Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2021
Enabling Efficient Decentralized and Privacy Preserving Data Sharing in Mobile Cloud Computing
Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security ...
- research-articleJanuary 2021
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network
In a 5G network-sliced environment, mobility management introduces a new form of handover called inter-slice handover among network slices. Users can change their slices as their preferences or requirements vary over time. However, existing handover-...
- research-articleJanuary 2021
Blockchain-Based Fine-Grained Data Sharing for Multiple Groups in Internet of Things
Cloud-based Internet of Things, which is considered as a promising paradigm these days, can provide various applications for our society. However, as massive sensitive and private data in IoT devices are collected and outsourced to cloud for data storage, ...
- research-articleJanuary 2021
Audit Outsourced Data in Internet of Things
With the increase in network transmission rates, the Internet of Things (IoT) has gradually become a trend. Users can upload the data generated by the device to the cloud database to save local storage space, thereby reducing local storage costs. Because ...
- research-articleJanuary 2021
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing
Recently, cloud-based mobile crowdsensing (MCS) has developed into a promising paradigm which can provide convenient data sensing, collection, storage, and sharing services for resource-constrained terminates. Nevertheless, it also inflicts many security ...
- research-articleJanuary 2021
Android Malware Detection via Graph Representation Learning
With the widespread usage of Android smartphones in our daily lives, the Android platform has become an attractive target for malware authors. There is an urgent need for developing an automatic malware detection approach to prevent the spread of malware. ...
- research-articleJanuary 2021
Identifying IoT Devices Based on Spatial and Temporal Features from Network Traffic
With the rapid growth of the Internet of Things (IoT) devices, security risks have also arisen. The preidentification of IoT devices connected to the network can help administrators to set corresponding security policies according to the functionality and ...
- research-articleJanuary 2021
Combinatorial Spectrum E-Auction for 5G Heterogeneous Networks: A Zether-Based Approach
5G heterogeneous network (HetNet) is a novel network topology that integrates various kinds of wireless access technologies such as 4G Long-Term Evolution (LTE), Wi-Fi, and so on. Despite greatly improving spectrum efficiency, it poses enormous challenges ...
- research-articleJanuary 2021
Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees
IEEE Transactions on Information Forensics and Security (TIFS), Volume 16Pages 4909–4923https://doi.org/10.1109/TIFS.2021.3118880Structured Encryption (STE), which allows a server to provide secure search services on encrypted data structures, has been widely investigated in recent years. To meet expressive search requirements in practical applications, a large number of STE ...
- research-articleDecember 2020
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), Volume 16, Issue 4Article No.: 124, Pages 1–22https://doi.org/10.1145/3408299The guarantee of social stability comes from many aspects of life, and image information security as one of them is being subjected to various malicious attacks. As a means of information attack, image splicing forgery refers to copying some areas of an ...
- ArticleDecember 2020
Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach
AbstractThe characteristics of social networks has always been a hot topic of scientific research. In order to protect the privacy of users, the owner of the private data need to provide privacy protection when providing inquiries or publishing data. ...
- research-articleDecember 2020
FHPT: Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability
GLOBECOM 2020 - 2020 IEEE Global Communications ConferencePages 1–6https://doi.org/10.1109/GLOBECOM42002.2020.9322135E-healthcare cloud remarkably facilitates patients to outsource their electronic health record (EHR) to achieve large-scale information sharing in real-time for improving the efficiency of diagnosis and treatment. Unfortunately, compared with other ...
- research-articleNovember 2020
A group key agreement based encrypted traffic detection scheme for Internet of Things
SecICPS '20: Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical SystemsPages 19–26https://doi.org/10.1145/3417312.3432093In CCS 2019, the privacy-preserving deep package inspection (PrivDPI) was proposed to detect anomalies and suspicious activities in encrypted network traffic, which is a provably secure and highly efficient approach for the end-to-end communication ...
- research-articleNovember 2020
GPS Spoofing Detection via SNR
SecICPS '20: Proceedings of the 1st ACM International Workshop on Security and Safety for Intelligent Cyber-Physical SystemsPages 1–5https://doi.org/10.1145/3417312.3431826Nowadays, the use of GPS has penetrated everyone's daily life, so the safety of GPS signals has threatened all of us. Since the portable GPS spoof was proposed at the Black Hat Conference, the cost and threshold of GPS spoofing have also been getting ...
- research-articleNovember 2020
Achieving secure and convenient WLAN sharing in personal
IET Information Security (ISE2), Volume 14, Issue 6Pages 733–744https://doi.org/10.1049/iet-ifs.2020.0134The authors analyse the security threats caused by personal wireless local area network (WLAN) sharing, propose schemes under two different conditions, and evaluate the performance of their schemes. WLAN is a widely used low‐cost wireless networking ...
- research-articleOctober 2020
RansomSpector: An introspection-based approach to detect crypto ransomware
AbstractCrypto ransomware encrypts user files and then extorts a ransom for decryption, thus it brings a big threat to users. To address this problem, we propose RansomSpector, an introspection-based approach to detect crypto ransomware. ...
- research-articleOctober 2020
A secured TPM integration scheme towards smart embedded system based collaboration network
AbstractTo achieve more powerful task processing capabilities, the smart embedded systems (SES) are interconnected via wireless network to form a collaboration system. However, due to the limitations on system hardware, the SES device are usually built ...
- ArticleSeptember 2020
Spatial Dynamic Searchable Encryption with Forward Security
AbstractNowadays, spatial search services bring unprecedented convenience in people’s daily life (e.g., location-based services, social networking) and are becoming more and more popular. To protect the privacy of outsourcing data, several schemes have ...
- research-articleJuly 2020
Search Me in the Dark: Privacy-preserving Boolean Range Query over Encrypted Spatial Data
IEEE INFOCOM 2020 - IEEE Conference on Computer CommunicationsPages 2253–2262https://doi.org/10.1109/INFOCOM41043.2020.9155505With the increasing popularity of geo-positioning technologies and mobile Internet, spatial keyword data services have attracted growing interest from both the industrial and academic communities in recent years. Meanwhile, a massive amount of data is ...
- research-articleJuly 2020
A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation
IEEE Transactions on Wireless Communications (TWC), Volume 19, Issue 7Pages 4632–4642https://doi.org/10.1109/TWC.2020.2985690Dynamic spectrum access (DSA) is a promising platform to solve the problem of spectrum shortage for which the most challenging issue is spectrum allocation under uncertain availability information, which is referred as a nondeterministic spectrum ...