- Blockchain Technology Applications and Security
- Cryptography and Data Security
- Cloud Data Security Solutions
- User Authentication and Security Systems
- VLSI and Analog Circuit Testing
- IoT and Edge/Fog Computing
- VLSI and FPGA Design Techniques
- Low-power high-performance VLSI design
- Peer-to-Peer Network Technologies
- Internet Traffic Analysis and Secure E-voting
- Sensorless Control of Electric Motors
- 3D Printing in Biomedical Research
- Anomaly Detection Techniques and Applications
- Iterative Learning Control Systems
- Advanced Authentication Protocols Security
- Access Control and Trust
- Full-Duplex Wireless Communications
- Video Analysis and Summarization
- Real-time simulation and control systems
- Scientific Computing and Data Management
- Radio Frequency Integrated Circuit Design
- Evacuation and Crowd Dynamics
- Cellular Mechanics and Interactions
- Augmented Reality Applications
- Acoustic Wave Resonator Technologies
University of Electronic Science and Technology of China
2003-2024
Shanghai East Hospital
2024
Tongji University
2024
Huzhou University
2022
Portland State University
2021
In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and users holding devices for supporting related services. However, critical threats towards confidentiality authenticity are raised: adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. Furthermore, have store (secret public) keys used locally. Consequently, only maintaining can be utilized access services provided by servers, "portability"...
In this paper, we propose a servers-aided password-based subsequent-key-locked encryption mechanism to ensure the confidentiality of outsourced electronic health records (EHRs). The achieves conditional forward transparency: doctor can only access patient's EHRs related current diagnosis with delegation. It also portability: delegate for accessing specific part EHRs, patient needs send one key (at most 256 bits) in addition delegation information doctor; does not need maintain any secret...
In this letter, we point out that the privacy-preserving adaptive trapdoor hash authentication tree scheme (published in IEEE TIFS, doi: 10.1109/TIFS.2020.2986879) can be invalidated by an adversarial cloud server: if outsourced data is arbitrarily modified, server still pass third-party auditor's auditing.
Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with efficient way authenticate themselves different service providers and has been widely applied in digital systems. However, existing SSO schemes suffer from critical issues terms of security privacy. Regarding security, most achieve a high convenience at the expense are thereby susceptible various attacks. privacy, fail protect users' subscription pattern access against adversaries who can easily...
Mechanical aspects of tissues and cells critically influence a myriad biological processes can substantially alter the course diverse diseases. The emergence methodologies adapted from physical science now permits precise quantification cellular forces mechanical properties cells. Despite rising interest in tissue mechanics across fields like biology, bioengineering medicine, there remains noticeable absence comprehensive readily accessible repository this pertinent information. To fill gap,...
We propose a protection mechanism for password-based credential databases maintained by service providers against leakage, dubbed PCDL. In PCDL, each authentication is derived from user's password and salt, where provider employs set of key servers to share the salt in threshold way. With an external adversary cannot derive any information about underlying passwords compromised database, even if he can compromise some servers. The most prominent manifestation PCDL transparency: integrating...
Certificate revocation checking (CRC) is a fundamental requirement in certificate-based public-key cryptographic systems. Most existing CRC schemes are not tailored for edge-cloud computing systems, and directly applying these would cause security efficiency problems. In this article, we first propose two-layer edge-cloud-assisted framework, dubbed ECA-CRC, where edge nodes utilizing probabilistic algorithm serve as layer, the cloud server deterministic serves second layer. Both...
In this paper, we investigate actual cloud-assisted electronic health (eHealth) systems in terms of security, efficiency, and functionality. Specifically, propose a password-based subsequent-key-locked encryption mechanism to ensure the confidentiality outsourced records (EHRs). We also blockchain-based secure EHR provenance by designing data structure record deploying public blockchain smart contract both EHRs their records. With two mechanisms, develop BESURE (blockchain-based eHealth...
Syndrome-based early epidemic warning plays a vital role in preventing and controlling unknown outbreaks. It monitors the frequency of each syndrome, issues if some is aberrant, identifies potential outbreaks, alerts governments as possible. Existing systems adopt cloud-assisted paradigm to achieve cross-facility statistics on syndrome frequencies. However, these systems, all symptom data would be directly leaked cloud, which causes critical security privacy issues. In this paper, we first...
In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and devices for supporting related services. However, critical threats towards confidentiality authenticity are raised, where adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. this paper, we propose a blockchain-based authenticated scheme, dubbed Badge, establish secure channels devices. Badge based on hybrid encryption mechanism, which...
With the high demand for reliability and performance, it is essential to determine an accurate estimation of maximum CMOS combinational circuit power consumption. However, large-scaled circuits, problem determining input patterns induce current NP-complete. In this paper, a novel approach was proposed obtain lower bound consumption using THGA (tabu-hierarchy genetic algorithm). The experiments with ISCAS85 benchmark circuits show that generates quality cannot be achieved simulation-based...
Even-order intermodulation distortions are often considered easy to filter in narrowband radio frequency (RF) wireless systems because they usually located far away from the desired passband and adjacent bands. However, even-order have recently attracted more interest with increasing popularity of wideband RF applications. The authors' previous work was devoted establishing power spectrum model second-order distortion. Motivated by latest efforts on amplifier linearization fourth-order...
In this paper, we investigate actual exchange-assisted data trading systems and point out that the increment of content in a sensitive dataset always results its privacy level, i.e., making more than before. As consequence, follows an incremental privacy-driven paradigm, where (1) buyers with various requirements would purchase subsets different levels, (2) when buyer purchases subset entire higher level privacy, all lower levels are required (in other words, there is containment...
As more datapath stacks are integrated into system-on-chips (SOC), the is becoming a critical part of whole giga-scale circuit (GSI) design. The traditional layout design methodology cannot satisfy performance requirements since it has no knowledge bit-sliced structure. In this paper, we applied an approach OpenTS (open tabu search) to determine optimal element ordering minimize track density, wire length and interconnection delay. Experimental results show that efficient than existing...