Data collection for attack detection and security measurement in mobile ad hoc networks: A survey G Liu, Z Yan, W Pedrycz Journal of Network and Computer Applications 105, 105-122, 2018 | 86 | 2018 |
B4SDC: A blockchain system for security data collection in MANETs G Liu, H Dong, Z Yan, X Zhou, S Shimizu IEEE transactions on big data 8 (3), 739-752, 2020 | 85 | 2020 |
Lightweight privacy-preserving raw data publishing scheme J Chen, G Liu, Y Liu IEEE Transactions on Emerging Topics in Computing 9 (4), 2170-2174, 2020 | 64 | 2020 |
SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation G Liu, Z Yan, W Feng, X Jing, Y Chen, M Atiquzzaman Information Fusion 70, 100-114, 2021 | 48 | 2021 |
A privacy-preserving health data aggregation scheme Y Liu, G Liu, C Cheng, Z Xia, J Shen KSII Transactions on Internet and Information Systems (TIIS) 10 (8), 3852-3864, 2016 | 30 | 2016 |
An adaptive network data collection system in sdn D Zhou, Z Yan, G Liu, M Atiquzzaman IEEE Transactions on Cognitive Communications and Networking 6 (2), 562-574, 2019 | 25 | 2019 |
DePTVM: Decentralized pseudonym and trust value management for integrated networks G Liu, Z Yan, D Wang, H Wang, T Li IEEE Transactions on Dependable and Secure Computing 21 (1), 110-124, 2023 | 18 | 2023 |
Detection of application-layer tunnels with rules and machine learning H Lin, G Liu, Z Yan Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2019 | 17 | 2019 |
Physically secure and privacy-preserving charging authentication framework with data aggregation in vehicle-to-grid networks Y Liang, Y Liu, X Zhang, G Liu IEEE Transactions on Intelligent Transportation Systems, 2024 | 10 | 2024 |
Practical privacy-preserving electricity theft detection for smart grid Z Zhao, G Liu, Y Liu IEEE Transactions on Smart Grid 15 (4), 4104-4114, 2024 | 4 | 2024 |
A fairness-enhanced micropayment scheme Y Liu, Q Zhao, G Liu, L Chang, J Shen Wireless Personal Communications 96, 5267-5278, 2017 | 3 | 2017 |
Lottery protocol using oblivious transfer based on ECC Y Liu, G Liu, CC Chang Journal of Internet Technology 18 (2), 279-285, 2017 | 2 | 2017 |
DeGKM: Decentralized Group Key Management for Content Push in Integrated Networks G Liu, H Li, N Wang, T Xiang, Y Liu IEEE Transactions on Dependable and Secure Computing 21 (5), 4784-4800, 2024 | 1 | 2024 |
Improved convertible multi-authenticated encryption scheme G Liu, Y Liu, C Liu, Z Shi JOURNAL OF INFORMATION &COMPUTATIONAL SCIENCE 12 (8), 3231-3240, 2015 | 1 | 2015 |
PSRAKA: Physically Secure and Robust Authenticated Key Agreement for VANETs G Liu, H Li, Y Liang, J Le, N Wang, N Mu, Z Liu, Y Liu, T Xiang IEEE Transactions on Vehicular Technology, 2024 | | 2024 |
PECHA: Privacy-Preserving and Efficient Cross-Domain Handover Authentication for Heterogeneous Networks G Liu, H Li, N Wang, B Chen, J Le, Y Liu, T Xiang IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
Privacy-Preserving Federated Learning Based on Dataset Condensation D Zhang, J Le, N Mu, G Liu, T Xiang IEEE Transactions on Consumer Electronics, 2024 | | 2024 |
Expressive Voice Conversion Using Perturbation and Autoencoder Loss Z Chen, Y Liu, G Liu 2024 IEEE 12th International Conference on Information, Communication and …, 2024 | | 2024 |
一种基于区块链的网络节点控制方法、系统及共识节点 刘高, 闫峥, 王海光, 李铁岩 CN Patent App. 202111092096.5, 2021 | | 2021 |
基于区块链的分布式网络攻击检测和安全测量系统及方法 刘高, 闫峥 CN Patent ZL 2019 1 0134568.5, 2021 | | 2021 |