


default search action
Hong Zhong 0001
Person information
- affiliation: Anhui University, School of Computer Science and Technology, Hefei, China
Other persons with the same name
- Hong Zhong — disambiguation page
- Hong Zhong 0002 — Dalian University of Technology, State Key Laboratory of Coastal and Offshore Engineering, Faculty of Infrastructure Engineering, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j182]Ningning Cui
, Zhihao Wang
, Lili Pei
, Mengxiang Wang
, Dong Wang, Jie Cui
, Hong Zhong
:
Dynamic and Verifiable Fuzzy Keyword Search With Forward Security in Cloud Environments. IEEE Internet Things J. 12(9): 11482-11494 (2025) - [j181]Qingyang Zhang
, Shuai Qian
, Jie Cui
, Hong Zhong
, Fengqun Wang
, Debiao He
:
Blockchain-Based Privacy-Preserving Deduplication and Integrity Auditing in Cloud Storage. IEEE Trans. Computers 74(5): 1717-1729 (2025) - [j180]Mingwei Zeng, Jie Cui
, Qingyang Zhang
, Hong Zhong
, Debiao He
:
Efficient Revocable Cross-Domain Anonymous Authentication Scheme for IIoT. IEEE Trans. Inf. Forensics Secur. 20: 996-1010 (2025) - [j179]Bei Li
, Hong Zhong
, Jie Cui
, Chengjie Gu
, Debiao He
:
RRMAC: A Multi-Data Owner Access Control Scheme With Robust Revocation for Co-Owned Data Sharing. IEEE Trans. Inf. Forensics Secur. 20: 1206-1221 (2025) - [j178]Zhaoyi Meng
, Jiale Zhang, Jiaqi Guo, Wansen Wang
, Wenchao Huang
, Jie Cui
, Hong Zhong
, Yan Xiong
:
Detecting Android Malware by Visualizing App Behaviors From Multiple Complementary Views. IEEE Trans. Inf. Forensics Secur. 20: 2915-2929 (2025) - [j177]Miaomiao Tian
, Chuang Gao, Long Chen
, Hong Zhong
, Jie Chen
:
Proofs of Retrievability With Public Verifiability From Lattices. IEEE Trans. Inf. Forensics Secur. 20: 3925-3935 (2025) - [j176]Fengqun Wang
, Jie Cui
, Qingyang Zhang
, Debiao He
, Hong Zhong
:
Blockchain-Assisted Flexible Revocable Anonymous Authentication in Industrial Internet of Things. IEEE Trans. Netw. Sci. Eng. 12(1): 518-532 (2025) - 2024
- [j175]Fengqun Wang
, Jie Cui
, Qingyang Zhang
, Debiao He
, Chengjie Gu
, Hong Zhong
:
Lightweight and Secure Data Sharing Based on Proxy Re-Encryption for Blockchain-Enabled Industrial Internet of Things. IEEE Internet Things J. 11(8): 14115-14126 (2024) - [j174]Jie Cui
, Yihu Zhu, Hong Zhong
, Qingyang Zhang
, Chengjie Gu
, Debiao He
:
Efficient Blockchain-Based Mutual Authentication and Session Key Agreement for Cross-Domain IIoT. IEEE Internet Things J. 11(9): 16325-16338 (2024) - [j173]Chunyang Fan, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
MM-SDVN: Efficient Mobility Management Scheme for Optimal Network Handover in Software-Defined Vehicular Network. IEEE Internet Things J. 11(19): 32089-32104 (2024) - [j172]Qingyang Zhang
, Chang Xu
, Hong Zhong
, Chengjie Gu
, Jie Cui
:
Revocable and Efficient Blockchain-Based Fine-Grained Access Control Against EDoS Attacks in Cloud Storage. IEEE Trans. Computers 73(8): 2012-2024 (2024) - [j171]Fengqun Wang
, Jie Cui
, Qingyang Zhang
, Debiao He
, Chengjie Gu
, Hong Zhong
:
Blockchain-Based Lightweight Message Authentication for Edge-Assisted Cross-Domain Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 21(4): 1587-1604 (2024) - [j170]Jie Cui
, Yatao Li
, Qingyang Zhang
, Hong Zhong
, Chengjie Gu
, Debiao He
:
DSChain: A Blockchain System for Complete Lifecycle Security of Data in Internet of Things. IEEE Trans. Dependable Secur. Comput. 21(4): 3977-3993 (2024) - [j169]Qingyang Zhang
, Yujie Fu
, Jie Cui
, Debiao He
, Hong Zhong
:
Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT. IEEE Trans. Dependable Secur. Comput. 21(6): 5797-5809 (2024) - [j168]Fengqun Wang
, Jie Cui
, Qingyang Zhang
, Debiao He
, Hong Zhong
:
Blockchain-Based Secure Cross-Domain Data Sharing for Edge-Assisted Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 3892-3905 (2024) - [j167]Jing Zhang
, Ruonan Ying
, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
Secure and Efficient User-Centric V2C Communication for Intelligent Cyber-Physical Transportation System. IEEE Trans. Inf. Forensics Secur. 19: 7674-7689 (2024) - [j166]Qingyang Zhang
, Xiaolong Zhou, Hong Zhong
, Jie Cui
, Jiaxin Li, Debiao He
:
Device-Side Lightweight Mutual Authentication and Key Agreement Scheme Based on Chameleon Hashing for Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 19: 7895-7907 (2024) - [j165]Jing Zhang
, Hong Zhong
, Jie Cui
, Lu Wei
, Lu Liu
:
CVAR: Distributed and Extensible Cross-Region Vehicle Authentication With Reputation for VANETs. IEEE Trans. Intell. Transp. Syst. 25(1): 74-89 (2024) - [j164]Jie Cui
, Yun Shen, Hong Zhong
, Jing Zhang
, Lu Liu
:
A Multilevel Electronic Control Unit Re-Encryption Scheme for Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 25(1): 104-119 (2024) - [j163]Yun Shen, Jie Cui
, Hong Zhong
, Jing Zhang
, Irina Bolodurina
, Debiao He
:
A Two-Layer Dynamic ECU Group Management Scheme for In-Vehicle CAN Bus. IEEE Trans. Intell. Transp. Syst. 25(8): 10431-10445 (2024) - [j162]Ningning Cui
, Dong Wang
, Jianxin Li
, Huaijie Zhu
, Xiaochun Yang
, Jianliang Xu
, Jie Cui
, Hong Zhong
:
Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains. IEEE Trans. Knowl. Data Eng. 36(6): 2445-2460 (2024) - [j161]Jing Zhang
, Yue Jiang, Jie Cui
, Debiao He
, Irina Bolodurina
, Hong Zhong
:
DBCPA: Dual Blockchain-Assisted Conditional Privacy-Preserving Authentication Framework and Protocol for Vehicular Ad Hoc Networks. IEEE Trans. Mob. Comput. 23(2): 1127-1141 (2024) - [j160]Lu Wei
, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Chengjie Gu
, Debiao He
:
A Decentralized Authenticated Key Agreement Scheme Based on Smart Contract for Securing Vehicular Ad-Hoc Networks. IEEE Trans. Mob. Comput. 23(5): 4318-4333 (2024) - [j159]Jing Zhang
, Xinzhong Liu
, Jie Cui
, Hong Zhong
, Lu Wei
, Irina Bolodurina
, Debiao He
:
CBDDS: Secure and Revocable Cache-Based Distributed Data Sharing for Vehicular Networks. IEEE Trans. Mob. Comput. 23(6): 6579-6591 (2024) - [j158]Jie Cui
, Jietian Xiao
, Hong Zhong
, Jing Zhang
, Lu Wei
, Irina Bolodurina
, Debiao He
:
LH-IDS: Lightweight Hybrid Intrusion Detection System Based on Differential Privacy in VANETs. IEEE Trans. Mob. Comput. 23(12): 12195-12210 (2024) - [j157]Lu Wei
, Yongjuan Zhang, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
A Threshold-Based Full-Decentralized Authentication and Key Agreement Scheme for VANETs Powered by Consortium Blockchain. IEEE Trans. Mob. Comput. 23(12): 12505-12521 (2024) - [j156]Li Wang
, Hong Zhong
, Jie Cui
, Jing Zhang
, Lu Wei
, Irina Bolodurina
, Debiao He
:
Privacy-Preserving and Secure Distributed Data Sharing Scheme for VANETs. IEEE Trans. Mob. Comput. 23(12): 13882-13897 (2024) - [j155]Jie Cui
, Xinzhong Liu
, Hong Zhong
, Jing Zhang
, Lu Wei
, Irina Bolodurina
, Debiao He
:
A Practical and Provably Secure Authentication and Key Agreement Scheme for UAV-Assisted VANETs for Emergency Rescue. IEEE Trans. Netw. Sci. Eng. 11(2): 1454-1468 (2024) - [j154]Jie Cui
, Meng Li
, Haozhe Chen
, Chunyang Fan
, Jing Zhang
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
LISP-MM: Efficient LISP-Based Mobility Management in Software Defined Vehicular Networks. IEEE Trans. Netw. Sci. Eng. 11(3): 3222-3236 (2024) - [j153]Jing Zhang
, Zichen Pan
, Jie Cui
, Hong Zhong
, Jiaxin Li, Debiao He
:
Toward Open-Set Intrusion Detection in VANETs: An Efficient Meta-Recognition Approach. IEEE Trans. Netw. Sci. Eng. 11(6): 6589-6604 (2024) - [j152]Fekri Saleh
, Saleem Karmoshi
, Abraham O. Fapojuwo
, Hong Zhong
:
TARA: Tenant-Aware Resource Allocation in Multi-Tenant Data Centers. IEEE Trans. Netw. Serv. Manag. 21(6): 6349-6363 (2024) - [j151]Shun Zhang
, Pengfei Lan
, Benfei Duan
, Zhili Chen
, Hong Zhong
, Neal N. Xiong
:
DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels. ACM Trans. Sens. Networks 20(2): 35:1-35:26 (2024) - [j150]Chunyang Fan
, Jie Cui
, Hulin Jin
, Hong Zhong
, Irina Bolodurina
, Debiao He
:
Auto-Updating Intrusion Detection System for Vehicular Network: A Deep Learning Approach Based on Cloud-Edge-Vehicle Collaboration. IEEE Trans. Veh. Technol. 73(10): 15372-15384 (2024) - [j149]Yan Xu, Ailian Shi, Jie Cui, Hong Zhong
:
DSSPS: A dynamic secure service provision scheme in fog-based VANETs. Veh. Commun. 47: 100762 (2024) - [c64]Jing Zhang, Peiyv Yang, Jie Cui, Lu Wei, Hong Zhong:
Improved PBFT Consensus Based on Reputation System in Vehicle Network. BDCAT 2024: 366-371 - [c63]Hong Zhong, Shunming Wang, Jie Cui, Qingyang Zhang, Bei Li, Debiao He:
Server-Assisted Certificateless Searchable Encryption Scheme for Industrial Internet of Things Against Keyword Guessing Attacks. CBD 2024: 165-171 - [c62]Yang Xu, Rui Cai, Huabin Wang, Yiwen Zhang, Hong Zhong, Dengcheng Yan:
Psychology-Informed Network Alignment. ICBASE 2024: 282-286 - [c61]Jingru Wei, Yanping Cai, Dengcheng Yan, Huabin Wang, Hong Zhong, Qingren Wang:
Psychology-informed Rumor and Stance Detection. ICBASE 2024: 701-706 - [c60]Han Yang, Lingxiang Wang, Qingren Wang, Huabin Wang, Yiwen Zhang, Hong Zhong, Dengcheng Yan:
Local Community Detection from Noisy Graph Streams. ICBASE 2024: 707-712 - [c59]Ningning Cui, Dong Wang, Jianxin Li, Huaijie Zhu, Xiaochun Yang, Jianliang Xu, Jie Cui, Hong Zhong:
Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains. ICDE 2024: 5699-5700 - [c58]Jie Cui, Jing Zhang, Lu Wei, Minghui Zhu, Hong Zhong, Geyong Min:
Multi-Authority Ciphertext-Policy Attribute-based Encryption with Hidden Policy for Securing Internet-of-Vehicles. TrustCom 2024: 213-221 - [i18]Depeng Chen, Xiao Liu, Jie Cui, Hong Zhong:
CLMIA: Membership Inference Attacks via Unsupervised Contrastive Learning. CoRR abs/2411.11144 (2024) - [i17]Depeng Chen, Hao Chen, Hulin Jin, Jie Cui, Hong Zhong:
Hide in Plain Sight: Clean-Label Backdoor for Auditing Membership Inference. CoRR abs/2411.16763 (2024) - 2023
- [j148]Jie Cui, Fangzheng Cheng, Hong Zhong
, Qingyang Zhang
, Chengjie Gu, Lu Liu:
Multi-factor based session secret key agreement for the Industrial Internet of Things. Ad Hoc Networks 138: 102997 (2023) - [j147]Hong Zhong, Chengdong Gu, Qingyang Zhang, Jie Cui
, Chengjie Gu, Debiao He:
Conditional privacy-preserving message authentication scheme for cross-domain Industrial Internet of Things. Ad Hoc Networks 144: 103137 (2023) - [j146]Lin Mu
, Peiquan Jin
, Yiwen Zhang
, Hong Zhong
, Jie Zhao
:
Synonym recognition from short texts: A self-supervised learning approach. Expert Syst. Appl. 224: 119966 (2023) - [j145]Fuhu Wu, Jian Sun, Shun Zhang
, Neal N. Xiong
, Hong Zhong:
Efficient reversible data hiding via two layers of double-peak embedding. Inf. Sci. 644: 119264 (2023) - [j144]Xiuwen Sun, Da Mo, Di Wu, Chunhui Ye, Qingying Yu, Jie Cui, Hong Zhong:
Efficient regular expression matching over hybrid dictionary-based compressed data. J. Netw. Comput. Appl. 215: 103635 (2023) - [j143]Yan Xu, ChongYue Yao, Jie Cui, Hong Zhong
:
LPPA-RCM: A lightweight privacy-preserving authentication scheme for road condition monitoring in fog-based VANETs. J. Syst. Archit. 143: 102967 (2023) - [j142]Depeng Chen, Xiaohong Jiang, Hong Zhong
, Jie Cui:
Building Trusted Federated Learning: Key Technologies and Challenges. J. Sens. Actuator Networks 12(1): 13 (2023) - [j141]Yan Xu
, Xinyan Liu
, Jie Cui
, Hong Zhong
, Jing Zhang
:
L-TCM: A Lightweight Privacy-Preserving Traffic Condition Monitoring Scheme With Source Authentication in Cloud-Assisted VANETs. IEEE Syst. J. 17(4): 6138-6147 (2023) - [j140]Qingyang Zhang
, Dongfang Sui
, Jie Cui
, Chengjie Gu, Hong Zhong
:
Efficient Integrity Auditing Mechanism With Secure Deduplication for Blockchain Storage. IEEE Trans. Computers 72(8): 2365-2376 (2023) - [j139]Tianjiao Ni
, Zhili Chen
, Lin Chen, Shun Zhang
, Yan Xu
, Hong Zhong:
Differentially Private Combinatorial Cloud Auction. IEEE Trans. Cloud Comput. 11(1): 412-425 (2023) - [j138]Ran Ding
, Yan Xu
, Hong Zhong
, Jie Cui
, Geyong Min
:
An Efficient Integrity Checking Scheme With Full Identity Anonymity for Cloud Data Sharing. IEEE Trans. Cloud Comput. 11(3): 2922-2935 (2023) - [j137]Lu Wei
, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Lu Liu
:
A Lightweight and Conditional Privacy-Preserving Authenticated Key Agreement Scheme With Multi-TA Model for Fog-Based VANETs. IEEE Trans. Dependable Secur. Comput. 20(1): 422-436 (2023) - [j136]Jie Cui
, Bei Li
, Hong Zhong
, Yan Xu
, Lu Liu
:
Achieving Revocable Attribute Group-Based Encryption for Mobile Cloud Data: A Multi-Proxy Assisted Approach. IEEE Trans. Dependable Secur. Comput. 20(4): 2988-3001 (2023) - [j135]Qingyang Zhang
, Jing Wu
, Hong Zhong
, Debiao He
, Jie Cui
:
Efficient Anonymous Authentication Based on Physically Unclonable Function in Industrial Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 233-247 (2023) - [j134]Hong Zhong
, Li Wang, Jie Cui
, Jing Zhang, Irina Bolodurina
:
Secure Edge Computing-Assisted Video Reporting Service in 5G-Enabled Vehicular Networks. IEEE Trans. Inf. Forensics Secur. 18: 3774-3786 (2023) - [j133]Jing Zhang
, Shuangshuang Su, Hong Zhong
, Jie Cui
, Debiao He
:
Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs. IEEE Trans. Inf. Forensics Secur. 18: 4830-4842 (2023) - [j132]Jie Cui
, Jing Yu, Hong Zhong
, Lu Wei
, Lu Liu
:
Chaotic Map-Based Authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle. IEEE Trans. Intell. Transp. Syst. 24(3): 3167-3181 (2023) - [j131]Qingren Wang
, Chengcheng Zhu, Yiwen Zhang
, Hong Zhong
, Jinqin Zhong
, Victor S. Sheng
:
Short Text Topic Learning Using Heterogeneous Information Network. IEEE Trans. Knowl. Data Eng. 35(5): 5269-5281 (2023) - [j130]Ningning Cui
, Kang Qian, Taotao Cai
, Jianxin Li
, Xiaochun Yang
, Jie Cui
, Hong Zhong
:
Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database. IEEE Trans. Knowl. Data Eng. 35(9): 9333-9349 (2023) - [j129]Xiaoyu Zhang
, Hong Zhong
, Jie Cui
, Chengjie Gu, Irina Bolodurina
, Lu Liu
:
AC-SDVN: An Access Control Protocol for Video Multicast in Software Defined Vehicular Networks. IEEE Trans. Mob. Comput. 22(10): 5657-5674 (2023) - [j128]Jie Cui
, Nan Liu, Qingyang Zhang
, Debiao He
, Chengjie Gu, Hong Zhong
:
Efficient and Anonymous Cross-Domain Authentication for IIoT Based on Blockchain. IEEE Trans. Netw. Sci. Eng. 10(2): 899-910 (2023) - [j127]Jie Cui
, Fengqun Wang
, Qingyang Zhang
, Chengjie Gu, Hong Zhong
:
Efficient Batch Authentication Scheme Based on Edge Computing in IIoT. IEEE Trans. Netw. Serv. Manag. 20(1): 357-368 (2023) - [j126]Jing Zhang
, Huixia Fang, Hong Zhong
, Jie Cui
, Debiao He
:
Blockchain-Assisted Privacy-Preserving Traffic Route Management Scheme for Fog-Based Vehicular Ad-Hoc Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 2854-2868 (2023) - [j125]Jie Cui
, Hu Sun
, Hong Zhong
, Jing Zhang
, Lu Wei
, Irina Bolodurina
, Debiao He
:
Collaborative Intrusion Detection System for SDVN: A Fairness Federated Deep Learning Approach. IEEE Trans. Parallel Distributed Syst. 34(9): 2512-2528 (2023) - [j124]Qingyang Zhang
, Zhiming Zhang
, Jie Cui
, Hong Zhong
, Yang Li
, Chengjie Gu
, Debiao He
:
Efficient Blockchain-Based Data Integrity Auditing for Multi-Copy in Decentralized Storage. IEEE Trans. Parallel Distributed Syst. 34(12): 3162-3173 (2023) - [j123]Ran Ding
, Yan Xu
, Hong Zhong
, Jie Cui
, Kewei Sha
:
Towards Fully Anonymous Integrity Checking and Reliability Authentication for Cloud Data Sharing. IEEE Trans. Serv. Comput. 16(5): 3782-3795 (2023) - [j122]Jie Cui
, Yaning Chen
, Hong Zhong
, Debiao He
, Lu Wei
, Irina Bolodurina
, Lu Liu:
Lightweight Encryption and Authentication for Controller Area Network of Autonomous Vehicles. IEEE Trans. Veh. Technol. 72(11): 14756-14770 (2023) - [j121]Song Li
, Hong Zhong
, Liangmin Wang
, Jie Cui
, Jinguang Han
, Zuobin Ying
, Guannan Yang:
SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique. IEEE Trans. Veh. Technol. 72(11): 14815-14827 (2023) - [c57]Depeng Chen
, Xiao Liu
, Jie Cui
, Hong Zhong
:
Poster: Membership Inference Attacks via Contrastive Learning. CCS 2023: 3555-3557 - [c56]Yang Li, Qingyang Zhang, Wenwen Cao, Jie Cui, Hong Zhong:
An Efficient Authentication and Key Agreement Scheme for CAV Internal Applications. CollaborateCom (2) 2023: 414-434 - [c55]Ningning Cui, Zheli Deng, Man Li, Yuliang Ma, Jie Cui, Hong Zhong:
Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee. DASFAA (1) 2023: 644-660 - [c54]Jie Cui, Qipeng Chen, Li Han, Yang Li, Qingyang Zhang, Lu Liu, Hong Zhong:
SLCSA: Scalable Layered Cooperative Service Attestation Scheme in Cloud-Edge-End Cooperation Environments. ICPADS 2023: 1741-1750 - [c53]Yang Li, Qingyang Zhang, Jun Cheng, Yiyuan Zhou, Jie Cui, Hong Zhong:
Attribute-based Verifiable Outsourcing Decryption Encryption Scheme in IIoT. NaNA 2023: 332-338 - [c52]Fuhu Wu, Lin Wang, Shun Zhang, Jie Cui, Hong Zhong:
Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation. ProvSec 2023: 27-43 - [c51]Xiuwen Sun, Zhihao Wu, Jing Lin, Pengfei Fu, Jie Cui, Hong Zhong:
Extracting Length Field of Unknown Binary Network Protocol from Static Trace. TrustCom 2023: 462-469 - [c50]Xiuwen Sun, Guangzheng Zhang, Di Wu, Qingying Yu, Jie Cui, Hong Zhong:
Parallel Pattern Matching over Brotli Compressed Network Traffic. TrustCom 2023: 477-484 - 2022
- [j120]Jie Cui, Yue Sun, Yan Xu, Miaomiao Tian, Hong Zhong:
Forward and backward secure searchable encryption with multi-keyword search and result verification. Sci. China Inf. Sci. 65(5): 1-3 (2022) - [j119]Hong Zhong, Jinshan Xu, Jie Cui
, Xiuwen Sun, Chengjie Gu, Lu Liu:
Prediction-based dual-weight switch migration scheme for SDN load balancing. Comput. Networks 205: 108749 (2022) - [j118]Dengcheng Yan
, Jie Cao
, Wenxin Xie
, Yiwen Zhang
, Hong Zhong
:
PersonalityGate: A general plug-and-play GNN gate to enhance cascade prediction with personality recognition task. Expert Syst. Appl. 203: 117381 (2022) - [j117]Hong Zhong
, Lei Chen, Jie Cui
, Jing Zhang, Irina Bolodurina
, Lu Liu
:
Secure and Lightweight Conditional Privacy-Preserving Authentication for Fog-Based Vehicular Ad Hoc Networks. IEEE Internet Things J. 9(11): 8485-8497 (2022) - [j116]Hui Sun
, Ying Yu, Kewei Sha
, Hong Zhong
:
EdgeEye: A Data-Driven Approach for Optimal Deployment of Edge Video Analytics. IEEE Internet Things J. 9(19): 19273-19295 (2022) - [j115]Hong Zhong
, Jingyue Ni, Jie Cui
, Jing Zhang, Lu Liu
:
Personalized Location Privacy Protection Based on Vehicle Movement Regularity in Vehicular Networks. IEEE Syst. J. 16(1): 755-766 (2022) - [j114]Jie Cui
, Fengyu Bian, Hong Zhong
, Qingyang Zhang
, Sheng Xu, Chengjie Gu, Lu Liu
:
An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System. IEEE Syst. J. 16(4): 6569-6580 (2022) - [j113]Hong Zhong
, Chuanwang Zhang, Jie Cui
, Yan Xu
, Lu Liu
:
Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud. IEEE Trans. Cloud Comput. 10(3): 1592-1603 (2022) - [j112]Xiaoyu Zhang
, Hong Zhong
, Chunyang Fan, Irina Bolodurina, Jie Cui
:
CBACS: A Privacy-Preserving and Efficient Cache-Based Access Control Scheme for Software Defined Vehicular Networks. IEEE Trans. Inf. Forensics Secur. 17: 1930-1945 (2022) - [j111]Jie Cui, Jie Lu, Hong Zhong, Qingyang Zhang
, Chengjie Gu, Lu Liu
:
Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things. IEEE Trans. Ind. Informatics 18(7): 4875-4883 (2022) - [j110]Jie Cui
, Jiayi Chen, Hong Zhong
, Jing Zhang, Lu Liu
:
Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(2): 1247-1259 (2022) - [j109]Jie Cui
, Fenqiang Ouyang, Zuobin Ying
, Lu Wei
, Hong Zhong
:
Secure and Efficient Data Sharing Among Vehicles Based on Consortium Blockchain. IEEE Trans. Intell. Transp. Syst. 23(7): 8857-8867 (2022) - [j108]Lu Wei
, Jie Cui
, Hong Zhong
, Yan Xu
, Lu Liu
:
Proven Secure Tree-Based Authenticated Key Agreement for Securing V2V and V2I Communications in VANETs. IEEE Trans. Mob. Comput. 21(9): 3280-3297 (2022) - [j107]Erzhou Zhu
, Zhile Chen, Jie Cui
, Hong Zhong
:
MOE/RF: A Novel Phishing Detection Model Based on Revised Multiobjective Evolution Optimization Algorithm and Random Forest. IEEE Trans. Netw. Serv. Manag. 19(4): 4461-4478 (2022) - [j106]Qingyang Zhang
, Jie Cui
, Hong Zhong
, Lu Liu
:
Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration. ACM Trans. Sens. Networks 18(3): 48:1-48:27 (2022) - [j105]Jie Cui
, Bei Li
, Hong Zhong
, Geyong Min
, Yan Xu
, Lu Liu
:
A Practical and Efficient Bidirectional Access Control Scheme for Cloud-Edge Data Sharing. IEEE Trans. Parallel Distributed Syst. 33(2): 476-488 (2022) - [j104]Hong Zhong
, Shuo Zhang
, Jie Cui
, Lu Wei
, Lu Liu
:
Broadcast Encryption Scheme for V2I Communication in VANETs. IEEE Trans. Veh. Technol. 71(3): 2749-2760 (2022) - [j103]Xiaoyu Zhang
, Hong Zhong
, Jie Cui
, Irina Bolodurina
, Lu Liu
:
LBVP: A Lightweight Batch Verification Protocol for Fog-Based Vehicular Networks Using Self-Certified Public Key Cryptography. IEEE Trans. Veh. Technol. 71(5): 5519-5533 (2022) - [c49]Hong Zhong, Fan Yang, Lu Wei, Jing Zhang, Chengjie Gu, Jie Cui:
Dataset for Evaluation of DDoS Attacks Detection in Vehicular Ad-Hoc Networks. WASA (3) 2022: 249-260 - [i16]Fuhu Wu, Jian Sun, Shun Zhang, Zhili Chen, Hong Zhong:
Efficient reversible data hiding via two layers of double-peak embedding. CoRR abs/2206.03838 (2022) - 2021
- [j102]Tianjiao Ni, Zhili Chen, Gang Xu, Shun Zhang, Hong Zhong:
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing. Ad Hoc Networks 114: 102450 (2021) - [j101]Hong Zhong, Jinpeng Fan, Jie Cui, Yan Xu, Lu Liu
:
Assessing Profit of Prediction for SDN controllers load balancing. Comput. Networks 191: 107991 (2021) - [j100]Qingyang Zhang
, Hong Zhong, Weisong Shi, Lu Liu
:
A trusted and collaborative framework for deep learning in IoT. Comput. Networks 193: 108055 (2021) - [j99]Zhili Chen, Wei Ding, Yan Xu, Miaomiao Tian, Hong Zhong:
Fair auctioning and trading framework for cloud virtual machines based on blockchain. Comput. Commun. 171: 89-98 (2021) - [j98]Zhili Chen, Yu Wang, Shun Zhang, Hong Zhong, Lin Chen:
Differentially private user-based collaborative filtering recommendation based on k-means clustering. Expert Syst. Appl. 168: 114366 (2021) - [j97]Yan Xu, Ming Wang, Hong Zhong, Sheng Zhong:
IBEET-AOK: ID-based encryption with equality test against off-line KGAs for cloud medical services. Frontiers Comput. Sci. 15(6): 156814 (2021) - [j96]Hong Zhong, Yiyuan Zhou, Qingyang Zhang
, Yan Xu, Jie Cui:
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Future Gener. Comput. Syst. 115: 486-496 (2021) - [j95]Tianjiao Ni, Minghao Qiao, Zhili Chen, Shun Zhang, Hong Zhong:
Utility-efficient differentially private K-means clustering based on cluster merging. Neurocomputing 424: 205-214 (2021) - [j94]Yongliang Cheng, Yan Xu
, Hong Zhong
, Yi Liu:
Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication. IEEE Internet Things J. 8(1): 144-155 (2021) - [j93]Qingyang Zhang
, Hong Zhong
, Jie Cui
, Lingmei Ren
, Weisong Shi
:
AC4AV: A Flexible and Dynamic Access Control Framework for Connected and Autonomous Vehicles. IEEE Internet Things J. 8(3): 1946-1958 (2021) - [j92]Jie Cui
, Xuelian Chen, Jing Zhang, Qingyang Zhang
, Hong Zhong
:
Toward Achieving Fine-Grained Access Control of Data in Connected and Autonomous Vehicles. IEEE Internet Things J. 8(10): 7925-7937 (2021) - [j91]Hong Zhong
, Wenwen Cao
, Qingyang Zhang
, Jing Zhang, Jie Cui
:
Toward Trusted and Secure Communication Among Multiple Internal Modules in CAV. IEEE Internet Things J. 8(24): 17734-17746 (2021) - [j90]Yan Xu
, Long Ding, Jie Cui
, Hong Zhong
, Jia Yu
:
PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing. IEEE Syst. J. 15(3): 3730-3739 (2021) - [j89]Ke Cheng, Liangmin Wang
, Yulong Shen
, Hua Wang
, Yongzhi Wang
, Xiaohong Jiang
, Hong Zhong
:
Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 7(4): 689-702 (2021) - [j88]Jing Zhang
, Jie Cui
, Hong Zhong
, Zhili Chen
, Lu Liu
:
PA-CRT: Chinese Remainder Theorem Based Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks. IEEE Trans. Dependable Secur. Comput. 18(2): 722-735 (2021) - [j87]Jie Cui
, Fengqun Wang, Qingyang Zhang
, Yan Xu
, Hong Zhong
:
Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT. IEEE Trans. Ind. Electron. 68(12): 12921-12929 (2021) - [j86]Lu Wei
, Jie Cui
, Yan Xu
, Jiujun Cheng
, Hong Zhong
:
Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. IEEE Trans. Inf. Forensics Secur. 16: 1681-1695 (2021) - [j85]Jing Zhang, Hong Zhong
, Jie Cui
, Yan Xu
, Lu Liu
:
SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks. IEEE Trans. Inf. Forensics Secur. 16: 1810-1824 (2021) - [j84]Hong Zhong
, Fei Wu, Yan Xu, Jie Cui
:
QoS-Aware Multicast for Scalable Video Streaming in Software-Defined Networks. IEEE Trans. Multim. 23: 982-994 (2021) - [j83]Jing Zhang, Jie Cui
, Hong Zhong
, Irina Bolodurina
, Lu Liu
:
Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks. IEEE Trans. Netw. Sci. Eng. 8(4): 2982-2994 (2021) - [c48]Jing Zhang, Jie Cui, Hong Zhong, Chengjie Gu, Lu Liu
:
Secure and Efficient Certificateless Provable Data Possession for Cloud-Based Data Management Systems. DASFAA (1) 2021: 71-87 - [c47]Xiuwen Sun, Di Wu, Da Mo, Jie Cui, Hong Zhong:
Accelerating Knuth-Morris-Pratt String Matching over LZ77 Compressed Text. DCC 2021: 372 - [c46]Hong Zhong, Chao Yu, Jie Cui, Xiuwen Sun, Chengjie Gu, Lu Liu:
DDoS Defense Scheme Based on Machine Learning in Software-Defined Networking. HPCC/DSS/SmartCity/DependSys 2021: 253-260 - [c45]Jie Cui, Lingbiao Kong, Hong Zhong, Xiuwen Sun, Chengjie Gu, Jianfeng Ma:
Scalable QoS-Aware Multicast for SVC Streams in Software-Defined Networks. ISCC 2021: 1-7 - [i15]Shun Zhang, Benfei Duan, Zhili Chen, Hong Zhong:
On the differential privacy of dynamic location obfuscation with personalized error bounds. CoRR abs/2101.12602 (2021) - [i14]Shun Zhang, Benfei Duan, Zhili Chen, Hong Zhong:
Regionalized location obfuscation mechanism with personalized privacy levels. CoRR abs/2102.00654 (2021) - [i13]Dengcheng Yan, Jie Cao, Yiwen Zhang, Hong Zhong:
PersonalityGate: A General Plug-and-Play GNN Gate to Enhance Cascade Prediction with Personality Recognition Task. CoRR abs/2104.14327 (2021) - 2020
- [j82]Hong Zhong, Zhanfei Li, Yan Xu, Zhili Chen, Jie Cui:
Two-stage index-based central keyword-ranked searches over encrypted cloud data. Sci. China Inf. Sci. 63(3) (2020) - [j81]Qiliang Li, Jie Cui
, Hong Zhong, Yichao Du, Yonglong Luo, Lu Liu
:
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j80]Jing Zhang, Hong Zhong
, Jie Cui
, Yan Xu, Lu Liu
:
An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks. IEEE Internet Things J. 7(4): 3462-3473 (2020) - [j79]Yan Xu, Song Sun, Jie Cui, Hong Zhong
:
Intrusion-resilient public cloud auditing scheme with authenticator update. Inf. Sci. 512: 616-628 (2020) - [j78]Qingren Wang, Chuankai Feng, Yan Xu
, Hong Zhong, Victor S. Sheng:
A novel privacy-preserving speech recognition framework using bidirectional LSTM. J. Cloud Comput. 9: 36 (2020) - [j77]Hong Zhong, Yingxue Geng, Jie Cui
, Yan Xu, Lu Liu
:
A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network. J. Cloud Comput. 9: 54 (2020) - [j76]Hong Zhong, Zhanfei Li, Jie Cui, Yue Sun, Lu Liu
:
Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149 (2020) - [j75]Jie Cui
, Lu Wei
, Hong Zhong
, Jing Zhang, Yan Xu, Lu Liu
:
Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme. IEEE J. Sel. Areas Commun. 38(6): 1191-1204 (2020) - [j74]Ran Ding, Yan Xu, Jie Cui
, Hong Zhong
:
A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience. IEEE Syst. J. 14(1): 633-644 (2020) - [j73]Yimin Wang
, Hong Zhong
, Yan Xu
, Jie Cui
, Ge Wu
:
Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs. IEEE Syst. J. 14(4): 5373-5383 (2020) - [j72]Jie Cui
, Xiaoyu Zhang
, Hong Zhong
, Jing Zhang, Lu Liu
:
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment. IEEE Trans. Inf. Forensics Secur. 15: 1654-1667 (2020) - [j71]Jing Zhang, Hong Zhong
, Jie Cui
, Miaomiao Tian
, Yan Xu
, Lu Liu
:
Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks. IEEE Trans. Veh. Technol. 69(7): 7940-7954 (2020) - [j70]Jie Cui
, Yali Wang, Jing Zhang, Yan Xu
, Hong Zhong
:
Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 69(8): 8914-8924 (2020) - [j69]Jie Cui, Wenyu Xu, Yibo Han, Jing Zhang, Hong Zhong:
Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Veh. Commun. 21 (2020) - [c44]Miaomiao Tian, Zhen Xie, Hong Zhong, Zhili Chen:
Lightweight Proofs of Storage with Public Verifiability from Lattices. HPCC/DSS/SmartCity 2020: 551-558 - [c43]Zhili Chen, Baohua Yang, Fuhu Wu, Shuai Ren, Hong Zhong:
TCNN: Two-Way Convolutional Neural Network for Image Steganalysis. SecureComm (1) 2020: 509-514 - [c42]Jie Cui, Jing Zhang, Jiantao He, Hong Zhong, Yao Lu:
DDoS detection and defense mechanism for SDN controllers with K-Means. UCC 2020: 394-401 - [c41]Yan Xu, Meng Wang
, Jie Cui, Jing Zhang, Hong Zhong
:
LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs. WASA (2) 2020: 78-86 - [i12]Tianjiao Ni, Zhili Chen, Lin Chen, Hong Zhong, Shun Zhang, Yan Xu:
Differentially Private Combinatorial Cloud Auction. CoRR abs/2001.00694 (2020) - [i11]Zhili Chen, Wei Ding, Yan Xu, Miaomiao Tian, Hong Zhong:
Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain. CoRR abs/2001.00771 (2020) - [i10]Shun Zhang, Benfei Duan, Zhili Chen, Hong Zhong, Qizhi Yu:
A Differentially Private Framework in Spatial Crowdsourcing with Historical Data Learning. CoRR abs/2008.03475 (2020) - [i9]Tianjiao Ni, Minghao Qiao, Zhili Chen, Shun Zhang, Hong Zhong:
Utility-efficient Differentially Private K-means Clustering based on Cluster Merging. CoRR abs/2010.01234 (2020) - [i8]Zhili Chen, Yuting Wang, Tianjiao Ni, Hong Zhong:
DCDChain: A Credible Architecture of Digital Copyright Detection Based on Blockchain. CoRR abs/2010.01235 (2020)
2010 – 2019
- 2019
- [b1]Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang:
Security and Privacy for Next-Generation Wireless Networks. Wireless Networks, Springer 2019, ISBN 978-3-030-01149-9, pp. 1-180 - [j68]Hong Zhong
, Lei Pan, Qingyang Zhang
, Jie Cui
:
A New Message Authentication Scheme for Multiple Devices in Intelligent Connected Vehicles Based on Edge Computing. IEEE Access 7: 108211-108222 (2019) - [j67]Miaomiao Tian
, Shibei Ye, Hong Zhong
, Fei Chen
, Chuang Gao, Jie Chen:
Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem. IEEE Access 7: 129071-129081 (2019) - [j66]Jingwen Pan, Jie Cui
, Lu Wei, Yan Xu, Hong Zhong:
Secure data sharing scheme for VANETs based on edge computing. EURASIP J. Wirel. Commun. Netw. 2019: 169 (2019) - [j65]Jie Cui, Mingjun Wang, Yonglong Luo, Hong Zhong:
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. Future Gener. Comput. Syst. 97: 275-283 (2019) - [j64]Jie Cui
, Xiaoyu Zhang
, Hong Zhong
, Zuobin Ying
, Lu Liu
:
RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks. IEEE Internet Things J. 6(4): 6417-6428 (2019) - [j63]Ran Ding, Hong Zhong
, Jianfeng Ma, Ximeng Liu
, Jianting Ning
:
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System. IEEE Internet Things J. 6(5): 8393-8405 (2019) - [j62]Hong Zhong
, Shunshun Han, Jie Cui
, Jing Zhang, Yan Xu:
Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 476: 211-221 (2019) - [j61]Jie Cui
, Han Zhou, Yan Xu, Hong Zhong
:
OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud. Inf. Sci. 489: 63-77 (2019) - [j60]Shun Zhang, Laixiang Liu, Zhili Chen, Hong Zhong:
Probabilistic matrix factorization with personalized differential privacy. Knowl. Based Syst. 183 (2019) - [j59]Qingyang Zhang
, Hui Sun, Xiaopei Wu, Hong Zhong
:
Edge Video Analytics for Public Safety: A Review. Proc. IEEE 107(8): 1675-1696 (2019) - [j58]Hong Zhong, Jianqiao Sheng, Yan Xu, Jie Cui
:
SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers. Peer-to-Peer Netw. Appl. 12(2): 440-451 (2019) - [j57]Zhili Chen
, Tianjiao Ni
, Hong Zhong, Shun Zhang
, Jie Cui
:
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization. IEEE Trans. Inf. Forensics Secur. 14(11): 2805-2818 (2019) - [j56]Jie Cui
, Lu Wei
, Jing Zhang
, Yan Xu, Hong Zhong
:
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 20(5): 1621-1632 (2019) - [j55]Jie Cui
, Di Wu, Jing Zhang
, Yan Xu, Hong Zhong
:
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs. IEEE Trans. Veh. Technol. 68(3): 2972-2986 (2019) - [j54]Zhili Chen
, Ruihong Che, Hong Zhong, Miaomiao Tian, Jie Cui:
PATH: privacy-preserving auction for heterogeneous spectrum allocations. Wirel. Networks 25(4): 1763-1776 (2019) - [c40]Min Ye, Hong Zhong, Xiao Song, Shilei Huang, Gang Cheng:
Acoustic Scene Classification Using Deep Convolutional Neural Network via Transfer Learning. IALP 2019: 19-22 - [c39]Hong Zhong
, JianZhong Zou
, Jie Cui
, Yan Xu
:
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers. ICA3PP (1) 2019: 330-344 - [c38]Ke Cheng, Yulong Slien, Yuzhen Zhang, Xinghui Zhu, Liangmin Wang
, Hong Zhong:
Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets. ICC 2019: 1-6 - [c37]Lin Wang, Qingyang Zhang
, Youhuizi Li, Hong Zhong, Weisong Shi
:
MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs. ICPADS 2019: 470-479 - [c36]Yongliang Cheng, Yan Xu, Hong Zhong, Yi Liu:
HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT. IPCCC 2019: 1-7 - [i7]Zhili Chen, Xiaoli Kan, Shun Zhang, Lin Chen, Yan Xu, Hong Zhong:
Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics. CoRR abs/1908.03715 (2019) - [i6]Yin Xu, Zhili Chen, Hong Zhong:
Privacy-preserving Double Auction Mechanism Based on Homomorphic Encryption and Sorting Networks. CoRR abs/1909.07637 (2019) - 2018
- [j53]Hong Zhong
, Bo Huang, Jie Cui
, Yan Xu, Lu Liu
:
Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks. IEEE Access 6: 2241-2250 (2018) - [j52]Hong Zhong, Yaming Fang, Jie Cui:
Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time". Future Gener. Comput. Syst. 80: 409-416 (2018) - [j51]Miaomiao Tian, Lingyan Wang, Hong Zhong, Jie Chen:
Attribute-based Data Integrity Checking for Cloud Storage. Fundam. Informaticae 163(4): 395-411 (2018) - [j50]Jie Cui
, Jingyu Wen, Shunshun Han, Hong Zhong
:
Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network. IEEE Internet Things J. 5(5): 3491-3498 (2018) - [j49]Qingyang Zhang
, Quan Zhang
, Weisong Shi
, Hong Zhong
:
Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts. IEEE Internet Things J. 5(5): 3580-3593 (2018) - [j48]Jie Cui, Han Zhou, Hong Zhong, Yan Xu:
AKSER: Attribute-based keyword search with efficient revocation in cloud computing. Inf. Sci. 423: 343-352 (2018) - [j47]Jie Cui, Jing Zhang, Hong Zhong, Runhua Shi, Yan Xu:
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Inf. Sci. 451-452: 1-15 (2018) - [j46]Hong Zhong, Lili Shao, Jie Cui
, Yan Xu:
An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 111: 1-12 (2018) - [j45]Jie Cui, Lili Shao, Hong Zhong, Yan Xu, Lu Liu
:
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Netw. Appl. 11(5): 1022-1037 (2018) - [j44]Jie Cui
, Wenyu Xu, Hong Zhong
, Jing Zhang, Yan Xu, Lu Liu
:
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles. Sensors 18(5): 1453 (2018) - [j43]Hong Zhong, Wenlong Zhu, Yan Xu, Jie Cui:
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 22(1): 243-251 (2018) - [j42]Jie Cui
, Qinghe Lu
, Hong Zhong
, Miaomiao Tian, Lu Liu
:
A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time. IEEE Trans. Netw. Serv. Manag. 15(4): 1197-1206 (2018) - [j41]Quan Zhang
, Qingyang Zhang
, Weisong Shi
, Hong Zhong
:
Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics. IEEE Trans. Parallel Distributed Syst. 29(9): 2004-2017 (2018) - [j40]Jie Cui, Xuefei Tao
, Jing Zhang, Yan Xu, Hong Zhong:
HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs. Veh. Commun. 14: 15-25 (2018) - [c35]Yan Xu, Ran Ding, Jie Cui, Hong Zhong:
Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. ACISP 2018: 399-416 - [c34]Jie Cui, Jiantao He, Yan Xu, Hong Zhong:
TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. ACISP 2018: 649-665 - [c33]Qingyang Zhang
, Hong Zhong, Jiaoren Wu, Weisong Shi
:
How Edge Computing and Initial Congestion Window Affect Latency of Web-Based Services: Early Experiences with Baidu? SEC 2018: 393-398 - [c32]Jie Cui, Qinghe Lu, Hong Zhong, Miaomiao Tian, Lu Liu
:
SMCLBRT: A Novel Load-Balancing Strategy of Multiple SDN Controllers Based on Response Time. HPCC/SmartCity/DSS 2018: 541-546 - [c31]Zhili Chen, Xianyue Bao, Zuobin Ying, Ximeng Liu, Hong Zhong:
Differentially Private Location Protection with Continuous Time Stamps for VANETs. ICA3PP (4) 2018: 204-219 - [c30]Miaomiao Tian, Shibei Ye, Hong Zhong, Lingyan Wang, Fei Chen, Jie Cui:
Identity-Based Proofs of Storage with Enhanced Privacy. ICA3PP (4) 2018: 461-480 - [c29]Hong Zhong, Bo Huang, Jie Cui, Jiang Li, Kewei Sha:
Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. ICCCN 2018: 1-8 - [c28]Jie Cui, Sheng Zhou, Hong Zhong, Yan Xu, Kewei Sha:
Transaction-Based Flow Rule Conflict Detection and Resolution in SDN. ICCCN 2018: 1-9 - [c27]Qingyang Zhang
, Yifan Wang, Xingzhou Zhang, Liangkai Liu, Xiaopei Wu, Weisong Shi
, Hong Zhong:
OpenVDAP: An Open Vehicular Data Analytics Platform for CAVs. ICDCS 2018: 1310-1320 - [c26]Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:
PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. ICICS 2018: 248-267 - [i5]Zhili Chen, Tianjiao Ni, Hong Zhong, Shun Zhang, Jie Cui:
Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization. CoRR abs/1810.07873 (2018) - [i4]Zhili Chen, Xuemei Wei, Hong Zhong, Jie Cui, Yan Xu, Shun Zhang:
Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter. CoRR abs/1810.07880 (2018) - [i3]Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:
PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction. CoRR abs/1810.08451 (2018) - [i2]Shun Zhang, Laixiang Liu, Zhili Chen, Hong Zhong:
Probabilistic Matrix Factorization with Personalized Differential Privacy. CoRR abs/1810.08509 (2018) - [i1]Zhili Chen, Yu Wang, Shun Zhang, Hong Zhong, Lin Chen:
Differentially Private User-based Collaborative Filtering Recommendation Based on K-means Clustering. CoRR abs/1812.01782 (2018) - 2017
- [j39]Liangmin Wang, Qing-Qing Xie
, Hong Zhong
:
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data. IEEE Access 5: 3216-3227 (2017) - [j38]Yan Xu, Ming Wang, Hong Zhong
, Jie Cui
, Lu Liu
, Virginia N. L. Franqueira
:
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks. IEEE Access 5: 12702-12713 (2017) - [j37]Jie Cui, Hong Zhong, Weiya Luo, Jing Zhang:
Area-based mobile multicast group key management scheme for secure mobile cooperative sensing. Sci. China Inf. Sci. 60(9): 098104:1-098104:3 (2017) - [j36]Hong Zhong, Weiya Luo, Jie Cui:
Multiple multicast group key management for the Internet of People. Concurr. Comput. Pract. Exp. 29(3) (2017) - [j35]Hong Zhong, Yaming Fang, Jie Cui:
LBBSRT: An efficient SDN load balancing scheme based on server response time. Future Gener. Comput. Syst. 68: 183-190 (2017) - [j34]Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, Yimin Wang:
An Efficient ID-based Online/Offline Signature Scheme without Key Escrow. Int. J. Netw. Secur. 19(1): 127-137 (2017) - [j33]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Inf. Process. 16(1): 8 (2017) - [j32]Zhen-wan Peng, Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 16(12): 316 (2017) - [j31]Song Li, Jie Cui
, Hong Zhong, Yiwen Zhang, Qiang He:
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. Secur. Commun. Networks 2017: 4364376:1-4364376:16 (2017) - [j30]Song Li, Jie Cui
, Hong Zhong, Lu Liu
:
Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks. Sensors 17(5): 1032 (2017) - [j29]Jie Cui
, Jing Zhang
, Hong Zhong, Yan Xu:
SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter. IEEE Trans. Veh. Technol. 66(11): 10283-10295 (2017) - [c25]Jie Cui, Wenyu Xu, Kewei Sha
, Hong Zhong:
An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs. CollaborateCom 2017: 508-518 - [c24]Hong Zhong, Jianqiao Sheng, Jie Cui, Yan Xu:
SCPLBS: A Smart Cooperative Platform for Load Balancing and Security on SDN Distributed Controllers. CYBCONF 2017: 1-6 - [c23]Zhili Chen, Lin Chen, Hong Zhong:
Towards Secure and Verifiable Database-Driven Spectrum Sharing. DSN 2017: 285-296 - [c22]Qingyang Zhang
, Quan Zhang, Weisong Shi
, Hong Zhong:
Enhancing AMBER alert using collaborative edges: poster. SEC 2017: 27:1-27:2 - [c21]Jie Cui, Jingyu Wen, Hong Zhong, Jing Zhang:
A Privacy Protection Scheme for Vehicle's Location Based on Virtual Location and Route Confusion. iThings/GreenCom/CPSCom/SmartData 2017: 190-194 - [c20]Zhili Chen, Xuemei Wei, Hong Zhong, Jie Cui, Yan Xu, Shun Zhang:
Secure, efficient and practical double spectrum auction. IWQoS 2017: 1-6 - 2016
- [j28]Yimin Wang, Hong Zhong, Yan Xu, Jie Cui:
ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs. Int. J. Netw. Secur. 18(2): 374-382 (2016) - [j27]Yan Xu, Liusheng Huang, Miaomiao Tian, Hong Zhong:
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication. Int. J. Netw. Secur. 18(5): 993-996 (2016) - [j26]Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui:
Keyword search protocol with privacy preservation using ID-based proxy reencryption. Int. J. Secur. Networks 11(4): 188-195 (2016) - [j25]Runhua Shi, Yi Mu, Hong Zhong, Shun Zhang, Jie Cui:
Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370-371: 147-158 (2016) - [j24]Runhua Shi, Hong Zhong, Shun Zhang:
A Novel Authenticated Group Key Distribution Scheme. KSII Trans. Internet Inf. Syst. 10(2): 935-946 (2016) - [j23]Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang:
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving. J. Electr. Comput. Eng. 2016: 6567146:1-6567146:14 (2016) - [j22]Yan Xu, Hong Zhong, Jie Cui:
An Improved Identity-Based Multi-Proxy Multi-Signature Scheme. J. Inf. Hiding Multim. Signal Process. 7(2): 343-351 (2016) - [j21]Hong Zhong, Haiquan Liu, Chin-Chen Chang, Chia-Chen Lin:
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. J. Inf. Hiding Multim. Signal Process. 7(2): 362-375 (2016) - [j20]Xuan Tang, Hong Zhong, Runhua Shi, Jie Cui:
基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption). 计算机科学 43(1): 181-185 (2016) - [j19]Jiafu Yu, Hong Zhong, Yimin Wang:
基于组合阶双线性群的组签名方案的分析与改进 (Correctness Analysis and Improvement of Group Signature in Composite Order Bilinear Groups). 计算机科学 43(2): 179-182 (2016) - [j18]Conglin Huang, Hong Zhong, Yimin Wang:
基于中国剩余定理的群签名改进方案 (Improved Group Signature Scheme Based on Chinese Remainder Theorem). 计算机科学 43(3): 174-178 (2016) - [j17]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
An efficient quantum scheme for Private Set Intersection. Quantum Inf. Process. 15(1): 363-371 (2016) - [j16]Hong Zhong, Jie Cui, Runhua Shi, Chao Xia:
Many-to-one homomorphic encryption scheme. Secur. Commun. Networks 9(10): 1007-1015 (2016) - [j15]Yimin Wang
, Hong Zhong, Yan Xu, Jie Cui, Fuchun Guo
:
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs. Secur. Commun. Networks 9(18): 5460-5471 (2016) - [j14]Ke Cheng, Liangmin Wang, Hong Zhong:
Secure Nearest Neighbor Query on Crowd-Sensing Data. Sensors 16(10): 1545 (2016) - [c19]Qing-Qing Xie, Liangmin Wang, Hong Zhong:
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data. CBD 2016: 200-206 - [c18]Qingyang Zhang
, Zhifeng Yu, Weisong Shi
, Hong Zhong:
Demo Abstract: EVAPS: Edge Video Analysis for Public Safety. SEC 2016: 121-122 - [c17]Dongrui Fan
, Hong Zhong, Ali R. Hurson
, Weisong Shi
:
Message from the chairs. IGSC 2016: 1 - [c16]Quan Zhang, Xiaohong Zhang, Qingyang Zhang
, Weisong Shi
, Hong Zhong:
Firework: Big Data Sharing and Processing in Collaborative Edge Environment. HotWeb 2016: 20-25 - [c15]Zhili Chen, Lin Chen, Liusheng Huang, Hong Zhong:
Towards secure spectrum auction: both bids and bidder locations matter: poster. MobiHoc 2016: 361-362 - [c14]Hong Zhong, Lili Shao, Jie Cui:
A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks. NaNA 2016: 210-217 - [c13]Zhili Chen, Lin Chen, Liusheng Huang, Hong Zhong:
On Privacy-Preserving Cloud Auction. SRDS 2016: 279-288 - [c12]Song Li, Hong Zhong, Jie Cui:
Public auditing scheme for cloud-based wireless body area network. UCC 2016: 375-381 - [c11]Jie Cui, Hong Zhong, Xuan Tang, Jing Zhang:
A fined-grained privacy-preserving access control protocol in wireless sensor networks. UCC 2016: 382-387 - 2015
- [j13]Jie Cui, Hong Zhong, Runhua Shi, Jiankai Wang:
Related-key cryptanalysis on 7-round AES-128/192. Int. J. Electron. Secur. Digit. Forensics 7(2): 166-178 (2015) - [j12]Jie Cui, Hong Zhong, Runhua Shi, Liangmin Wang:
A New AES S-Box Equation System Based on BES. J. Inf. Hiding Multim. Signal Process. 6(6): 1177-1184 (2015) - [j11]Hong Zhong, Qunfeng Lin, Jie Cui, Runhua Shi, Lu Liu
:
An Efficient SDN Load Balancing Scheme Based on Variance Analysis for Massive Mobile Users. Mob. Inf. Syst. 2015: 241732:1-241732:9 (2015) - [j10]Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel one-to-many and many-to-one asymmetric encryption model and its algorithms. Secur. Commun. Networks 8(18): 3906-3913 (2015) - [j9]Runhua Shi, Hong Zhong, Shun Zhang:
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J. Supercomput. 71(11): 4015-4018 (2015) - 2014
- [j8]Runhua Shi, Hong Zhong, Liusheng Huang:
A novel anonymous authentication scheme without cryptography. Trans. Emerg. Telecommun. Technol. 25(9): 875-880 (2014) - [c10]Yun Wang, Dalei Zhang, Hong Zhong:
Multi-authority based weighted attribute encryption scheme in cloud computing. ICNC 2014: 1033-1038 - 2013
- [j7]Runhua Shi, Hong Zhong:
Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 12(2): 921-932 (2013) - [j6]Runhua Shi, Hong Zhong:
Erratum to: Multi-party quantum key agreement with Bell states and Bell measurements. Quantum Inf. Process. 12(2): 933 (2013) - [j5]Runhua Shi, Hong Zhong, Liusheng Huang:
Quantum state sharing against the controller's cheating. Quantum Inf. Process. 12(8): 2889-2899 (2013) - 2012
- [j4]Runhua Shi, Hong Zhong:
Multiparty quantum secret sharing with the pure entangled two-photon states. Quantum Inf. Process. 11(1): 161-169 (2012) - [c9]Fen Wu, Hong Zhong, Runhua Shi, Hongsheng Huang:
Secure two-party computation of the quadratic function's extreme minimal value. FSKD 2012: 2975-2978 - [c8]Hong Zhong, Xiaodong Wei, Runhua Shi:
A novel anonymous secret sharing scheme based on BP Artificial Neural Network. ICNC 2012: 366-370 - 2011
- [j3]Runhua Shi, Liusheng Huang, Wei Yang, Hong Zhong:
Asymmetric multi-party quantum state sharing of an arbitrary m-qubit state. Quantum Inf. Process. 10(1): 53-61 (2011) - [j2]Runhua Shi, Liusheng Huang, Wei Yang, Hong Zhong:
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states. Quantum Inf. Process. 10(2): 231-239 (2011) - [c7]Yonglong Luo, Chao Cheng, Cai-xia Chen, Hong Zhong:
A Protocol of Privacy-Preserving Closest Pair in Two Dimensional Space. CIS 2011: 865-869 - [c6]Runhua Shi, Hong Zhong:
An Efficient Multiparty Quantum Secret Sharing with Pure Entangled Two Photon States. CSEE (1) 2011: 489-495 - 2010
- [c5]Huanghong Sheng, Hong Zhong, Runhua Shi:
A Secure Scheme for Data Statistics. ICEE 2010: 1289-1291
2000 – 2009
- 2008
- [c4]Runhua Shi, Liusheng Huang, Yonglong Luo, Hong Zhong:
A Threshold Multi-secret Sharing Scheme. ICNSC 2008: 1705-1707 - [c3]Runhua Shi, Liusheng Huang, Hong Zhong:
An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme. WKDD 2008: 580-583 - 2007
- [j1]Yonglong Luo, Liusheng Huang, Hong Zhong:
Secure Two-Party Point-Circle Inclusion Problem. J. Comput. Sci. Technol. 22(1): 88-91 (2007) - [c2]Runhua Shi, Hong Zhong, Liusheng Huang:
A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. SNPD (2) 2007: 9-13 - 2005
- [c1]Liusheng Huang, Hong Zhong, Hong Shen, Yonglong Luo:
An Efficient Multiple-Precision Division Algorithm. PDCAT 2005: 971-974
Coauthor Index
aka: Irina Bolodurina

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-12 22:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint