- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Complexity and Algorithms in Graphs
- Cloud Data Security Solutions
- Security in Wireless Sensor Networks
- Advanced Authentication Protocols Security
- Cryptographic Implementations and Security
- Internet Traffic Analysis and Secure E-voting
- Vehicular Ad Hoc Networks (VANETs)
- RNA modifications and cancer
- Advanced Steganography and Watermarking Techniques
- Cryptography and Residue Arithmetic
- Chaos-based Image/Signal Encryption
- IoT and Edge/Fog Computing
- Computer Graphics and Visualization Techniques
- Natural Language Processing Techniques
- Network Security and Intrusion Detection
- Video Surveillance and Tracking Methods
- Oceanographic and Atmospheric Processes
- Anomaly Detection Techniques and Applications
- Software System Performance and Reliability
- Advanced Computational Techniques and Applications
- Advanced Measurement and Detection Methods
- User Authentication and Security Systems
East China University of Science and Technology
2021-2025
Renmin University of China
2015-2024
Guangxi University
2024
Northeast Forestry University
2023-2024
Fudan University
2024
Xi'an Jiaotong University
2024
Ocean University of China
2005-2023
Shanghai University of Electric Power
2023
University of Electronic Science and Technology of China
2023
Tianjin University of Science and Technology
2023
Existing secure and privacy-preserving vehicular communication protocols in ad hoc networks face the challenges of being fast not depending on ideal tamper-proof devices (TPDs) embedded vehicles. To address these challenges, we propose a authentication protocol referred to as distributedaggregate authentication. The proposed is based our new multiple trusted authority one-time identity-based aggregate signature technique. With this technique vehicle can verify many messages simultaneously...
Checking remote data possession is of crucial importance in public cloud storage. It enables the users to check whether their outsourced have been kept intact without downloading original data. The existing checking (RDPC) protocols designed PKI (public key infrastructure) setting. server has validate users' certificates before storing uploaded by order prevent spam. This incurs considerable costs since numerous may frequently upload server. study addresses this problem with a new model...
The connected vehicular ad hoc network (VANET) and cloud computing technology allows entities in VANET to enjoy the advantageous storage services offered by some service provider. However, advantages do not come free, since their combination brings many new security privacy requirements for applications. In this paper, we investigate cloud-based road condition monitoring (RCoM) scenario, where authority needs monitor real-time conditions with help of a server so that it could make sound...
Existing secure and privacy-preserving schemes for vehicular communications in ad hoc networks face some challenges, e.g., reducing the dependence on ideal tamper-proof devices, building efficient member revocation mechanisms avoiding computation communication bottlenecks. To cope with those we propose a highly scheme based identity-based aggregate signatures. Our enables hierarchical aggregation batch verification. The individual signatures generated by different vehicles can be aggregated...
Cloud storage system provides facilitative file and sharing services for distributed clients. To address integrity, controllable outsourcing, origin auditing concerns on outsourced files, we propose an identity-based data outsourcing (IBDO) scheme equipped with desirable features advantageous over existing proposals in securing data. First, our IBDO allows a user to authorize dedicated proxies upload the cloud server her behalf, e.g., company may some employees files company's account...
Handwritten mathematical expression recognition aims to automatically generate LaTeX sequences from given images. Currently, attention-based encoder-decoder models are widely used in this task. They typically target a left-to-right (L2R) manner, leaving the right-to-left (R2L) contexts unexploited. In paper, we propose an Attention aggregation based Bi-directional Mutual learning Network (ABM) which consists of one shared encoder and two parallel inverse decoders (L2R R2L). The enhanced via...
With the continuously increasing application of photovoltaic (PV) panels, how to effectively manage these valuable facilities has become an issue concern. To date, some methods have been developed meet this purpose. However, a satisfactory solution not achieved for managing large-scale solar PV power plants. address issue, new panel condition monitoring and fault diagnosis technique is in paper. The uses U-Net neural network classifier combination intelligently analyse panel's infrared...
Due to the rapid development of demand response management and distributed energy resources, prosumers are becoming more proactive, which also promotes emergence peer-to-peer (P2P) trading mechanisms. However, we find that it is quite difficult simultaneously achieve high computational efficiency, decentralized operations solution optimality in a P2P mechanism, called "P2P trilemma". In this paper, first propose novel negotiation mechanism for can maximize social welfare manner respect...
In vehicle-to-grid (V2G) networks, service providers are battery-powered vehicles, and the consumer is power grid. Security privacy concerns major obstacles for V2G networks to be extensively deployed. 2011, Yang et al. proposed a very interesting privacy-preserving communication precise reward architecture in smart grids. this paper, we enhance al.'s framework with formal definitions of unforgeability restrictiveness. Then, propose new traceable scheme available cryptographic primitives....
Cloud technology has brought great convenience to enterprises as well customers. System logs record notable events and are becoming valuable resources track investigate system status. Detecting anomaly from fast possible can improve the quality of service significantly. Although many machine learning algorithms (e.g., SVM, Logistic Regression) have high detection accuracy, we find that they assume data clean might training time. Facing these challenges, in this paper, propose Robust Online...
Information extraction (IE) can identify a set of relations from free text to support question answering (QA). Until recently, IE systems were domain specific and needed combination manual engineering supervised learning adapt each target domain. A new paradigm, Open IE, operates on large corpora without any tagging relations, indeed prespecified relations. Due its open‐domain open‐relation nature, is purely textual unable relate the surface forms an ontology, if known in advance. We explore...
Modern collaborative and group-oriented applications typically involve communications over open networks. Given the openness of today's networks, among group members must be secure and, at same time, efficient. Group key agreement (GKA) is widely employed for in modern applications. This paper studies problem GKA identity-based cryptosystems with an emphasis on round-efficient, sender-unrestricted, member-dynamic, provably escrow freeness. The resolved by proposing a one-round dynamic...