Xiaodong S. Lin
#130,844
Most Influential Person Now
Xiaodong S. Lin's AcademicInfluence.com Rankings
Xiaodong S. Linengineering Degrees
Engineering
#4496
World Rank
#5693
Historical Rank
Electrical Engineering
#1141
World Rank
#1227
Historical Rank

Xiaodong S. Lincomputer-science Degrees
Computer Science
#5745
World Rank
#6064
Historical Rank
Database
#2876
World Rank
#3001
Historical Rank

Download Badge
Engineering Computer Science
Xiaodong S. Lin's Degrees
- PhD Electrical and Computer Engineering University of California, Santa Barbara
- Masters Electrical and Computer Engineering University of California, Santa Barbara
- Bachelors Electrical Engineering Tsinghua University
Why Is Xiaodong S. Lin Influential?
(Suggest an Edit or Addition)Xiaodong S. Lin's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications (2007) (908)
- ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications (2008) (718)
- EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications (2012) (678)
- An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks (2008) (612)
- Smart community: an internet of things application (2011) (534)
- Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs (2012) (481)
- Secure provenance: the essential of bread and butter of data forensics in cloud computing (2010) (444)
- Securing Fog Computing for Internet of Things Applications: Challenges and Solutions (2018) (433)
- Securing smart grid: cyber attacks, countermeasures, and challenges (2012) (355)
- An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications (2010) (350)
- Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain (2018) (324)
- SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks (2009) (318)
- SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots (2009) (314)
- EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid (2014) (305)
- RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks (2008) (299)
- GRS: The green, reliability, and security of emerging machine to machine communications (2011) (292)
- An Efficient Message Authentication Scheme for Vehicular Communications (2008) (276)
- VerifyNet: Secure and Verifiable Federated Learning (2020) (270)
- Pi: A practical incentive protocol for delay tolerant networks (2010) (250)
- Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems (2009) (247)
- SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks (2009) (229)
- A Threshold Anonymous Authentication Protocol for VANETs (2016) (211)
- A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs (2012) (202)
- Understanding Ethereum via Graph Analysis (2018) (195)
- Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing (2017) (192)
- BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks (2012) (190)
- TSVC: timed efficient and secure vehicular communications with privacy preserving (2008) (190)
- SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency (2013) (184)
- Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT (2018) (179)
- A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing (2017) (177)
- UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid (2013) (168)
- A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network (2011) (163)
- White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes (2015) (160)
- Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] (2010) (147)
- HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems (2018) (146)
- Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors (2019) (143)
- Efficient and Privacy-Preserving Carpooling Using Blockchain-Assisted Vehicular Fog Computing (2019) (142)
- Secure Regression on Distributed Databases (2005) (139)
- Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data (2019) (135)
- Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems (2017) (132)
- Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks (2013) (130)
- Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks (2012) (123)
- FINE: A fine-grained privacy-preserving location-based service framework for mobile devices (2014) (122)
- Anonymous Reputation System for IIoT-Enabled Retail Marketing Atop PoS Blockchain (2019) (122)
- SDSM: A secure data service mechanism in mobile cloud computing (2011) (115)
- Querying in Internet of Things with Privacy Preserving: Challenges, Solutions and Opportunities (2018) (113)
- Securing m-healthcare social networks: challenges, countermeasures and future directions (2013) (113)
- Ciphertext Policy Attribute Based Encryption with Efficient Revocation (2009) (112)
- Security in vehicular ad hoc networks (2008) (109)
- Providing Task Allocation and Secure Deduplication for Mobile Crowdsensing via Fog Computing (2018) (109)
- STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs (2011) (104)
- Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme (2007) (102)
- An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications (2010) (99)
- SLAB: A secure localized authentication and billing scheme for wireless mesh networks (2008) (96)
- MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications (2015) (94)
- PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System (2015) (94)
- Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation (2014) (94)
- The Security of Autonomous Driving: Threats, Defenses, and Future Directions (2020) (94)
- PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks (2011) (93)
- PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI (2019) (82)
- AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks (2008) (81)
- PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems (2015) (78)
- Enabling Strong Privacy Preservation and Accurate Task Allocation for Mobile Crowdsensing (2018) (77)
- Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks (2015) (76)
- Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic (2014) (75)
- Security and privacy in mobile social networks: challenges and solutions (2014) (71)
- Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs (2009) (71)
- Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability (2014) (70)
- Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network (2010) (70)
- ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks (2007) (70)
- Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions (2015) (69)
- Toward Edge-Assisted Internet of Things: From Security and Efficiency Perspectives (2019) (68)
- Privacy-Preserving Smart Parking Navigation Supporting Efficient Driving Guidance Retrieval (2018) (68)
- Efficient and Secure Decision Tree Classification for Cloud-Assisted Online Diagnosis Services (2019) (68)
- MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks (2010) (66)
- Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering (2017) (66)
- Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles (2018) (65)
- HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks (2012) (64)
- TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems (2015) (64)
- Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks (2014) (64)
- Fully Anonymous Profile Matching in Mobile Social Networks (2013) (62)
- Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks (2012) (61)
- Security-Aware and Privacy-Preserving D2D Communications in 5G (2017) (59)
- A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy (2009) (57)
- Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing (2016) (54)
- Security in service-oriented vehicular networks (2009) (52)
- PLAM: A privacy-preserving framework for local-area mobile social networks (2014) (52)
- Achieving authorized and ranked multi-keyword search over encrypted cloud data (2015) (51)
- SODA: A Generic Online Detection Framework for Smart Contracts (2020) (50)
- One secure data integrity verification scheme for cloud storage (2019) (49)
- Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks (2019) (49)
- Fine-grained data sharing in cloud computing for mobile devices (2015) (48)
- CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks (2009) (46)
- An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs (2010) (46)
- PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks (2009) (44)
- A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems (2013) (44)
- Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs (2011) (43)
- On optimal communication strategies for cooperative cognitive radio networking (2013) (43)
- PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks (2012) (42)
- LPDA: A lightweight privacy-preserving data aggregation scheme for smart grid (2012) (41)
- RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks (2008) (41)
- Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach (2016) (41)
- Privacy-Preserving Traffic Monitoring with False Report Filtering via Fog-Assisted Vehicular Crowdsensing (2019) (39)
- A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems (2020) (39)
- A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks (2008) (39)
- EDR: An efficient demand response scheme for achieving forward secrecy in smart grid (2012) (38)
- Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models (2017) (38)
- Toward Privacy-Preserving Valet Parking in Autonomous Driving Era (2019) (38)
- TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks (2008) (37)
- LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks (2013) (37)
- Balancing Security and Efficiency for Smart Metering Against Misbehaving Collectors (2019) (36)
- Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid (2020) (36)
- DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation (2019) (34)
- Public key distribution scheme for delay tolerant networks based on two-channel cryptography (2012) (34)
- Itrust: interpersonal trust measurements from social interactions (2016) (32)
- Heterogeneous Computation and Resource Allocation for Wireless Powered Federated Edge Learning Systems (2022) (30)
- A secure incentive scheme for delay tolerant networks (2008) (30)
- EDAT: Efficient data aggregation without TTP for privacy-assured smart metering (2016) (30)
- Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET (2010) (29)
- Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach (2020) (29)
- A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer (2021) (29)
- New (t, n) threshold directed signature scheme with provable security (2008) (28)
- SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks (2012) (28)
- FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road (2010) (28)
- AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network (2008) (28)
- Privacy-Preserving Blockchain-Based Energy Trading Schemes for Electric Vehicles (2021) (27)
- AMA: Anonymous mutual authentication with traceability in carpooling systems (2016) (27)
- Blockchain-Based Secure Data Provenance for Cloud Storage (2018) (27)
- REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks (2010) (27)
- A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks (2008) (26)
- Capillary Machine-to-Machine Communications: The Road Ahead (2012) (26)
- TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks (2010) (25)
- An Efficient and Secure User Revocation Scheme in Mobile Social Networks (2011) (25)
- On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking (2013) (25)
- An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid (2014) (25)
- On Countermeasures of Pilot Spoofing Attack in Massive MIMO Systems: A Double Channel Training Based Approach (2019) (25)
- Secure bidirectional proxy re-encryption for cryptographic cloud storage (2016) (24)
- A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications (2014) (24)
- Secure analysis of distributed chemical databases without data integration (2005) (23)
- Analysis of Integrated Data without Data Integration (2004) (23)
- User-provided networking for QoE provisioning in mobile networks (2015) (23)
- FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System (2016) (22)
- Towards collusion-attack-resilient group key management using one-way function tree (2016) (22)
- Security-Enhanced Data Aggregation against Malicious Gateways in Smart Grid (2014) (22)
- Privacy-preserving mobile crowdsensing for located-based applications (2017) (22)
- Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid (2015) (22)
- EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques (2016) (22)
- Effective epidemic control and source tracing through mobile social sensing over WBANs (2013) (22)
- A secure privacy preserving deduplication scheme for cloud computing (2019) (22)
- Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications (2016) (22)
- A New Delay Analysis for IEEE 802.11 PCF (2013) (22)
- Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding (2010) (21)
- Collaborative Security in Vehicular Cloud Computing: A Game Theoretic View (2018) (20)
- A simple deniable authentication protocol based on the Diffie–Hellman algorithm (2008) (19)
- Android digital forensics: data, extraction and analysis (2017) (19)
- iFinger: Intrusion Detection in Industrial Control Systems via Register-Based Fingerprinting (2020) (18)
- Location privacy-aware task recommendation for spatial crowdsourcing (2017) (18)
- User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices (2015) (18)
- IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks (2013) (17)
- A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road (2016) (17)
- CoRide: A Privacy-Preserving Collaborative-Ride Hailing Service Using Blockchain-Assisted Vehicular Fog Computing (2019) (17)
- A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications (2010) (17)
- Security and Privacy in Mobile Social Networks (2013) (17)
- An effective behavior-based Android malware detection system (2015) (17)
- A Privacy-Preserving Data-Sharing Framework for Smart Grid (2017) (17)
- Detecting GPS information leakage in Android applications (2013) (17)
- Efficient e-health data release with consistency guarantee under differential privacy (2015) (17)
- Secure Regression for Vertically Partitioned , Partially Overlapping Data (2004) (16)
- EATH: An efficient aggregate authentication protocol for smart grid communications (2013) (16)
- Enabling pervasive healthcare with privacy preservation in smart community (2012) (16)
- Secure outsourced data transfer with integrity verification in cloud storage (2016) (16)
- Secure Statistical Analysis of Distributed Databases (2006) (15)
- Towards Airbnb-Like Privacy-Enhanced Private Parking Spot Sharing Based on Blockchain (2020) (15)
- PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks (2010) (14)
- EPS: An Efficient and Privacy-Preserving Service Searching Scheme for Smart Community (2013) (14)
- Efficient and Secure Service-oriented Authentication Supporting Network Slicing for 5 G-enabled IoT (2018) (14)
- TraceChain: A blockchain‐based scheme to protect data confidentiality and traceability (2019) (14)
- Vehicular Ad Hoc Network Security and Privacy (2015) (13)
- RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security (2014) (13)
- Networking for Big Data (2015) (13)
- Regression on Distributed Databases via Secure Multi-Party Computation (2004) (13)
- Encyclopedia of Wireless Networks (2020) (13)
- Consent-based access control for secure and privacy-preserving health information exchange (2016) (13)
- A clique-based secure admission control scheme for mobile ad hoc networks (MANETs) (2011) (13)
- Efficient and Privacy-Preserving Smart Grid Downlink Communication Using Identity Based Signcryption (2016) (13)
- A model-based semi-quantitative approach for evaluating security of enterprise networks (2008) (12)
- PDP: A Privacy-Preserving Data Provenance Scheme (2012) (12)
- Secure and privacy-preserving task announcement in vehicular cloud (2017) (12)
- MARP: A Distributed MAC Layer Attack Resistant Pseudonym Scheme for VANET (2020) (12)
- New threshold anonymous authentication for VANETs (2015) (12)
- Blockchain-Cloud Transparent Data Marketing: Consortium Management and Fairness (2022) (12)
- Privacy-preserving Maximum Likelihood Estimation for Distributed Data (2010) (12)
- EVSE: An Efficient Vehicle Social Evaluation Scheme with Location Privacy Preservation for Vehicular Communications (2011) (12)
- PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing (2016) (12)
- Secure and Privacy-Preserving Vehicular Communications (2008) (12)
- One Secure Access Scheme Based on Trusted Execution Environment (2018) (11)
- Content Delivery Analysis in Cellular Networks With Aerial Caching and mmWAVE Backhaul (2021) (11)
- Duth: a user-friendly dual-factor authentication for Android smartphone devices (2015) (11)
- Towards Secure and Fair IIoT-Enabled Supply Chain Management via Blockchain-Based Smart Contracts (2019) (11)
- Secure and effective image storage for cloud based e-healthcare systems (2013) (11)
- DNA Similarity Search With Access Control Over Encrypted Cloud Data (2022) (10)
- Performance Analysis of Secure Web Server Based on SSL (2000) (10)
- An Efficient Compromised Node Revocation Scheme in Fog-Assisted Vehicular Crowdsensing (2017) (10)
- Emerging technologies and applications of wireless communication in healthcare (2011) (10)
- Application-Oriented Block Generation for Consortium Blockchain-Based IoT Systems With Dynamic Device Management (2021) (10)
- A Privacy-Preserving Incentive Framework for the Vehicular Cloud (2018) (10)
- Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization (2022) (10)
- An efficient and provably secure public key encryption scheme based on coding theory (2011) (10)
- A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks (2011) (10)
- Measuring Intrusion Impacts for Rational Response: A State-based Approach (2007) (10)
- Practical and Secure SVM Classification for Cloud-Based Remote Clinical Decision Services (2021) (10)
- TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks (2007) (10)
- A New Dynamic Group Key Management Scheme with Low Rekeying Cost (2008) (9)
- GSIS: Group Signature and ID-based Signature-Based Secure and Privacy-Preserving Protocol (2015) (9)
- Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings (2008) (9)
- Wireless technologies for e-healthcare [Guest Editorial] (2010) (9)
- Towards hierarchical security framework for smartphones (2012) (9)
- SQLite Forensic Analysis Based on WAL (2016) (9)
- Performance Enhancement for Secure Vehicular Communications (2007) (9)
- NIS01-5: A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks (2006) (9)
- NUND: Non-Uniform Node Distribution in Cluster-based Wireless Sensor Networks (2014) (9)
- Vehicular Ad Hoc Network Security and Privacy: Lin/Vehicular (2015) (8)
- A uniform framework for network selection in Cognitive Radio Networks (2015) (8)
- Proxy Re-encryption with Delegatable Verifiability (2016) (8)
- Efficient and Privacy-Preserving Outsourced SVM Classification in Public Cloud (2019) (8)
- A Fairness-Aware and Privacy-Preserving Online Insurance Application System (2016) (8)
- Two-Factor Localized Authentication Scheme for WLAN Roaming (2007) (8)
- NEHCM: A Novel and Efficient Hash-chain based Certificate Management scheme for vehicular communications (2010) (8)
- ECPP: Efficient Conditional Privacy Preservation Protocol (2015) (8)
- A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing (2020) (8)
- A Group-Based Key Management Protocol for Mobile Ad Hoc Networks (2009) (8)
- A privacy-preserving proximity friend notification scheme with opportunistic networking (2012) (7)
- BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks (2008) (7)
- Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing (2019) (7)
- An Efficient Searchable Encryption Scheme and Its Application in Network Forensics (2010) (7)
- A privacy-preserving and truthful tendering framework for vehicle cloud computing (2017) (7)
- Towards a game theoretical modeling of rational collaborative spectrum sensing in Cognitive Radio networks (2012) (7)
- DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications (2022) (7)
- Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks (2006) (7)
- Efficient Deduplicated Reporting in Fog-Assisted Vehicular Crowdsensing (2018) (7)
- Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing (2021) (7)
- Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks (2010) (7)
- Socialized WBANs in mobile sensing environments (2014) (7)
- Device-invisible two-factor authenticated key agreement protocol for BYOD (2016) (7)
- Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability (2021) (7)
- ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks (2020) (7)
- Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach (2017) (7)
- Anonymous Group Message Authentication Protocol for LTE‐based V2X Communications (2018) (7)
- Location-Release Signature for Vehicular Communications (2009) (6)
- Transparent and Accountable Vehicular Local Advertising With Practical Blockchain Designs (2020) (6)
- Balancing Privacy and Accountability for Industrial Mortgage Management (2020) (6)
- Design and Implementation of Real-time Sobel Edge Detection on FPGA for Mobile Device Applications (2015) (6)
- Networking for big data [Guest Editorial] (2014) (6)
- Wireless Technology for Pervasive Healthcare (2014) (6)
- Understanding and Detecting Mobile Ad Fraud Through the Lens of Invalid Traffic (2021) (6)
- Natural image splicing detection based on defocus blur at edges (2014) (6)
- Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks (2011) (6)
- Reshaping Autonomous Driving for the 6G Era (2020) (5)
- Cross entropy based component carrier allocation in LTE-Advanced wireless communication system (2012) (5)
- Blurred License Plate Recognition based on single snapshot from drive recorder (2015) (5)
- Enabling Efficient and Fine-Grained DNA Similarity Search with Access Control over Encrypted Cloud Data (2018) (5)
- Dual-anonymous reward distribution for mobile crowdsensing (2017) (5)
- An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants (2019) (5)
- Verifiable and Secure SVM Classification for Cloud-Based Health Monitoring Services (2021) (5)
- Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity (2020) (5)
- ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks (2015) (5)
- Kernel regression based encrypted images compression for e-healthcare systems (2013) (5)
- Power allocation for CoMP system with backhaul limitation (2014) (5)
- Efficient and Privacy-Preserving Decision Tree Classification for Health Monitoring Systems (2021) (5)
- A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI (2018) (5)
- PPT: A Privacy-Preserving Global Model Training Protocol for Federated Learning in P2P Networks (2021) (5)
- Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing (2022) (4)
- On Achieving Encrypted File Recovery (2010) (4)
- CHetNet: crowdsourcing to heterogeneous cellular networks (2015) (4)
- Privacy-Enhancing Fog Computing and Its Applications (2018) (4)
- Security and privacy in emerging information technologies (2012) (4)
- QoS oriented heterogeneous traffic scheduling in LTE downlink (2015) (4)
- Toward secure user-habit-oriented authentication for mobile devices (2014) (4)
- Profile Matching Protocol with Anonymity Enhancing Techniques (2013) (4)
- EFRS:Enabling Efficient and Fine-Grained Range Search on Encrypted Spatial Data (2018) (4)
- EVOC: More efficient verifiable outsourced computation from any one-way trapdoor function (2015) (4)
- An empirical investigation into path divergences for concolic execution using CREST (2015) (3)
- PPBR: Privacy-Aware Position-Based Routing in Mobile Ad Hoc Networks (2007) (3)
- Secure Localized Authentication and Billing for Wireless Mesh Networks (2007) (3)
- BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain (2020) (3)
- One Secure IoT Scheme for Protection of True Nodes (2018) (3)
- A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks (2007) (3)
- Ring Selection for Ring Signature-Based Privacy Protection in VANETs (2020) (3)
- Towards compromise-resilient localized authentication architecture for wireless mesh networks (2007) (3)
- A framework for privacy-preserving data sharing in the Smart Grid (2014) (3)
- Community detection based reference points clustering for indoor localization in WLAN (2013) (3)
- Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage (2022) (3)
- Accelerating authenticated emergence message propagation to mitigate chain-reaction accidents in highway traffic (2009) (2)
- Cooperative sensing scheduling in Cognitive Radio Networks with multiple Primary Networks (2014) (2)
- Selectively iterative particle filtering and its applications for target tracking in WSNs (2013) (2)
- Towards addressing group selfishness of cluster-based collaborative spectrum sensing in cognitive radio networks (2012) (2)
- Cloud-based parallel concolic execution (2017) (2)
- MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications (2014) (2)
- Credit card-based secure online payment (2003) (2)
- Separate-combine recovery for compressed sensing of large images (2014) (2)
- On symbol mapping for FQPSK modulation enabled Physical-layer Network Coding (2013) (2)
- Pervasive Monitoring of M-Health Care Using Android (2015) (2)
- Pseudonym-Changing Strategy for Location Privacy (2015) (2)
- RECCE: A reliable and efficient cloud cooperation scheme in E-healthcare (2013) (2)
- Efficient and Privacy-Preserving Ad Conversion for V2X-Assisted Proximity Marketing (2018) (2)
- User-satisfaction-based weighted SLNR beamforming in TD-LTE-A system (2014) (2)
- Silent Battery Draining Attack against Android Systems by Subverting Doze Mode (2016) (2)
- Context-aware Cooperative Authentication (2015) (2)
- Characterizing Heterogeneous Internet of Things Devices at Internet Scale Using Semantic Extraction (2022) (2)
- Comment on "Reparable key distribution protocols for Internet environments" [and reply] (1998) (1)
- Fast Handover Authentication Based on Mobility Prediction (2015) (1)
- A keyless facility access control system with wireless enabled personal devices (2007) (1)
- Guest Editorial: Network Forensics and Surveillance for Emerging Networks (2016) (1)
- Relative interpersonal-influence-aware routing in buffer constrained Delay-Tolerant Networks (2013) (1)
- Radio Resource Management of CoMP System in HetNet under Power and Backhaul Constraints (2014) (1)
- Effective Data Rate Based Rank Adaptive Receive Antenna Selection (2014) (1)
- Privacy-Preserving Time Series Data Aggregation for Internet of Things (2016) (1)
- Networking for big data: part 2 [Guest Editorial] (2015) (1)
- Vehicular Networking (2017) (1)
- A secure message delivery scheme with path tracking for delay tolerant networks (2012) (1)
- Emerging trends in network forensics (2010) (1)
- TESLA-based Broadcast Authentication (2015) (1)
- Guest Editorial: Data Analytics Streamlines Autonomous Driving (2021) (1)
- Consent-based Privacy-preserving Decision Tree Evaluation (2020) (1)
- Blockchain-based Fair and Fine-grained Data Trading with Privacy Preservation (2023) (1)
- Against Pilot Spoofing Attack with Double Channel Training in Massive MIMO NOMA Systems (2019) (1)
- Security and Privacy in Communication Networks (2017) (1)
- A Fair and Privacy-Preserving Image Trading System Based on Blockchain and Group Signature (2021) (1)
- CSCAC: one constant-size CPABE access control scheme in trusted execution environment (2019) (1)
- Enabling Regulatory Compliance and Enforcement in Decentralized Anonymous Payment (2023) (1)
- Distributed Cooperative Message Authentication (2015) (1)
- Cooperative Data Forwarding Strategy with Privacy Preservation (2013) (1)
- Efficient and Privacy-Preserving Speaker Recognition for Cybertwin-Driven 6G (2021) (1)
- PReFilter: A Privacy-preserving Relay Filtering Scheme for Delay Tolerant Networks (2012) (1)
- Statistical analysis of capacity in joint processing coordinated multi-point systems (2014) (1)
- Analysis on dynamic of node storage in space delay/disruption tolerant networking (2013) (1)
- A Framework for Defending Deep Neural Networks Against Out-Of-Distribution Adversarial Attacks (2019) (0)
- Best Readings Topics on Communications and Information Systems Security Authentication (2013) (0)
- SECURITY IN MOBILE AD HOC AND SENSOR NETWORKS (2009) (0)
- Location Privacy Protection in Mobile Crowdsensing (2018) (0)
- RSU-Aided Message Authentication (2015) (0)
- NFSP 2013: message from the chairs (2013) (0)
- PPNA special issue on “the green, reliability and security of machine-to-machine communications” (2014) (0)
- A provably secure threshold signature scheme based on DDH assumption (2011) (0)
- IEEE Press Series on Information and Communication Networks Security (ICNS) (2015) (0)
- Identity Privacy Protection in Smart Parking Navigation (2018) (0)
- S ECURITY A ND P RIVACY I N E MERGING W IRELESS N ETWORKS (2010) (0)
- Best Readings in Communications and Information Systems Security (2013) (0)
- Guest Editorial: Centralized Management of Smart Transportation (2020) (0)
- Network Configuration and Flow Scheduling for Big Data Applications (2015) (0)
- Data Privacy Protection in Smart Grid (2018) (0)
- Key-Management Systems in Vehicular Ad-Hoc Networks (2020) (0)
- Advances of Security and Privacy Techniques in Emerging Wireless Networks (2020) (0)
- Vehicular Networking Series Editorial (2018) (0)
- NETWORK FORENSICS AND SURVEILLANCE FOR EMERGING NETWORKS (2016) (0)
- A Routing-Compatible Credit-Based Incentive Scheme for DTNs (2011) (0)
- On the global stability of a delay epidemic model (1992) (0)
- Everything you control is not everything: Achieving intention-concealed visit on social networks (2022) (0)
- An Efficient and Privacy-Preserving Multi-User Multi-Keyword Search Scheme without Key Sharing (2021) (0)
- PPNA special issue on “the green, reliability and security of machine-to-machine communications” (2013) (0)
- SECURITY IN SERVICE-ORIENTED VEHICULAR NETWORKS The success of service delivery in vehicular networks depends on the underlying communication system to enable the user devices to connect to a large number of communicating peers and even to the Internet (2009) (0)
- Vehicular Networking: Protecting Vehicles from Imminent Cyber Threats (2018) (0)
- Drones in the Era of V2X Communications (2019) (0)
- An Overview of Android Operating System and Its Security Features (2015) (0)
- On Dually-Polarized MIMO based NOMA: System Model and Polarization Resource Allocation (2020) (0)
- Blockchain-based Health Data Sharing for Continuous Disease Surveillance in Smart Environments (2023) (0)
- Series Editorial: Vehicular Networking and 6G Data Taxonomy (2022) (0)
- Universal Authentication and Billing Architecture for Wireless MANs (2008) (0)
- Recommendation-Based Trustworthy Service Evaluation (2013) (0)
- Towards Private and Efficient Ad Impression Aggregation in Mobile Advertising (2019) (0)
- Qualitative study of an HIV transmission model among intravenous drug users (1994) (0)
- Traceable and Privacy-Preserving Non-Interactive Data Sharing in Mobile Crowdsensing (2021) (0)
- A Trusted Misbehaviors Detection Scheme in Delay Tolerant Network (2020) (0)
- How can secure multiparty computation enable agencies to share information without sacrificing confidentiality ? Analysis of Integrated Data without Data Integration (2004) (0)
- A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space (2010) (0)
- Robust Key Agreement From Received Signal Strength in Stationary Wireless Networks (2016) (0)
- ◾ A User Data Profile-Aware Policy-Based Network Management Framework in the Era of Big Data (2015) (0)
- Joint optimization of spectrum sensing and dynamic spectrum access system (2013) (0)
- Privacy-Enhancing Technologies (2018) (0)
- Virtual Private Broadband Access in Metropolitan-Area Wireless Mesh Networks (2012) (0)
- Methods of Secure Computation and Data Integration (2005) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Xiaodong S. Lin?
Xiaodong S. Lin is affiliated with the following schools: