- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Advanced Authentication Protocols Security
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- Security in Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Complexity and Algorithms in Graphs
- User Authentication and Security Systems
- Privacy, Security, and Data Protection
- Advanced Steganography and Watermarking Techniques
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Coding theory and cryptography
- Security and Verification in Computing
- Network Security and Intrusion Detection
- Vehicular Ad Hoc Networks (VANETs)
- Cryptography and Residue Arithmetic
- Biometric Identification and Security
- Hate Speech and Cyberbullying Detection
- Vestibular and auditory disorders
- Migraine and Headache Studies
- Smart Grid Security and Resilience
- Digital Media Forensic Detection
- Advanced Malware Detection Techniques
Zhejiang University
2024-2025
Shaanxi Provincial People's Hospital
2025
Shanxi Medical University
2025
Wuhan University of Technology
2015-2024
Central China Normal University
2023
Guizhou University
2022
American Jewish Committee
2022
Guangdong Ocean University
2022
Shenzhen University
2022
Deakin University
2022
¿¿¿¿¿¿Pre¿t a¿ Voter provides a practical approach to end-to-end verifiable elections with simple, familiar voter-experience. It assures high degree of transparency while preserving secrecy the ballot. Assurance arises from auditability election itself, rather than need place trust in system components. The original idea has undergone several revisions and enhancements since its inception 2004, driven by identification threats, availability improved cryptographic primitives, desire make...
Nowadays, as an essential technique for intelligent transportation, vehicular ad hoc networks (VANETs) has significantly improved people's travel experience, providing richer, and smarter services vehicles while ensuring driver safety. However, considering that VANETs are complex, some security challenges still remain, including but not restricted to privacy preserving of vehicles, authentication messages, limited resources in computational power, network bandwidth. To address these issues,...
To know the most recent market conditions, an e-commerce platform needs to be aware of sales situation its sellers' commodities. The conditions can help forecast future trends and develop policies guide sellers in reasonably allocating their inventory proportion. Statistical analysis is a fundamental approach studying situation. However, data usually has significant volume. Therefore, outsourcing statistical cloud servers effective method. Nevertheless, do not want leaked anyone or any other...
The Internet of Things (IoT) is helpful in making people's life more convenient and efficient. To ensure that the nodes within IoT can interact securely, a certificateless signature (CLS) be used to protect message authentication IoT. Recently, some concrete constructions CLS schemes have been proposed literature, but through our analyses, we demonstrate existing cannot keep their claimed security because various flaws. For example, valid forged by any Type I adversary replacing...
In recent years, the development of Internet Things technology has led to a surge in interest vehicular ad hoc network (VANET), which greatly improved travel efficiency and facilitated vehicle data sharing. To ensure privacy security both vehicles personnel, researchers have proposed various measures for securing VANET systems. Recently, certificate-based aggregate signature (CBAS) schemes been design an identity authentication protocol prevent tampering corruption private data. this study,...
In subjects with Vestibular Migraine (VM), a high Dizziness Handicap Inventory (DHI) scores is commonly observed, often reflecting severe impairment in balance. This investigation aims to evaluate the abnormalities DHI and explore associations between alterations brain function balance disorders individuals suffering from VM. Fifty-four VM 49 age-, sex-, education-matched healthy controls (HCs) underwent Resting-state functional magnetic resonance imaging (rs-fMRI). Differences whole-brain...
In Industrial Internet of Things (IIoT), the certificate-based aggregate signature (CBAS) scheme was used to ensure privacy and security IIoT, thus, concrete construction CBAS without bilinear pairing has proposed, which employed as an underlying building block create efficient data aggregation protocol. this article, we first point out that previous cannot keep its claimed security. Particularly, a malicious KGC can compute valid forgery signature, because it knowledge master secret key....
Smart grid provides convenience for power generation, consumption and distribution. Authenticated key exchange (AKE) is a fundamental technique to protect data transmission from interception tampering in smart grid. However, since the meters only have limited resources computation communication, most of existing AKE schemes are inefficient First, many use large security parameters compensate loose reduction their proofs. Second, these require at least three-round communication negotiate...
Abstract Climbing robots present transformative potential for automated structural inspections, yet their deployment remains limited by the reliance on manual control due to absence of effective environment perception and path‐planning solutions. The critical bottleneck lies in difficulty generating accurate planning maps solely through onboard sensors challenge capturing open, large‐scale, irregular environments (e.g., cable‐stayed bridge towers). This study proposes a building information...
<title>Abstract</title> <bold>Objective</bold>: In subjectswith Vestibular Migraine (VM), a high Dizziness Handicap Inventory (DHI) scores is commonly observed, often reflecting severe impairment in balance. This investigation aims to evaluate the abnormalities DHI and explore associations between alterations brain function balance disorders individuals suffering from VM. <bold>Methods</bold>: Fifty – four subjects with VM 49 age-, sex-, education matched healthy controls (HCs) underwent...
Sensitive data stored in laptops or other mobile devices can easily be lost, stolen, misplaced corrupted, the remote backup storage technique is used to address these issues; however, server could not fully trusted, should encrypted advance. Although key more protected due smaller size compared with data, it still impossible for ordinary human remember. A user-centred design scheme proposed using multi-factor authentication. The user firstly selects a symmetrical and divides into three...
In a secret-sharing scheme, the secret is shared among set of shareholders, and it can be reconstructed if quorum these shareholders work together by releasing their shares. However, in many applications, undesirable for nonshareholders to learn secret. cases, pairwise secure channels are needed exchange other words, key needs established between every pair shareholders. But employing an additional establishment protocol may make schemes significantly more complicated. To solve this problem,...
In the optimized footballer configurations, team coach selects players to participate in game based on training status of all players. As number excellent increases, costs and budget owned by club boss need be considered. Obviously, players' are considered as private sensitive also sensitive. Therefore, information might revealed process data sharing processing this distributed manner. Considering privacy-revealing issues above-mentioned scenario, article proposes a privacy-preserving...
The primary task of secure group communications in wireless sensor networks (WSNs) is to securely transmit various types data, for example weather traffic etc. Collected data WSNs different from most transmitted digital communication applications. Most collected contains only few bits information. Conventional protocols are not suitable since need more fast and lightweight communications. User authentication key establishment two fundamental security services WSNs. user allows entities...
The primary task of wireless sensor networks (WSNs) is to collect various types data, for example, weather traffic etc. Collected data in WSNs are different from most transmitted digital communication applications. Most collected contain only few bits information, but applications a large number bits. All existing encryptions use conventional symmetric-key (e.g., advanced encryption standard (AES)) which each large-size key used encrypt block fixed size 128 bit AES), and the security based...
In future intelligent transportation systems, vehicular ad hoc network (VANET) is a popular application. They provide early warning of dangers through wireless communication to improve road safety. Therefore, we should protect messages from leakage and changes during transmission. To ensure the security issues in process, propose secure effective certificateless signcryption scheme with multiple receivers prove its confidentiality unforgeability based on hardness discrete logarithm problem...