Jingxian Cheng

ORCID: 0000-0001-8593-0706
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Misinformation and Its Impacts
  • Privacy-Preserving Technologies in Data
  • Topic Modeling
  • Nuclear Physics and Applications
  • Data Management and Algorithms
  • Adversarial Robustness in Machine Learning
  • Advanced Steganography and Watermarking Techniques
  • IoT and Edge/Fog Computing
  • Spam and Phishing Detection
  • Superconducting Materials and Applications
  • Graphite, nuclear technology, radiation studies

Xi'an Jiaotong University
2019-2024

Cloud service is an essential technique to provide product traceability for industrial systems by providing data integration and sharing services. However, a malicious or corrupted cloud may prevent participants from acquiring accurate consistent of products. To fix this issue, we propose Acics, fast consistency auditing scheme massive in untrusted Our enables circularly play the role auditor audit products real-time. Additionally, design separated storage mechanism improve efficiency...

10.1145/3386263.3407598 article EN 2020-09-04

Cloud computing is an essential technique to provide item traceability for industrial internet of things (IIoT) systems by providing data sharing services. However, a malicious cloud server may prevent participants from acquiring accurate items inconsistent data. To fix this issue, we propose Acics, consistency auditing scheme in untrusted services cloud-aided IIoT systems. Acics presents two variants named S-Acics and L-Acics. enables audit each circularly play the role. L-Acics further...

10.1145/3522740 article EN ACM Transactions on Sensor Networks 2022-05-05

Blockchain databases have been exploited in many applications to construct trust and share data among multiple participants. However, maintaining the entire blockchain locally will cause heavy communication storage overhead for users with limited resources. Alternatively, user could act as a light node that stores block headers only delegates queries full nodes maintain blockchain. introducing raises several concerns about query integrity privacy. In this paper, we propose EPPVChain, first...

10.1109/trustcom60117.2023.00178 article EN 2023-11-01
Coming Soon ...