Zhiquan Liu

ORCID: 0000-0002-3934-2177
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Advanced Authentication Protocols Security
  • Advanced Steganography and Watermarking Techniques
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Mobile Crowdsensing and Crowdsourcing
  • Access Control and Trust
  • Internet Traffic Analysis and Secure E-voting
  • Chaos-based Image/Signal Encryption
  • Brain Tumor Detection and Classification
  • Complexity and Algorithms in Graphs
  • Privacy, Security, and Data Protection
  • Anomaly Detection Techniques and Applications
  • Human Mobility and Location-Based Analysis
  • Advanced Image and Video Retrieval Techniques
  • Mobile Ad Hoc Networks
  • Meteorological Phenomena and Simulations
  • Opportunistic and Delay-Tolerant Networks
  • User Authentication and Security Systems
  • UAV Applications and Optimization
  • Climate variability and models

Jinan University
2017-2025

Data Assurance and Communication Security
2020-2025

Guilin University of Electronic Technology
2023-2024

Shenyang Ligong University
2024

Xiamen University of Technology
2024

Key Laboratory of Guangdong Province
2022-2024

Guangxi University
2023

Shanghai Maritime University
2021

Xidian University
2014-2018

Shanghai Jiao Tong University
2013

Due to the distributed collaboration and privacy protection features, federated learning is a promising technology perform model training in virtual twins of Digital Twin for Mobile Networks (DTMN). In order enhance reliability model, it always expected that users involved have trustworthy behaviors. Yet, available trust evaluation schemes problems considering simplex factor using coarse-grained calculation method. this paper, we propose scheme DTMN, which takes direct evidence recommended...

10.1109/jsac.2023.3310094 article EN cc-by IEEE Journal on Selected Areas in Communications 2023-08-30

As an important means of obtaining information marine situation, the monitoring system relying on UAV has been paid more and attention by all countries in world, demand for tasks is growing continually. In ad hoc networks, routing protocols with immutable policies that lack flexibility are generally incapable maintaining effective performance due to complicated rapidly changing environmental situation application requirements. this paper, we propose intelligent clustering approach (ICRA)...

10.1109/tits.2022.3145857 article EN IEEE Transactions on Intelligent Transportation Systems 2022-02-01

Vehicular networks have huge potential to improve road safety and traffic efficiency, especially in the context of large models. Cloud computing can significantly performance vehicular networks, concept cloud-assisted comes into being. Reputation management plays a crucial role since it help each vehicle evaluate trustworthiness other vehicles received messages. updating is essential reputation usually done by Trusted Authority (TA) regularly after collecting, decrypting, verifying number...

10.1109/tvt.2023.3340723 article EN cc-by IEEE Transactions on Vehicular Technology 2023-12-08

Cloud-based mobile crowd-sourcing has been an attractive solution to provide data storage and share services for resource-limited devices in a privacy-preserving manner, but how enable users issue search queries achieve fine-grained access control over ciphertexts simultaneously is still big challenge various circumstances. Although the ciphertext-policy attribute-based keyword technology combining encryption with searchable become hot research topic, it just deals equivalent attributes...

10.1109/jiot.2017.2779124 article EN IEEE Internet of Things Journal 2017-12-04

Vehicular networks have become a visible reality enabling information sharing between vehicles to enhance driving safety and provide value-added services drivers passengers. However, false might be injected into the network because of defective sensors, malicious vehicles, so on. Therefore, an efficient mechanism guarantee reliability used by is great importance in vehicular networks. To solve this problem, article proposes context-awareness trust management model evaluate trustworthiness...

10.1109/jiot.2020.2975084 article EN IEEE Internet of Things Journal 2020-02-19

With the increasing connectivity between Electronic Control Units (ECUs) and outside world, safety security have become stringent problems. The Controller Area Network (CAN) bus is most commonly used in-vehicle network protocol, which lacks mechanisms by design, so it vulnerable to various attacks. In this paper, we propose a novel intrusion detection model called CNN-LSTM with Attention (CLAM) for network, especially CAN. CLAM uses one-dimensional convolution (Conv1D) extract abstract...

10.1109/tvt.2021.3106940 article EN IEEE Transactions on Vehicular Technology 2021-08-24

Vehicular networks have tremendous potential to improve the road safety and traffic efficiency, adoption of space–air–ground-integrated network (SAGIN) architecture in vehicular can greatly performance by leveraging respective advantages space, air, ground segments on coverage, flexibility, reliability, availability, which results (SAGIVNs). Trust management is an important tool for constructing trustworthy SAGIVNs, privacy preservation also a primary concern SAGIVNs. They conflicting...

10.1109/jiot.2021.3060751 article EN IEEE Internet of Things Journal 2021-02-20

Electronic health (e-health) systems may outsource data such as patient e-health records to mobile cloud servers for efficiency gains (e.g., minimizing local storage and computation costs). However, a move result in privacy implications the presence of semi-honest servers. Searchable Encryption (SE) can potentially facilitate privacy-preserving searches based on keywords encrypted stored cloud, but most existing SE solutions do not support temporal access control (i.e., mechanism that grants...

10.1109/tmc.2023.3277702 article EN IEEE Transactions on Mobile Computing 2023-05-18

With the rapid development of geographic location technology and explosive growth data, a large amount spatial data is outsourced to cloud server for reducing local high storage computing burdens, but at same time causes security issues. Thus, extensive privacy-preserving query schemes have been proposed. Most existing use Asymmetric Scalar-Product-Preserving Encryption (ASPE) encrypt ASPE has proven be insecure against known plaintext attack. And require users provide more information about...

10.1109/tkde.2023.3283020 article EN IEEE Transactions on Knowledge and Data Engineering 2023-06-05

Image retrieval systems help users to browse and search among extensive images in real time. With the rise of cloud computing, tasks are usually outsourced servers. However, scenario brings a daunting challenge privacy protection as servers cannot be fully trusted. To this end, image-encryption-based privacy-preserving image (PPIR) schemes have been developed, which first extract features from cipher-images, then build models based on these features. Yet, most existing PPIR approaches...

10.1109/tcsvt.2024.3370668 article EN IEEE Transactions on Circuits and Systems for Video Technology 2024-02-26

Internet of Vehicles (IoVs) is increasingly used as a medium to propagate critical information via establishing connections between entities such vehicles and infrastructures. During message transmission, privacy-preserving authentication considered the first line defence against attackers malicious information. To achieve more secure stable communication environment, ever-increasing numbers blockchain-based schemes are proposed. At glance, existing approaches provide robust architectures...

10.1109/tits.2024.3399200 article EN IEEE Transactions on Intelligent Transportation Systems 2024-05-27

Due to the powerful representation ability and superior performance of Deep Neural Networks (DNN), Federated Learning (FL) based on DNN has attracted much attention from both academic industrial fields. However, its transmitted plaintext data causes privacy disclosure. FL Local Differential Privacy (LDP) solutions can provide protection a certain extent, but these still cannot achieve adaptive perturbation in model. In addition, this kind schemes cause high communication overheads due curse...

10.1109/tdsc.2024.3354736 article EN IEEE Transactions on Dependable and Secure Computing 2024-01-16

Autonomous vehicles (AVs) rely on controller area network (CAN), which ensures the communication between massive electronic control units (ECUs) and passenger safety. Although CAN is a lightweight reliable broadcast protocol, its vulnerability has caused to confront serious security threats. Adversaries malicious organizations can impair bus in variety of ways, such as injecting messages into bus. These directly intervene functions inside AVs. Therefore, this article proposes novel...

10.1109/jiot.2024.3393122 article EN IEEE Internet of Things Journal 2024-04-24

Vehicular ad-hoc networks (VANETs) have recently attracted considerable attention from both industry and academia for improving road safety traffic efficiency. Trust modeling plays a significant role in VANETs, however, the existing trust models cannot primely conform to characteristics of VANETs. This article proposes novel cascading-based emergency message dissemination (TCEMD) model which incorporates entity-oriented values into data-oriented evaluation an efficient manner. In proposed...

10.1109/jiot.2019.2957520 article EN IEEE Internet of Things Journal 2019-12-05

As a potential application field of the sixth-generation (6G) communication technology and promising part massive Internet Things (IoT), vehicular networks have attracted considerable attention from both academia industry in recent years, where cooperative safety applications are significant branch. It is widely acknowledged that 6G able to provide high-throughput low-latency wireless capability for networks, support interconnectivity with diverse service requirements, significantly improve...

10.1109/jiot.2020.3037098 article EN IEEE Internet of Things Journal 2020-11-10

Mobile crowdsensing (MCS) refers to a group of mobile users utilizing their sensing devices accomplish the same task. However, in vehicular networks, how evaluate reliability vehicles and achieve lightweight privacy preservation are urgent issues. Therefore, this paper proposes scheme with efficient reputation management (PPRM) for MCS networks. Specifically, we design privacy-preserving task matching algorithm which can preserve location privacy, identity data value while reducing...

10.1109/tdsc.2022.3163752 article EN IEEE Transactions on Dependable and Secure Computing 2022-01-01

Recently, federated learning has received widespread attention, which will promote the implementation of artificial intelligence technology in various fields. Privacy-preserving technologies are applied to users' local models protect privacy. Such operations make server not see true model parameters each user, opens wider door for a malicious user upload and training result converge an ineffective model. To solve this problem, article, we propose poisoning attack defense framework horizontal...

10.1109/tii.2022.3156645 article EN IEEE Transactions on Industrial Informatics 2022-03-15

With the rapid development of Location-Based Services (LBS), a large number LBS providers outsource spatial data to cloud servers reduce their high computational and storage burdens, but meanwhile incur some security issues such as location privacy leakage. Thus, extensive privacy-preserving schemes have been proposed. However, existing solutions using Bloom filter do not take into account redundant bits that map information in filter, resulting overheads, reveal inclusion relationship...

10.1109/tifs.2023.3288453 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

In mobile crowdsensing (MCS), truth discovery (TD) plays an important role in sensing task completion. Most of the existing studies focus on privacy preservation users, and reliability users is evaluated by their weights which are calculated based submitted data. However, if unreliable, data also may influence accuracy ground truths tasks. Therefore, this article proposes a privacy-preserving reputation-based framework named PRTD can generate tasks with high while preserving privacy....

10.1109/tdsc.2023.3276976 article EN IEEE Transactions on Dependable and Secure Computing 2023-05-17
Coming Soon ...