Shanpeng Liu

ORCID: 0000-0003-1391-9932
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Recommender Systems and Techniques
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Service-Oriented Architecture and Web Services
  • Advanced Graph Neural Networks
  • IoT and Edge/Fog Computing
  • Privacy-Preserving Technologies in Data
  • Web Data Mining and Analysis
  • Mobile and Web Applications
  • Advanced Malware Detection Techniques
  • Complex Network Analysis Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • RFID technology advancements
  • Sentiment Analysis and Opinion Mining
  • User Authentication and Security Systems
  • Advanced Computing and Algorithms
  • Privacy, Security, and Data Protection
  • Text and Document Classification Technologies
  • Advanced Authentication Protocols Security

Hunan University of Science and Technology
2018-2024

As the rapid development of 5G and Internet Things (IoT) techniques, more mobile devices with specific sensing capabilities access to network large amounts data. The traditional architecture cloud computing cannot satisfy requirements, such as low latency, fast data for IoT applications. Mobile edge (MEC) can solve these problems, improve execution efficiency system. In this paper, we propose a privacy preserving aggregation scheme MEC assisted our model, there are three participants, i.e.,...

10.1109/jiot.2018.2874473 article EN IEEE Internet of Things Journal 2018-10-08

The booming Internet of Things makes smart healthcare a reality, while cloud-based medical storage systems solve the problems large-scale and real-time access data. integrity data outsourced in has become crucial since only complete can make correct diagnosis, public auditing protocol is key technique to this problem. To guarantee reduce burden owner, we propose an efficient privacy-preserving for systems, which supports functions batch dynamic update Detailed security analysis shows that...

10.1109/jbhi.2022.3140831 article EN IEEE Journal of Biomedical and Health Informatics 2022-01-06

Purpose With the increasing number of mobile applications, efficiently recommending applications to users has become a challenging problem. Although existing application recommendation approaches based on user attributes and behaviors have achieved notable effectiveness, they overlook diffusion patterns interdependencies topic-specific among groups. This paper aims capture To achieve this, topic-aware neural network-based method, referred as TN-MR, is proposed. Design/methodology/approach In...

10.1108/ijwis-10-2023-0205 article EN International Journal of Web Information Systems 2024-02-02

With the development of Internet Things (IoT)-enabled Maritime Transportation Systems (MTS), massive data generated in system not only requires to be stored reliably and cheaply, but also needs analyzed timely. The Cloud-based (CMTS) allow users upload without worrying about price, capacity, location so on. However, CMTS brings some security issues, where integrity protection outsourced is one most important issues since it crucial for safety, reliability efficiency sea lanes. To solve this...

10.1109/tits.2022.3179991 article EN IEEE Transactions on Intelligent Transportation Systems 2022-01-01

Purpose With the exponential growth of mobile applications, recommending suitable applications to users becomes a critical challenge. Although existing methods have made achievements in application recommendation by leveraging graph convolutional networks (GCNs), they suffer from two limitations: reliance on singular acquisition path leads signal sparsity, and neighborhood aggregation method exacerbates adverse impact noisy interactions. This paper aims propose SMAR, self-supervised approach...

10.1108/ijwis-06-2024-0178 article EN International Journal of Web Information Systems 2024-10-16

In this paper, we discuss a security weakness of Shen <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al.</i> 's public auditing protocol for cloud data [IEEE Transactions on Information Forensics and Security, 12(10): 2402-2415, 2017.]. Specifically, point out their is vulnerable to privacy breach attack, xmlns:xlink="http://www.w3.org/1999/xlink">i.e.</i> , an adversary, once he compromises the third-party auditor latently, can also...

10.1109/tifs.2020.2978592 article EN IEEE Transactions on Information Forensics and Security 2020-01-01

In this article, we point out the security weakness of Shang <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al.</i> 's identity-based dynamic data auditing protocol for big storage. Specifically, identify that their is vulnerable to a secret key reveal attack, i.e., service provider (SP) can owner (DO) from stored data. Further, SP also generate proof pass challenge TPA (third party auditor) even if all block and tag pairs have been...

10.1109/tbdata.2020.3026318 article EN IEEE Transactions on Big Data 2020-09-24

With the emergence of more and Web services, finding suitable services becomes a difficult problem. Service link prediction is employed to disclose relationships among which facilitates further development service composition, selection, recommendation. But existing approaches simply utilize structural features network. In reality, rich text content in node description documents also carries latent but fine-grained semantics generated by multifaceted topic-aware factors, yet few efforts are...

10.1109/icws60048.2023.00065 article EN 2023-07-01

Summary Web service recommendation as an emerging topic attracts increasing attention due to its important practical significance. As the number of available services continues grow, users face challenge searching most suitable that meet their specific needs. Quality (QoS)‐based becomes a popular approach address this issue. However, existing QoS‐based methods are inability effectively capture valuable content and structural information from services. These often rely solely on low‐order...

10.1002/cpe.8038 article EN Concurrency and Computation Practice and Experience 2024-02-22

With the prosperity of mobile Internet, abundance data makes it difficult for users to choose their favorite app. Thus, app recommendation as an emerging topic attracts lots attention. However, existing methods rarely consider accuracy under privacy representation user preferences. To address this problem, we propose a privacy-aware package method named APP-Rec. Specifically, in method: 1) treat and its associated heterogeneous entities (APP-Rec considers not only apps themselves but also...

10.1109/tai.2024.3443028 article EN IEEE Transactions on Artificial Intelligence 2024-08-16

With the increasing number of Web services, service discovery becomes a significant challenge, and classification methods based on Graph Neural Network (GNN) are considered to be an efficient way for discovery. However, these rarely exploit structure-based feature-based prior knowledge services. To address this problem, paper proposes method graph neural network distillation. In method, firstly, it employs Word2Vec extract semantic feature vector from descriptions, then builds relationship...

10.1109/smartworld-uic-atc-scalcom-digitaltwin-pricomp-metaverse56740.2022.00243 article EN 2022-12-01

In today’s society, Global Mobile Networks (GLOMONETs) have become an important network infrastructure that provides seamless roaming service for mobile users when they leave their home network. Authentication is essential mechanism secure communication among the user, network, and foreign in GLOMONET. Recently, Madhusudhan Shashidhara presented a lightweight authentication protocol application However, we found not only has design flaws, but also vulnerable to many attacks. To address these...

10.3390/electronics8090939 article EN Electronics 2019-08-26
Coming Soon ...