Zhiguo Wan
Orcid: 0000-0003-1319-1224
According to our database1,
Zhiguo Wan
authored at least 112 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Protecting System Information From False Base Station Attacks: A Blockchain-Based Approach.
IEEE Trans. Wirel. Commun., October, 2024
IEEE Trans. Neural Networks Learn. Syst., September, 2024
EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation.
IEEE Internet Things J., April, 2024
Inf. Fusion, March, 2024
PUL-ABE: An Efficient and Quantum-Resistant CP-ABE With Policy Update in Cloud Storage.
IEEE Trans. Serv. Comput., 2024
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Netw. Sci. Eng., 2024
Division of Regulatory Power: Collaborative Regulation for Privacy-Preserving Blockchains.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption.
IEEE Trans. Dependable Secur. Comput., 2024
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024
IEEE ACM Trans. Audio Speech Lang. Process., 2024
Debiasing Counterfactual Context With Causal Inference for Multi-Turn Dialogue Reasoning.
IEEE ACM Trans. Audio Speech Lang. Process., 2024
IEEE Internet Things J., 2024
IACR Cryptol. ePrint Arch., 2024
OPSA: Efficient and Verifiable One-Pass Secure Aggregation with TEE for Federated Learning.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
CoRR, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Vehicloak: A Blockchain-Enabled Privacy-Preserving Payment Scheme for Location-Based Vehicular Services.
IEEE Trans. Mob. Comput., November, 2023
Design Space Exploration of Galois and Fibonacci Configuration Based on Espresso Stream Cipher.
ACM Trans. Reconfigurable Technol. Syst., September, 2023
Causal Disentanglement: A Generalized Bearing Fault Diagnostic Framework in Continuous Degradation Mode.
IEEE Trans. Neural Networks Learn. Syst., September, 2023
IEEE Trans. Knowl. Data Eng., September, 2023
A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.
ACM Trans. Internet Techn., August, 2023
IEEE Trans. Computers, July, 2023
ACM Trans. Reconfigurable Technol. Syst., June, 2023
IEEE Trans. Netw. Serv. Manag., June, 2023
Password-authenticated proofs of retrievability for multiple devices checking cloud data.
J. Inf. Secur. Appl., June, 2023
Distributed Ledger Technol. Res. Pract., June, 2023
Semi-supervised cross-modal hashing via modality-specific and cross-modal graph convolutional networks.
Pattern Recognit., April, 2023
IEEE Internet Things J., April, 2023
Fine-Grained Online Energy Management of Edge Data Centers Using Per-Core Power Gating and Dynamic Voltage and Frequency Scaling.
IEEE Trans. Sustain. Comput., 2023
zk-AuthFeed: Protecting Data Feed to Smart Contracts With Authenticated Zero Knowledge Proof.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
QoE-Driven Data Communication Framework for Consumer Electronics in Tele-Healthcare System.
IEEE Trans. Consumer Electron., 2023
J. Syst. Archit., 2023
Beyond Words: An Intelligent Human-Machine Dialogue System with Multimodal Generation and Emotional Comprehension.
Int. J. Intell. Syst., 2023
High Dimensional Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers.
CoRR, 2023
An Efficient Autonomous Path Proxy Re-encryption Without Pairing for Cloud-Assisted mHealth.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Lightweight Secure Detection Service for Malicious Attacks in WSN With Timestamp-Based MAC.
IEEE Trans. Netw. Serv. Manag., December, 2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Dependable Secur. Comput., 2022
BlockMaze: An Efficient Privacy-Preserving Account-Model Blockchain Based on zk-SNARKs.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Internet Things J., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Work-in-Progress: Towards a Smaller than Grain Stream Cipher: Optimized FPGA Implementations of Fruit-80.
Proceedings of the International Conference on Compilers, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
A novel distributed Social Internet of Things service recommendation scheme based on LSH forest.
Pers. Ubiquitous Comput., 2021
IEEE Internet Things J., 2021
2020
Pay as You Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Internet Things J., 2020
IACR Cryptol. ePrint Arch., 2020
Open-Pub: A Transparent yet Privacy-Preserving Academic Publication System based on Blockchain.
CoRR, 2020
2019
J. Comput. Sci. Technol., 2019
Proceedings of the IEEE International Conference on Blockchain, 2019
2018
VPSearch: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.
IEEE Netw., 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
A Novel Graph-based Mechanism for Identifying Traffic Vulnerabilities in Smart Home IoT.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2017
BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain.
Proceedings of the Security and Privacy in Communication Networks, 2017
2016
Rebuttal to "Comments on 'Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption"'.
IEEE Trans. Inf. Forensics Secur., 2016
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid.
Comput. Secur., 2016
2015
Control Cloud Data Access Privilege and Anonymity With Fully Anonymous Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
2014
IEEE Trans. Ind. Electron., 2014
J. Comput. Sci. Technol., 2014
From least interference-cost paths to maximum (Concurrent) multiflow in MC-MR wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
2013
A Collusion-Resistant Conditional Access System for Flexible-Pay-Per-Channel Pay-TV Broadcasting.
IEEE Trans. Multim., 2013
Proceedings of the Information Security, 16th International Conference, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Scalable algorithms for wireless link schedulings in multi-channel multi-radio wireless networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
2012
IEEE Trans. Wirel. Commun., 2012
HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2012
AnonyControl: Control Cloud Data Anonymously with Multi-Authority Attribute-Based Encryption
CoRR, 2012
Stability analyses of longest-queue-first link scheduling in MC-MR wireless networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012
Priv-Code: Preserving privacy against traffic analysis through network coding for multihop wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
2011
Hierarchical Attribute-Set Based Encryption for Scalable, Flexible and Fine-Grained Access Control in Cloud Computing.
Proceedings of the Information Security Practice and Experience, 2011
Proceedings of the Global Communications Conference, 2011
2010
Anonymous User Communication for Privacy Protection in Wireless Metropolitan Mesh Networks.
IEEE Trans. Veh. Technol., 2010
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010
Proceedings of the International Conference on Computational Aspects of Social Networks, 2010
2009
<i>n</i> PAKE<sup>+</sup>: A Tree-Based Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
J. Comput. Sci. Technol., 2009
IACR Cryptol. ePrint Arch., 2009
CLEAR: A confidential and Lifetime-Aware Routing Protocol for wireless sensor network.
Proceedings of the IEEE 20th International Symposium on Personal, 2009
Proceedings of the MSN 2009, 2009
2008
A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks.
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008
2007
Comput. Networks, 2007
<i>n</i> PAKE<sup> + </sup>: A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords.
Proceedings of the Information and Communications Security, 9th International Conference, 2007
2006
IEEE Trans. Wirel. Commun., 2006
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006
2005
DoS-resistant access control protocol with identity confidentiality for wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Anonymous DoS-Resistant Access Control Protocol Using Passwords for Wireless Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Providing efficient certification services against active attacks in ad hoc networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
2004
Comput. Networks, 2004
Proceedings of the 29th Annual IEEE Conference on Local Computer Networks (LCN 2004), 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004