Jun Shao

ORCID: 0000-0001-8352-0973
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Complexity and Algorithms in Graphs
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Data Management and Algorithms
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Cryptography and Residue Arithmetic
  • Advanced Authentication Protocols Security
  • Cryptographic Implementations and Security
  • Mobile Crowdsensing and Crowdsourcing
  • Vehicular Ad Hoc Networks (VANETs)
  • graph theory and CDMA systems
  • Human Mobility and Location-Based Analysis
  • Security in Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Advanced Steganography and Watermarking Techniques
  • User Authentication and Security Systems
  • IoT and Edge/Fog Computing
  • Caching and Content Delivery
  • Geometric and Algebraic Topology
  • Cooperative Communication and Network Coding
  • IPv6, Mobility, Handover, Networks, Security

Zhejiang Gongshang University
2015-2024

Zhejiang University
2013-2023

Institute of Information Engineering
2023

Chinese Academy of Sciences
2023

Commercial Aircraft Corporation of China (China)
2021

University of New Brunswick
2018-2020

Commonwealth Scientific and Industrial Research Organisation
2019

Beijing University of Posts and Telecommunications
2014

Shanghai Jiao Tong University
2004-2010

Pennsylvania State University
2009-2010

Big data, because it can mine new knowledge for economic growth and technical innovation, has recently received considerable attention, many research efforts have been directed to big data processing due its high volume, velocity, variety (referred as "3V") challenges. However, in addition the 3V challenges, flourishing of also hinges on fully understanding managing newly arising security privacy If are not authentic, mined will be unconvincing; while if is well addressed, people may...

10.1109/mnet.2014.6863131 article EN IEEE Network 2014-07-01

Vehicular ad hoc networks (VANETs) have recently received significant attention in improving traffic safety and efficiency. However, communication trust user privacy still present practical concerns to the deployment of VANETs, as many existing authentication protocols for VANETs either suffer from heavy workload downloading latest revocation list a remote authority or cannot allow drivers on road decide trustworthiness message when messages is anonymous. In this paper, cope with these...

10.1109/tvt.2015.2405853 article EN IEEE Transactions on Vehicular Technology 2015-02-24

The fast development of intelligent transportation has paved the way for innovative techniques highways, and an entirely new driving pattern highway vehicular platooning might offer a solution to persistent problem road congestion, travel comfort, safety. In this system, platoon head vehicle provides service its user vehicles. However, some badly behaved vehicles may put in danger, which makes it crucial distinguish avoid them. paper, we propose reliable trust-based recommendation scheme, is...

10.1109/tvt.2016.2565001 article EN IEEE Transactions on Vehicular Technology 2016-05-09

Association rule mining and frequent itemset are two popular widely studied data analysis techniques for a range of applications. In this paper, we focus on privacy-preserving vertically partitioned databases. such scenario, owners wish to learn the association rules or itemsets from collective set disclose as little information about their (sensitive) raw possible other third parties. To ensure privacy, design an efficient homomorphic encryption scheme secure comparison scheme. We then...

10.1109/tifs.2016.2561241 article EN IEEE Transactions on Information Forensics and Security 2016-05-02

Blockchain, as one of the crypto-intensive creatures, has become a very hot topic recently. Although many surveys have recently been dedicated to security and privacy issues blockchains, there still lacks systematic examination on cryptographic primitives in blockchains. To this end, we paper conduct study blockchains by comprehensive analysis top-30 mainstream cryptocurrencies, terms usages, functionalities, evolutions these primitives. We hope that it would be helpful for cryptographers...

10.1016/j.jnca.2018.11.003 article EN cc-by-nc-nd Journal of Network and Computer Applications 2018-11-22

Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional (public key or identity cryptosystem) to attribute counterpart, and thus empower users with delegating capability in access control environment. Users, identified by attributes, could freely designate who can re-encrypt ciphertext related certain policy another one different policy. The proposed proved selective-structure chosen plaintext secure master without random oracles....

10.1145/1533057.1533094 article EN 2009-03-10

10.1016/j.ins.2010.03.026 article EN Information Sciences 2010-03-30

10.1016/j.future.2016.10.028 article EN Future Generation Computer Systems 2016-11-02

Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach improving quality of healthcare service while lowering cost. Unfortunately, it also poses serious risk on both clients' privacy intellectual property monitoring providers, could deter wide adoption mHealth technology. This paper is address this important problem design...

10.1109/tifs.2013.2255593 article EN IEEE Transactions on Information Forensics and Security 2013-03-29

In this paper, we propose a fine-grained privacy-preserving location-based service (LBS) framework, called FINE, for mobile devices. It adopts the data-as-a-service (DaaS) model, where LBS provider publishes its data to third party (e.g., cloud server) who executes users' queries. The proposed FINE framework employs ciphertext-policy anonymous attribute-based encryption technique achieve access control, location privacy, confidentiality of and policy, accurate query result while without...

10.1109/infocom.2014.6847945 article EN IEEE INFOCOM 2022 - IEEE Conference on Computer Communications 2014-04-01

Cloud computing is now a popular paradigm that can provide end users access to configurable resources on any device, from anywhere, at time. During the past years, cloud has been developed dramatically. However, with development of Internet Things, disadvantages (such as high latency) are gradually revealed due long distance between and users. Fog proposed solve this problem by extending edge network. In particular, fog introduces an intermediate layer called designed process communication...

10.1109/mnet.2018.1700250 article EN IEEE Network 2018-03-13

In order to protect the privacy of individual data, meantime guaranteeing utility big preserving data aggregation is widely researched, which a feasible solution since it not only preserves statistical feature original but also masks single user's data. With smart meter owning capability connecting Internet, area extends virtual rather than traditional physical area. However, in area, users' membership maybe frequently changes, if while executing protocol for overhead ignorable. this paper,...

10.1109/jsyst.2019.2912415 article EN IEEE Systems Journal 2019-05-08

The advance of Internet-of-Things (IoT) techniques has promoted an increasing number organizations to explore more mission-critical solutions. However, the response latency, bandwidth usage, and reliability are still challenging issues in traditional IoT. To tackle these challenges, fog-based IoT become popular range query is one most frequently used operations IoT, where given a query, fog node will return aggregated data from devices user. Because nodes not fully trusted, there desire...

10.1109/jiot.2020.2977253 article EN IEEE Internet of Things Journal 2020-02-28

Similarity query over time series data plays a significant role in various applications, such as signal processing, speech recognition, and disease diagnosis. Meanwhile, driven by the reliable flexible cloud services, encrypted are often outsourced to cloud, result, similarity has recently attracted considerable attention. Nevertheless, existing solutions still have issues supporting queries with different lengths, accuracy efficiency. To address these issues, this article, we propose new...

10.1109/tdsc.2021.3061611 article EN IEEE Transactions on Dependable and Secure Computing 2021-02-23

The sixth-generation (6G) communication technology has been attracting great interests from both industry and academia, as it is regarded a promising approach to achieve more stable low-latency communication. These features of 6G make an enabler for cybertwin, technique create digital representations physical objects implement various functionalities. In this article, we consider cybertwin-based spatiotemporal keyword query service over dynamic message data set in intelligent transportation...

10.1109/jiot.2021.3096674 article EN IEEE Internet of Things Journal 2021-07-12

Although federated learning improves privacy of training data by exchanging local gradients or parameters rather than raw data, the adversary still can leverage and to obtain launching reconstruction membership inference attacks. To defend against such attacks, many noises perturbed methods (like differential CountSketch matrix) have been widely designed. However, strong defence ability high accuracy these schemes cannot be ensured at same time, which will impede wide application FL in...

10.1145/3485447.3512233 article EN Proceedings of the ACM Web Conference 2022 2022-04-25

Similarity queries, giving a way to disease diagnosis based on similar patients, have wide applications in eHealthcare and are essentially demanded be processed under fine-grained access policies due the high sensitivity of healthcare data. One efficient flexible implement such queries is outsource data corresponding query services powerful cloud. Nevertheless, considering privacy, usually outsourced an encrypted form required accessed privacy-preserving way. In past years, many schemes been...

10.1109/tifs.2022.3152395 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

With the emergence of countless independent blockchain systems in recent years, cross-chain transactions have attracted considerable attention, and lots solutions been put forth by both industry academia. However, most existing suffer from either centralization or scalability issues. To mitigate these issues, this paper, we propose concept virtual payment channels, which allows two users different to conduct limitless off-chain with help an intermediate node, hence solving Furthermore, as...

10.1109/tifs.2023.3281064 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Data sharing in cloud storage is receiving substantial attention information communications technology because it can provide users with efficient and effective services. To protect the confidentiality of shared sensitive data, cryptographic techniques are usually applied. However, data protection still posing significant challenges for sharing. Among them, how to revoke key fundamental challenge. tackle this, we propose a new mechanism storage, which holds following properties. First,...

10.1109/tifs.2017.2746000 article EN IEEE Transactions on Information Forensics and Security 2017-08-28
Coming Soon ...