Ximeng Liu
Orcid: 0000-0002-4238-3295
According to our database1,
Ximeng Liu
authored at least 477 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
J. Parallel Distributed Comput., 2025
2024
RATE: Privacy-Preserving Task Assignment With Bi-Objective Optimization for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., December, 2024
RTrust: toward robust trust evaluation framework for fake news detection in online social networks.
World Wide Web (WWW), November, 2024
IEEE Trans. Knowl. Data Eng., November, 2024
Peer Peer Netw. Appl., November, 2024
Modular-Based Compression Scheme for Address Data in the Blockchain System for IoV Applications.
IEEE Trans. Veh. Technol., October, 2024
IEEE Trans. Circuits Syst. Video Technol., October, 2024
IEEE Trans. Computers, October, 2024
IEEE Trans. Computers, August, 2024
IEEE Internet Things J., July, 2024
Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement Learning.
IEEE Trans. Mob. Comput., June, 2024
IEEE Trans. Cybern., June, 2024
IEEE Trans. Mob. Comput., May, 2024
IEEE Internet Things J., May, 2024
IEEE Trans. Knowl. Data Eng., April, 2024
Toward Fine-Grained Task Allocation With Bilateral Access Control for Intelligent Transportation Systems.
IEEE Internet Things J., April, 2024
$D^{2}MTS$: Enabling Dependable Data Collection With Multiple Crowdsourcers Trust Sharing in Mobile Crowdsensing.
IEEE Trans. Knowl. Data Eng., March, 2024
Publicly Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services.
IEEE Internet Things J., March, 2024
PAM<sup>3</sup>S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
IEEE/ACM Trans. Netw., February, 2024
Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring.
ACM Trans. Intell. Syst. Technol., February, 2024
IEEE Internet Things J., February, 2024
IEEE Internet Things J., February, 2024
IEEE Comput. Intell. Mag., February, 2024
IEEE Trans. Wirel. Commun., January, 2024
DeepDIST: A Black-Box Anti-Collusion Framework for Secure Distribution of Deep Models.
IEEE Trans. Circuits Syst. Video Technol., January, 2024
Verifiable and privacy-preserving fine-grained data management in vehicular fog computing: A game theory-based approach.
Peer Peer Netw. Appl., January, 2024
A Blockchain-Based Anonymous Attribute-Based Searchable Encryption Scheme for Data Sharing.
IEEE Internet Things J., January, 2024
Lightweight Privacy-Preserving Feature Extraction for EEG Signals Under Edge Computing.
IEEE Internet Things J., January, 2024
VeriRange: A Verifiable Range Query Model on Encrypted Geographic Data for IoT Environment.
IEEE Internet Things J., January, 2024
Privacy-Preserving Joint Data and Function Homomorphic Encryption for Cloud Software Services.
IEEE Internet Things J., January, 2024
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges.
IEEE CAA J. Autom. Sinica, January, 2024
An Authentic and Privacy-Preserving Scheme Towards E-Health Data Transmission Service.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Netw. Sci. Eng., 2024
Data Inspection and Access Control for 5G Edge Computing-Enabled Internet of Medical Things.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
MODEL: A Model Poisoning Defense Framework for Federated Learning via Truth Discovery.
IEEE Trans. Inf. Forensics Secur., 2024
Boosting the Transferability of Adversarial Attacks With Frequency-Aware Perturbation.
IEEE Trans. Inf. Forensics Secur., 2024
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage.
IEEE Trans. Inf. Forensics Secur., 2024
RFed: Robustness-Enhanced Privacy-Preserving Federated Learning Against Poisoning Attack.
IEEE Trans. Inf. Forensics Secur., 2024
SeCoSe: Toward Searchable and Communicable Healthcare Service Seeking in Flexible and Secure EHR Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
Privacy-Enhancing and Robust Backdoor Defense for Federated Learning on Heterogeneous Data.
IEEE Trans. Inf. Forensics Secur., 2024
Lightweight Privacy-Preserving Cross-Cluster Federated Learning With Heterogeneous Data.
IEEE Trans. Inf. Forensics Secur., 2024
Boosting Accuracy of Differentially Private Continuous Data Release for Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2024
T-Trace: Constructing the APTs Provenance Graphs Through Multiple Syslogs Correlation.
IEEE Trans. Dependable Secur. Comput., 2024
A Federated Learning Framework Based on Differentially Private Continuous Data Release.
IEEE Trans. Dependable Secur. Comput., 2024
Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees.
IEEE Trans. Dependable Secur. Comput., 2024
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Effectiveness of machine learning at modeling the relationship between Hi-C data and copy number variation.
Quant. Biol., 2024
Knowl. Based Syst., 2024
Paired 2-disjoint path covers of k-ary n-cubes under the partitioned edge fault model.
J. Parallel Distributed Comput., 2024
Inf. Process. Manag., 2024
CoRR, 2024
Detecting and Measuring Security Implications of Entangled Domain Verification in CDN.
CoRR, 2024
CoRR, 2024
CoRR, 2024
Towards Trustworthy Unsupervised Domain Adaptation: A Representation Learning Perspective for Enhancing Robustness, Discrimination, and Generalization.
CoRR, 2024
CoRR, 2024
LPulse: An efficient algorithm for service function chain placement and routing with delay guarantee.
Comput. Networks, 2024
Sci. China Inf. Sci., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Break the Wall from Bottom: Automated Discovery of Protocol-Level Evasion Vulnerabilities in Web Application Firewalls.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the ACM SIGCOMM 2024 Conference, 2024
Towards Adversarial-Robust Class-Incremental Learning via Progressively Volume-Up Perturbation Generation.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
Proceedings of the International Conference on Networking and Network Applications, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Achieving Privacy-Preserving and Scalable Graph Neural Network Prediction in Cloud Environments.
Proceedings of the IEEE International Conference on Communications, 2024
MEAT: Median-Ensemble Adversarial Training for Improving Robustness and Generalization.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Generating Transferable Adversarial Examples From the Perspective of Ensemble and Distribution.
Proceedings of the 2024 3rd International Conference on Cyber Security, 2024
2023
IEEE Trans. Reliab., December, 2023
Learning Distinct Relationship in Package Recommendation With Graph Attention Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023
A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks.
J. King Saud Univ. Comput. Inf. Sci., December, 2023
Future Gener. Comput. Syst., December, 2023
Finite Fields Their Appl., December, 2023
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023
Owner-free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries.
ACM Trans. Storage, November, 2023
IEEE Trans. Mob. Comput., November, 2023
IEEE Trans. Cybern., November, 2023
Theor. Comput. Sci., November, 2023
Embedding Hamiltonian Paths in $k$-Ary $n$-Cubes With Exponentially-Many Faulty Edges.
IEEE Trans. Computers, November, 2023
IEEE Trans. Computers, November, 2023
Differentially Private Recurrent Variational Autoencoder For Text Privacy Preservation.
Mob. Networks Appl., October, 2023
NAH: neighbor-aware attention-based heterogeneous relation network model in E-commerce recommendation.
World Wide Web (WWW), September, 2023
IEEE Trans. Mob. Comput., August, 2023
ACM Trans. Intell. Syst. Technol., August, 2023
Comput. Stand. Interfaces, August, 2023
Privacy-Preserving Ranked Spatial Keyword Query in Mobile Cloud-Assisted Fog Computing.
IEEE Trans. Mob. Comput., June, 2023
IEEE Trans. Knowl. Data Eng., June, 2023
FedECG: A federated semi-supervised learning framework for electrocardiogram abnormalities prediction.
J. King Saud Univ. Comput. Inf. Sci., June, 2023
Inf. Sci., June, 2023
IEEE Trans. Knowl. Data Eng., May, 2023
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023
A Scalable and Auditable Secure Data Sharing Scheme With Traceability for Fog-Based Smart Logistics.
IEEE Internet Things J., May, 2023
CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., March, 2023
Privacy-preserving association rule mining via multi-key fully homomorphic encryption.
J. King Saud Univ. Comput. Inf. Sci., February, 2023
Reliability Evaluation of Clustered Faults for Regular Networks Under the Probabilistic Diagnosis Model.
Comput. J., February, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks.
IEEE Trans. Serv. Comput., 2023
Privacy-Preserving Object Detection With Poisoning Recognition for Autonomous Vehicles.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
IEEE Trans. Inf. Forensics Secur., 2023
A Web Back-End Database Leakage Incident Reconstruction Framework Over Unlabeled Logs.
IEEE Trans. Emerg. Top. Comput., 2023
Efficient Vertical Federated Learning Method for Ridge Regression of Large-Scale Samples.
IEEE Trans. Emerg. Top. Comput., 2023
Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
Sensors, 2023
IEEE Internet Things J., 2023
IEEE Internet Things J., 2023
A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
IEEE Internet Things J., 2023
Defed: An Edge-Feature-Enhanced Image Denoised Network Against Adversarial Attacks for Secure Internet of Things.
IEEE Internet Things J., 2023
Further results on several classes of optimal ternary cyclic codes with minimum distance four.
IACR Cryptol. ePrint Arch., 2023
The <i>c</i>-differential uniformity and boomerang uniformity of three classes of permutation polynomials over F2n.
Finite Fields Their Appl., 2023
A fully decentralized auditing approach for edge computing: A Game-Theoretic Perspective.
CoRR, 2023
CoRR, 2023
Concurr. Comput. Pract. Exp., 2023
A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare.
IEEE Access, 2023
Q-TrHDRI: A Qurey-Based Transformer for High Dynamic Range Imaging with Dynamic Scenes.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Achieving Privacy-preserving and Lightweight Truth Discovery in Mobile Crowdsensing (Extended abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Euro-Par 2023: Parallel Processing - 29th International Conference on Parallel and Distributed Computing, Limassol, Cyprus, August 28, 2023
Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security.
Proceedings of the IEEE Intl Conf on Dependable, 2023
New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security.
Proceedings of the IEEE Intl Conf on Dependable, 2023
Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Artificial Intelligence Security and Privacy, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Mob. Networks Appl., December, 2022
A Reputation-Based Leader Election Scheme for Opportunistic Autonomous Vehicle Platoon.
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Serv. Comput., 2022
Reliable Policy Updating Under Efficient Policy Hidden Fine-Grained Access Control Framework for Cloud Data Sharing.
IEEE Trans. Serv. Comput., 2022
Privacy-Preserving Diverse Keyword Search and Online Pre-Diagnosis in Cloud Computing.
IEEE Trans. Serv. Comput., 2022
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Completely Independent Spanning Trees on BCCC Data Center Networks With an Application to Fault-Tolerant Routing.
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Knowl. Data Eng., 2022
PrivacySignal: Privacy-Preserving Traffic Signal Control for Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022
ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs.
IEEE Trans. Intell. Transp. Syst., 2022
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient Blockchain-Based Hierarchical Data Sharing for Healthcare Internet of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Ind. Informatics, 2022
Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
Guest Editorial: 5G-Enabled Intelligent Application for Distributed Industrial Internet-of-Thing System.
IEEE Trans. Ind. Informatics, 2022
FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Enabling Efficient and Strong Privacy-Preserving Truth Discovery in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
RevFRF: Enabling Cross-Domain Random Forest Training With Revocable Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2022
Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks.
IEEE Trans. Dependable Secur. Comput., 2022
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022
VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2022
Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
SecureAD: A Secure Video Anomaly Detection Framework on Convolutional Neural Network in Edge Computing Environment.
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph.
IEEE Trans. Big Data, 2022
Lightweight verifiable data management system for cloud-assisted wireless body area networks.
Peer-to-Peer Netw. Appl., 2022
Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022
Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things.
J. Inf. Secur. Appl., 2022
Revocable and Privacy-Preserving Decentralized Data Sharing Framework for Fog-Assisted Internet of Things.
IEEE Internet Things J., 2022
Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles.
IEEE Internet Things J., 2022
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Int. J. Intell. Syst., 2022
Front Cover: International Journal of Intelligent Systems, Volume 37 Issue 11 November 2022.
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
A Network Attack Risk Control Framework for Large-Scale Network Topology Driven by Node Importance Assessment.
Int. J. Grid High Perform. Comput., 2022
The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2022
Return just your search: privacy-preserving homoglyph search for arbitrary languages.
Frontiers Comput. Sci., 2022
CoRR, 2022
CoRR, 2022
CoRR, 2022
Evolution as a Service: A Privacy-Preserving Genetic Algorithm for Combinatorial Optimization.
CoRR, 2022
Malware detection method based on image analysis and generative adversarial networks.
Concurr. Comput. Pract. Exp., 2022
Auto-scalable and fault-tolerant load balancing mechanism for cloud computing based on the proof-of-work election.
Sci. China Inf. Sci., 2022
Appl. Algebra Eng. Commun. Comput., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Provable and Practical Security, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the Trustworthy Federated Learning - First International Workshop, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Combating False Sense of Security: Breaking the Defense of Adversarial Training Via Non-Gradient Adversarial Attack.
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
Proceedings of the Database Systems for Advanced Applications, 2022
Research on Information Coordination Mechanism of Multi-participants in Community-based Elderly Care by Blockchain.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Trans. Veh. Technol., 2021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Parallel Distributed Syst., 2021
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Mob. Comput., 2021
PACE: Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Ind. Informatics, 2021
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees.
IEEE Trans. Inf. Forensics Secur., 2021
Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Proxy-Free Privacy-Preserving Task Matching with Efficient Revocation in Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
A Lightweight Privacy-Preserving CNN Feature Extraction Framework for Mobile Sensing.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
The component connectivity, component diagnosability, and <i>t</i>/<i>k</i>-diagnosability of Bicube networks.
Theor. Comput. Sci., 2021
A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
IEEE Syst. J., 2021
Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage.
Secur. Commun. Networks, 2021
Reliability Evaluation of Generalized Exchanged Hypercubes Based on Imprecise Diagnosis Strategies.
Parallel Process. Lett., 2021
A Fine-Grained Attribute Based Data Retrieval with Proxy Re-Encryption Scheme for Data Outsourcing Systems.
Mob. Networks Appl., 2021
Inf. Sci., 2021
Inf. Sci., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Trans. Emerg. Telecommun. Technol., 2021
Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness.
CoRR, 2021
Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid.
CoRR, 2021
When Crowdsensing Meets Federated Learning: Privacy-Preserving Mobile Crowdsensing System.
CoRR, 2021
Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge.
Proceedings of the 20th IEEE International Conference on Trust, 2021
An Efficient Adaptive Fault Diagnosis Algorithm for Highly Scalable Data Center Networks.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2021
The Rg-conditional connectivity and diagnosablility of generalized exchanged X-cubes.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the Pattern Recognition and Computer Vision - 4th Chinese Conference, 2021
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
MEDASec: Logic Encryption Scheme for Micro-electrode-dot-array Biochips IP Protection.
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Federated Multi-label Propagation Based on Neighbor Node Influence for Community Detection on Attributed Networks.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2021
Federated Clique Percolation for Overlapping Community Detection on Attributed Networks.
Proceedings of the Computer Supported Cooperative Work and Social Computing, 2021
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
Privacy-Preserving Compressive Sensing for Real-Time Traffic Monitoring in Urban City.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Ind. Informatics, 2020
EmIr-Auth: Eye Movement and Iris-Based Portable Remote Authentication for Smart Grid.
IEEE Trans. Ind. Informatics, 2020
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Theor. Comput. Sci., 2020
IEEE Trans. Cloud Comput., 2020
Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
IEEE Trans. Cloud Comput., 2020
Sensors, 2020
Multim. Tools Appl., 2020
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020
PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries.
Inf. Sci., 2020
Inf. Sci., 2020
Inf. Sci., 2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020
Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020
CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud.
Inf. Sci., 2020
Attribute-based fine-grained access control for outscored private set intersection computation.
Inf. Sci., 2020
IronM: Privacy-Preserving Reliability Estimation of Heterogeneous Data for Mobile Crowdsensing.
IEEE Internet Things J., 2020
LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis.
Future Gener. Comput. Syst., 2020
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020
Cybersecur., 2020
CoRR, 2020
Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning.
CoRR, 2020
Sci. China Inf. Sci., 2020
A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud.
IEEE Access, 2020
Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things.
IEEE Access, 2020
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the 2020 IFIP Networking Conference, 2020
PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the 21st International Symposium on Quality Electronic Design, 2020
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
HTcatcher: Finite State Machine and Feature Verifcation for Large-scale Neuromorphic Computing Systems.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020
FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability.
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Serv. Comput., 2019
Hybrid Keyword-Field Search With Efficient Key Management for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019
Inf. Sci., 2019
Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system.
Inf. Sci., 2019
PLCOM: Privacy-preserving outsourcing computation of Legendre circularly orthogonal moment over encrypted image data.
Inf. Sci., 2019
Inf. Sci., 2019
SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments.
Inf. Sci., 2019
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019
SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019
Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019
CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query.
IEEE Internet Things J., 2019
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System.
IEEE Internet Things J., 2019
A secure IoT cloud storage system with fine-grained access control and decryption key exposure resistance.
Future Gener. Comput. Syst., 2019
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing.
CoRR, 2019
Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing.
CoRR, 2019
Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted Cloud With Fair Payment.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Search in My Way: Practical Outsourced Image Retrieval Framework Supporting Unshared Key.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Dependable Secur. Comput., 2018
Secur. Commun. Networks, 2018
Peer-to-Peer Netw. Appl., 2018
Peer-to-Peer Netw. Appl., 2018
VMKDO: Verifiable multi-keyword search over encrypted cloud data for dynamic data-owner.
Peer-to-Peer Netw. Appl., 2018
J. Netw. Comput. Appl., 2018
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018
Inf. Sci., 2018
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system.
Future Gener. Comput. Syst., 2018
Sci. China Inf. Sci., 2018
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability.
Sci. China Inf. Sci., 2018
An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing.
IEEE Access, 2018
IEEE Access, 2018
Consortium Blockchain-Based SIFT: Outsourcing Encrypted Feature Extraction in the D2D Network.
IEEE Access, 2018
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the Provable Security, 2018
Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Serv. Comput., 2017
VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017
Provably secure attribute based signcryption with delegated computation and efficient key updating.
KSII Trans. Internet Inf. Syst., 2017
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017
Sci. China Inf. Sci., 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification.
IEEE J. Biomed. Health Informatics, 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains.
IEEE Trans. Computers, 2016
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016
m2-ABKS: Attribute-Based Multi-Keyword Search over Encrypted Personal Health Records in Multi-Owner Setting.
J. Medical Syst., 2016
A key-insulated CP-ABE with key exposure accountability for secure data sharing in the cloud.
KSII Trans. Internet Inf. Syst., 2016
PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
Int. J. Embed. Syst., 2016
Future Gener. Comput. Syst., 2016
Secure, efficient and revocable multi-authority access control system in cloud storage.
Comput. Secur., 2016
2015
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption.
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
Peer-to-Peer Netw. Appl., 2015
Mob. Inf. Syst., 2015
2014
IEEE Trans. Cloud Comput., 2014
KSII Trans. Internet Inf. Syst., 2014
Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
Int. J. Netw. Secur., 2014
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
Int. J. Grid Util. Comput., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013