007
Group Oriented Identity-based Deniable Authentication Protocol from the Bilinear Pairings.
Int. J. Netw. Secur., 2007
IACR Cryptol. ePrint Arch., 2007
Comput. Stand. Interfaces, 2007
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Stand. Interfaces, 2007
Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405].
Comput. Stand. Interfaces, 2007
Ad Hoc Networks, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
2006
Authenticated encryption protocol with perfect forward secrecy for mobile communication.
Wirel. Commun. Mob. Comput., 2006
Off-line Password Guessing Attack on an Efficient Key Agreement Protocol for Secure Authentication.
Int. J. Netw. Secur., 2006
Sci. China Ser. F Inf. Sci., 2006
Efficient Password-Based Authentication and Key Exchange Scheme Preserving User Privacy.
Proceedings of the Wireless Algorithms, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Comput. Stand. Interfaces, 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Appl. Math. Comput., 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
ID-based threshold decryption without random oracles and its application in key escrow.
Proceedings of the 3rd International Conference on Information Security, 2004