default search action
Jin Cao 0001
Person information
- affiliation: Xidian University, Xi'an, China
Other persons with the same name
- Jin Cao — disambiguation page
- Jin Cao 0002 — Bell Labs, Alcatel-Lucent, Murray Hill, NJ, USA
- Jin Cao 0003 — Amazon Alexa AI
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Zhenyang Guo, Jin Cao, Xinyi Wang, Yinghui Zhang, Ben Niu, Hui Li:
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks. IEEE Internet Things J. 11(12): 22091-22106 (2024) - [j50]Qiao Liu, Qi Han, Guangze Luo, Jin Cao, Hui Li, Yong Wang:
Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles. Microprocess. Microsystems 104: 104965 (2024) - [j49]Chao Shang, Jin Cao, Tong Zhu, Yinghui Zhang, Ben Niu, Hui Li:
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices. IEEE Syst. J. 18(1): 590-599 (2024) - [j48]Chao Shang, Jin Cao, Jiajia Liu, Yinghui Zhang, Ben Niu, Hui Li:
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network. IEEE Trans. Intell. Transp. Syst. 25(7): 6780-6795 (2024) - [j47]Yunqing Sun, Jin Cao, Xiongpeng Ren, Canhui Tang, Ben Niu, Yinghui Zhang, Hui Li:
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks. IEEE Trans. Intell. Transp. Syst. 25(8): 9733-9748 (2024) - [j46]Ruhui Ma, Jin Cao, Shiyang He, Yinghui Zhang, Ben Niu, Hui Li:
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network. IEEE Trans. Netw. Serv. Manag. 21(2): 2426-2444 (2024) - [c24]Likun Zhang, Jingwei Sun, Shoukun Guo, Fenghua Li, Jin Cao, Ben Niu:
Interpreting Memorization in Deep Learning from Data Distribution. ICASSP 2024: 5565-5569 - [i1]Likun Zhang, Hao Wu, Lingcui Zhang, Fengyuan Xu, Jin Cao, Fenghua Li, Ben Niu:
Training Data Attribution: Was Your Model Secretly Trained On Data Created By Mine? CoRR abs/2409.15781 (2024) - 2023
- [j45]Yuanyuan Yang, Jin Cao, Xiongpeng Ren, Ben Niu, Yinghui Zhang, Hui Li:
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication. Comput. Commun. 197: 214-229 (2023) - [j44]Wei Liu, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui, Dong Zheng:
Secure and Efficient Smart Healthcare System Based on Federated Learning. Int. J. Intell. Syst. 2023: 1-12 (2023) - [j43]Yuanyuan Yang, Jin Cao, Ruhui Ma, Lifu Cheng, Lilan Chen, Ben Niu, Hui Li:
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks. IEEE Internet Things J. 10(15): 13959-13973 (2023) - [j42]Yinghui Zhang, Tian Zhu, Rui Guo, Shengmin Xu, Hui Cui, Jin Cao:
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data. IEEE Trans. Cloud Comput. 11(1): 971-983 (2023) - [j41]Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang, Hui Li:
A Software-Based Remote Attestation Scheme for Internet of Things Devices. IEEE Trans. Dependable Secur. Comput. 20(2): 1422-1434 (2023) - [j40]Xiongpeng Ren, Jin Cao, Ruhui Ma, Yurong Luo, Jian Guan, Yinghui Zhang, Hui Li:
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. IEEE Trans. Netw. Serv. Manag. 20(3): 3880-3899 (2023) - [c23]Yinghui Zhang, Hao Du, Jin Cao, Gang Han, Dong Zheng:
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection. Inscrypt (2) 2023: 293-304 - [c22]Ben Niu, Xindi Wang, Likun Zhang, Shoukun Guo, Jin Cao, Fenghua Li:
A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning. GLOBECOM 2023: 4259-4264 - [c21]Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. ISPEC 2023: 52-73 - [c20]Likun Zhang, Yahong Chen, Ang Li, Binghui Wang, Yiran Chen, Fenghua Li, Jin Cao, Ben Niu:
Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation. WACV 2023: 4690-4698 - 2022
- [j39]Xiongpeng Ren, Jin Cao, Maode Ma, Hui Li, Yinghui Zhang:
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. IEEE Internet Things J. 9(5): 3642-3656 (2022) - [j38]Jin Cao, Sheng Li, Ruhui Ma, Yuxi Han, Yueyu Zhang, Hui Li:
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices. IEEE Internet Things J. 9(19): 19174-19187 (2022) - [j37]Gang Han, Tiantian Zhang, Yinghui Zhang, Guowen Xu, Jianfei Sun, Jin Cao:
Verifiable and privacy preserving federated learning without fully trusted centers. J. Ambient Intell. Humaniz. Comput. 13(3): 1431-1441 (2022) - [j36]Yinghui Zhang, Xuanni Wei, Jin Cao, Jianting Ning, Zuobin Ying, Dong Zheng:
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8350-8361 (2022) - [j35]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Xiaowei Li, Yang Xu:
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N. J. Netw. Comput. Appl. 198: 103281 (2022) - [j34]Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. IEEE Trans. Dependable Secur. Comput. 19(1): 370-387 (2022) - [j33]Ruhui Ma, Jin Cao, Yinghui Zhang, Chao Shang, Lihui Xiong, Hui Li:
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X. IEEE Trans. Intell. Transp. Syst. 23(12): 23976-23992 (2022) - [c19]Haiyang Luo, Zhe Sun, Yunqing Sun, Ang Li, Binghui Wang, Jin Cao, Ben Niu:
SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2340-2347 - [c18]Ben Niu, Zejun Zhou, Yahong Chen, Jin Cao, Fenghua Li:
DP-Opt: Identify High Differential Privacy Violation by Optimization. WASA (2) 2022: 406-416 - 2021
- [j32]Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Comput. Commun. 166: 165-173 (2021) - [j31]Jin Cao, Maode Ma, Yulong Fu, Hui Li, Yinghui Zhang:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(3): 1182-1195 (2021) - [c17]Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao:
AdaPDP: Adaptive Personalized Differential Privacy. INFOCOM 2021: 1-10 - 2020
- [j30]Jin Cao, Maode Ma, Hui Li, Ruhui Ma, Yunqing Sun, Pu Yu, Lihui Xiong:
A Survey on Security Aspects for 3GPP 5G Networks. IEEE Commun. Surv. Tutorials 22(1): 170-195 (2020) - [j29]Weihao Li, Ben Niu, Jin Cao, Yurong Luo, Hui Li:
A personalized range-sensitive privacy-preserving scheme in LBSs. Concurr. Comput. Pract. Exp. 32(5) (2020) - [j28]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li:
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks. IEEE Internet Things J. 7(4): 2791-2805 (2020) - [j27]Jin Cao, Zheng Yan, Ruhui Ma, Yinghui Zhang, Yulong Fu, Hui Li:
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 7(6): 5329-5344 (2020) - [j26]Yulong Fu, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, Hui Li:
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks. J. Netw. Comput. Appl. 155: 102549 (2020) - [j25]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Shiyang He:
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks. IEEE Trans. Veh. Technol. 69(2): 2126-2140 (2020) - [c16]Ben Niu, Likun Zhang, Yahong Chen, Ang Li, Wei Du, Jin Cao, Fenghua Li:
A Framework to Preserve User Privacy for Machine Learning as a Service. GLOBECOM 2020: 1-6 - [c15]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [c14]Ben Niu, Yahong Chen, Boyang Wang, Jin Cao, Fenghua Li:
Utility-aware Exponential Mechanism for Personalized Differential Privacy. WCNC 2020: 1-6
2010 – 2019
- 2019
- [j24]Sheng Ding, Jin Cao, Chen Li, Kai Fan, Hui Li:
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 7: 38431-38441 (2019) - [j23]Yinghui Zhang, Fangyuan Ren, Axin Wu, Tiantian Zhang, Jin Cao, Dong Zheng:
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks. IEEE Access 7: 114721-114730 (2019) - [j22]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Yinghui Zhang, Xixiang Lv:
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks 87: 49-60 (2019) - [j21]Jin Cao, Maode Ma, Hui Li:
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks. Int. J. Commun. Syst. 32(3) (2019) - [j20]Jin Cao, Pu Yu, Maode Ma, Weifeng Gao:
Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network. IEEE Internet Things J. 6(2): 1561-1575 (2019) - [j19]Jin Cao, Pu Yu, Xinyin Xiang, Maode Ma, Hui Li:
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System. IEEE Internet Things J. 6(6): 9794-9805 (2019) - [j18]Yinghui Zhang, Robert H. Deng, Dong Zheng, Jin Li, Pengfei Wu, Jin Cao:
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Trans. Ind. Informatics 15(9): 5099-5108 (2019) - [c13]Fenghua Li, Zhe Sun, Ben Niu, Jin Cao, Hui Li:
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. ICNC 2019: 390-394 - [c12]Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. ICNC 2019: 418-424 - [c11]Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. ICNC 2019: 425-431 - [c10]Yulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan, Jin Cao, Hui Li:
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1431-1436 - [c9]Pu Yu, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. WCNC 2019: 1-7 - 2018
- [j17]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Xuefeng Liu:
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J. Netw. Comput. Appl. 102: 1-16 (2018) - [j16]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. Secur. Commun. Networks 2018: 6854612:1-6854612:16 (2018) - [c8]Fenghua Li, Yahong Chen, Ben Niu, Yuanyuan He, Kui Geng, Jin Cao:
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services. GLOBECOM 2018: 1-6 - 2017
- [j15]Yulong Fu, Zheng Yan, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. Comput. Secur. 70: 648-662 (2017) - [j14]Yulong Fu, Zheng Yan, Jin Cao, Ousmane Koné, Xuefei Cao:
An Automata Based Intrusion Detection Method for Internet of Things. Mob. Inf. Syst. 2017: 1750637:1-1750637:13 (2017) - [j13]Jin Cao, Maode Ma, Hui Li:
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks. IEEE Trans. Veh. Technol. 66(11): 9689-9701 (2017) - [j12]Jin Cao, Maode Ma, Xilei Wang, Haochen Liu:
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks. Wirel. Pers. Commun. 94(3): 1263-1279 (2017) - [c7]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6 - 2015
- [j11]Chengzhe Lai, Hui Li, Xiaoqing Li, Jin Cao:
A novel group access authentication and key agreement protocol for machine-type communication. Trans. Emerg. Telecommun. Technol. 26(3): 414-431 (2015) - [j10]Jin Cao, Maode Ma, Hui Li:
GBAAM: group-based access authentication for MTC in LTE networks. Secur. Commun. Networks 8(17): 3282-3299 (2015) - [c6]Jin Cao, Hui Li, Maode Ma:
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. ICC 2015: 3020-3025 - [c5]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks. ICC 2015: 7246-7251 - 2014
- [j9]Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Zhenxing Luo:
A Survey on Security Aspects for LTE and LTE-A Networks. IEEE Commun. Surv. Tutorials 16(1): 283-302 (2014) - [j8]Yueyu Zhang, Jie Chen, Hui Li, Jin Cao, Chengzhe Lai:
Group-based authentication and key agreement for machine-type communication. Int. J. Grid Util. Comput. 5(2): 87-95 (2014) - [j7]Jin Cao, Maode Ma, Hui Li:
Access Authentication of Mass Device Connections for MTC in LTE Networks. Smart Comput. Rev. 4(4): 262-277 (2014) - 2013
- [j6]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao:
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card. KSII Trans. Internet Inf. Syst. 7(5): 1313-1327 (2013) - [j5]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A New Roaming Authentication Framework For Wireless Communication. KSII Trans. Internet Inf. Syst. 7(8): 2061-2080 (2013) - 2012
- [j4]Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai:
A simple and robust handover authentication between HeNB and eNB in LTE networks. Comput. Networks 56(8): 2119-2131 (2012) - [j3]Boyang Wang, Hui Li, Jin Cao:
An efficient MAC scheme for secure network coding with probabilistic detection. Frontiers Comput. Sci. 6(4): 429-441 (2012) - [j2]Chengzhe Lai, Hui Li, Yueyu Zhang, Jin Cao:
Security Issues on Machine to Machine Communications. KSII Trans. Internet Inf. Syst. 6(2): 198-514 (2012) - [j1]Jin Cao, Maode Ma, Hui Li:
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks. IEEE Trans. Wirel. Commun. 11(10): 3644-3650 (2012) - [c4]Jin Cao, Maode Ma, Hui Li:
A group-based authentication and key agreement for MTC in LTE networks. GLOBECOM 2012: 1017-1022 - [c3]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A lightweight roaming authentication protocol for anonymous wireless communication. GLOBECOM 2012: 1029-1034 - [c2]Jin Cao, Maode Ma, Hui Li:
Unified handover authentication between heterogeneous access systems in LTE networks. GLOBECOM 2012: 5308-5313 - [c1]Yueyu Zhang, Jie Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai:
Dynamic Group Based Authentication Protocol for Machine Type Communications. INCoS 2012: 334-341
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint