default search action
Jinbo Xiong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j69]Axin Xiang, Hongfeng Gao, Youliang Tian, Linjie Wang, Jinbo Xiong:
Attribute-based key management for patient-centric and trusted data access in blockchain-enabled IoMT. Comput. Networks 246: 110425 (2024) - [j68]Renwan Bi, Mingfeng Zhao, Zuobin Ying, Youliang Tian, Jinbo Xiong:
Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT. Digit. Commun. Networks 10(2): 380-388 (2024) - [j67]Rong Ma, Tao Feng, Jinbo Xiong, Qi Li, Youliang Tian:
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT. IEEE Internet Things J. 11(2): 1880-1892 (2024) - [j66]Haoyuan Fan, Qi Li, Jinbo Xiong, Rui Li, Wei Chen, Haiping Huang:
Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update. IEEE Internet Things J. 11(9): 16887-16901 (2024) - [j65]Li Lin, Jiapeng Wu, Zhi Zhou, Jin Zhao, Peng Li, Jinbo Xiong:
Computing Power Networking Meets Blockchain: A Reputation-Enhanced Trading Framework for Decentralized IoT Cloud Services. IEEE Internet Things J. 11(10): 17082-17096 (2024) - [j64]Xianyu Mu, Youliang Tian, Zhou Zhou, Shuai Wang, Jinbo Xiong:
RVFL: Rational Verifiable Federated Learning Secure Aggregation Protocol. IEEE Internet Things J. 11(14): 25147-25161 (2024) - [j63]Jing Li, Youliang Tian, Zhou Zhou, Axin Xiang, Shuai Wang, Jinbo Xiong:
PSFL: Ensuring Data Privacy and Model Security for Federated Learning. IEEE Internet Things J. 11(15): 26234-26252 (2024) - [j62]Axin Xiang, Hongfeng Gao, Youliang Tian, Jinbo Xiong, Linjie Wang, Changgen Peng:
H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network. IEEE Internet Things J. 11(20): 33758-33772 (2024) - [j61]Ruonan Lin, Yikun Huang, Yuanyuan Zhang, Renwan Bi, Jinbo Xiong:
Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing. J. Inf. Secur. Appl. 85: 103854 (2024) - [j60]Qingyi He, Youliang Tian, Shuai Wang, Jinbo Xiong:
RRFL: A rational and reliable federated learning incentive framework for mobile crowdsensing. J. King Saud Univ. Comput. Inf. Sci. 36(3): 101977 (2024) - [j59]Jinbo Xiong, Renwan Bi, Yuanyuan Zhang, Qi Li, Li Lin, Youliang Tian:
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives. IEEE Netw. 38(3): 41-47 (2024) - [j58]Renwan Bi, Jinbo Xiong, Changqing Luo, Jianting Ning, Ximeng Liu, Youliang Tian, Yan Zhang:
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing. IEEE Trans. Inf. Forensics Secur. 19: 6722-6737 (2024) - [j57]Zheng Yuan, Youliang Tian, Zhou Zhou, Ta Li, Shuai Wang, Jinbo Xiong:
Trustworthy Federated Learning Against Malicious Attacks in Web 3.0. IEEE Trans. Netw. Sci. Eng. 11(5): 3969-3982 (2024) - [c36]Zuobin Ying, Qingao Ding, Wenqi Li, Shengmin Xu, Jinbo Xiong:
Towards Scalable and Secure IoTs Transactions: A New Bi-directional Payment Channel Without Third-Party Monitoring. ACISP (3) 2024: 120-139 - [c35]Dalong Guo, Changqing Luo, Yuanyuan Zhang, Renwan Bi, Jinbo Xiong:
LSTN: A Lightweight Secure Three-Party Inference Framework for Deep Neural Networks. ICC 2024: 746-751 - [c34]Jiayi Huang, Yuanyuan Zhang, Renwan Bi, Jiayin Lin, Jinbo Xiong:
Knowledge Distillation Enables Federated Learning: A Data-free Federated Aggregation Scheme. IJCNN 2024: 1-7 - 2023
- [j56]Qiuling Chen, Ayong Ye, Ziwen Zhao, Jinbo Xiong:
The dummy-based trajectory privacy protection method to resist correlation attacks in Internet of Vehicles. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j55]Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Kim-Kwang Raymond Choo:
Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles. IEEE Internet Things J. 10(3): 2314-2329 (2023) - [j54]Renwan Bi, Dalong Guo, Yuanyuan Zhang, Ruihong Huang, Li Lin, Jinbo Xiong:
Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing. IEEE Internet Things J. 10(18): 15810-15821 (2023) - [j53]Yipeng Zou, Tao Peng, Guojun Wang, Entao Luo, Jinbo Xiong:
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing. J. Syst. Archit. 144: 102984 (2023) - [j52]Rong Ma, Tao Feng, Youliang Tian, Jinbo Xiong:
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism. Mob. Networks Appl. 28(5): 1831-1841 (2023) - [j51]Ta Li, Youliang Tian, Jinbo Xiong, Md. Zakirul Alam Bhuiyan:
FVP-EOC: Fair, Verifiable, and Privacy-Preserving Edge Outsourcing Computing in 5G-Enabled IIoT. IEEE Trans. Ind. Informatics 19(1): 940-950 (2023) - [j50]Zhou Zhou, Youliang Tian, Jinbo Xiong, Jianfeng Ma, Changgen Peng:
Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT. IEEE Trans. Ind. Informatics 19(5): 6669-6681 (2023) - [j49]Li Lin, Yuhang Chen, Zhi Zhou, Peng Li, Jinbo Xiong:
When MetaVerse Meets Computing Power Networking: An Energy-Efficient Framework For Service Placement. IEEE Wirel. Commun. 30(5): 76-85 (2023) - [c33]Wangsheng Yan, Li Lin, Ruihong Huang, Jinbo Xiong, Tianqiang Huang, Mingwei Lin:
Enhancing Resource Allocation Efficiency for Collaborative End-Edge Tasks in the Metaverse's Virtual Reality. ISPA/BDCloud/SocialCom/SustainCom 2023: 516-523 - [c32]Ta Li, Youliang Tian, Jinbo Xiong, Linjie Wang:
A Verifiable Privacy-Preserving Outsourced Prediction Scheme Based on Blockchain in Smart Healthcare. HealthCom 2023: 265-270 - [c31]Xianyu Mu, Youliang Tian, Jinbo Xiong, Shuai Wang, Boxiang Gong:
FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing. NaNA 2023: 588-594 - [c30]Qing Yang, Youliang Tian, Jinbo Xiong:
DFedXGB: An XGB Vertical Federated Learning Framework with Data Desensitization. TrustCom 2023: 157-164 - 2022
- [j48]Linjie Wang, Youliang Tian, Jinbo Xiong:
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT. Digit. Commun. Networks 8(5): 644-653 (2022) - [j47]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Lei Chen, Jianfeng Ma, Changgen Peng:
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT. IEEE Internet Things J. 9(4): 2761-2777 (2022) - [j46]Jinbo Xiong, Renwan Bi, Youliang Tian, Ximeng Liu, Dapeng Wu:
Toward Lightweight, Privacy-Preserving Cooperative Object Classification for Connected Autonomous Vehicles. IEEE Internet Things J. 9(4): 2787-2801 (2022) - [j45]Dapeng Wu, Shaoen Wu, Danda B. Rawat, Paulo R. L. Gondim, Periklis Chatzimisios, Jinbo Xiong:
Special Issue on Knowledge- and Service-Oriented Industrial Internet of Things: Architectures, Challenges, and Methodologies. IEEE Internet Things J. 9(18): 16738-16741 (2022) - [j44]Yuanyuan Zhang, Jinbo Xiong, Ximeng Liu:
Privacy-Preserving Traffic Violation Image Filtering and Searching via Crowdsensing. Mob. Networks Appl. 27(6): 2374-2390 (2022) - [j43]Tianpeng Deng, Xuan Li, Jinbo Xiong, Ying Wu:
POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing. Multim. Tools Appl. 81(3): 3693-3714 (2022) - [j42]Youliang Tian, Ta Li, Jinbo Xiong, Md. Zakirul Alam Bhuiyan, Jianfeng Ma, Changgen Peng:
A Blockchain-Based Machine Learning Framework for Edge Services in IIoT. IEEE Trans. Ind. Informatics 18(3): 1918-1929 (2022) - [j41]Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li, Ximeng Liu:
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 24979-24990 (2022) - [c29]Rong Ma, Tao Feng, Qi Li, Jinbo Xiong:
Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT. GLOBECOM 2022: 4383-4388 - [c28]Renwan Bi, Jinbo Xiong, Jie Lin, Min Zhao, Youliang Tian:
Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data. ICC 2022: 5645-5650 - [c27]Yongjie Zhou, Jinbo Xiong, Renwan Bi, Youliang Tian:
Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles. NaNA 2022: 82-89 - [c26]Li Lin, Yuanyuan Zhang, Jinbo Xiong, Jiayin Lin:
An incentive mechanism for collaborative intelligence. RACS 2022: 112-118 - 2021
- [j40]Ximeng Liu, Lehui Xie, Yaopeng Wang, Jian Zou, Jinbo Xiong, Zuobin Ying, Athanasios V. Vasilakos:
Privacy and Security Issues in Deep Learning: A Survey. IEEE Access 9: 4566-4593 (2021) - [j39]Jinbo Xiong, Hui Liu, Biao Jin, Qi Li, Zhiqiang Yao:
A lightweight privacy protection scheme based on user preference in mobile crowdsensing. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j38]Zerui Chen, Youliang Tian, Jinbo Xiong, Changgen Peng, Jianfeng Ma:
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme. Inf. Sci. 568: 286-316 (2021) - [j37]Guangjun Liu, Wangmei Guo, Ximeng Liu, Jinbo Xiong:
Security Analysis and Improvements on a Remote Integrity Checking Scheme for Regenerating-Coding-Based Distributed Storage. Secur. Commun. Networks 2021: 6652606:1-6652606:8 (2021) - [j36]Jun Ma, Minshen Wang, Jinbo Xiong, Yongjin Hu:
CP-ABE-Based Secure and Verifiable Data Deletion in Cloud. Secur. Commun. Networks 2021: 8855341:1-8855341:14 (2021) - [j35]Jinbo Xiong, Mingfeng Zhao, Md. Zakirul Alam Bhuiyan, Lei Chen, Youliang Tian:
An AI-Enabled Three-Party Game Framework for Guaranteed Data Privacy in Mobile Edge Crowdsensing of IoT. IEEE Trans. Ind. Informatics 17(2): 922-933 (2021) - [j34]Hongtao Li, Xingsi Xue, Zhiying Li, Long Li, Jinbo Xiong:
Location Privacy Protection Scheme for LBS in IoT. Wirel. Commun. Mob. Comput. 2021: 9948543:1-9948543:18 (2021) - [i4]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Jianfeng Ma:
Structural Mutual Information and Its Application. IACR Cryptol. ePrint Arch. 2021: 1356 (2021) - 2020
- [j33]Qi Li, Yinghui Zhang, Tao Zhang, Haiping Huang, Yingjie He, Jinbo Xiong:
HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth. IEEE Access 8: 123430-123439 (2020) - [j32]Jinbo Xiong, Yuanyuan Zhang, Li Lin, Jian Shen, Xuan Li, Mingwei Lin:
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud. Concurr. Comput. Pract. Exp. 32(3) (2020) - [j31]Jinbo Xiong, Lei Chen, Md. Zakirul Alam Bhuiyan, Chunjie Cao, Minshen Wang, Entao Luo, Ximeng Liu:
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener. Comput. Syst. 111: 741-753 (2020) - [j30]Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Qi Li, Ximeng Liu, Zhiqiang Yao:
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT. IEEE Trans. Ind. Informatics 16(6): 4231-4241 (2020) - [j29]Youliang Tian, Zuan Wang, Jinbo Xiong, Jianfeng Ma:
A Blockchain-Based Secure Key Management Scheme With Trustworthiness in DWSNs. IEEE Trans. Ind. Informatics 16(9): 6193-6202 (2020) - [j28]Jinbo Xiong, Xiuhua Chen, Qing Yang, Lei Chen, Zhiqiang Yao:
A Task-Oriented User Selection Incentive Mechanism in Edge-Aided Mobile Crowdsensing. IEEE Trans. Netw. Sci. Eng. 7(4): 2347-2360 (2020) - [j27]Jinbo Xiong, Renwan Bi, Mingfeng Zhao, Jingda Guo, Qing Yang:
Edge-Assisted Privacy-Preserving Raw Data Sharing Framework for Connected Autonomous Vehicles. IEEE Wirel. Commun. 27(3): 24-30 (2020) - [j26]Renwan Bi, Qianxin Chen, Lei Chen, Jinbo Xiong, Dapeng Wu:
A Privacy-Preserving Personalized Service Framework through Bayesian Game in Social IoT. Wirel. Commun. Mob. Comput. 2020: 8891889:1-8891889:13 (2020) - [c25]Tianpeng Deng, Xuan Li, Biao Jin, Jinbo Xiong:
Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection. SpaCCS Workshops 2020: 257-268
2010 – 2019
- 2019
- [j25]Jinbo Xiong, Yuanyuan Zhang, Shaohua Tang, Ximeng Liu, Zhiqiang Yao:
Secure Encrypted Data With Authorized Deduplication in Cloud. IEEE Access 7: 75090-75104 (2019) - [j24]Cheng Liu, Youliang Tian, Jinbo Xiong, Yanhua Lu, Qiuxian Li, Changgen Peng:
Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach. IEEE Access 7: 156025-156032 (2019) - [j23]Qi Li, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Zuobin Ying, Huaqun Wang:
Fine-grained multi-authority access control in IoT-enabled mHealth. Ann. des Télécommunications 74(7-8): 389-400 (2019) - [j22]Xuan Li, Jin Li, Siu-Ming Yiu, Chongzhi Gao, Jinbo Xiong:
Privacy-preserving edge-assisted image retrieval and classification in IoT. Frontiers Comput. Sci. 13(5): 1136-1147 (2019) - [j21]Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Jinbo Xiong:
An Attribute-Based Assured Deletion Scheme in Cloud Computing. Int. J. Inf. Technol. Web Eng. 14(2): 74-91 (2019) - [j20]Jinbo Xiong, Jun Ren, Lei Chen, Zhiqiang Yao, Mingwei Lin, Dapeng Wu, Ben Niu:
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT. IEEE Internet Things J. 6(2): 1530-1540 (2019) - [c24]Rong Ma, Lei Chen, Jinbo Xiong, Youliang Tian, Qi Li, Ximeng Liu:
A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing. ICII 2019: 227-232 - [c23]Qi Chen, Sihai Tang, Jacob Hochstetler, Jingda Guo, Yuan Li, Jinbo Xiong, Qing Yang, Song Fu:
Low-Latency High-Level Data Sharing for Connected and Autonomous Vehicular Networks. ICII 2019: 287-296 - [i3]Li Lin, Peng Li, Jinbo Xiong, Mingwei Lin:
Distributed and Application-aware Task Scheduling in Edge-clouds. CoRR abs/1902.04362 (2019) - [i2]Qi Chen, Sihai Tang, Jacob Hochstetler, Jingda Guo, Yuan Li, Jinbo Xiong, Qing Yang, Song Fu:
Low-Latency High-Level Data Sharing for Connected and Autonomous Vehicular Networks. CoRR abs/1912.01080 (2019) - 2018
- [j19]Biao Jin, Dongshuo Jiang, Jinbo Xiong, Lei Chen, Qi Li:
D2D Data Privacy Protection Mechanism Based on Reliability and Homomorphic Encryption. IEEE Access 6: 51140-51150 (2018) - [j18]Jinbo Xiong, Xiuhua Chen, Youliang Tian, Rong Ma, Lei Chen, Zhiqiang Yao:
MAIM: A Novel Incentive Mechanism Based on Multi-Attribute User Selection in Mobile Crowdsensing. IEEE Access 6: 65384-65396 (2018) - [j17]Ayong Ye, Jianfei Shao, Li Xu, Jianwei Chen, Jinbo Xiong:
Local HMM for indoor positioning based on fingerprinting and displacement ranging. IET Commun. 12(10): 1163-1170 (2018) - [j16]Jinbo Xiong, Yuanyuan Zhang, Xuan Li, Mingwei Lin, Zhiqiang Yao, Guangjun Liu:
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data. Mob. Networks Appl. 23(3): 650-663 (2018) - [j15]Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian, Li Lin, Biao Jin:
Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services. Wirel. Commun. Mob. Comput. 2018: 8959635:1-8959635:12 (2018) - [c22]Minshen Wang, Jinbo Xiong, Rong Ma, Qi Li, Biao Jin:
A Novel Data Secure Deletion Scheme for Mobile Devices. ICCCN 2018: 1-8 - [c21]Li Lin, Peng Li, Jinbo Xiong, Mingwei Lin:
Distributed and Application-Aware Task Scheduling in Edge-Clouds. MSN 2018: 165-170 - 2017
- [j14]Mingwei Lin, Riqing Chen, Jinbo Xiong, Xuan Li, Zhiqiang Yao:
Efficient Sequential Data Migration Scheme Considering Dying Data for HDD/SSD Hybrid Storage Systems. IEEE Access 5: 23366-23373 (2017) - [c20]Jun Ren, Jinbo Xiong, Zhiqiang Yao, Rong Ma, Mingwei Lin:
DPLK-Means: A Novel Differential Privacy K-Means Mechanism. DSC 2017: 133-139 - [c19]Yuanyuan Zhang, Jinbo Xiong, Mingwei Lin, Lili Wang, Xuan Li:
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications. ICCCS (1) 2017: 262-274 - [c18]Huibing Wang, Mingwei Lin, Jinbo Xiong, Li Lin, Ruliang Xiao:
Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems. ICCCS (2) 2017: 576-588 - [c17]Rong Ma, Jinbo Xiong, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye:
Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory. TrustCom/BigDataSE/ICESS 2017: 990-995 - 2016
- [j13]Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong, Danwei Chen:
Secure, efficient and revocable multi-authority access control system in cloud storage. Comput. Secur. 59: 45-59 (2016) - [j12]Jinbo Xiong, Suping Li, Xuan Li, Yuanyuan Zhang, Biao Jin:
A secure access and associate deleting scheme for multi-replica in multi-cloud environment. Int. J. High Perform. Syst. Archit. 6(3): 143-152 (2016) - [j11]Mingwei Lin, Zhiqiang Yao, Jinbo Xiong:
History-aware page replacement algorithm for NAND flash-based consumer electronics. IEEE Trans. Consumer Electron. 62(1): 23-29 (2016) - [c16]Yuanyuan Zhang, Jinbo Xiong, Xuan Li, Biao Jin, Suping Li, Xu An Wang:
A Multi-replica Associated Deleting Scheme in Cloud. CISIS 2016: 444-448 - [c15]Fenghua Li, Yanchao Wang, Jinbo Xiong, Rongna Xie:
Role and Time-Based Access Control with Efficient Revocation for Cloud Storage. DSC 2016: 284-289 - [c14]Jun Ren, Zhiqiang Yao, Jinbo Xiong, Yuanyuan Zhang, Ayong Ye:
A Secure Data Deduplication Scheme Based on Differential Privacy. ICPADS 2016: 1241-1246 - [c13]Cui Zhang, Jinbo Xiong, Qiong Wu:
An efficient CGA algorithm against DoS attack on duplicate address detection process. WCNC 2016: 1-6 - [c12]Cui Zhang, Jinbo Xiong, Qiong Wu:
An efficient CGA algorithm against DoS attack on Duplicate Address Detection process. WCNC Workshops 2016: 471-476 - 2015
- [j10]Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong:
Attribute Based Multisignature Scheme for Wireless Communications. Mob. Inf. Syst. 2015: 827320:1-827320:11 (2015) - [j9]Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao, Patrick S. Chen:
A full lifecycle privacy protection scheme for sensitive data in cloud computing. Peer-to-Peer Netw. Appl. 8(6): 1025-1037 (2015) - [j8]Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Large universe decentralized key-policy attribute-based encryption. Secur. Commun. Networks 8(3): 501-509 (2015) - [j7]Qi Li, Jianfeng Ma, Rui Li, Jinbo Xiong, Ximeng Liu:
Provably secure unbounded multi-authority ciphertext-policy attribute-based encryption. Secur. Commun. Networks 8(18): 4098-4109 (2015) - [c11]Yanchao Wang, Fenghua Li, Jinbo Xiong, Ben Niu, Fangfang Shan:
Achieving Lightweight and Secure Access Control in Multi-authority Cloud. TrustCom/BigDataSE/ISPA (1) 2015: 459-466 - [i1]Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, Fangfang Shan:
A Novel Cyberspace-Oriented Access Control Model. IACR Cryptol. ePrint Arch. 2015: 637 (2015) - 2014
- [j6]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu:
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model. IET Inf. Secur. 8(4): 217-223 (2014) - [j5]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu:
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data. Int. J. Netw. Secur. 16(6): 437-443 (2014) - [j4]Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong:
Efficient attribute based sequential aggregate signature for wireless sensor networks. Int. J. Sens. Networks 16(3): 172-184 (2014) - [j3]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Jun Ma:
PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud. KSII Trans. Internet Inf. Syst. 8(1): 282-304 (2014) - [j2]Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, Patrick S. Chen:
A Secure Data Self-Destructing Scheme in Cloud Computing. IEEE Trans. Cloud Comput. 2(4): 448-458 (2014) - [c10]Tao Zhang, Jianfeng Ma, Ning Xi, Ximeng Liu, Zhiquan Liu, Jinbo Xiong:
Trustworthy Service Composition in Service-Oriented Mobile Social Networks. ICWS 2014: 684-687 - 2013
- [j1]Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu:
Access control requirements for structured document in cloud computing. Int. J. Grid Util. Comput. 4(2/3): 95-102 (2013) - [c9]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Tao Zhang:
PRAM: privacy preserving access management scheme in cloud services. SCC@ASIACCS 2013: 41-46 - [c8]Ximeng Liu, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang:
Attribute Based Multi-signature Scheme in the Standard Model. CIS 2013: 738-742 - [c7]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li:
A Secure Document Self-Destruction Scheme: An ABE Approach. HPCC/EUC 2013: 59-64 - [c6]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Qi Li:
Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing. IDCS 2013: 238-251 - [c5]Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma:
Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control. INCoS 2013: 51-57 - [c4]Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu:
Fully Secure Decentralized Key-Policy Attribute-Based Encryption. INCoS 2013: 220-225 - [c3]Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li:
A Secure Document Self-Destruction Scheme with Identity Based Encryption. INCoS 2013: 239-243 - 2012
- [c2]Jun Ma, Yuanbo Guo, Jinbo Xiong:
TNC-eSA: An Echanced Security Access Solution to Office Networks. ICICA (LNCS) 2012: 770-777
2000 – 2009
- 2009
- [c1]Ruliang Xiao, Faliang Hong, Jinbo Xiong, Xiaojian Zheng, Zhengqiu Zhang:
Syncretizing Context Information into the Collaborative Filtering Recommendation. DBTA 2009: 33-36
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint