Xiaodong Lin
Orcid: 0000-0001-8916-6645Affiliations:
- University of Guelph, School of Computer Science, Canada
- Wilfrid Laurier University, Waterloo, ON, Canada (2017 - 2018)
- University of Ontario Institute of Technology, Oshawa, ON, Canada (2008 - 2017)
- University of Waterloo, Department of Electrical and Computer Engineering, ON, Canada (PhD 2008)
According to our database1,
Xiaodong Lin
authored at least 352 papers
between 2000 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on uoguelph.ca
-
on linkedin.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
ACM Comput. Surv., March, 2025
2024
The Achilles' Heel of License Plate Recognition Parking Enforcement: Balancing Privacy Protection and Enforcement.
IEEE Internet Things J., October, 2024
ACM Trans. Internet Techn., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Internet Things J., 2024
XMAM:X-raying models with a matrix to reveal backdoor attacks for federated learning.
Digit. Commun. Networks, 2024
Proceedings of the ACM on Web Conference 2024, 2024
ALIF: Low-Cost Adversarial Audio Attacks on Black-Box Speech Platforms using Linguistic Features.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
DeFiAligner: Leveraging Symbolic Analysis and Large Language Models for Inconsistency Detection in Decentralized Finance.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
2023
IEEE Trans. Computers, September, 2023
Vehicular Networking: Ultra-Low Latency and Reliable Communications For Future Wireless Networks.
IEEE Commun. Stand. Mag., September, 2023
IEEE Internet Things J., August, 2023
IEEE Trans. Parallel Distributed Syst., June, 2023
IEEE Trans. Mob. Comput., June, 2023
TokenAware: Accurate and Efficient Bookkeeping Recognition for Token Smart Contracts.
ACM Trans. Softw. Eng. Methodol., January, 2023
Patient-Centric Fine-Grained Access Control for Electronic Medical Record Sharing With Security via Dual-Blockchain.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks.
Comput. Secur., 2023
RECESS Vaccine for Federated Learning: Proactive Defense Against Model Poisoning Attacks.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Emerging Information Security and Applications, 2023
Proceedings of the 2023 Workshop on Decentralized Finance and Security, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Practical and Privacy-Preserving Decision Tree Evaluation with One Round Communication.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Protecting Bilateral Privacy in Machine Learning-as-a-Service: A Differential Privacy Based Defense.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
2022
Privacy-Preserving Aggregate Mobility Data Release: An Information-Theoretic Deep Reinforcement Learning Approach.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022
Heterogeneous Computation and Resource Allocation for Wireless Powered Federated Edge Learning Systems.
IEEE Trans. Commun., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction.
IEEE Internet Things J., 2022
DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022
Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing.
IEEE Internet Things J., 2022
Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization.
IEEE Internet Things J., 2022
IEEE Commun. Stand. Mag., 2022
XMAM: X-raying Models with A Matrix to Reveal Backdoor Attacks for Federated Learning.
CoRR, 2022
Everything you control is not everything: Achieving intention-concealed visit on social networks.
Comput. Secur., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
2021
Content Delivery Analysis in Cellular Networks With Aerial Caching and mmWAVE Backhaul.
IEEE Trans. Veh. Technol., 2021
Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services.
IEEE Trans. Dependable Secur. Comput., 2021
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors.
IEEE Trans. Cloud Comput., 2021
Practical and Secure SVM Classification for Cloud-Based Remote Clinical Decision Services.
IEEE Trans. Computers, 2021
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems.
Patterns, 2021
Application-Oriented Block Generation for Consortium Blockchain-Based IoT Systems With Dynamic Device Management.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.
IEEE Internet Things J., 2021
Future Gener. Comput. Syst., 2021
IEEE Commun. Stand. Mag., 2021
PPT: A Privacy-Preserving Global Model Training Protocol for Federated Learning in P2P Networks.
CoRR, 2021
Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing.
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the Information Security - 24th International Conference, 2021
An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing.
Proceedings of the ICC 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Wirel. Commun., 2020
Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain.
IEEE Trans. Veh. Technol., 2020
Transparent and Accountable Vehicular Local Advertising With Practical Blockchain Designs.
IEEE Trans. Veh. Technol., 2020
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid.
IEEE Trans. Smart Grid, 2020
Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Proc. IEEE, 2020
iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting.
IEEE J. Sel. Areas Commun., 2020
J. Commun. Inf. Networks, 2020
Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach.
IEEE Internet Things J., 2020
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
IACR Cryptol. ePrint Arch., 2020
IEEE Commun. Stand. Mag., 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
On Dually-Polarized MIMO based NOMA: System Model and Polarization Resource Allocation.
Proceedings of the International Conference on Computing, Networking and Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
2019
IEEE Trans. Veh. Technol., 2019
On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach.
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Smart Grid, 2019
IEEE Trans. Ind. Informatics, 2019
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Netw., 2019
Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service.
CoRR, 2019
CoRR, 2019
CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Against Pilot Spoofing Attack with Double Channel Training in Massive MIMO NOMA Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Towards Secure and Fair IIoT-Enabled Supply Chain Management via Blockchain-Based Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
Springer Briefs in Electrical and Computer Engineering, Springer, ISBN: 978-3-030-02112-2, 2018
Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval.
IEEE Trans. Veh. Technol., 2018
Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018
Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities.
IEEE Netw., 2018
IEEE Netw., 2018
Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT.
IEEE J. Sel. Areas Commun., 2018
Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain.
J. Medical Syst., 2018
Internet Technol. Lett., 2018
Digit. Investig., 2018
IEEE Commun. Stand. Mag., 2018
Securing Fog Computing for Internet of Things Applications: Challenges and Solutions.
IEEE Commun. Surv. Tutorials, 2018
Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Springer, ISBN: 978-3-030-00580-1, 2018
2017
Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017
Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering.
IEEE Trans. Smart Grid, 2017
Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems.
IEEE Trans. Inf. Forensics Secur., 2017
A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing.
IEEE Internet Things J., 2017
IEEE Internet Things J., 2017
IEEE Commun. Mag., 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
An Efficient Compromised Node Revocation Scheme in Fog-Assisted Vehicular Crowdsensing.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
IEEE Trans. Veh. Technol., 2016
Consent-based access control for secure and privacy-preserving health information exchange.
Secur. Commun. Networks, 2016
Pervasive Mob. Comput., 2016
IEEE Netw., 2016
KSII Trans. Internet Inf. Syst., 2016
Comput. Networks, 2016
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE/CIC International Conference on Communications in China, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Efficient and Privacy-Preserving Smart Grid Downlink Communication Using Identity Based Signcryption.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions.
IEEE Wirel. Commun., 2015
IEEE Wirel. Commun., 2015
PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Parallel Distributed Syst., 2015
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes.
IEEE Trans. Inf. Forensics Secur., 2015
User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices.
IEEE Trans. Emerg. Top. Comput., 2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks.
Secur. Commun. Networks, 2015
MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2015
IEEE J. Sel. Top. Signal Process., 2015
Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid.
KSII Trans. Internet Inf. Syst., 2015
Design and Implementation of Real-time Sobel Edge Detection on FPGA for Mobile Device Applications.
Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNets, 2015
Proceedings of the ACM International Workshop on Mobility and MiddleWare Management in HetNets, 2015
TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Efficient e-health data release with consistency guarantee under differential privacy.
Proceedings of the 17th International Conference on E-health Networking, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
IEEE Wirel. Commun., 2014
IEEE Trans. Parallel Distributed Syst., 2014
EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid.
IEEE Trans. Parallel Distributed Syst., 2014
Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation.
IEEE J. Biomed. Health Informatics, 2014
PPNA special issue on "the green, reliability and security of machine-to-machine communications".
Peer-to-Peer Netw. Appl., 2014
Radio Resource Management of CoMP System in HetNet under Power and Backhaul Constraints.
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Statistical analysis of capacity in joint processing coordinated multi-point systems.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Cooperative sensing scheduling in Cognitive Radio Networks with multiple Primary Networks.
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid.
Proceedings of the IEEE Global Communications Conference, 2014
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Springer Briefs in Computer Science, Springer, ISBN: 978-1-4614-8857-6, 2013
Securing m-healthcare social networks: challenges, countermeasures and future directions.
IEEE Wirel. Commun., 2013
On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking.
IEEE Wirel. Commun., 2013
IEEE Trans. Veh. Technol., 2013
IEEE Trans. Smart Grid, 2013
SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency.
IEEE Trans. Parallel Distributed Syst., 2013
IEEE J. Sel. Areas Commun., 2013
A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems.
IEEE Intell. Syst., 2013
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013
Community detection based reference points clustering for indoor localization in WLAN.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Effective epidemic control and source tracing through mobile social sensing over WBANs.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Selectively iterative particle filtering and its applications for target tracking in WSNs.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs.
IEEE Trans. Veh. Technol., 2012
IEEE Trans. Veh. Technol., 2012
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications.
IEEE Trans. Parallel Distributed Syst., 2012
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2012
Secur. Commun. Networks, 2012
Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Netw. Comput. Appl., 2012
HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks.
Comput. Commun., 2012
IEEE Commun. Mag., 2012
Cross entropy based component carrier allocation in LTE-Advanced wireless communication system.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012
PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012
Proceedings of IEEE International Conference on Communications, 2012
Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks.
Proceedings of IEEE International Conference on Communications, 2012
A privacy-preserving proximity friend notification scheme with opportunistic networking.
Proceedings of IEEE International Conference on Communications, 2012
Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
EDR: An efficient demand response scheme for achieving forward secrecy in smart grid.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 11th International Conference, 2012
2011
A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks.
Wirel. Commun. Mob. Comput., 2011
An efficient and provably secure public key encryption scheme based on coding theory.
Secur. Commun. Networks, 2011
Secur. Commun. Networks, 2011
Mob. Networks Appl., 2011
J. Netw. Comput. Appl., 2011
J. Commun. Networks, 2011
PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks.
J. Commun. Networks, 2011
GRS: The green, reliability, and security of emerging machine to machine communications.
IEEE Commun. Mag., 2011
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
EVSE: An Efficient Vehicle Social Evaluation Scheme with Location Privacy Preservation for Vehicular Communications.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Global Communications Conference, 2011
A Routing-Compatible Credit-Based Incentive Scheme for DTNs.
Proceedings of the Delay Tolerant Networks - Protocols and Applications., 2011
2010
MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2010
IEEE Wirel. Commun., 2010
IEEE Trans. Wirel. Commun., 2010
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications.
IEEE Trans. Veh. Technol., 2010
An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications.
IEEE Trans. Veh. Technol., 2010
REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks.
Comput. Networks, 2010
Proceedings of the 72nd IEEE Vehicular Technology Conference, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of IEEE International Conference on Communications, 2010
TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2010
FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road.
Proceedings of the Global Communications Conference, 2010
Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET.
Proceedings of the Global Communications Conference, 2010
Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks.
Proceedings of the Global Communications Conference, 2010
Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
Secure provenance: the essential of bread and butter of data forensics in cloud computing.
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the 2010 conference of the Centre for Advanced Studies on Collaborative Research, 2010
Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network.
Proceedings of the 5th International ICST Conference on Body Area Networks, 2010
2009
PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks.
IEEE Trans. Veh. Technol., 2009
SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks.
IEEE Trans. Veh. Technol., 2009
A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy.
IEEE Trans. Veh. Technol., 2009
Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems.
IEEE J. Sel. Areas Commun., 2009
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
SLAB: A secure localized authentication and billing scheme for wireless mesh networks.
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Wirel. Commun., 2008
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks.
IEEE Trans. Wirel. Commun., 2008
IEEE Trans. Veh. Technol., 2008
Inf. Sci., 2008
Int. J. Secur. Networks, 2008
Int. J. Comput. Math., 2008
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
A model-based semi-quantitative approach for evaluating security of enterprise networks.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008
RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks.
Proceedings of IEEE International Conference on Communications, 2008
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2008
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings.
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
2007
IEEE Trans. Veh. Technol., 2007
TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007
Towards compromise-resilient localized authentication architecture for wireless mesh networks.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Global Communications Conference, 2007
2006
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006
A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
2000
Proceedings of the Information Security, Third International Workshop, 2000