Tao Feng
Orcid: 0000-0003-1611-9017Affiliations:
- Lanzhou University of Technology, School of Computer and Communication, China
According to our database1,
Tao Feng
authored at least 60 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cloud Comput., December, 2024
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity.
J. Cloud Comput., December, 2024
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials.
J. Cloud Comput., December, 2024
IEEE Internet Things J., December, 2024
Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals.
Peer Peer Netw. Appl., September, 2024
A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption.
IEEE Trans. Consumer Electron., February, 2024
Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool.
Inf., February, 2024
Int. J. Inf. Sec., February, 2024
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT.
IEEE Internet Things J., January, 2024
Blockchain-enhanced efficient and anonymous certificateless signature scheme and its application.
Pervasive Mob. Comput., 2024
A practical and UC-secure decentralized key management and authentication scheme based on blockchain for VNDN.
Comput. Sci. Inf. Syst., 2024
2023
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism.
Mob. Networks Appl., October, 2023
Multi-Authorization Attribute-Based Verifiable Encryption Scheme Based on Blockchain.
Mob. Networks Appl., October, 2023
Cryptogr., June, 2023
Cryptogr., June, 2023
A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme.
Inf., May, 2023
Symmetry, March, 2023
Simulation Implementation and Verification of a Security Framework for ICS Based on SPD.
Autom. Control. Comput. Sci., February, 2023
Sensors, January, 2023
PeerJ Comput. Sci., 2023
A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario.
IEEE Internet Things J., 2023
Inf., 2023
Security Analysis and Enhancement of INTERBUS Protocol in ICS Based on Colored Petri Net.
Inf., 2023
Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service.
Future Internet, 2023
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023
2022
Symmetry, November, 2022
Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time.
Symmetry, 2022
Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models.
EAI Endorsed Trans. Scalable Inf. Syst., 2022
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers.
EAI Endorsed Trans. Security Safety, 2022
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol.
Sensors, 2022
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things.
Sensors, 2022
Sensors, 2022
A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption.
Inf., 2022
Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment.
EAI Endorsed Trans. Creative Technol., 2022
IoT Based Detection of Molded Bread and Expiry Prediction using Machine Learning Techniques.
EAI Endorsed Trans. Creative Technol., 2022
An Intelligent and Secured Privacy Preserving Framework For Wireless Body Area Networks (WBANs).
EAI Endorsed Trans. Creative Technol., 2022
EAI Endorsed Trans. Creative Technol., 2022
Techniques For Reducing Energy And Delay For Data Aggregation In Wireless Sensor Networks.
EAI Endorsed Trans. Creative Technol., 2022
Cryptogr., 2022
Comput. Networks, 2022
Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT.
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Group signature with time-bound keys and unforgeability of expiry time for smart cities.
EURASIP J. Wirel. Commun. Netw., 2021
EAI Endorsed Trans. Creative Technol., 2021
EAI Endorsed Trans. Creative Technol., 2021
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2020
Forgery Node Detection Algorithm Based on Dynamic Reputation Value in the Internet of Vehicles.
Int. J. Netw. Secur., 2020
A Method of Constructing Arc Edge Anonymous Area Based on LBS Privacy Protection in the Internet of Vehicles.
Int. J. Netw. Secur., 2020
Adaptive Access Control Model of Vehicular Network Big Data Based on XACML and Security Risk.
Int. J. Netw. Secur., 2020
Differential Private Spatial Decomposition and Location Publishing Based on Unbalanced Quadtree Partition Algorithm.
IEEE Access, 2020
2019
Secur. Priv., 2019
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
2018
Proceedings of the Information Science and Applications 2018, 2018
2016