Zhiguo Wan

Orcid: 0000-0003-1319-1224

According to our database1, Zhiguo Wan authored at least 113 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Protecting System Information From False Base Station Attacks: A Blockchain-Based Approach.
IEEE Trans. Wirel. Commun., October, 2024

Efficient and Effective One-Step Multiview Clustering.
IEEE Trans. Neural Networks Learn. Syst., September, 2024

EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation.
IEEE Internet Things J., April, 2024

Virtual lighting environment and real human fusion based on multiview videos.
Inf. Fusion, March, 2024

PUL-ABE: An Efficient and Quantum-Resistant CP-ABE With Policy Update in Cloud Storage.
IEEE Trans. Serv. Comput., 2024

Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024

Secure and Efficient Federated Learning Through Layering and Sharding Blockchain.
IEEE Trans. Netw. Sci. Eng., 2024

Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024

Outsourced Privately Verifiable Proofs of Retrievability via Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024

SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2024

Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024

FluGCF: A Fluent Dialogue Generation Model With Coherent Concept Entity Flow.
IEEE ACM Trans. Audio Speech Lang. Process., 2024

Debiasing Counterfactual Context With Causal Inference for Multi-Turn Dialogue Reasoning.
IEEE ACM Trans. Audio Speech Lang. Process., 2024

Knowledge graph confidence-aware embedding for recommendation.
Neural Networks, 2024

Blockchain-Assisted Cross-Domain Data Sharing in Industrial IoT.
IEEE Internet Things J., 2024

SuperFL: Privacy-Preserving Federated Learning with Efficiency and Robustness.
IACR Cryptol. ePrint Arch., 2024

OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning.
IACR Cryptol. ePrint Arch., 2024

A Succinct Range Proof for Polynomial-based Vector Commitment.
IACR Cryptol. ePrint Arch., 2024

CVLUE: A New Benchmark Dataset for Chinese Vision-Language Understanding Evaluation.
CoRR, 2024

Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

A Huber Loss Minimization Approach to Byzantine Robust Federated Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Robust Nonparametric Regression under Poisoning Attack.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services.
IEEE Trans. Mob. Comput., November, 2023

Mutual structure learning for multiple kernel clustering.
Inf. Sci., November, 2023

Design Space Exploration of Galois and Fibonacci Configuration Based on Espresso Stream Cipher.
ACM Trans. Reconfigurable Technol. Syst., September, 2023

Causal Disentanglement: A Generalized Bearing Fault Diagnostic Framework in Continuous Degradation Mode.
IEEE Trans. Neural Networks Learn. Syst., September, 2023

Towards Hard Few-Shot Relation Classification.
IEEE Trans. Knowl. Data Eng., September, 2023

A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.
ACM Trans. Internet Techn., August, 2023

Optimal Rack-Coordinated Updates in Erasure-Coded Data Centers: Design and Analysis.
IEEE Trans. Computers, July, 2023

Hardware Optimizations of Fruit-80 Stream Cipher: Smaller than Grain.
ACM Trans. Reconfigurable Technol. Syst., June, 2023

An End-Host-Importance-Aware Secure Service-Enabled Hybrid SDN Deployment.
IEEE Trans. Netw. Serv. Manag., June, 2023

Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023

A Survey on Cross-chain Technologies.
Distributed Ledger Technol. Res. Pract., June, 2023

Semi-supervised cross-modal hashing via modality-specific and cross-modal graph convolutional networks.
Pattern Recognit., April, 2023

A Survey on Blockchain-Based Trust Management for Internet of Things.
IEEE Internet Things J., April, 2023

Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling.
IEEE Trans. Sustain. Comput., 2023

zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof.
IEEE Trans. Dependable Secur. Comput., 2023

HIBEChain: A Hierarchical Identity-Based Blockchain System for Large-Scale IoT.
IEEE Trans. Dependable Secur. Comput., 2023

ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing.
IEEE Trans. Dependable Secur. Comput., 2023

HyperMaze: Towards Privacy-Preserving and Scalable Permissioned Blockchain.
IEEE Trans. Dependable Secur. Comput., 2023

QoE-Driven Data Communication Framework for Consumer Electronics in Tele-Healthcare System.
IEEE Trans. Consumer Electron., 2023

A survey on privacy preservation techniques for blockchain interoperability.
J. Syst. Archit., 2023

Beyond Words: An Intelligent Human-Machine Dialogue System with Multimodal Generation and Emotional Comprehension.
Int. J. Intell. Syst., 2023

High Dimensional Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers.
CoRR, 2023

An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealth.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Multi-Level Confidence Learning for Trustworthy Multimodal Classification.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC.
IEEE Trans. Netw. Serv. Manag., December, 2022

SmartVM: A Smart Contract Virtual Machine for Fast On-Chain DNN Computations.
IEEE Trans. Parallel Distributed Syst., 2022

A Scalable Two-Layer Blockchain System for Distributed Multicloud Storage in IIoT.
IEEE Trans. Ind. Informatics, 2022

Decentralized Privacy-Preserving Fair Exchange Scheme for V2G Based on Blockchain.
IEEE Trans. Dependable Secur. Comput., 2022

BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs.
IEEE Trans. Dependable Secur. Comput., 2022

DLBN: Group Storage Mechanism Based on Double-Layer Blockchain Network.
IEEE Internet Things J., 2022

Intelligent Computing: The Latest Advances, Challenges and Future.
CoRR, 2022

An Efficient and Secure Scheme of Verifiable Computation for Intel SGX.
Proceedings of the IEEE International Conference on Trust, 2022

Work-in-Progress: Towards a Smaller than Grain Stream Cipher: Optimized FPGA Implementations of Fruit-80.
Proceedings of the International Conference on Compilers, 2022

2021
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting.
IEEE Trans. Inf. Forensics Secur., 2021

A novel distributed Social Internet of Things service recommendation scheme based on LSH forest.
Pers. Ubiquitous Comput., 2021

Scalable Decentralized Privacy-Preserving Usage-Based Insurance for Vehicles.
IEEE Internet Things J., 2021

When Blockchain Meets Smart Grids: A Comprehensive Survey.
CoRR, 2021

Memory Regulation and Alignment toward Generalizer RGB-Infrared Person.
CoRR, 2021

2020
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT.
IEEE Internet Things J., 2020

ContactChaser: A Simple yet Effective Contact Tracing Scheme with Strong Privacy.
IACR Cryptol. ePrint Arch., 2020

Open-Pub: A Transparent yet Privacy-Preserving Academic Publication System based on Blockchain.
CoRR, 2020

2019
MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains.
J. Comput. Sci. Technol., 2019

zk-AuthFeed: How to Feed Authenticated Data into Smart Contract with Zero Knowledge.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2018

A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018

PRIDE: A Private and Decentralized Usage-Based Insurance Using Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Secure Fair and Efficient Data Trading Without Third Party Using Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017

BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'.
IEEE Trans. Inf. Forensics Secur., 2016

PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.
Comput. Secur., 2016

2015
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015

Electronic Contract Signing Without Using Trusted Third Party.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
SKM: Scalable Key Management for Advanced Metering Infrastructure in Smart Grids.
IEEE Trans. Ind. Electron., 2014

Maximizing Networking Capacity in Multi-Channel Multi-Radio Wireless Networks.
J. Comput. Sci. Technol., 2014

From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting.
IEEE Trans. Multim., 2013

Achieving Revocable Fine-Grained Cryptographic Access Control over Cloud Data.
Proceedings of the Information Security, 16th International Conference, 2013

Mutual privacy-preserving regression modeling in participatory sensing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Stability analyses of static greedy link schedulings in MC-MR wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Scalable algorithms for wireless link schedulings in multi-channel multi-radio wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Privacy preserving cloud data access with multi-authorities.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2012

HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2012

AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption
CoRR, 2012

Stability analyses of longest-queue-first link scheduling in MC-MR wireless networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing.
Proceedings of the Information Security Practice and Experience, 2011

De-Anonymizing Dynamic Social Networks.
Proceedings of the Global Communications Conference, 2011

2010
Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.
IEEE Trans. Veh. Technol., 2010

Assure High Quality Code Using Refactoring and Obfuscation Techniques.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

A Brief Survey on De-anonymization Attacks in Online Social Networks.
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010

2009
<i>n</i> PAKE<sup>+</sup>: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009

Privacy-aware Attribute-based Encryption with User Accountability.
IACR Cryptol. ePrint Arch., 2009

CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks.
Proceedings of the MSN 2009, 2009

2008
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

2007
Access control protocols with two-layer architecture for wireless networks.
Comput. Networks, 2007

<i>n</i> PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
Security analysis on a conference scheme for mobile communications.
IEEE Trans. Wirel. Commun., 2006

Efficient key tree construction for group key agreement in ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

2005
DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
Highly reliable trust establishment scheme in ad hoc networks.
Comput. Networks, 2004

Anonymous Secure Routing in Mobile Ad-Hoc Networks.
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004

Cryptanalysis of Two Password-Authenticated Key Exchange Protocols.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004


  Loading...