- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- RFID technology advancements
- IoT and Edge/Fog Computing
- User Authentication and Security Systems
- Advanced Authentication Protocols Security
- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Adversarial Robustness in Machine Learning
- Complexity and Algorithms in Graphs
- Context-Aware Activity Recognition Systems
- Advanced Neural Network Applications
- Mobile Crowdsensing and Crowdsourcing
- Domain Adaptation and Few-Shot Learning
- Chaos-based Image/Signal Encryption
- Energy Efficient Wireless Sensor Networks
- Graph Theory and Algorithms
- Advanced Data Storage Technologies
- Mobile Ad Hoc Networks
- Service-Oriented Architecture and Web Services
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Face recognition and analysis
Xi'an Jiaotong University
2007-2025
State Key Laboratory of Cryptology
2019-2021
Xidian University
2016-2020
University of Hong Kong
2011-2015
Hong Kong University of Science and Technology
2011-2015
Nanyang Technological University
2014
The Industrial Internet of Things (IIoT) has provided a promising opportunity to build digitalized industrial systems. A fundamental technology IIoT is the radio-frequency identification (RFID) technique, which allows participants identify items and anchor time-series IoT data for them. They can further share through cloud service enable information exchange support critical decisions in production operations. Storing cloud, however, requires access control mechanism protect sensitive...
Internet of Things (IoT) is a promising technology to provide product traceability for industrial systems. By using sensing and networking techniques, an IoT-enabled system enables its participants efficiently track products record their status during production process. Current IoT systems lack unified data sharing service, which prevents the from acquiring trusted products. Using emerging blockchain build such service direction. However, directly storing on incurs in efficiency privacy...
By attaching RFID tags to products, supply chain participants can identify products and create product data record the particulars in transit. Participants along share their enable information exchange support critical decisions production operations. Such an sharing essentially requires a access control mechanism when relate sensitive business issues. However, existing solutions are ill-suited RFID-enabled chain, as they not scalable handling huge number of tags, introduce vulnerability...
The application of blockchain to Vehicular Edge Computing (VEC) has attracted significant interests. As the Internet Things plays an essential and fundamental role for data collecting, analyzing, management in VEC, it is vital guarantee security data. However, resource-constraint nature edge node makes challenging meet needs maintain long life-cycle IoT since vast volumes quickly increase. In this paper, we propose Acce-chain, a storage-elastic based on different storage capacities at edge....
The rapid development of Internet Things (IoT) enables digital twin (DT) technology to precisely represent a real product in virtual space by generating multitude IoT data items record many aspects the product. To support various DT-based applications, generated need be shared among multiple parties involving lifecycle product, which raises increasing demand for access control. decentralization and tamper-proofing properties blockchain enable it promising immutability protection items....
As a valuable digital resource, graph data is an important asset, which has been widely utilized across various fields to optimize decision-making and enable smarter solutions. To manage assets, blockchain used sharing trading, but it cannot supply complex analytical queries. vChain was proposed achieve verifiable boolean queries over by designing embedded authenticated structure (ADS). However, for generating (non-)existence proofs, suffers from expensive storage computation costs in ADS...
Enabling cryptographically enforced access controls for data hosted in untrusted cloud is attractive many users and organizations. However, designing efficient dynamic control system the still challenging. In this paper, we propose Crypt-DAC, a that provides practical cryptographic enforcement of control. Crypt-DAC revokes permissions by delegating to update encrypted data. file symmetric key list which records sequence revocation keys. each revocation, dedicated administrator uploads new...
As the most successful application of sharing economy, ride-hailing service is popular worldwide and serves millions users per day worldwide. Ride-hailing providers (SPs) usually collect users' personal data to improve their services via big technologies. However, SPs may also use collected user apply personalized prices different users, which raises price fairness concerns. In this paper, we propose a smart auditing system named Spas. Spas allows purchase <italic...
E-commerce has changed the way of shopping and played an important role in world. Therefore, e-commerce platforms require a secure reputation service, which provides genuine sellers so as to support potential buyers making right decision while interacting with platform. Unfortunately, most current failed do because they fully control make it easy for adversary violate genuineness reputation. In this article, we focus on feedback anonymity authenticity, are two critical security properties...
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted extensive attention recently. However, most EMM constructions reveal the real volumes queried keys, which can be leveraged to launch leakage-abuse attacks, demonstrated by Kellaris et al. in CCS 2016 and Kornaropoulos S&P 2021.
Radio Frequency Identification (RFID) is a key emerging technology for supply chain systems. By attaching RFID tags to various products, product-related data can be efficiently indexed, retrieved and shared among multiple participants involved in an RFID-enabled chain. The flexible access property, however, raises security privacy concerns. In this paper, we target at issues We investigate Third-party Supply (RTS) systems identify several inherent efficiency requirements. further design...
As the number of smart cars grows rapidly, vehicular crowdsensing (VCS) is gradually becoming popular. In a VCS infrastructure, sensing devices and computing units hold on as well cloud servers form an IoT-edge-cloud continuum to perform real-time tasks. order encourage participate in process, blockchain technology can be combined with provide automated incentive for data trading without relying trusted third parties. However, directly using enforce process incurs expensive service fees...
Adversarial Examples threaten to fool deep learning models output erroneous predictions with high confidence. Optimization-based methods for constructing such samples have been extensively studied. While being effective in terms of aggression, they typically lack clear interpretation and constraint about their underlying generation process, which thus hinders us from leveraging the produced adversarial model protection reverse direction. Hence, we expect them repair bugs pre-trained by...
Batch recall is a practically important problem for most industry manufacturers. The batches of products which contain flawed parts need to be recalled by manufacturers in time prevent further economic and health loss. Accurate batch could challenging issue as may have already been integrated into large number distributed customers. recent development Radio Frequency Identification (RFID) provides us promising opportunity implement an accurate efficient way. RFID-enabled the enhance security...
Radio Frequency Identification (RFID) is a key emerging technology to improve data sharing in item distribution systems. By attaching RFID tags items, related can be bound items and participants involved an system directly store, access update the by interrogating tags. Such flexible manner of technology, however, raises privacy security concerns. In this article, we focus on special named RFID-enabled Third-party Distribution (RTD) identify two inherent requirements. We further design...
Intel Software Guard extensions (SGX), a hardware-based Trusted Execution Environment (TEE), has become promising solution to stopping critical threats such as insider attacks and remote exploits. SGX recently drawn extensive research in two directions---using it protect the confidentiality integrity of sensitive data, protecting itself from attacks. Both applications defense mechanisms have fundamental need---flexible memory protection that updates memory-page permissions dynamically...
Data deduplication is of vital importance for mobile cloud computing to cope with the explosive growth outsourced data. In order ensure privacy sensitive data against an untrusted cloud, Message-Locked Encryption (MLE) has been proposed enable over ciphertext. However, MLE prohibits access control since it uses deterministic content-derived encryption keys. Recently, a lightweight rekeying-aware encrypted system (REED) achieve dynamic secure deduplication. REED vulnerable key-retaining...
Data deduplication technique could greatly save the storage overhead of cloud by eliminating duplicated data and retaining one copy. In order to ensure privacy against an untrusted cloud, many cryptographic schemes have been proposed make feasible in ciphertext. A typical scheme is Message-Locked Encryption (MLE), which takes hash values messages as encryption keys. However, MLE vulnerable side-channel attacks. Current solutions trying mitigate these attacks raise either expensive or...