Rongxing Lu
#156,861
Most Influential Person Now
Researcher, University of New Brunswick
Rongxing Lu's AcademicInfluence.com Rankings
Rongxing Lucomputer-science Degrees
Computer Science
#8682
World Rank
#9129
Historical Rank
Data Science
#208
World Rank
#212
Historical Rank
Machine Learning
#3616
World Rank
#3660
Historical Rank
Artificial Intelligence
#3931
World Rank
#3988
Historical Rank

Download Badge
Computer Science
Rongxing Lu's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Computer Science University of California, Berkeley
Similar Degrees You Can Earn
Why Is Rongxing Lu Influential?
(Suggest an Edit or Addition)Rongxing Lu's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications (2008) (718)
- EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications (2012) (678)
- Optimal Workload Allocation in Fog-Cloud Computing Toward Balanced Delay and Power Consumption (2016) (614)
- An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks (2008) (612)
- Smart community: an internet of things application (2011) (534)
- Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs (2012) (481)
- Secure provenance: the essential of bread and butter of data forensics in cloud computing (2010) (444)
- A Lightweight Message Authentication Scheme for Smart Grid Communications (2011) (424)
- Securing smart grid: cyber attacks, countermeasures, and challenges (2012) (355)
- An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications (2010) (350)
- SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks (2009) (318)
- SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots (2009) (314)
- Toward efficient and privacy-preserving computing in big data era (2014) (312)
- EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid (2014) (305)
- RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks (2008) (299)
- GRS: The green, reliability, and security of emerging machine to machine communications (2011) (292)
- Sybil Attacks and Their Defenses in the Internet of Things (2014) (289)
- An Efficient Message Authentication Scheme for Vehicular Communications (2008) (276)
- An Efficient Merkle-Tree-Based Authentication Scheme for Smart Grid (2014) (269)
- Pi: A practical incentive protocol for delay tolerant networks (2010) (250)
- Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems (2009) (247)
- Energy-theft detection issues for advanced metering infrastructure in smart grid (2014) (235)
- SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks (2009) (229)
- A Threshold Anonymous Authentication Protocol for VANETs (2016) (211)
- Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification (2016) (208)
- Defending Against False Data Injection Attacks on Power System State Estimation (2017) (206)
- A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs (2012) (202)
- BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks (2012) (190)
- SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency (2013) (184)
- Towards power consumption-delay tradeoff by workload allocation in cloud-fog computing (2015) (180)
- Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases (2016) (176)
- UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid (2013) (168)
- SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks (2013) (164)
- A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network (2011) (163)
- ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing (2011) (158)
- Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption (2012) (156)
- Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] (2010) (147)
- Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System (2015) (146)
- Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers (2018) (143)
- PDAFT: A privacy-preserving data aggregation scheme with fault tolerance for smart grid communications (2015) (134)
- REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET (2017) (131)
- Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks (2012) (123)
- FINE: A fine-grained privacy-preserving location-based service framework for mobile devices (2014) (122)
- Discovering User Interest on Twitter with a Modified Author-Topic Model (2011) (112)
- Ciphertext Policy Attribute Based Encryption with Efficient Revocation (2009) (112)
- Security in vehicular ad hoc networks (2008) (109)
- PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs (2014) (108)
- A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications (2015) (106)
- STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs (2011) (104)
- Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid (2016) (101)
- An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications (2010) (99)
- Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM (2017) (98)
- SLAB: A secure localized authentication and billing scheme for wireless mesh networks (2008) (96)
- MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications (2015) (94)
- PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks (2011) (93)
- An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud (2016) (93)
- Toward secure targeted broadcast in smart grid (2012) (91)
- Enabling pervasive healthcare through continuous remote health monitoring (2012) (89)
- Secure sharing and searching for real-time video data in mobile cloud (2015) (88)
- AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks (2008) (81)
- PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid (2013) (81)
- PEACE: An efficient and secure patient-centric access control scheme for eHealth care system (2011) (81)
- GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications (2016) (79)
- A Location Privacy Preserving Authentication Scheme in Vehicular Networks (2008) (77)
- CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service (2014) (73)
- Exploiting multimedia services in mobile social networks from security and privacy perspectives (2014) (71)
- Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs (2009) (71)
- Fast Distributed Demand Response With Spatially and Temporally Coupled Constraints in Smart Grid (2015) (71)
- ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks (2007) (70)
- Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network (2010) (70)
- A comprehensive study of RPL and P2P-RPL routing protocols: Implementation, challenges and opportunities (2017) (70)
- Social on the road: enabling secure and efficient social networking on highways (2015) (70)
- MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks (2010) (66)
- Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data (2018) (65)
- HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks (2012) (64)
- Fully Anonymous Profile Matching in Mobile Social Networks (2013) (62)
- Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks (2012) (61)
- SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing (2013) (60)
- Privacy Concerns for Photo Sharing in Online Social Networks (2015) (60)
- Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications (2015) (60)
- A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy (2009) (57)
- LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks (2013) (57)
- Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption (2015) (56)
- Towards a light-weight message authentication mechanism tailored for Smart Grid communications (2011) (55)
- Security in service-oriented vehicular networks (2009) (52)
- PLAM: A privacy-preserving framework for local-area mobile social networks (2014) (52)
- Toward Reliable Actor Services in Wireless Sensor and Actor Networks (2011) (49)
- EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data (2016) (48)
- Fine-grained data sharing in cloud computing for mobile devices (2015) (48)
- An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs (2010) (46)
- Exploiting mobile social behaviors for Sybil detection (2015) (46)
- An Efficient Data-Driven Particle PHD Filter for Multitarget Tracking (2013) (46)
- Trend Analysis of News Topics on Twitter (2012) (44)
- A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems (2013) (44)
- PDA: a privacy-preserving dual-functional aggregation scheme for smart grid communications (2015) (43)
- Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs (2011) (43)
- Side Channel Monitoring: Packet Drop Attack Detection in Wireless Ad Hoc Networks (2011) (42)
- PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks (2012) (42)
- Energy-efficient and trust-aware cooperation in cognitive radio networks (2012) (40)
- A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems (2020) (39)
- EDR: An efficient demand response scheme for achieving forward secrecy in smart grid (2012) (38)
- BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid (2016) (37)
- TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks (2008) (37)
- Toward secure large-scale machine-to-machine comm unications in 3GPP networks: chall enges and solutions (2015) (37)
- Efficient and privacy-preserving skyline computation framework across domains (2016) (36)
- SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks (2014) (35)
- Comment on “Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid” (2016) (34)
- RCare: Extending Secure Health Care to Rural Area Using VANETs (2013) (31)
- TPSQ: Trust-based platoon service query via vehicular communications (2017) (31)
- A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance (2017) (30)
- Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid (2015) (30)
- A secure incentive scheme for delay tolerant networks (2008) (30)
- Time Synchronization for Random Mobile Sensor Networks (2014) (30)
- Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET (2010) (29)
- PTRS: A privacy-preserving trust-based relay selection scheme in VANETs (2017) (29)
- Privacy-Enhancing Aggregation Techniques for Smart Grid Communications (2016) (28)
- SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks (2012) (28)
- AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network (2008) (28)
- FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road (2010) (28)
- REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks (2010) (27)
- SPS: Secure personal health information sharing with patient-centric access control in cloud computing (2013) (27)
- Security and Privacy in Emerging Wireless Networks (2017) (27)
- A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks (2008) (26)
- PARK: A privacy-preserving aggregation scheme with adaptive key management for smart grid (2013) (26)
- TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks (2010) (25)
- An Efficient and Secure User Revocation Scheme in Mobile Social Networks (2011) (25)
- Robust group key management with revocation and collusion resistance for SCADA in smart grid (2013) (24)
- PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks (2015) (24)
- A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications (2014) (24)
- Secure bidirectional proxy re-encryption for cryptographic cloud storage (2016) (24)
- PMDS: A probabilistic misbehavior detection scheme in DTN (2012) (24)
- EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques (2016) (22)
- EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption (2014) (22)
- ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid (2013) (22)
- FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System (2016) (22)
- Achieving ranked range query in smart grid auction market (2014) (21)
- TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs (2016) (20)
- Trust-based anomaly detection in wireless sensor networks (2012) (19)
- A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains (2016) (19)
- EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market (2014) (18)
- EPF: An Event-Aided Packet Forwarding Protocol for Privacy-Preserving Mobile Healthcare Social Networks (2011) (18)
- A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road (2016) (17)
- A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications (2010) (17)
- VTrust: A Robust Trust Framework for Relay Selection in Hybrid Vehicular Communications (2014) (17)
- Security and Privacy in Mobile Social Networks (2013) (17)
- IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks (2013) (17)
- Enabling pervasive healthcare with privacy preservation in smart community (2012) (16)
- EATH: An efficient aggregate authentication protocol for smart grid communications (2013) (16)
- EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks (2015) (16)
- SAFE: A social based updatable filtering protocol with privacy-preserving in mobile social networks (2013) (15)
- DDPFT: Secure data aggregation scheme with differential privacy and fault tolerance (2015) (15)
- SFPM: A Secure and Fine-Grained Privacy-Preserving Matching Protocol for Mobile Social Networking (2016) (15)
- Building Blocks of Sharding Blockchain Systems: Concepts, Approaches, and Open Problems (2021) (14)
- PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks (2010) (14)
- EPS: An Efficient and Privacy-Preserving Service Searching Scheme for Smart Community (2013) (14)
- Secure machine-type communications in LTE networks (2016) (13)
- An Energy-Efficient and Self-Regioning Based RPL for Low-Power and Lossy Networks (2016) (13)
- PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare (2015) (13)
- Vehicular Ad Hoc Network Security and Privacy (2015) (13)
- RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security (2014) (13)
- New threshold anonymous authentication for VANETs (2015) (12)
- PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing (2016) (12)
- APED: An efficient aggregation protocol with error detection for smart grid communications (2013) (12)
- A Wormhole Attack Resistant Neighbor Discovery Scheme With RDMA Protocol for 60 GHz Directional Network (2013) (11)
- PEACE: Polarization Enabled Active Cooperation Scheme Between Primary and Secondary Networks (2014) (11)
- Duth: a user-friendly dual-factor authentication for Android smartphone devices (2015) (11)
- Trust-Based Anomaly Detection in Emerging Sensor Networks (2015) (11)
- PPPA: A practical privacy-preserving aggregation scheme for smart grid communications (2013) (10)
- An efficient and provably secure public key encryption scheme based on coding theory (2011) (10)
- Particle filter based grid synchronization with voltage unbalance and frequency variation in smart grid (2013) (10)
- VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs (2012) (10)
- Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization (2021) (10)
- Life Activity Modeling of News Event on Twitter Using Energy Function (2012) (10)
- State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid (2018) (9)
- A New Dynamic Group Key Management Scheme with Low Rekeying Cost (2008) (9)
- GSIS: Group Signature and ID-based Signature-Based Secure and Privacy-Preserving Protocol (2015) (9)
- Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings (2008) (9)
- ECPP: Efficient Conditional Privacy Preservation Protocol (2015) (8)
- NEHCM: A Novel and Efficient Hash-chain based Certificate Management scheme for vehicular communications (2010) (8)
- Coordinate-Free Distributed Algorithm for Boundary Detection in Wireless Sensor Networks (2011) (8)
- Health-Post: A Delay-Tolerant Secure Long-Term Health Care Scheme in Rural Area (2011) (8)
- Vehicular Ad Hoc Network Security and Privacy: Lin/Vehicular (2015) (8)
- EFPA: Efficient and flexible privacy-preserving mining of association rule in cloud (2015) (8)
- Proxy Re-encryption with Delegatable Verifiability (2016) (8)
- Incentive mechanism design for crowdsourcing-based cooperative transmission (2014) (7)
- BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks (2008) (7)
- Improved auxiliary particle filter-based synchronization of chaotic Colpitts circuit and its application to secure communication (2015) (7)
- Three-dimensional spatial multiplexing for directional millimeter-wave communications in multi-cubicle office environments (2013) (7)
- Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks (2010) (7)
- An Efficient Searchable Encryption Scheme and Its Application in Network Forensics (2010) (7)
- PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme (2014) (6)
- Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks (2011) (6)
- Trends Predicting of Topics on Twitter based on MACD (6)
- A New Public Key Encryption Scheme based on Layered Cellular Automata (2014) (6)
- A sybil attack detection scheme for privacy-preserving mobile social networks (2015) (6)
- SND: Secure neighbor discovery for 60 GHz network with directional antenna (2013) (6)
- Toward efficient and effective bullying detection in online social network (2020) (6)
- Location-Release Signature for Vehicular Communications (2009) (6)
- Exploiting Private Profile Matching for Efficient Packet Forwarding in Mobile Social Networks (2014) (5)
- Comment on “An Efficient Homomorphic MAC with Small Key Size for Authentication in Network Coding” (2015) (5)
- ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks (2015) (5)
- PQuery: Achieving Privacy-Preserving Query with Communication Efficiency in Internet of Things (2017) (5)
- SRC: a multicore NPU-based TCP stream reassembly card for deep packet inspection (2014) (5)
- Comment on “A Novel Homomorphic MAC Scheme for Authentication in Network Coding” (2014) (5)
- A unified end-to-end security scheme for machine-type communication in LTE networks (2013) (5)
- PAD: Privacy-preserving data dissemination in mobile social networks (2014) (5)
- A New Digital Signature Scheme from Layered Cellular Automata (2016) (4)
- Profile Matching Protocol with Anonymity Enhancing Techniques (2013) (4)
- A regular expression matching engine with hybrid memories (2014) (4)
- A lightweight key management scheme for 60 GHz WPAN (2012) (4)
- Achieving Secure CoMP Joint Transmission Handover in LTE-A Vehicular Networks (2017) (4)
- Querying over Encrypted Data in Smart Grids (2014) (3)
- Range Query over Encrypted Metering Data for Financial Audit (2014) (3)
- A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks (2007) (3)
- SGSA: Secure Group Setup and Anonymous Authentication in Platoon-Based Vehicular Cyber-Physical Systems (2015) (3)
- Homomorphic Public Key Encryption Techniques (2016) (3)
- Secure Localized Authentication and Billing for Wireless Mesh Networks (2007) (3)
- Special Issue on "Security and Privacy Preservation in Vehicular Communications" Wiley's Security and Communication Networks Journal (2008) (3)
- Privacy-Preserving Multidimensional Data Aggregation (2016) (3)
- Achieve Revocable Access Control for Fog-Based Smart Grid System (2019) (3)
- Context-aware Cooperative Authentication (2015) (2)
- Accelerating authenticated emergence message propagation to mitigate chain-reaction accidents in highway traffic (2009) (2)
- Pseudonym-Changing Strategy for Location Privacy (2015) (2)
- Privacy-Preserving Subset Data Aggregation (2016) (2)
- Pervasive Monitoring of M-Health Care Using Android (2015) (2)
- Introduction to the Special Issue on User-Centric Security and Safety for CPS (2020) (2)
- Recent advances in security and privacy in large‐scale networks (2016) (2)
- An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes (2021) (2)
- A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G (2016) (2)
- PReFilter: A Privacy-preserving Relay Filtering Scheme for Delay Tolerant Networks (2012) (1)
- Optimal decentralized security software deployment in multihop wireless networks (2014) (1)
- Distributed Cooperative Message Authentication (2015) (1)
- Privacy-Preserving Time Series Data Aggregation for Internet of Things (2016) (1)
- An Adversarial Attack with Fusion of Polarization for Unmanned Scenes (2020) (1)
- TESLA-based Broadcast Authentication (2015) (1)
- Cooperative Data Forwarding Strategy with Privacy Preservation (2013) (1)
- Differentially Private Data Aggregation with Fault Tolerance (2016) (1)
- Fast Handover Authentication Based on Mobility Prediction (2015) (1)
- Real-time path planning for optimized spatial utilization and travel cost in vanet-enhanced transportation system (2013) (1)
- A novel low-power mixed-mode implementation of weight update in particle PHD filters (2013) (0)
- Security, and privacy in emerging wireless networks : security and communication networks journal (2017) (0)
- A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network (2020) (0)
- A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network (2020) (0)
- SECURITY IN MOBILE AD HOC AND SENSOR NETWORKS (2009) (0)
- Privacy-Preserving Multifunctional Data Aggregation (2016) (0)
- Equality Query for Auction in Emerging Smart Grid Marketing (2014) (0)
- Conjunctive Query over Encrypted Multidimensional Data (2014) (0)
- Key-Management Systems in Vehicular Ad-Hoc Networks (2020) (0)
- S ECURITY A ND P RIVACY I N E MERGING W IRELESS N ETWORKS (2010) (0)
- Privacy-Preserving Data Aggregation with Data Integrity and Fault Tolerance (2016) (0)
- Privacy-Preserving Data Aggregation with Fault Tolerance (2016) (0)
- Interactions between artificial intelligence and cybersecurity to protect future networks (2022) (0)
- Everything you control is not everything: Achieving intention-concealed visit on social networks (2022) (0)
- Universal Authentication and Billing Architecture for Wireless MANs (2008) (0)
- Recommendation-Based Trustworthy Service Evaluation (2013) (0)
- Secure Data Aggregation Protocol for M2M Communications (2015) (0)
- RSU-Aided Message Authentication (2015) (0)
- Best Readings Topics on Communications and Information Systems Security Authentication (2013) (0)
- Information and Communications Security (2018) (0)
- RCare: Extending Secure Health Care to Rural Area Using VANETs (2013) (0)
- IEEE Press Series on Information and Communication Networks Security (ICNS) (2015) (0)
- Call for papers: systematic network optimizations for security parameters (security and communication networks) (2014) (0)
- A Routing-Compatible Credit-Based Incentive Scheme for DTNs (2011) (0)
- An Overview of Android Operating System and Its Security Features (2015) (0)
This paper list is powered by the following services:
Other Resources About Rongxing Lu
What Schools Are Affiliated With Rongxing Lu?
Rongxing Lu is affiliated with the following schools: