- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Residue Arithmetic
- Stochastic Gradient Optimization Techniques
- Security in Wireless Sensor Networks
- Complexity and Algorithms in Graphs
- Mobile Crowdsensing and Crowdsourcing
- User Authentication and Security Systems
- Blockchain Technology Applications and Security
- Coding theory and cryptography
- Chaos-based Image/Signal Encryption
- Cryptographic Implementations and Security
- Privacy, Security, and Data Protection
- Vehicular Ad Hoc Networks (VANETs)
- RFID technology advancements
- Security and Verification in Computing
- Wireless Body Area Networks
- Polynomial and algebraic computation
- graph theory and CDMA systems
- Cellular Automata and Applications
- Indoor and Outdoor Localization Technologies
- Advanced Data Storage Technologies
University of Electronic Science and Technology of China
2015-2025
Hangzhou Wanxiang Polytechnic
2025
Ghana Institute of Management and Public Administration
2024
Guangzhou University
2019
University of Chinese Academy of Sciences
2011
Jimei University
2006
Zhejiang University
2006
Heart failure is considered one of the leading cause death around world. The diagnosis heart a challenging task especially in under-developed and developing countries where there paucity human experts equipments. Hence, different researchers have developed intelligent systems for automated detection failure. However, most these methods are facing problem overfitting i.e. recently proposed improved accuracy on testing data while compromising training data. Consequently, constructed models...
Authenticated Key agreement protocol (AKA) is one of the essential components for reliable secure communication in Industrial Internet-of-Things (IIoT) model. Recently, Srinivas et al. proposed a three-factor elliptic curve cryptosystem (ECC)-based AKA called UAP-BCIoT WSN-based intelligent transportation system (ITS). In this paper, we first find out that their has security weak point inherently master secret disclose and key forgery defect which makes susceptible to variant impersonation...
The Internet of Things (IoT), recognized as one the major technological revolutions in century, is deployed and used today sociality. related security issues are taken into account by academia industry. Recently, an online/offline certificateless signature scheme (OO-CLS) proposed Saeed et al. to construct a heterogeneous remote anonymous authentication protocol (HRAAP) wireless body area networks based on IoT. However, this article, we show that vulnerable forgery attack which not necessary...
The logistic model is a very elementary and important in the field of machine learning. In this article, an efficient differential privacy classification mechanism proposed. proposed better than object function perturbation terms running time accuracy. Regarding accuracy, mechanism's accuracy almost same as no (non-dp) mechanism, that both test train As for training model, non-dp mechanism.
Recently, Jin, Wen, and Du proposed an identity-based signcryption scheme in the standard model. In this letter, we show that their does not have indistinguishability against adaptive chosen ciphertext attacks existential unforgeability messages attacks.
Outsourced decryption attribute-based encryption (OD-ABE) is emerging as a promising cryptographic tool to provide efficient fine-grained access control for data accessing and sharing in cloud-assisted Intelligent Internet of Mobile Things (IIoMT). Decryption verification an essential property OD-ABE enable the mobile user verify precision data. Unfortunately, most representative (commitment) algorithms have various security flaws. In this article, we first indicate that two state-of-art...
The advent of cloud computing arouses the flourish data sharing, promoting development research, especially in fields analysis, artificial intelligence, etc. In order to address sensitive information hiding, auditing shared efficiently and malicious manager preventing, we propose an identity-based scheme for with a secure mechanism hide information. This provides solution that allows users share plaintext researchers keeps invisible at same time. Besides, formal security analysis is given...
A broadcast encryption scheme with personalized messages (BEPM) is a in which broadcaster transmits not only encrypted to subset of recipients but also each user individually. Several (BE) schemes allow encrypts message for S public keys and any can decrypt the his/her private key. However, these BE provide an efficient way transmit In this paper, we propose transmission messages. Besides, based on multilinear maps ensure constant ciphertext size key achieve statically security. More...
With the wide deployment of wireless networks, attackers may exploit Wi-Fi network vulnerabilities to transfer data secretly, or covert communication channels spread malicious codes. The protocol formats reverse engineering technique can be used detect such attacks, however, previous works are focused on application layer analysis, and hardly work under scenarios that captured is only in binary format due lack semantics. In this paper, we propose a novel framework, which utilizes association...
In the field of social survey misconduct and legal consultation, features confidentiality, integrity, deniable authentication, non-repudiation are needed for sake preserving privacy. For this special kind application scenario, we propose an efficient authentication encryption scheme. Our scheme can achieve four secure in a single logical step. And compared with latest scheme, our reduces computational cost by about 30%, decryption 50%, length ciphertext 33%. Its security is shown random oracle model.
To reduce a user's decryption cost and protect the private information from being leaked, Green et al. proposed an approach outsourcing of attribute based encryption (ABE) scheme to cloud server. Later, almost all ABE schemes with outsourced (ABE-OD) used their model or approach. However, server needs repeat service same ciphertext for distinct users satisfying access policy in these schemes. computing is atmosphere conscientious recyclable utilization resources. The green networks can...
Massive Internet of Things (IoT) data sets are possessed by big institutions serving daily life because IoT devices widely used in our such as wearable and smart home devices. Publishing these among various causes an increasing number users to concern their personal privacy. Differential privacy is the state-of-the-art concept preservation, but it suffers from low accuracy. In this article, we improve differentially private mechanisms including Laplace mechanism well sample aggregation...
He et al. proposed a certificateless provable data possession protocol for big storage on cloud. They claimed that the scheme is not only secure, but also can achieve integrity checking without downloading stored from cloud server. However, in this paper, we show al.'s has some security flaw and cannot get property of at all. Specifically, by observing signature used their protocol, find server (or any user who gets signature-message pairs) generate valid message. Then, tamper owner...
Recently, security and privacy issues in mobile communication systems became an enormous challenge due to the limited resources of networks regarding overhead, computational cost, battery power. 5G provide high performance flexibility that can connect billion objects through Heterogeneous Wireless Networks (HWN) concerning Internet Things (IoT). However, some these challenges be addressed by using outsourced assistants such as Server-Aided Verification (SAV) contribute partially with...