Branding/Logomark minus arrow-point-to-down Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 Icon/List
Loading Scinapse...
Xiuzhen Cheng
George Washington University
292Publications
41H-index
6,569Citations
Publications 292
Newest
Chunqiang Hu10
Estimated H-index: 10
(Chongqing University),
Wei Li10
Estimated H-index: 10
(Georgia State University),
Xiuzhen Cheng41
Estimated H-index: 41
(George Washington University)
... more
Due to the complexity and volume, outsourcing ciphertexts to a cloud is deemed to be one of the most effective approaches for big data storage and access. Nevertheless, verifying the access legitimacy of a user and securely updating a ciphertext in the cloud based on a new access policy designated by the data owner are two critical challenges to make cloud-based big data storage practical and effective. Traditional approaches either completely ignore the issue of access policy update or delegate...
Cited 10
Source
Cite this paper
2018 in IEEE Wireless Communications [IF: 8.97]
Yan Huo11
Estimated H-index: 11
,
Yuqi Tian1
Estimated H-index: 1
,
Liran Ma13
Estimated H-index: 13
... more
This article provides a comprehensive overview on jamming strategies in the physical layer for securing wireless communications. As a complement to traditional cryptography-based approaches, physical layer based security provisioning techniques offer a number of promising features that have not been previously available. Among the physical layer security techniques, jamming is an effective way to degrade the channel quality of the eavesdroppers for ensuring security. We start by giving a brief i...
Cited 6
Source
Cite this paper
Chunqiang Hu10
Estimated H-index: 10
,
Jiguo Yu14
Estimated H-index: 14
,
Xiuzhen Cheng41
Estimated H-index: 41
... more
In this paper, we present a signcryption scheme called CP_ABSC based on Ciphertext-Policy Attribute Based Encryption (CP_ABE) [ 7 ] to secure the multicast communications in smart grids that require access control, data encryption, and authentication to ensure message integrity and confidentiality. CP_ABSC provides algorithms for key management, signcryption, and designcryption. It can be used to signcrypt a message based on the access rights specified by the message itself. A user can designcry...
Cited 1 Source Cite this paper
Arwa Alrawais3
Estimated H-index: 3
(George Washington University),
Abdulrahman Alhothaily3
Estimated H-index: 3
(George Washington University),
Xiuzhen Cheng41
Estimated H-index: 41
(George Washington University)
... more
Certificate validation in public key infrastructure (PKI) is a vital phase of establishing secure connections on any network. There has been a great deal of speculation on how to efficiently validate digital certificates in PKI on which the security of network communications rests. Developing such a system is challenging because digital certificates need to be quickly and securely validated for a large number of clients in a short period of time at a low cost. On the other hand, our analysis on ...
Cited 1
Source
Cite this paper
Yizhen Jia (George Washington University), Yinhao Xiao (George Washington University), Jiguo Yu14
Estimated H-index: 14
(Qufu Normal University)
... more
Smart home IoT devices have been more prevalent than ever before but the relevant security considerations fail to keep up with due to device and technology heterogeneity and resource constraints, making IoT systems susceptible to various attacks. In this paper, we propose a novel graph-based mechanism to identify the vulnerabilities in communication of IoT devices for smart home systems. Our approach takes one or more packet capture files as inputs to construct a traffic graph by passing the cap...
Source
Cite this paper
2018 in IEEE Access
Yunhua He1
Estimated H-index: 1
(North China University of Technology),
Hong Li1
Estimated H-index: 1
(Chinese Academy of Sciences),
Xiuzhen Cheng41
Estimated H-index: 41
(George Washington University)
... more
In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering messages, or uploading data. Nevertheless, users are selfish in nature and they may refuse to cooperate due to their concerns on energy and bandwidth consumption. Thus each user should receive a satisfying reward to compensate its resource consumption for cooperation. However, suitable incentive mechanisms that can meet the diverse requireme...
Source Cite this paper
Dongxiao Yu12
Estimated H-index: 12
(Huazhong University of Science and Technology),
Yifei Zou1
Estimated H-index: 1
(University of Hong Kong),
Jiguo Yu14
Estimated H-index: 14
(Qilu University of Technology)
... more
We present a distributed stable protocol for local broadcast in multi-hop wireless networks, where packets are injected to the nodes continuously, and each node needs to quickly disseminate the injected packets to all its neighbors within a given communication range $R$ . We investigate the maximum packet injection rate and the minimum packet latency that can be achieved in a stable protocol. This paper assumes the signal-to-interference-plus-noise-ratio (SINR) interference model, which reflects...
Source
Cite this paper
Honglu Jiang1
Estimated H-index: 1
(Qufu Normal University),
Jiguo Yu14
Estimated H-index: 14
(Qufu Normal University),
Chunqiang Hu10
Estimated H-index: 10
(Chongqing University)
... more
Abstract The data of social networks contains a large amount of personal information, of which may be public or insignificant, but some may be sensitive and private. Once the user privacy leaked, it may bring a variety of troubles for users. Holders of social networking data first conduct anonymization before the data is published. However, the simple anonymity method does not play a very good protection. At present, a number of de-anonymization attacks for the data releasing of social networks ...
Ref 9Cited 1 Source Cite this paper
Qin Hu2
Estimated H-index: 2
(Beijing Normal University),
Shengling Wang10
Estimated H-index: 10
(Beijing Normal University),
Chunqiang Hu10
Estimated H-index: 10
(Chongqing University)
... more
Query privacy has led to a serious concern for location-based services (LBSs). Existing mainstream schemes preserve query privacy by either introducing a third party or degrading the accuracy of LBS. To address these deficiencies, we propose a scheme named the content sealed bottle in this paper for the users to get accurate LBSs while the server learns zero knowledge on the query content. To realize this objective, the Euclidean distance based on homomorphic encryption is used to signal the dif...
Source Cite this paper
12345678910