Yaqing Song

ORCID: 0009-0004-8966-2779
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • User Authentication and Security Systems
  • Privacy-Preserving Technologies in Data
  • Lymphoma Diagnosis and Treatment
  • Advanced Authentication Protocols Security
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Caching and Content Delivery
  • Scientific Computing and Data Management
  • IoT and GPS-based Vehicle Safety Systems
  • Access Control and Trust
  • Anomaly Detection Techniques and Applications
  • Advanced Steganography and Watermarking Techniques
  • Cloud Data Security Solutions
  • Viral-associated cancers and disorders
  • Digital Rights Management and Security
  • Vascular Tumors and Angiosarcomas
  • Data-Driven Disease Surveillance
  • Indoor and Outdoor Localization Technologies
  • Context-Aware Activity Recognition Systems
  • Peer-to-Peer Network Technologies
  • Vehicular Ad Hoc Networks (VANETs)

University of Electronic Science and Technology of China
2020-2024

Huzhou University
2023

Peking University Cancer Hospital
2021

Peking University
2021

Ocean University of China
2013

In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and users holding devices for supporting related services. However, critical threats towards confidentiality authenticity are raised: adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. Furthermore, have store (secret public) keys used locally. Consequently, only maintaining can be utilized access services provided by servers, "portability"...

10.1109/tc.2024.3355759 article EN IEEE Transactions on Computers 2024-01-22

Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with efficient way authenticate themselves different service providers and has been widely applied in digital systems. However, existing SSO schemes suffer from critical issues terms of security privacy. Regarding security, most achieve a high convenience at the expense are thereby susceptible various attacks. privacy, fail protect users' subscription pattern access against adversaries who can easily...

10.1109/tifs.2024.3392533 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

This study evaluated the survival benefit of asparaginase (ASP)-based versus non-ASP-based chemotherapy combined with radiotherapy in a real-world cohort patients early-stage extranodal nasal-type natural killer/T-cell lymphoma (ENKTCL).We identified 376 who received either ASP-based (ASP, platinum, and gemcitabine; n = 286) or (platinum 90) regimens. The were stratified into low-, intermediate-, high-risk groups using early stage-adjusted nomogram-revised risk index. Overall (OS) distant...

10.1016/j.esmoop.2021.100206 article EN cc-by-nc-nd ESMO Open 2021-07-07

We propose a protection mechanism for password-based credential databases maintained by service providers against leakage, dubbed PCDL. In PCDL, each authentication is derived from user's password and salt, where provider employs set of key servers to share the salt in threshold way. With an external adversary cannot derive any information about underlying passwords compromised database, even if he can compromise some servers. The most prominent manifestation PCDL transparency: integrating...

10.1109/tifs.2023.3324326 article EN IEEE Transactions on Information Forensics and Security 2023-10-13

Certificate revocation checking (CRC) is a fundamental requirement in certificate-based public-key cryptographic systems. Most existing CRC schemes are not tailored for edge-cloud computing systems, and directly applying these would cause security efficiency problems. In this article, we first propose two-layer edge-cloud-assisted framework, dubbed ECA-CRC, where edge nodes utilizing probabilistic algorithm serve as layer, the cloud server deterministic serves second layer. Both...

10.1109/jiot.2023.3264682 article EN IEEE Internet of Things Journal 2023-04-05

Smartphones have been widely integrated with GPS receiver, which may provide accurate location information of vehicles without cost increase. Traditionally, LBS applications obtain vehicle locations then using the Hypertext Transfer Protocol (HTTP) protocol uploaded to central servers a fixed frequency. In this paper, we exploit an intelligent strategy sensing and transmitting. Explicitly, implemented platform collect real-time data from vehicles. A common Android Smartphone serves as sensor...

10.1109/iccsnt.2013.6967324 article EN 2013-10-01

Blockchain has brought great potential in improving Space-Air-Ground Integrated Networks (SAGINs) terms of security and efficiency. In blockchain-integrated SAGINs, many applications services inherently require both the communication contents behaviors to be secure against eavesdroppers, which a covert algorithm is always deployed as fundamental component. However, existing schemes suffer from critical problems. On one hand, they sender locally maintain cryptographic key for long period...

10.1051/sands/2024006 article EN cc-by Security and Safety 2024-01-01

10.1109/icc51166.2024.10622710 article EN ICC 2022 - IEEE International Conference on Communications 2024-06-09

10.1109/icc51166.2024.10622818 article EN ICC 2022 - IEEE International Conference on Communications 2024-06-09

Syndrome-based early epidemic warning plays a vital role in preventing and controlling unknown outbreaks. It monitors the frequency of each syndrome, issues if some is aberrant, identifies potential outbreaks, alerts governments as possible. Existing systems adopt cloud-assisted paradigm to achieve cross-facility statistics on syndrome frequencies. However, these systems, all symptom data would be directly leaked cloud, which causes critical security privacy issues. In this paper, we first...

10.56553/popets-2025-0020 article EN Proceedings on Privacy Enhancing Technologies 2024-11-10

10.1016/j.sysarc.2020.101851 article EN Journal of Systems Architecture 2020-08-07

In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and devices for supporting related services. However, critical threats towards confidentiality authenticity are raised, where adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. this paper, we propose a blockchain-based authenticated scheme, dubbed Badge, establish secure channels devices. Badge based on hybrid encryption mechanism, which...

10.1109/icc45855.2022.9838606 article EN ICC 2022 - IEEE International Conference on Communications 2022-05-16

In this paper, we propose an efficient private set intersection protocol, named LL-PSI, to enable two parties (where each party has individual set) obtain the of their sets without leaking other information about other. Compared with existing protocols, LL-PSI reduces computational latency between significantly at expense communication costs parties. Based on a privacy-preserving friend matching scheme for mobile social networks, dubbed PAIRING. PAIRING allows users match those who have...

10.1109/globecom46510.2021.9685386 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2021-12-01

In this paper, we investigate actual exchange-assisted data trading systems and point out that the increment of content in a sensitive dataset always results its privacy level, i.e., making more than before. As consequence, follows an incremental privacy-driven paradigm, where (1) buyers with various requirements would purchase subsets different levels, (2) when buyer purchases subset entire higher level privacy, all lower levels are required (in other words, there is containment...

10.1109/pimrc56721.2023.10294035 article EN 2023-09-05
Coming Soon ...