- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Complexity and Algorithms in Graphs
- Cloud Data Security Solutions
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Data Management and Algorithms
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Cryptography and Residue Arithmetic
- Advanced Authentication Protocols Security
- Cryptographic Implementations and Security
- Mobile Crowdsensing and Crowdsourcing
- Vehicular Ad Hoc Networks (VANETs)
- graph theory and CDMA systems
- Human Mobility and Location-Based Analysis
- Security in Wireless Sensor Networks
- Network Security and Intrusion Detection
- Advanced Steganography and Watermarking Techniques
- User Authentication and Security Systems
- IoT and Edge/Fog Computing
- Caching and Content Delivery
- Geometric and Algebraic Topology
- Cooperative Communication and Network Coding
- IPv6, Mobility, Handover, Networks, Security
Zhejiang Gongshang University
2015-2024
Zhejiang University
2013-2023
Institute of Information Engineering
2023
Chinese Academy of Sciences
2023
Commercial Aircraft Corporation of China (China)
2021
University of New Brunswick
2018-2020
Commonwealth Scientific and Industrial Research Organisation
2019
Beijing University of Posts and Telecommunications
2014
Shanghai Jiao Tong University
2004-2010
Pennsylvania State University
2009-2010
Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, many research efforts have been directed to big data processing due its high volume, velocity, variety (referred as "3V") challenges. However, in addition the 3V challenges, flourishing of also hinges on fully understanding managing newly arising security privacy If are not authentic, mined will be unconvincing; while if is well addressed, people may...
Vehicular ad hoc networks (VANETs) have recently received significant attention in improving traffic safety and efficiency. However, communication trust user privacy still present practical concerns to the deployment of VANETs, as many existing authentication protocols for VANETs either suffer from heavy workload downloading latest revocation list a remote authority or cannot allow drivers on road decide trustworthiness message when messages is anonymous. In this paper, cope with these...
The fast development of intelligent transportation has paved the way for innovative techniques highways, and an entirely new driving pattern highway vehicular platooning might offer a solution to persistent problem road congestion, travel comfort, safety. In this system, platoon head vehicle provides service its user vehicles. However, some badly behaved vehicles may put in danger, which makes it crucial distinguish avoid them. paper, we propose reliable trust-based recommendation scheme, is...
Association rule mining and frequent itemset are two popular widely studied data analysis techniques for a range of applications. In this paper, we focus on privacy-preserving vertically partitioned databases. such scenario, owners wish to learn the association rules or itemsets from collective set disclose as little information about their (sensitive) raw possible other third parties. To ensure privacy, design an efficient homomorphic encryption scheme secure comparison scheme. We then...
Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently. Although many surveys have recently been dedicated to security and privacy issues blockchains, there still lacks systematic examination on cryptographic primitives in blockchains. To this end, we paper conduct study blockchains by comprehensive analysis top-30 mainstream cryptocurrencies, terms usages, functionalities, evolutions these primitives. We hope that it would be helpful for cryptographers...
Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional (public key or identity cryptosystem) to attribute counterpart, and thus empower users with delegating capability in access control environment. Users, identified by attributes, could freely designate who can re-encrypt ciphertext related certain policy another one different policy. The proposed proved selective-structure chosen plaintext secure master without random oracles....
Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach improving quality of healthcare service while lowering cost. Unfortunately, it also poses serious risk on both clients' privacy intellectual property monitoring providers, could deter wide adoption mHealth technology. This paper is address this important problem design...
In this paper, we propose a fine-grained privacy-preserving location-based service (LBS) framework, called FINE, for mobile devices. It adopts the data-as-a-service (DaaS) model, where LBS provider publishes its data to third party (e.g., cloud server) who executes users' queries. The proposed FINE framework employs ciphertext-policy anonymous attribute-based encryption technique achieve access control, location privacy, confidentiality of and policy, accurate query result while without...
Cloud computing is now a popular paradigm that can provide end users access to configurable resources on any device, from anywhere, at time. During the past years, cloud has been developed dramatically. However, with development of Internet Things, disadvantages (such as high latency) are gradually revealed due long distance between and users. Fog proposed solve this problem by extending edge network. In particular, fog introduces an intermediate layer called designed process communication...
In order to protect the privacy of individual data, meantime guaranteeing utility big preserving data aggregation is widely researched, which a feasible solution since it not only preserves statistical feature original but also masks single user's data. With smart meter owning capability connecting Internet, area extends virtual rather than traditional physical area. However, in area, users' membership maybe frequently changes, if while executing protocol for overhead ignorable. this paper,...
The advance of Internet-of-Things (IoT) techniques has promoted an increasing number organizations to explore more mission-critical solutions. However, the response latency, bandwidth usage, and reliability are still challenging issues in traditional IoT. To tackle these challenges, fog-based IoT become popular range query is one most frequently used operations IoT, where given a query, fog node will return aggregated data from devices user. Because nodes not fully trusted, there desire...
Similarity query over time series data plays a significant role in various applications, such as signal processing, speech recognition, and disease diagnosis. Meanwhile, driven by the reliable flexible cloud services, encrypted are often outsourced to cloud, result, similarity has recently attracted considerable attention. Nevertheless, existing solutions still have issues supporting queries with different lengths, accuracy efficiency. To address these issues, this article, we propose new...
The sixth-generation (6G) communication technology has been attracting great interests from both industry and academia, as it is regarded a promising approach to achieve more stable low-latency communication. These features of 6G make an enabler for cybertwin, technique create digital representations physical objects implement various functionalities. In this article, we consider cybertwin-based spatiotemporal keyword query service over dynamic message data set in intelligent transportation...
Although federated learning improves privacy of training data by exchanging local gradients or parameters rather than raw data, the adversary still can leverage and to obtain launching reconstruction membership inference attacks. To defend against such attacks, many noises perturbed methods (like differential CountSketch matrix) have been widely designed. However, strong defence ability high accuracy these schemes cannot be ensured at same time, which will impede wide application FL in...
Similarity queries, giving a way to disease diagnosis based on similar patients, have wide applications in eHealthcare and are essentially demanded be processed under fine-grained access policies due the high sensitivity of healthcare data. One efficient flexible implement such queries is outsource data corresponding query services powerful cloud. Nevertheless, considering privacy, usually outsourced an encrypted form required accessed privacy-preserving way. In past years, many schemes been...
With the emergence of countless independent blockchain systems in recent years, cross-chain transactions have attracted considerable attention, and lots solutions been put forth by both industry academia. However, most existing suffer from either centralization or scalability issues. To mitigate these issues, this paper, we propose concept virtual payment channels, which allows two users different to conduct limitless off-chain with help an intermediate node, hence solving Furthermore, as...
Data sharing in cloud storage is receiving substantial attention information communications technology because it can provide users with efficient and effective services. To protect the confidentiality of shared sensitive data, cryptographic techniques are usually applied. However, data protection still posing significant challenges for sharing. Among them, how to revoke key fundamental challenge. tackle this, we propose a new mechanism storage, which holds following properties. First,...