• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索
High Impact Results & Cited Count Trend for Year Keyword Cloud and Partner Relationship

Query:

学者姓名:公备

Refining:

Source

Submit Unfold

Co-Author

Submit Unfold

Language

Submit

Clean All

Sort by:
Default
  • Default
  • Title
  • Year
  • WOS Cited Count
  • Impact factor
  • Ascending
  • Descending
< Page ,Total 11 >
An Anonymous and Super visory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application SCIE
期刊论文 | 2024 , 20 (2) | ACM TRANSACTIONS ON SENSOR NETWORKS
Abstract&Keyword Cite

Abstract :

Internet of things (IoT) development tends to reduce the reliance on centralized servers. The zero-trust distributed system combined with blockchain technology has become a hot topic in IoT research. However, distribution data storage services and different blockchain protocols make network interoperability and cross-platform more complex. Relay chain is a promising cross-chain technology that solves the complexity and compatibility issues associated with blockchain cross-chain transactions by utilizing relay blockchains as cross-chain connectors. Yet relay chain cross-chain transactions need to collect asset information and implement asset transactions via two-way peg. Due to the release of user transaction information, there is the issue of privacy leakage. In this article, we propose a cross-chain privacy protection protocol based on the Groth16 zero-knowledge proof algorithm and coin-mixing technology, which changes the authentication mechanism and uses a combination of generating functions to map virtual external addresses in transactions. It allows fast cross-chain anonymous transactions while hiding the genuine user's address. The experiment shows that, in a zero-trust IoT context, our scheme can effectively protect user privacy information, accomplish controlled transaction traceability operations, and guarantee cross-chain transaction security.

Keyword :

relay chain relay chain privacy protection privacy protection Zero trust Zero trust vritual address vritual address groth16 groth16

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Yang, Yinghong , Bai, Fenhua , Yu, Zhuo et al. An Anonymous and Super visory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application [J]. | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) .
MLA Yang, Yinghong et al. "An Anonymous and Super visory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application" . | ACM TRANSACTIONS ON SENSOR NETWORKS 20 . 2 (2024) .
APA Yang, Yinghong , Bai, Fenhua , Yu, Zhuo , Shen, Tao , Liu, Yingli , Gong, Bei . An Anonymous and Super visory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application . | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) .
Export to NoteExpress RIS BibTex
An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things SCIE
期刊论文 | 2024 , 24 (21) | SENSORS
Abstract&Keyword Cite

Abstract :

The Internet of Things (IoT) is a heterogeneous network composed of numerous dynamically connected devices. While it brings convenience, the IoT also faces serious challenges in data security. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptography method that supports fine-grained access control, offering a solution to the IoT's security issues. However, existing CP-ABE schemes are inefficient and unsuitable for IoT devices with limited computing resources. To address this problem, this paper proposes an efficient pairing-free CP-ABE scheme for the IoT. The scheme is based on lightweight elliptic curve scalar multiplication and supports multi-authority and verifiable outsourced decryption. The proposed scheme satisfies indistinguishability against chosen-plaintext attacks (CPA) under the elliptic curve decisional Diffie-Hellman (ECDDH) problem. Performance analysis shows that our proposed scheme is more efficient and better suited to the IoT environment compared to existing schemes.

Keyword :

ciphertext-policy attribute-based encryption ciphertext-policy attribute-based encryption pairing-free pairing-free access control access control Internet of Things Internet of Things

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Guo, Chong , Gong, Bei , Waqas, Muhammad et al. An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things [J]. | SENSORS , 2024 , 24 (21) .
MLA Guo, Chong et al. "An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things" . | SENSORS 24 . 21 (2024) .
APA Guo, Chong , Gong, Bei , Waqas, Muhammad , Alasmary, Hisham , Tu, Shanshan , Chen, Sheng . An Efficient Pairing-Free Ciphertext-Policy Attribute-Based Encryption Scheme for Internet of Things . | SENSORS , 2024 , 24 (21) .
Export to NoteExpress RIS BibTex
yVSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain SCIE
期刊论文 | 2024 , 20 (2) | ACM TRANSACTIONS ON SENSOR NETWORKS
WoS CC Cited Count: 4
Abstract&Keyword Cite

Abstract :

To solve the problems of vote forgery and malicious election of candidate nodes in the Raft consensus algorithm, we combine zero trust with the Raft consensus algorithm and propose a secure and efficient consensus algorithm -Verifiable Secret Sharing Byzantine Fault Tolerance Raft Consensus Algorithm (VSSB-Raft). The VSSB-Raft consensus algorithm realizes zero trust through the supervisor node and secret sharing algorithm without the invisible trust between nodes required by the algorithm. Meanwhile, the VSSB-Raft consensus algorithm uses the SM2 signature algorithm to realize the characteristics of zero trust requiring authentication before data use. In addition, by introducing the NDN network, we redesign the communication between nodes and guarantee the communication quality among nodes. The VSSB-Raft consensus algorithm proposed in this paper can make the algorithm Byzantine fault tolerant by setting a threshold for secret sharing while maintaining the algorithm ' s complexity to be O(n). Experiments show that the VSSB-Raft consensus algorithm is secure and efficient with high throughput and low consensus latency.

Keyword :

Blockchain Blockchain secret sharing secret sharing Byzantine fault tolerance Byzantine fault tolerance zero trust zero trust consensus algorithm consensus algorithm

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Tian, Siben , Bai, Fenhua , Shen, Tao et al. yVSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain [J]. | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) .
MLA Tian, Siben et al. "yVSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain" . | ACM TRANSACTIONS ON SENSOR NETWORKS 20 . 2 (2024) .
APA Tian, Siben , Bai, Fenhua , Shen, Tao , Zhang, Chi , Gong, Bei . yVSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain . | ACM TRANSACTIONS ON SENSOR NETWORKS , 2024 , 20 (2) .
Export to NoteExpress RIS BibTex
Intelligent analysis of android application privacy policy and permission consistency SCIE
期刊论文 | 2024 , 57 (7) | ARTIFICIAL INTELLIGENCE REVIEW
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

With the continuous development of mobile devices, mobile applications bring a lot of convenience to people's lives. The abuse of mobile device permissions is prone to the risk of privacy leakage. The existing detection technology can detect the inconsistency between the declared authority and the actual use authority. But using the third-party privacy policy as the analysis basis for SDK permissions will result in a large set of extracted declaration permissions, which will lead to identifying risky applications as normal applications during consistency comparison. The prevailing approach involves utilizing models based on TextCNN to extract information from privacy policies. However, the training of TextCNN relies on large-scale annotated datasets, leading to high costs. This paper uses BERT as the word vector extraction model to obtain private phrases from the privacy policy. And then we use cosine similarity to automatically filter permission phrase samples, reducing the workload of manual labeling. On the other hand, existing methods do not support the analysis of Chinese privacy policies. In order to solve the problem of consistency judgment between Chinese privacy policy and permission usage, we implement a BERT-based Android privacy policy and permission usage consistency analysis engine. The engine first uses static analysis to obtain the permission list of Android applications, and then combines the BERT model to achieve consistency analysis. After functional and speed testing, we found that the engine can successfully run the consistency analysis function of Chinese declaration permissions and usage permissions, and it is better than the existing detection methods.

Keyword :

Privacy policy Privacy policy Mobile applications Mobile applications Policy conflicts Policy conflicts Text extraction Text extraction Android security Android security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Tu, Tengfei , Zhang, Hua , Gong, Bei et al. Intelligent analysis of android application privacy policy and permission consistency [J]. | ARTIFICIAL INTELLIGENCE REVIEW , 2024 , 57 (7) .
MLA Tu, Tengfei et al. "Intelligent analysis of android application privacy policy and permission consistency" . | ARTIFICIAL INTELLIGENCE REVIEW 57 . 7 (2024) .
APA Tu, Tengfei , Zhang, Hua , Gong, Bei , Du, Daizhong , Wen, Qiaoyan . Intelligent analysis of android application privacy policy and permission consistency . | ARTIFICIAL INTELLIGENCE REVIEW , 2024 , 57 (7) .
Export to NoteExpress RIS BibTex
A data compression and encryption method for green edge computing SCIE
期刊论文 | 2023 , 26 (5) , 3341-3359 | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
Abstract&Keyword Cite

Abstract :

Green edge computing aims to reasonably allocate computing resources on the premise of ensuring the reliability of information services. The computing power gap between terminal and edge server makes the traditional encryption algorithm waste too much energy when dealing with massive redundant data. How to improve encryption efficiency and reduce the computing consumption of massive data terminal equipment on the premise of ensuring data security is one of the goals of green edge computing. We proposed a data compression and encryption scheme based on compression sensing, which greatly reduces the computing consumption of computing limited data terminals; At the same time, the hyper chaotic system is used to further encrypt the data by Arnold transform, bitwise XOR and data random scrambling. In order to solve the problem that compressed sensing can not accurately recover data, we designed a nonlinear encryption scheme based on Chinese Remainder Theorem as a supplement. The simulation results show that the proposed data compression and encryption method is effective and reliable, which has high security performance, compression ability for text data and images, and high recovery ability when the compression ratio is more than 0.5.

Keyword :

Chinese remainder theorem Chinese remainder theorem Green edge computing Green edge computing Compression encryption Compression encryption Compressed sensing Compressed sensing

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Liu, Jianli , Zhang, Yu , Gong, Bei . A data compression and encryption method for green edge computing [J]. | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS , 2023 , 26 (5) : 3341-3359 .
MLA Liu, Jianli et al. "A data compression and encryption method for green edge computing" . | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 26 . 5 (2023) : 3341-3359 .
APA Liu, Jianli , Zhang, Yu , Gong, Bei . A data compression and encryption method for green edge computing . | CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS , 2023 , 26 (5) , 3341-3359 .
Export to NoteExpress RIS BibTex
Smart contracts vulnerability detection model based on adversarial multi-task learning SCIE
期刊论文 | 2023 , 77 | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
Abstract&Keyword Cite

Abstract :

Vulnerability detection is important for smart contracts because of their immutable and irreversible features. In this work, a new detection method based on adversarial multi-task learning is proposed to improve the accuracy of existing vulnerability detection methods, which is based on the multi-task learning framework, including a shared part and a task-specific part. We optimize the multi-task learning frameworks and propose the mixed parameter sharing method to make each task not only maintain its uniqueness, but also share features with other tasks, which helps solve the problem that the hard parameter sharing method cannot constrain the underlying shared layer and improve the quality of extracted features. In addition, we introduce adversarial transfer learning to reduce noise pollution caused by the private feature and interference between the general feature and the private feature. We experimented on datasets obtained from our previous work, and the experimental results prove that our proposed model can judge whether there are vulnerabilities in smart contracts and then identify their types. Additionally, the results also show that our model effectively improves detection accuracy and has an advantage in performance over representative methods.

Keyword :

Smart contracts Smart contracts Blockchain security supervision Blockchain security supervision Adversarial transfer learning Adversarial transfer learning Multi-task learning Multi-task learning Vulnerability detection Vulnerability detection

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhou, Kuo , Huang, Jing , Han, Honggui et al. Smart contracts vulnerability detection model based on adversarial multi-task learning [J]. | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS , 2023 , 77 .
MLA Zhou, Kuo et al. "Smart contracts vulnerability detection model based on adversarial multi-task learning" . | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 77 (2023) .
APA Zhou, Kuo , Huang, Jing , Han, Honggui , Gong, Bei , Xiong, Ao , Wang, Wei et al. Smart contracts vulnerability detection model based on adversarial multi-task learning . | JOURNAL OF INFORMATION SECURITY AND APPLICATIONS , 2023 , 77 .
Export to NoteExpress RIS BibTex
Many-Objective Optimization Based Intrusion Detection for In-Vehicle Network Security SCIE
期刊论文 | 2023 , 24 (12) , 15051-15065 | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
WoS CC Cited Count: 6
Abstract&Keyword Cite

Abstract :

In-vehicle network security plays a vital role in ensuring the secure information transfer between vehicle and Internet. The existing research is still facing great difficulties in balancing the conflicting factors for the in-vehicle network security and hence to improve intrusion detection performance. To challenge this issue, we construct a many-objective intrusion detection model by including information entropy, accuracy, false positive rate and response time of anomaly detection as the four objectives, which represent the key factors influencing intrusion detection performance. We then design an improved intrusion detection algorithm based on many-objective optimization to optimize the detection model parameters. The designed algorithm has double evolutionary selections. Specifically, an improved differential evolutionary operator produces new offspring of the internal population, and a spherical pruning mechanism selects the excellent internal solutions to form the selected pool of the external archive. The second evolutionary selection then produces new offspring of the archive, and an archive selection mechanism of the external archive selects and stores the optimal solutions in the whole detection process. An experiment is performed using a real-world in-vehicle network data set to verify the performance of our proposed model and algorithm. Experimental results obtained demonstrate that our algorithm can respond quickly to attacks and achieve high entropy and detection accuracy as well as very low false positive rate with a good trade-off in the conflicting objective landscape.

Keyword :

information entropy information entropy Optimization Optimization Behavioral sciences Behavioral sciences intrusion detection intrusion detection Data models Data models Intrusion detection Intrusion detection Many-objective optimization Many-objective optimization in-vehicle network in-vehicle network Feature extraction Feature extraction Anomaly detection Anomaly detection Network security Network security

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Zhang, Jiangjiang , Gong, Bei , Waqas, Muhammad et al. Many-Objective Optimization Based Intrusion Detection for In-Vehicle Network Security [J]. | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS , 2023 , 24 (12) : 15051-15065 .
MLA Zhang, Jiangjiang et al. "Many-Objective Optimization Based Intrusion Detection for In-Vehicle Network Security" . | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 24 . 12 (2023) : 15051-15065 .
APA Zhang, Jiangjiang , Gong, Bei , Waqas, Muhammad , Tu, Shanshan , Chen, Sheng . Many-Objective Optimization Based Intrusion Detection for In-Vehicle Network Security . | IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS , 2023 , 24 (12) , 15051-15065 .
Export to NoteExpress RIS BibTex
Applications of Differential Privacy in Social Network Analysis: A Survey SCIE
期刊论文 | 2023 , 35 (1) , 108-127 | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING
WoS CC Cited Count: 51
Abstract&Keyword Cite

Abstract :

Differential privacy provides strong privacy preservation guarantee in information sharing. As social network analysis has been enjoying many applications, it opens a new arena for applications of differential privacy. This article presents a comprehensive survey connecting the basic principles of differential privacy and applications in social network analysis. We concisely review the foundations of differential privacy and the major variants. Then, we discuss how differential privacy is applied to social network analysis, including privacy attacks in social networks, models of differential privacy in social network analysis, and a series of popular tasks, such as analyzing degree distribution, counting subgraphs and assigning weights to edges. We also discuss a series of challenges for future work.

Keyword :

global sensitivity global sensitivity local differential privacy local differential privacy dependent differential privacy dependent differential privacy subgraph counting subgraph counting degree distributions degree distributions smooth sensitivity smooth sensitivity social network data analysis social network data analysis Differential privacy Differential privacy edge weight query edge weight query

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Jiang, Honglu , Pei, Jian , Yu, Dongxiao et al. Applications of Differential Privacy in Social Network Analysis: A Survey [J]. | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2023 , 35 (1) : 108-127 .
MLA Jiang, Honglu et al. "Applications of Differential Privacy in Social Network Analysis: A Survey" . | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING 35 . 1 (2023) : 108-127 .
APA Jiang, Honglu , Pei, Jian , Yu, Dongxiao , Yu, Jiguo , Gong, Bei , Cheng, Xiuzhen . Applications of Differential Privacy in Social Network Analysis: A Survey . | IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2023 , 35 (1) , 108-127 .
Export to NoteExpress RIS BibTex
Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services SCIE
期刊论文 | 2023 , 17 (4) , 6169-6180 | IEEE SYSTEMS JOURNAL
WoS CC Cited Count: 1
Abstract&Keyword Cite

Abstract :

The development of Internet of Things (IoT) technology leads to the continuous growth of IoT devices. Due to the characteristics of resource constraints and interdependencies, IoT devices are vulnerable to many security issues. Remote attestation can verify the integrity of remote devices. However, there are some problems that exist, such as only verifying the integrity of static and runtime data, attestation evidence growing proportionally to the number of services, resulting in significant increase in runtime overhead. Therefore, this article proposes a blockchain-assisted integrity attestation scheme for distributed dependency IoT services. The scheme builds a distributed service integrity model capable of measuring the integrity of both static data and runtime data of distributed IoT services. In addition, we propose a secure and trusted blockchain query mechanism, which can effectively resist tampering or storage errors in the database data of a certain node in the blockchain. Furthermore, a two-way authentication distributed service integrity attestation protocol is designed to protect the communication security between participants without excessive performance overhead. We demonstrate the security of the attestation protocol with automated validation of Internet security protocols and applications. The feasibility and performance of the proposed scheme are verified by simulating the Wismote sensor using the Cooja simulator.

Keyword :

remote attestation remote attestation Protocols Protocols Blockchain Blockchain Performance evaluation Performance evaluation distributed dependency Internet of Things (IoT) services distributed dependency Internet of Things (IoT) services integrity attestation integrity attestation Blockchains Blockchains

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Shen, Tao , Li, Hongchao , Bai, Fenhua et al. Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services [J]. | IEEE SYSTEMS JOURNAL , 2023 , 17 (4) : 6169-6180 .
MLA Shen, Tao et al. "Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services" . | IEEE SYSTEMS JOURNAL 17 . 4 (2023) : 6169-6180 .
APA Shen, Tao , Li, Hongchao , Bai, Fenhua , Gong, Bei . Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services . | IEEE SYSTEMS JOURNAL , 2023 , 17 (4) , 6169-6180 .
Export to NoteExpress RIS BibTex
Anonymous Traceability protocol based on Group Signature for Blockchain SCIE
期刊论文 | 2022 , 127 , 160-167 | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
WoS CC Cited Count: 7
Abstract&Keyword Cite

Abstract :

In blockchain technology, data are stored on decentralized nodes and public to each node in the blockchain network. Hence, the focus of privacy protection in the blockchain guarantees the anonymity of transactions such that attackers cannot attain the users' personal information through data analysis. Among the existing privacy protection technologies, the scheme based on group signature has good anonymity, but the existing scheme exists a large number of operations that are difficult to apply to wireless terminals. In this paper, using the powerful offloading capability of edge computing, we propose a blockchain node traceable identity privacy technology scheme based on threshold group signature, and the scheme greatly reduces the computing burden of nodes while achieving node privacy protection. (C) 2021 Elsevier B.V. All rights reserved.

Keyword :

Traceability Traceability Signature Signature Blockchain Blockchain

Cite:

Copy from the list or Export to your reference management。

GB/T 7714 Gong, Bei , Cui, Chi , Hu, Mingsheng et al. Anonymous Traceability protocol based on Group Signature for Blockchain [J]. | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 : 160-167 .
MLA Gong, Bei et al. "Anonymous Traceability protocol based on Group Signature for Blockchain" . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 127 (2022) : 160-167 .
APA Gong, Bei , Cui, Chi , Hu, Mingsheng , Guo, Chong , Li, Xiaochong , Ren, Yuheng . Anonymous Traceability protocol based on Group Signature for Blockchain . | FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE , 2022 , 127 , 160-167 .
Export to NoteExpress RIS BibTex
10| 20| 50 per page
< Page ,Total 11 >

Export

Results:

Selected

to

Format:
Online/Total:239/5939462
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.