Dengzhi Liu

ORCID: 0000-0001-9206-7680
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Data Security Solutions
  • Cryptography and Data Security
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Security in Wireless Sensor Networks
  • Energy Efficient Wireless Sensor Networks
  • Advanced Authentication Protocols Security
  • Security and Verification in Computing
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Korean Peninsula Historical and Political Studies
  • Advanced Steganography and Watermarking Techniques
  • Caching and Content Delivery
  • User Authentication and Security Systems
  • Access Control and Trust
  • Indoor and Outdoor Localization Technologies
  • Ethics and Legal Issues in Pediatric Healthcare
  • Underwater Vehicles and Communication Systems
  • Wireless Body Area Networks
  • Innovation in Digital Healthcare Systems
  • 3D Shape Modeling and Analysis
  • Robotics and Sensor-Based Localization
  • Chaos-based Image/Signal Encryption

Jiangsu Yanjiang Chemical Resources Development Research Institute (China)
2021-2024

Shanghai Ocean University
2021-2024

Southwest Jiaotong University
2021

Nanjing University of Information Science and Technology
2015-2020

Peng Cheng Laboratory
2019

State Key Laboratory of Cryptology
2019

Institute of Information Engineering
2017

Chinese Academy of Sciences
2017

Nanjing University
2017

University of Information Science
2017

10.1016/j.pmcj.2017.03.013 article EN publisher-specific-oa Pervasive and Mobile Computing 2017-04-02

The vehicular cloud provides many significant advantages to Vehicular ad-hoc Networks (VANETs), such as unlimited storage space, powerful computing capability and timely traffic services. Traffic data aggregation in the cloud, which can aggregate from vehicles for further processing sharing, is very important. Incorrect feedback may affect safety; therefore, security of should be ensured. In this paper, by using property recovery message signature (MRS), we propose a secure real-time scheme...

10.1109/tvt.2019.2946935 article EN IEEE Transactions on Vehicular Technology 2019-10-11

Internet of things (IoT) has emerged as a promising technology that can be widely used in various industries to realize real-time information collection, so improve production efficiency and reduce running costs. By combining the IoT, maritime transportation systems (MTS) prevent vessels collision, loss revenue for ports shipbuilders. The large amount data generated IoT-enabled MTS efficiently utilized predict future trajectories hotspots on sea combined with historical data. However,...

10.1109/tits.2021.3125070 article EN publisher-specific-oa IEEE Transactions on Intelligent Transportation Systems 2021-01-01

With the fast growing demands for big data, we need to manage and store data in cloud. Since cloud is not fully trusted it can be accessed by any users, may face threats. In this paper, propose a secure authentication protocol with hierarchical attribute authorization structure. Our proposed resorts tree-based signature significantly improve security of authorization. To satisfy requirements, extend support multiple levels Security analysis shows that our resist forgery attack replay attack....

10.1109/tbdata.2017.2705048 article EN IEEE Transactions on Big Data 2017-01-01

Storage is one of the main services that cloud provides users. Utilizing to store large amounts data can alleviate cost storage and hardware investment on local side, which very important for resource-restricted clients. An emerging issue clients how verify database in could after outsourcing their cloud. Many verifiable (VDB) schemes have been proposed by researchers solve this issue. However, some existing cannot satisfy practical requirements verifiability. In paper, we propose a secure...

10.1109/tetc.2017.2776402 article EN IEEE Transactions on Emerging Topics in Computing 2017-11-22

Vehicular networking is a communication platform that integrates the computing power of vehicles, roadside units, and infrastructures, which capable offering services to terminals characterized by low latency, high bandwidth, reliability. Artificial intelligence (AI) has been developed rapidly over past few years, numerous AI applications requiring in vehicular have emerged (e.g., automatic driving, collision avoidance, trajectory prediction). However, computation model requires power,...

10.1109/mcomstd.0003.2100100 article EN IEEE Communications Standards Magazine 2023-03-01

With the rapid development of cloud services, resources-constrained enterprises and individuals can outsource huge sensitive data into Cloud Service Providers (CSPs) who fully control physically. Since CSPs are not trusted, it is essential to protect integrity confidentiality users' data. Plenty researchers have devoted considerable attention solve this issue in last decade such as various PDP POR schemes. In paper, we propose an algebraic signature-based auditing scheme that ensures with...

10.1109/tsusc.2017.2781232 article EN IEEE Transactions on Sustainable Computing 2017-12-08

In edge computing, the idle resources of devices in network can be virtualized into a platform that provides clients with storage resource and computing capability. Note service response is faster than cloud computing. The provision speed distributed utilization rate will further improved when integrated 5G software definition paradigm design system. However, issues data security devices' trustworthiness seriously restrict development To enhance secure integrity auditing proposed. proposed...

10.1016/j.csa.2022.100004 article EN cc-by Cyber Security and Applications 2022-07-23

Incompletely predictable vehicular ad hoc networks is a type of where vehicles move in certain range or just particular tendency, which very similar to some circumstances reality. However, how route such more efficiently according the node motion characteristics and related historical big data still an open issue. In this paper, we propose novel routing protocol named trustworthiness evaluation-based (TERP). our protocol, each individual calculated by cloud depending on attribute parameters...

10.1109/tbdata.2017.2710347 article EN IEEE Transactions on Big Data 2017-06-01

There are many concerns about the sensitivity and privacy of data in hierarchical wireless sensor networks (HWSNs) because low-cost nodes neither tamper-proof nor capable performing public key cryptography efficiently. In existing studies, researchers only focus on existence single node network, while arrangement that multiple attached to one cluster is out consideration. this paper, we propose a lightweight practical clustering authentication protocol for HWSNs. As assume be authenticated...

10.1504/ijsnet.2018.092638 article EN International Journal of Sensor Networks 2018-01-01

Cloud storage is now a hot research topic in information technology, which has changed the technical architecture and implementation method of electronic records management. However, due to loss physical control record cloud environment, it more difficult guarantee evidential quality for manager. In this paper, we analyzes requirements preserving based on security theory. Moreover construct first technology framework storage. addition, integration insure authenticity, integrity, reliability...

10.6138/jit.2016.17.6.20160714 article EN 網際網路技術學刊 2016-11-01

With the rapid spread of smart sensors, data collection is becoming more and important in Mobile Edge Networks (MENs). The collected can be used many applications based on analysis results these by cloud computing. Nowadays, schemes have been widely studied researchers. However, most researches take amount into consideration without thinking about problem privacy leakage data. In this paper, we propose an energy-efficient anonymous scheme for MENs to keep a balance between energy consumption...

10.1016/j.dcan.2019.04.001 article EN cc-by-nc-nd Digital Communications and Networks 2019-04-11

Cloud computing is a newfound service which has rapid growth in IT industry recent years. With the development of social network, group data sharing system been developed to store and process large amounts data. Due cloud provided by third party, server semi-trusted. In this paper, we propose secure identity-based dynamic scheme for computing, based on transplanted signature algorithm perform identity authorization authentication. order make members share efficiently, utilize multi-owner...

10.6138/jit.2017.18.4.20160415 article EN 2017-07-01

There are many concerns about the sensitivity and privacy of data in hierarchical wireless sensor networks (HWSNs) because low-cost nodes neither tamper-proof nor capable performing public key cryptography efficiently. In existing studies, researchers only focus on existence single node network, while arrangement that multiple attached to one cluster is out consideration. this paper, we propose a lightweight practical clustering authentication protocol for HWSNs. As assume be authenticated...

10.1504/ijsnet.2018.10014025 article EN International Journal of Sensor Networks 2018-01-01

It is important to improve the registration precision and speed in process of registration. In order solve this problem, we proposed a robust point cloud method based on deep learning, called PDC-Net, using principal component analysis adjustment network that quickly adjusts initial position between two slices cloud, then an iterative neural inverse compositional algorithm complete final transformation. We compare it ModelNet40 dataset with closest point, which traditional method,...

10.1364/ao.418304 article EN Applied Optics 2021-03-11

Cloud computing is a newfound service which has rapid growth in IT industry recent years. Despite it huge contribution to the development of technology and society, cloud still exists some security deficiencies block its such as data leakage, illegal access privacy risks. Hence, control user authentication very important environment. Some related schemes been proposed solve problems cloud, however, high computation cost crucial factor practical use. In this paper we propose novel lightweight...

10.1109/icact.2016.7423272 article EN 2022 24th International Conference on Advanced Communication Technology (ICACT) 2016-01-01

Cloud storage which provides efficiency and convenience has been paid more attention by not only users but also researchers. Users can save their local costs outsourcing the data to cloud. While enjoying benefits of cloud storage, are worried about whether remain intact in or private information leaked. This makes them hesitate outsource cannot fully trust servers. Because concern users, integrity becomes an essential security factor storage. Many scholars have dedicated themselves research...

10.1109/ic3.2018.00031 article EN 2018-08-01
Coming Soon ...