Search Results - "Su, ChunHua"

Refine Results
  1. 1

    Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices by Wang, Weizheng, Xu, Hao, Alazab, Mamoun, Gadekallu, Thippa Reddy, Han, Zhaoyang, Su, Chunhua

    “…Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal lifestyles and society operations into a novel digital mode, which…”
    Get full text
    Journal Article
  2. 2

    Secure and efficient mutual authentication protocol for smart grid under blockchain by Wang, Weizheng, Huang, Huakun, Zhang, Lejun, Su, Chunhua

    Published in Peer-to-peer networking and applications (01-09-2021)
    “…Smart grid has been acknowledged as the next-generation intelligent network that optimizes energy efficiency. Primarily through a bidirectional communication…”
    Get full text
    Journal Article
  3. 3

    Lightweight IoT-based authentication scheme in cloud computing circumstance by Zhou, Lu, Li, Xiong, Yeh, Kuo-Hui, Su, Chunhua, Chiu, Wayne

    Published in Future generation computer systems (01-02-2019)
    “…Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud computing have been promptly investigated for secure data…”
    Get full text
    Journal Article
  4. 4

    ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts by Wang, Wei, Song, Jingjing, Xu, Guangquan, Li, Yidong, Wang, Hao, Su, Chunhua

    “…Smart contracts are decentralized applications running on Blockchain. A very large number of smart contracts has been deployed on Ethereum. Meanwhile, security…”
    Get full text
    Journal Article
  5. 5

    Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks by Wang, Weizheng, Chen, Qiu, Yin, Zhimeng, Srivastava, Gautam, Gadekallu, Thippa Reddy, Alsolami, Fawaz, Su, Chunhua

    Published in IEEE internet of things journal (01-06-2022)
    “…Due to the emergence of heterogeneous Internet of Medical Things (IoMT) (e.g., wearable health devices, smartwatch monitoring, and automated insulin delivery…”
    Get full text
    Journal Article
  6. 6

    FPDP: Flexible Privacy-Preserving Data Publishing Scheme for Smart Agriculture by Song, Jingcheng, Zhong, Qi, Wang, Weizheng, Su, Chunhua, Tan, Zhiyuan, Liu, Yining

    Published in IEEE sensors journal (15-08-2021)
    “…The development of the Internet of Things (IoT) and 5th generation wireless network (5G) is set to push the smart agriculture to the next level since the…”
    Get full text
    Journal Article
  7. 7

    A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things by Cha, Shi-Cho, Chen, Jyun-Fu, Su, Chunhua, Yeh, Kuo-Hui

    Published in IEEE access (01-01-2018)
    “…Recently, the popularity of the Internet of Things (IoT) has led to a rapid development and significant advancement of ubiquitous applications seamlessly…”
    Get full text
    Journal Article
  8. 8

    Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks by Zhou, Lu, Ge, Chunpeng, Hu, Simin, Su, Chunhua

    Published in IEEE internet of things journal (01-05-2020)
    “…Privacy-preserving data aggregation is a kind of fundamental and essential algorithm for wireless sensor networks. However, the existing aggregation algorithms…”
    Get full text
    Journal Article
  9. 9

    A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine by Fang, Liming, Yin, Changchun, Zhou, Lu, Li, Yang, Su, Chunhua, Xia, Jinyue

    Published in Information sciences (01-01-2020)
    “…•We proposed a new classification algorithm which called fuzzy-rough core vector machine(FRCVM).•We introduced a physiological and behavioral feature…”
    Get full text
    Journal Article
  10. 10

    Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data by Meng, Weizhi, Li, Wenjuan, Su, Chunhua, Zhou, Jianying, Lu, Rongxing

    Published in IEEE access (01-01-2018)
    “…Internet of Things (IoT) has been widely used in our daily life, which enables various objects to be interconnected for data exchange, including physical…”
    Get full text
    Journal Article
  11. 11

    Design and application of a personal credit information sharing platform based on consortium blockchain by Zhang, Jing, Tan, Rong, Su, Chunhua, Si, Wen

    “…The technical features of blockchain, including decentralization, data transparency, tamper-proofing, traceability, privacy protection and open-sourcing, make…”
    Get full text
    Journal Article
  12. 12

    Loss-based differentiation strategy for privacy preserving of social robots by Yang, Qinglin, Wang, Taiyu, Zhu, Kaiming, Wang, Junbo, Han, Yu, Su, Chunhua

    Published in The Journal of supercomputing (2023)
    “…The training and application of machine learning models encounter the leakage of a significant amount of information about their training dataset that can be…”
    Get full text
    Journal Article
  13. 13

    A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things by Yeh, Kuo-Hui, Su, Chunhua, Choo, Kim-Kwang Raymond, Chiu, Wayne

    Published in Sensors (Basel, Switzerland) (01-05-2017)
    “…Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT)…”
    Get full text
    Journal Article
  14. 14

    Y-DWMS: A Digital Watermark Management System Based on Smart Contracts by Zhao, Bo, Fang, Liming, Zhang, Hanyi, Ge, Chunpeng, Meng, Weizhi, Liu, Liang, Su, Chunhua

    Published in Sensors (Basel, Switzerland) (12-07-2019)
    “…With the development of information technology, films, music, and other publications are inclined to be distributed in digitalized form. However, the low cost…”
    Get full text
    Journal Article
  15. 15

    ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning by Fang, Liming, Yun, Xinyu, Yin, Changchun, Ding, Weiping, Zhou, Lu, Liu, Zhe, Su, Chunhua

    Published in IEEE transactions on fuzzy systems (01-04-2021)
    “…Botmasters generate a large number of malicious algorithmically generated domains (mAGDs) through domain generation algorithms (DGAs) to infect a large number…”
    Get full text
    Journal Article
  16. 16
  17. 17

    Expression of fibronectin in esophageal squamous cell carcinoma and its role in migration by Xiao, Jiefei, Yang, Weilin, Xu, Bo, Zhu, Haoshuai, Zou, Jianyong, Su, Chunhua, Rong, Jian, Wang, Tao, Chen, Zhenguang

    Published in BMC cancer (12-10-2018)
    “…Fibronectin (FN) is a high-molecular-weight glycoprotein component of the extracellular matrix involved in cell adhesion, migration, metastasis, proliferation…”
    Get full text
    Journal Article
  18. 18

    Smart contract token-based privacy-preserving access control system for industrial Internet of Things by Wang, Weizheng, Huang, Huakun, Yin, Zhimeng, Gadekallu, Thippa Reddy, Alazab, Mamoun, Su, Chunhua

    Published in Digital communications and networks (01-04-2023)
    “…Due to mobile Internet technology's rapid popularization, the Industrial Internet of Things (IIoT) can be seen everywhere in our daily lives. While IIoT brings…”
    Get full text
    Journal Article
  19. 19

    Polynomial-based modifiable blockchain structure for removing fraud transactions by Cheng, Lichen, Liu, Jiqiang, Su, Chunhua, Liang, Kaitai, Xu, Guangquan, Wang, Wei

    Published in Future generation computer systems (01-10-2019)
    “…Blockchain has become one of the most significant technology in financial fields. A hash-based blockchain holds the feature of strong tamper resistance…”
    Get full text
    Journal Article
  20. 20

    Security analysis and new models on the intelligent symmetric key encryption by Zhou, Lu, Chen, Jiageng, Zhang, Yidan, Su, Chunhua, Anthony James, Marino

    Published in Computers & security (01-01-2019)
    “…•Reinvestigate the neural network based data protection solution and improve the model.•Investigate its security based on the designated statistical…”
    Get full text
    Journal Article