- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Cloud Data Security Solutions
- User Authentication and Security Systems
- Business Strategy and Innovation
- Blockchain Technology Applications and Security
- Biometric Identification and Security
- Organ Transplantation Techniques and Outcomes
- Geotechnical Engineering and Soil Mechanics
- Face recognition and analysis
- Liver physiology and pathology
- IoT and Edge/Fog Computing
- Geotechnical Engineering and Underground Structures
- Complex Network Analysis Techniques
- Internet Traffic Analysis and Secure E-voting
- IPv6, Mobility, Handover, Networks, Security
- Security and Verification in Computing
- Speech Recognition and Synthesis
- Security in Wireless Sensor Networks
- Cardiac, Anesthesia and Surgical Outcomes
- Topic Modeling
- Smart Grid Security and Resilience
- Model Reduction and Neural Networks
- Matrix Theory and Algorithms
Xidian University
2015-2025
Civil Aviation University of China
2020-2024
China University of Petroleum, East China
2023
Xiamen University
2015-2020
Niigata University
2020
Loyola University Maryland
2019
Hebei University of Science and Technology
2019
Chinese University of Hong Kong
2010-2017
University of Hong Kong
2010-2017
Chang'an University
2017
With the character of low maintenance, cloud computing provides an economical and efficient solution for sharing group resource among users. Unfortunately, data in a multi-owner manner while preserving identity privacy from untrusted is still challenging issue, due to frequent change membership. In this paper, we propose secure scheme, named Mona, dynamic groups cloud. By leveraging signature broadcast encryption techniques, any user can anonymously share with others. Meanwhile, storage...
Current knowledge on the shear wave velocity (V s ) and associated stiffness (G 0 of sand is built mainly results extensive laboratory studies clean quartz sands. Often natural sands are not clean, but contain a certain amount fines. The role fines in altering matter great concern, yet remains poorly understood. This paper presents an investigation into problem through well-controlled experiments conjunction with analysis interpretation at macro micro scale. were conducted for sequence...
Mobile crowdsensing (MCS) has gained popularity for its potential to leverage individual mobile devices sense, collect, and analyze data instead of deploying sensors. As the sensing become increasingly fine-grained complicated, there is a tendency enhance MCS with edge computing paradigm reduce time delays high bandwidth costs. The may reveal personal information, thus it great significance preserve privacy participants. However, preserving hinder process handling malicious In this paper, we...
Encrypted data search allows cloud to offer fundamental information retrieval service its users in a privacypreserving way.In most existing schemes, result is returned by semi-trusted server and usually considered authentic.However, practice, the may malfunction or even be malicious itself.Therefore, need verification mechanism detect potential misbehavior this computation outsourcing model rebuild their confidence whole process.On other hand, typically hosts large outsourced of storage.The...
In this paper, we investigate the problem of integrity auditing for cloud deduplication storage. Specifically, in addition to outsourced data confidentiality, also aim ensure deduplicated With existing works based on Provable Data Possession (PDP)/Proof Retrievability (PoR), are either required rely a fully trusted proxy server or inevitably sacrifice privacy and efficiency. contrast, present novel message-locked scheme without an additional server, which is applicable both file-level...
With the massive deployment of Internet Things (IoT) devices, many data analysis applications emerge for large amount accumulated by IoT. Federated learning (FedL) on IoT devices is an appealing mode to train a precise model. However, existing FedL schemes either take expensive computation costs (e.g., public-key cryptographic operations) or number interactions among participants. Obviously, these are unsuitable due limited computational and communication resources. In this work, we propose...
ABSTRACT By integrating the traditional grid with advanced communication and information technologies, smart can provide a reliable efficient energy service for our modern society. Data aggregation plays an important role in evaluating current usage of consumer domains, based on which operation center accommodate distributed power sources to maximize utilization efficiency. However, it also incurs potential risk privacy. In this paper, we propose anonymous multi‐dimensional data systems....
IEEE 802.16 m is now under consideration by the ITU to become IMT-Advanced standard. However, handover authentication a critical issue in this area. In letter, we propose fast mechanism based on ticket for m. The credential of Mobile Station (MS) issued access Base (BS) using multi-BS group key during initial authentication. When MS moves from service BS target BS, it can show its and authenticate without communicating with any other third party (e.g., previous server). Our analysis shows...
Extensible Authentication Protocol (EAP) is a framework which aims to provide flexible authentication for wireless networks. Due the involvement of an EAP server and several round trips between mobile node (MN) server, full takes about 1000ms unacceptable in handover process. This paper proposes privacy preserving scheme EAP-based We use proxy signature accomplish MN access point (AP) without involving third party. The detailed security analysis shows that our can achieve forward/backward...
The face recognition has become a common means of identity authentication because the advantages uniqueness, non-invasive and not easy to be stolen. outsourcing service provider is typical manner nowadays. However, it raises vital concerns about privacy server due sensitivity data. Therefore, frame based on technology privacy-preserving presented in this paper. convolutional neural network used for feature extraction. To overcome issue leaked, method secure nearest neighbor that can compute...
Tight sandstone reservoirs are characterized by multi-scale pore space and high clay content, resulting in intricate rock physical responses. In this work, imaging techniques, including computed tomography stitched scanning electron microscopy, applied to identify the large intergranular pores micropores within major minerals. The structure of tight sandstones is quantitatively investigated using images. Besides, multi-mineral digital rocks constructed performing registration segmentation...
Abstract To provide secure roaming services for mobile users in Global Mobility Networks, many schemes have been proposed recent years. However, most of them focus only on authentication and fail to satisfy practical security requirements such as user anonymity untraceability. address this problem, we propose a privacy‐preserving scheme based elliptic curve cryptography. The is provably under formal model that satisfies all requirements. Compared with existing schemes, ours enjoys better...
In the design and construction of large-scale earth structures such as hydraulic fills for artificial islands or tailings dams, a major concern is susceptibility sand to flow failure liquefaction. The big challenge in liquefaction evaluation evaluate situ state sand, because it extremely difficult obtain high-quality undisturbed samples that purpose. Here an attractive framework presented, which allows direct states sands with varying quantity fines through shear wave velocity measurements....
This paper investigates improving lightly supervised acoustic model training for an archive of broadcast data.Standard uses automatically derived decoding hypotheses using a biased language model.However, as the actual speech can deviate significantly from original programme scripts that are supplied, quality standard be poor.To address this issue, word and segment level combination approaches used between transcripts which yield improved transcriptions.Experimental results show systems...
Uploading data streams to a resource-rich cloud server for inner product evaluation, an essential building block in many popular stream applications (e.g., statistical monitoring), is appealing companies and individuals. On the other hand, verifying result of remote computation plays crucial role addressing issue trust. Since outsourced collection likely comes from multiple sources, it desired system be able pinpoint originator errors by allotting each source unique secret key, which...
Privacy concerns of using sensitive biometric data as credentials arise with the wide adoption user-friendly face authentication. To protect facial features users, two important functions, i.e., <i>revocability</i> and <i>reusability</i> , are anticipated to be realized in a privacy-preserving authentication design. Revocability requires an effective approach deregister or replace user when server is compromised; For reusability, same should appear independently non-cooperating applications....
Smart living is a trending lifestyle that envisions lower energy consumption, sound public services, and better quality of life for human being. The Internet Things (IoT) compelling platform connecting various sensors around us to the Internet, providing great opportunities realization smart living. Spintronic with superb measuring ability multiple unique advantages can be an important piece cornerstone IoT. In this review, we discuss successful applications spintronic in electrical current...
As cloud computing is becoming prevalent, data owners are motivated to delegate complex managements the commercial for economic savings. Sensitive usually encrypted before being uploaded cloud, which unfortunately makes frequently-used search function a challenging problem. In this paper, we present new multi-keyword dynamic scheme with result ranking make over more secure and practical. scheme, employ powerful function-hiding inner product encryption enhance security by preventing leakage...