Search Results - "Su, ChunHua"
-
1
Blockchain-Based Reliable and Efficient Certificateless Signature for IIoT Devices
Published in IEEE transactions on industrial informatics (01-10-2022)“…Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal lifestyles and society operations into a novel digital mode, which…”
Get full text
Journal Article -
2
Secure and efficient mutual authentication protocol for smart grid under blockchain
Published in Peer-to-peer networking and applications (01-09-2021)“…Smart grid has been acknowledged as the next-generation intelligent network that optimizes energy efficiency. Primarily through a bidirectional communication…”
Get full text
Journal Article -
3
Lightweight IoT-based authentication scheme in cloud computing circumstance
Published in Future generation computer systems (01-02-2019)“…Recently, authentication technologies integrated with the Internet of Things (IoT) and cloud computing have been promptly investigated for secure data…”
Get full text
Journal Article -
4
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts
Published in IEEE transactions on network science and engineering (01-04-2021)“…Smart contracts are decentralized applications running on Blockchain. A very large number of smart contracts has been deployed on Ethereum. Meanwhile, security…”
Get full text
Journal Article -
5
Blockchain and PUF-Based Lightweight Authentication Protocol for Wireless Medical Sensor Networks
Published in IEEE internet of things journal (01-06-2022)“…Due to the emergence of heterogeneous Internet of Medical Things (IoMT) (e.g., wearable health devices, smartwatch monitoring, and automated insulin delivery…”
Get full text
Journal Article -
6
FPDP: Flexible Privacy-Preserving Data Publishing Scheme for Smart Agriculture
Published in IEEE sensors journal (15-08-2021)“…The development of the Internet of Things (IoT) and 5th generation wireless network (5G) is set to push the smart agriculture to the next level since the…”
Get full text
Journal Article -
7
A Blockchain Connected Gateway for BLE-Based Devices in the Internet of Things
Published in IEEE access (01-01-2018)“…Recently, the popularity of the Internet of Things (IoT) has led to a rapid development and significant advancement of ubiquitous applications seamlessly…”
Get full text
Journal Article -
8
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks
Published in IEEE internet of things journal (01-05-2020)“…Privacy-preserving data aggregation is a kind of fundamental and essential algorithm for wireless sensor networks. However, the existing aggregation algorithms…”
Get full text
Journal Article -
9
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine
Published in Information sciences (01-01-2020)“…•We proposed a new classification algorithm which called fuzzy-rough core vector machine(FRCVM).•We introduced a physiological and behavioral feature…”
Get full text
Journal Article -
10
Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data
Published in IEEE access (01-01-2018)“…Internet of Things (IoT) has been widely used in our daily life, which enables various objects to be interconnected for data exchange, including physical…”
Get full text
Journal Article -
11
Design and application of a personal credit information sharing platform based on consortium blockchain
Published in Journal of information security and applications (01-12-2020)“…The technical features of blockchain, including decentralization, data transparency, tamper-proofing, traceability, privacy protection and open-sourcing, make…”
Get full text
Journal Article -
12
Loss-based differentiation strategy for privacy preserving of social robots
Published in The Journal of supercomputing (2023)“…The training and application of machine learning models encounter the leakage of a significant amount of information about their training dataset that can be…”
Get full text
Journal Article -
13
A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things
Published in Sensors (Basel, Switzerland) (01-05-2017)“…Rapid advances in wireless communications and pervasive computing technologies have resulted in increasing interest and popularity of Internet-of-Things (IoT)…”
Get full text
Journal Article -
14
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts
Published in Sensors (Basel, Switzerland) (12-07-2019)“…With the development of information technology, films, music, and other publications are inclined to be distributed in digitalized form. However, the low cost…”
Get full text
Journal Article -
15
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning
Published in IEEE transactions on fuzzy systems (01-04-2021)“…Botmasters generate a large number of malicious algorithmically generated domains (mAGDs) through domain generation algorithms (DGAs) to infect a large number…”
Get full text
Journal Article -
16
Correction to: Loss-based differentiation strategy for privacy preserving of social robots
Published in The Journal of supercomputing (2023)Get full text
Journal Article -
17
Expression of fibronectin in esophageal squamous cell carcinoma and its role in migration
Published in BMC cancer (12-10-2018)“…Fibronectin (FN) is a high-molecular-weight glycoprotein component of the extracellular matrix involved in cell adhesion, migration, metastasis, proliferation…”
Get full text
Journal Article -
18
Smart contract token-based privacy-preserving access control system for industrial Internet of Things
Published in Digital communications and networks (01-04-2023)“…Due to mobile Internet technology's rapid popularization, the Industrial Internet of Things (IIoT) can be seen everywhere in our daily lives. While IIoT brings…”
Get full text
Journal Article -
19
Polynomial-based modifiable blockchain structure for removing fraud transactions
Published in Future generation computer systems (01-10-2019)“…Blockchain has become one of the most significant technology in financial fields. A hash-based blockchain holds the feature of strong tamper resistance…”
Get full text
Journal Article -
20
Security analysis and new models on the intelligent symmetric key encryption
Published in Computers & security (01-01-2019)“…•Reinvestigate the neural network based data protection solution and improve the model.•Investigate its security based on the designated statistical…”
Get full text
Journal Article