Qingfeng Cheng

ORCID: 0000-0001-6149-4807
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Authentication Protocols Security
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • Security in Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Biometric Identification and Security
  • Privacy-Preserving Technologies in Data
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Residue Arithmetic
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Complexity and Algorithms in Graphs
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Wireless Body Area Networks
  • Spam and Phishing Detection
  • Smart Grid Security and Resilience
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • RFID technology advancements
  • Coding theory and cryptography
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Malware Detection Techniques

PLA Information Engineering University
2009-2025

Zhengzhou University of Science and Technology
2018-2022

Xidian University
2016-2021

State Key Laboratory of Cryptology
2016-2020

Wuhan Engineering Science & Technology Institute
2018

Institute of Software
2014

Chinese Academy of Sciences
2014

Zhejiang Science and Technology Information Institute
2008-2011

Luoyang Institute of Science and Technology
2010

Mobile edge computing (MEC) provides and data storage capabilities within the range of wireless access network close to users, which is driving need for new type security technologies. Faced with rapid traffic growth increasing user experience requirements, existing schemes can no longer meet requirements real time lightweight. New solutions that do not require complex calculations, such as identity-based cryptography, attract great attention from researchers. To these demands, we design a...

10.1109/jsyst.2020.2979006 article EN IEEE Systems Journal 2020-03-19

As a new computing paradigm, edge has appeared in the public field of vision recently. Owing to its advantages low delay and fast response, become an important assistant cloud brought opportunities for diverse smart applications like grid, home, transportation. However, accompanying security issues, which have always been focus users' concern, still cannot be ignored. Therefore, we on issues this overview. We first introduce some related definitions present architecture computing-based...

10.1109/jiot.2020.3019297 article EN IEEE Internet of Things Journal 2020-08-25

Summary Wearable devices, which provide the services of collecting personal data, monitoring health conditions, and so on, are widely used in many fields, ranging from sports to healthcare. Although wearable devices bring convenience people's lives, they about significant security concerns, such as privacy disclosure unauthorized access devices. To ensure sensitive it is critical design an efficient authentication protocol suitable for Recently, Das et al proposed a lightweight protocol,...

10.1002/dac.3900 article EN International Journal of Communication Systems 2018-12-27

Internet of Things provides complicated value-added services to mobile intelligent terminal users. Different sensors collect various data from the users and transmit for storage. Consequently, a great amount personal sensitive information related these rich colorful applications is stored in terminal. Mobile terminals have become prominent target network attackers. Security breach privacy leakage severely thread application development Things. We present privacy-preserving implicit...

10.1109/jiot.2020.3031486 article EN IEEE Internet of Things Journal 2020-10-15

In this work, we give a lattice attack on the ECDSA implementation in latest version of OpenSSL, which implement scalar multiplication by windowed Non-Adjacent Form method. We propose totally different but more efficient method extracting and utilizing information from side-channel results, remarkably improving previous attacks. First, develop new method, can extract almost all obtaining 105.8 bits per signature average for 256-bit ECDSA. Then order to make utmost our extracted information,...

10.1145/2976749.2978400 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

Summary The number of malware has exploded due to the openness Android platform, and endless stream poses a threat privacy, tariffs, device mobile phone users. A novel detection system is proposed, which employs an optimized deep convolutional neural network learn from opcode sequences. trained multiple times by raw sequences extracted decompiled file, so that feature information can be effectively learned malicious program detected more accurately. More critically, k ‐max pooling method...

10.1002/cpe.5308 article EN Concurrency and Computation Practice and Experience 2019-05-09

With the global promotion and application of 5G technology, data transmitted on network show explosive growth, secure sharing its important is still one research hotspots. Steganography embeds that needs to be shared into digital carrier files transmits it through open channels, which has applications in protecting realizing covert communication. However, encrypted generated by traditional steganography are susceptible compression, cropping, geometric attacks, man-made destruction process...

10.1109/tii.2021.3100480 article EN IEEE Transactions on Industrial Informatics 2021-07-27

Covert communication is a crucial technology that hides information in the redundant structure of file and transmission through public channel to achieve secure delivery information. The blockchain network, with characteristics anonymity, decentralization tamper-proofing, can make up for shortcomings multimedia-based covert communication, which include easy exposure identity both parties, vulnerability destruction during weak robustness channel. Therefore, network an ideal communication....

10.1109/tdsc.2024.3353570 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-12

With the development of communication 5G networks and technologies, spectrum resources are increasingly scarce. The scarcity resource makes market-driven auction become an important means allocation, due to complexity network environment, security auctions can not be ignored. Most existing secure schemes introduce a semi-honest agent complete auction. However, hypothetical model does guarantee in actual application scenario, which may lead potential threats: reveal privacy bidders, or...

10.1016/j.dcan.2020.06.004 article EN cc-by-nc-nd Digital Communications and Networks 2020-07-10

As an extension of cloud computing, edge computing has attracted the attention academia and industry because its characteristics low latency, high bandwidth, energy consumption. However, due to limited terminal resources insufficient security design, environment still faces many challenges in terms data privacy protection. Among them, how effectively control access outsourced is one main issues. In this article, we propose a lightweight verifiable ciphertext-policy attribute-based encryption...

10.1109/jiot.2022.3165576 article EN IEEE Internet of Things Journal 2022-04-07

Real-time and high-efficient communication becomes a vital property for IoT-enabled equipment, since the application range of Internet Things has extended widely. At same time, centralized characterization cloud computing is gradually unable to meet demand both low latency high efficiency. To resolve these issues, new paradigms have been introduced, such as edge, dew, fog computing. Recently, Saurabh et al. introduced mutual authentication protocol, which was claimed resist various attacks...

10.1155/2022/7125491 article EN cc-by Security and Communication Networks 2022-06-15

Summary IP geolocation is usually used in fog computing to avoid high latency and discriminate malicious requests by judging the location of users. Existing delay measurement‐based approaches are not applicable network that has hierarchical topology weak connectivity, precision classical Street‐Level Geolocation (SLG) method will decrease dramatically when common routers anonymous. In this paper, an based on identification local distribution similarity proposed. The target IP's at city‐level...

10.1002/cpe.4722 article EN cc-by Concurrency and Computation Practice and Experience 2018-07-27

Internet of Things brings convenience to the social life, at same time, putting forward higher requirements for security data transmission and storage. Security incidents based on industrial have occurred frequently recently, which should be given full consideration. The identity-based authenticated key agreement protocol can solve these threats a certain extent. Recently, lightweight Industrial Things, called ID-2PAKA protocol, was claimed achieve secure authentication meet properties. In...

10.1155/2021/5573886 article EN cc-by Security and Communication Networks 2021-02-27

With the rapid development of Internet, it has become a hot spot in protecting important information from illegal theft and destruction during network transmission. The characteristics strong robustness, anonymity distributed transmission blockchain technology can precisely make up for disadvantages faced by traditional covert communication transmitting data, such as poor easy exposure participants difficulty achieving group Therefore, steganography method digital currency based on is...

10.1109/tnse.2022.3196816 article EN IEEE Transactions on Network Science and Engineering 2022-08-05

Vehicular technology has been violently developing recently, and triggers wide discussion. The Internet of Vehicles (IoV), as an important application vehicular technology, is emerging research intention. While the decentralization high efficiency are in line with needs IoV, dependable information transmission asks for a new kind cryptography urgently. Despite fact that slew related researches designed, schemes may be vulnerable to privacy leakage, identity tracing, computation overheads so...

10.1109/tvt.2023.3334034 article EN IEEE Transactions on Vehicular Technology 2023-11-17
Coming Soon ...