Kai Fan

ORCID: 0000-0001-6870-6657
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • RFID technology advancements
  • Cloud Data Security Solutions
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Advanced Steganography and Watermarking Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Complexity and Algorithms in Graphs
  • Chaos-based Image/Signal Encryption
  • Security in Wireless Sensor Networks
  • Network Time Synchronization Technologies
  • Geomechanics and Mining Engineering
  • Access Control and Trust
  • Vehicular Ad Hoc Networks (VANETs)
  • Digital Rights Management and Security
  • Cloud Computing and Resource Management
  • Cryptography and Residue Arithmetic
  • Advanced Data Storage Technologies
  • Adversarial Robustness in Machine Learning
  • graph theory and CDMA systems
  • Optical Wireless Communication Technologies
  • Rock Mechanics and Modeling

Xidian University
2016-2025

China Jiliang University
2024

Chengdu University of Information Technology
2023

State Key Laboratory of Cryptology
2023

University of Science and Technology Beijing
2023

University of Memphis
2022

Arkansas State University
2019

Huainan Mining Industry Group (China)
2011

Hefei Design and Research Institute of Coal Industry (China)
2008

With the sharp increase in number of intelligent devices, Internet Things (IoT) has gained more and attention rapid development recent years. It effectively integrates physical world with over existing network infrastructure to facilitate sharing data among devices. However, its complex large-scale structure brings new security risks challenges IoT systems. To ensure data, traditional access control technologies are not suitable be directly used for implementing systems because their...

10.1109/access.2019.2905846 article EN cc-by-nc-nd IEEE Access 2019-01-01

Traditional medical privacy data are at a serious risk of disclosure, and many related cases have occurred over the years. For example, personal can be easily leaked to insurance companies, which not only compromises individuals, but also hinders healthy development industry. With continuous improvement cloud computing big technologies, Internet Things technology has been rapidly developed. Radio frequency identification (RFID) is one core technologies Things. The application RFID system...

10.1109/tii.2018.2794996 article EN IEEE Transactions on Industrial Informatics 2018-01-18

Many artificial intelligence technologies have been applied for extracting useful information from massive industrial big data. However, the privacy issues are usually overlooked in many existing methods. In this article, we propose an anonymous and privacy-preserving federated learning scheme mining of We explored effect proportion shared parameters on accuracy through experiments, found that sharing partial can almost achieve all parameters. On basis, our proposed reduces leakage by fewer...

10.1109/tii.2021.3052183 article EN IEEE Transactions on Industrial Informatics 2021-01-15

Now, the authors' life is full of vast amount information, era information has arrived. So content-centric networks face severe challenges in dealing with a huge range content requests, bringing protection and sharing concerns content. How to protect network efficiently securely for upcoming 5G become problem. The authors propose scheme based on blockchain solve privacy issues mobile 5G. implement mutual trust between providers users. Besides, openness tamper-resistant ledger ensure access...

10.1049/iet-com.2017.0619 article EN IET Communications 2017-11-01

The vehicular social networks (VSNs) supports diverse kinds of services such as traffic management, road safety, and sharing data (videos, audios, roads photos, air quality, so on). However, its complex, large-scale dynamic network structure poses new security challenges. Among these challenges, secure transmission has turned to be a spotlight. Ciphertext-policy attribute-based encryption (CP-ABE) may adopted realize one-to-many in VSNs. In traditional CP-ABE schemes, access policy is stored...

10.1109/tvt.2020.2968094 article EN IEEE Transactions on Vehicular Technology 2020-01-22

As one of the core techniques in 5G, Internet Things is more interested than ever. Furthermore, radio frequency identification RFID plays a crucial role development. Although low-cost system has wide prospect, it to face with huge challenges because potential security risks, privacy problems, and efficiency its restrictions on processing, storage, power tags. One possible solutions secure authentication lightweight protocol. A mutual protocol cache reader proposed this paper, named LRMAPC....

10.1002/sec.1314 article EN Security and Communication Networks 2015-08-03

With the rapid development of big data and Internet things (IOT), number networking devices volume are increasing dramatically. Fog computing, which extends cloud computing to edge network can effectively solve bottleneck problems transmission storage. However, security privacy challenges also arising in fog-cloud environment. Ciphertext-policy attribute-based encryption (CP-ABE) be adopted realize access control systems. In this paper, we propose a verifiable outsourced multi-authority...

10.3390/s17071695 article EN cc-by Sensors 2017-07-24

Internet of Things (IoT) has been developed rapidly to make our life easier. In many IoT applications (e.g., smart homes, healthcare, etc.), all the devices should be synchronized in time. However, some malicious nodes located network can influence time synchronization, which may interrupt system and lead serious accidents. Therefore, it is critical challenging guarantee accuracy consistency during synchronization among devices. this paper, we propose a blockchain-based scheme assure...

10.1109/jiot.2018.2874222 article EN IEEE Internet of Things Journal 2018-10-05

Cloud-based RFID provides a new solution for the smart healthcare environment, and cloudbased systems have many advantages over traditional systems, such as efficient medical assets management information sharing. However, in system, untrusted cloud server manages private information, these data are transmitted on public wireless channel, which exposes them to high risk of leakage. Furthermore, attacks system may lead serious consequences. Assuming tag is implanted an artificial organ...

10.1109/mnet.2019.1800225 article EN IEEE Network 2019-03-01

Cloud storage system provides data owners with remote service, which allows them to outsource without local burden. Nevertheless, the cloud service is not fully trustworthy since it may be honest and would corrupted. One way ensure preservation of auditing method, through can check reliability on demand avoid potential corruption in time. However, private methods fail promise mutual trust results. Thus, public are introduced, traditionally a third party auditor delegated interact providers...

10.1109/access.2020.2993606 article EN cc-by IEEE Access 2020-01-01

The attribute-based encryption (ABE) scheme, which can set specific conditions to control user access data, has been widely studied and applied cloud storage services. Considering file hierarchy in practical scenarios, the ABE scheme a hierarchical policy so multiple files be associated with one structure reduce users' computing overhead save server's space. However, existing systems have risk of collusion due parameters. This paper proposes secure supporting resistance (CR-FH-CPABE)...

10.1109/jiot.2024.3358745 article EN IEEE Internet of Things Journal 2024-01-29

In the existing watermarking protocols, a trusted third party (TTP) is introduced to guarantee that protocol fair both seller and buyer in digital content transaction. However, TTP decreases security affects implementation. To address this issue, article secure buyer–seller without assistance of proposed which there are only two participants, buyer. Based on idea sharing secret, watermark embedded trace piracy composed pieces secret information, one produced by Since neither knows exact...

10.1049/ip-ifs:20055069 article EN IEE proceedings. Information security 2006-01-01

As vehicular equipment is becoming more and intelligent, the information service, as main means of capturing information, has been far from able to meet needs occupants [1, 2]. Cloud computing, with its powerful computing storage capabilities, convenient network access, energy saving excellent scalability, reliability, availability, other advantages, can be an effective solution limitations existing automotive services. Connected cloud which combines VANETs, characteristics both a platform...

10.1109/mnet.2018.1700327 article EN IEEE Network 2018-05-01

With the development of Internet technology, demand for openness and sharing information in network grows rapidly. Data one domain can not satisfy users' requirement. What a user needs may be data another management domain, so there is an urgent need secure way to share among different domains. At present, some web technology (JSONP, server proxy, cross frame on) attribute-based encryption (ABE) are main methods solve cross-domain sharing. The problem face security authentication In edge...

10.1109/edge.2018.00019 article EN 2018-07-01

With the advent of 5G and Internet Things, edge computing cloud with their respective strengths are bound as Cloud-Edge-End Orchestrated (CEEO). The CEEO network integrates artificial intelligence provides innovative technologies for smart grid applications services. massive data transmission on network, trustworthiness service node exerts an enormous influence privacy. To realize securely share decrease local storage, end-user prefer to encrypt upload it cloud. Meanwhile, challenge is how...

10.1109/tcc.2021.3134015 article EN IEEE Transactions on Cloud Computing 2021-12-09
Coming Soon ...