- Blockchain Technology Applications and Security
- Cryptography and Data Security
- User Authentication and Security Systems
- Privacy-Preserving Technologies in Data
- Lymphoma Diagnosis and Treatment
- Advanced Authentication Protocols Security
- IoT and Edge/Fog Computing
- Internet Traffic Analysis and Secure E-voting
- Caching and Content Delivery
- Scientific Computing and Data Management
- IoT and GPS-based Vehicle Safety Systems
- Access Control and Trust
- Anomaly Detection Techniques and Applications
- Advanced Steganography and Watermarking Techniques
- Cloud Data Security Solutions
- Viral-associated cancers and disorders
- Digital Rights Management and Security
- Vascular Tumors and Angiosarcomas
- Data-Driven Disease Surveillance
- Indoor and Outdoor Localization Technologies
- Context-Aware Activity Recognition Systems
- Peer-to-Peer Network Technologies
- Vehicular Ad Hoc Networks (VANETs)
University of Electronic Science and Technology of China
2020-2024
Huzhou University
2023
Peking University Cancer Hospital
2021
Peking University
2021
Ocean University of China
2013
In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and users holding devices for supporting related services. However, critical threats towards confidentiality authenticity are raised: adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. Furthermore, have store (secret public) keys used locally. Consequently, only maintaining can be utilized access services provided by servers, "portability"...
Single-sign-on (SSO) authentication employs an identity provider (IdP) to provide users with efficient way authenticate themselves different service providers and has been widely applied in digital systems. However, existing SSO schemes suffer from critical issues terms of security privacy. Regarding security, most achieve a high convenience at the expense are thereby susceptible various attacks. privacy, fail protect users' subscription pattern access against adversaries who can easily...
This study evaluated the survival benefit of asparaginase (ASP)-based versus non-ASP-based chemotherapy combined with radiotherapy in a real-world cohort patients early-stage extranodal nasal-type natural killer/T-cell lymphoma (ENKTCL).We identified 376 who received either ASP-based (ASP, platinum, and gemcitabine; n = 286) or (platinum 90) regimens. The were stratified into low-, intermediate-, high-risk groups using early stage-adjusted nomogram-revised risk index. Overall (OS) distant...
We propose a protection mechanism for password-based credential databases maintained by service providers against leakage, dubbed PCDL. In PCDL, each authentication is derived from user's password and salt, where provider employs set of key servers to share the salt in threshold way. With an external adversary cannot derive any information about underlying passwords compromised database, even if he can compromise some servers. The most prominent manifestation PCDL transparency: integrating...
Certificate revocation checking (CRC) is a fundamental requirement in certificate-based public-key cryptographic systems. Most existing CRC schemes are not tailored for edge-cloud computing systems, and directly applying these would cause security efficiency problems. In this article, we first propose two-layer edge-cloud-assisted framework, dubbed ECA-CRC, where edge nodes utilizing probabilistic algorithm serve as layer, the cloud server deterministic serves second layer. Both...
Smartphones have been widely integrated with GPS receiver, which may provide accurate location information of vehicles without cost increase. Traditionally, LBS applications obtain vehicle locations then using the Hypertext Transfer Protocol (HTTP) protocol uploaded to central servers a fixed frequency. In this paper, we exploit an intelligent strategy sensing and transmitting. Explicitly, implemented platform collect real-time data from vehicles. A common Android Smartphone serves as sensor...
Blockchain has brought great potential in improving Space-Air-Ground Integrated Networks (SAGINs) terms of security and efficiency. In blockchain-integrated SAGINs, many applications services inherently require both the communication contents behaviors to be secure against eavesdroppers, which a covert algorithm is always deployed as fundamental component. However, existing schemes suffer from critical problems. On one hand, they sender locally maintain cryptographic key for long period...
Syndrome-based early epidemic warning plays a vital role in preventing and controlling unknown outbreaks. It monitors the frequency of each syndrome, issues if some is aberrant, identifies potential outbreaks, alerts governments as possible. Existing systems adopt cloud-assisted paradigm to achieve cross-facility statistics on syndrome frequencies. However, these systems, all symptom data would be directly leaked cloud, which causes critical security privacy issues. In this paper, we first...
In mobile edge computing (MEC) systems, data is frequently transmitted between MEC servers and devices for supporting related services. However, critical threats towards confidentiality authenticity are raised, where adversaries always attempt to extract content from the transmission impersonate others spread malicious profits. this paper, we propose a blockchain-based authenticated scheme, dubbed Badge, establish secure channels devices. Badge based on hybrid encryption mechanism, which...
In this paper, we propose an efficient private set intersection protocol, named LL-PSI, to enable two parties (where each party has individual set) obtain the of their sets without leaking other information about other. Compared with existing protocols, LL-PSI reduces computational latency between significantly at expense communication costs parties. Based on a privacy-preserving friend matching scheme for mobile social networks, dubbed PAIRING. PAIRING allows users match those who have...
In this paper, we investigate actual exchange-assisted data trading systems and point out that the increment of content in a sensitive dataset always results its privacy level, i.e., making more than before. As consequence, follows an incremental privacy-driven paradigm, where (1) buyers with various requirements would purchase subsets different levels, (2) when buyer purchases subset entire higher level privacy, all lower levels are required (in other words, there is containment...