Search

Your search keyword '"Zhu, Liehuang"' showing total 57 results

Search Constraints

Start Over You searched for: Author "Zhu, Liehuang" Remove constraint Author: "Zhu, Liehuang"
57 results on '"Zhu, Liehuang"'

Search Results

1. A Blockchain-Enabled Group Covert Channel against Transaction Forgery.

2. BNS: A Detection System to Find Nodes in the Bitcoin Network.

3. Achieving Anonymous and Covert Reporting on Public Blockchain Networks.

4. SECURITY APPLICATION OF NEURAL NETWORKS UNDER THE INSPECTION OF NONLINEAR DYNAMIC SYSTEMS.

5. Verifiable and Privacy-Preserving Traffic Flow Statistics for Advanced Traffic Management Systems.

6. Achieving a Covert Channel over an Open Blockchain Network.

7. Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.

8. A privacy-preserving data aggregation scheme for dynamic groups in fog computing.

9. PGAS: Privacy-preserving graph encryption for accurate constrained shortest distance queries.

10. Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid.

11. A Blockchain-Based Privacy-Preserving Payment Mechanism for Vehicle-to-Grid Networks.

12. The Localization Method for Ship Network Nodes Based on High Performance Matching of Multi-pattern String TMWM.

13. Statistical and clustering analysis of attributes of Bitcoin backbone nodes.

14. RTSense: Providing Reliable Trust-Based Crowdsensing Services in CVCC.

15. PPTDS: A privacy-preserving truth discovery scheme in crowd sensing systems.

16. SUAA: A Secure User Authentication Scheme with Anonymity for the Single & Multi-server Environments.

17. Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.

18. PTBI: An efficient privacy-preserving biometric identification based on perturbed term in the cloud.

19. Achieving differential privacy of trajectory data publishing in participatory sensing.

20. Reasoning task dependencies for robust service selection in data intensive workflows.

21. An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks.

22. ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.

23. Search pattern leakage in searchable encryption: Attacks and new construction.

24. The minimum regret path problem on stochastic fuzzy time-varying networks.

25. Accelerating Decentralized and Partial-Privacy Data Access for VANET via Online/Offline Functional Encryption.

26. Mixture Differential Cryptanalysis on Round-Reduced SIMON32/64 Using Machine Learning.

27. Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings

29. EPVM: efficient and publicly verifiable computation for matrix multiplication with privacy preservation.

30. Successive Point-of-Interest Recommendation With Personalized Local Differential Privacy.

31. A Privacy-Preserving Traffic Monitoring Scheme via Vehicular Crowdsourcing.

32. Blockchain-Based Data Preservation System for Medical Data.

33. An Energy-Aware High Performance Task Allocation Strategy in Heterogeneous Fog Computing Environments.

34. Efficient and privacy-preserving similar electronic medical records query for large-scale ehealthcare systems.

35. Privacy-preserving voluntary-tallying leader election for internet of things.

36. Real-time positioning of a specific object in the big data environment.

37. SCM: Secure and accountable TLS certificate management.

38. Optimizing Feature Selection for Efficient Encrypted Traffic Classification: A Systematic Approach.

39. Privacy-Preserving Image Retrieval for Medical IoT Systems: A Blockchain-Based Approach.

40. Decentralized Policy-Hidden Fine-Grained Redaction in Blockchain-Based IoT Systems.

41. Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains.

42. An Efficient Confidentiality and Integrity Preserving Aggregation Protocol in Wireless Sensor Networks.

43. Joint coupled representation and homogeneous reconstruction for multi-resolution small sample face recognition.

44. A Blockchain-Based Data Sharing System with Enhanced Auditability.

45. Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.

46. Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles.

47. LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication.

48. Hadoop Perfect File: A fast and memory-efficient metadata access archive file to face small files problem in HDFS.

49. An efficient heuristic power analysis framework based on hill-climbing algorithm.

50. Toward Smart Treatment Management for Personalized Healthcare.

Catalog

Books, media, physical & digital resources