Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Detecting Near-Duplicate SPITs in Voice Mailboxes Using Hashes

    Spam over Internet Telephony (SPIT) is a threat to the use of Voice of IP (VoIP) systems. One kind of SPIT can make unsolicited bulk calls to victims’ voice mailboxes and then send them a prepared audio messag...

    Ge Zhang, Simone Fischer-Hübner in Information Security (2011)

  2. No Access

    Chapter and Conference Paper

    A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds

    Micro-video sharing is prevalent nowadays due to the rapid development of personal smart devices, fast growing of network bandwidth and the easy-to-use cloud computing. However, the micro-video sharing system ...

    Chunpeng Ge, Lu Zhou, **yue **a in Security and Privacy in Social Networks an… (2019)

  3. No Access

    Chapter and Conference Paper

    Time-Aware and Energy Efficient Data Collection Mechanism for Duty-Cycled Wireless Sensor Networks

    Wireless sensor networks (WSNs) are composed of huge amount of battery powered sensor nodes, which usually adopt sleep strategy to save energy and prolong network lifetime. Although appealing, such network fac...

    Zhiqiang Ruan, Haibo Luo, Ge Xu in Artificial Intelligence and Security (2019)

  4. No Access

    Chapter and Conference Paper

    WSN Multi-hop Routing Algorithm Based on Path Quality Comparison in New Energy Consumption Distance Node Relation Model

    The wireless sensor network is an important technology of the Internet of things. In the sensor network, the limited energy and uneven distribution of nodes lead to unbalanced load of nodes, and reduce the qua...

    Huizong Li, **agnqian Wang, Bin Ge, Jie Wang in Artificial Intelligence and Security (2019)

  5. No Access

    Chapter and Conference Paper

    Blockchain-Enabled Privacy-Preserving Internet of Vehicles: Decentralized and Reputation-Based Network Architecture

    With the rapid growth of the transportation systems, the Internet of Vehicles (IoV) has evolved as a new theme in both industry and academia from traditional vehicular ad hoc networks (VANETs). However, the mu...

    **nshu Ma, Chunpeng Ge, Zhe Liu in Network and System Security (2019)

  6. No Access

    Chapter and Conference Paper

    Gnocchi: Multiplexed Payment Channels for Cryptocurrencies

    As the underlying technology of mainstream cryptocurrencies such as Bitcoin and Ethereum, blockchain builds a decentralized payment system. However, the security and consistency of such system derive from the ...

    Chen Pan, Shuyang Tang, Zhonghui Ge, Zhiqiang Liu, Yu Long in Network and System Security (2019)

  7. No Access

    Chapter and Conference Paper

    Improving Big Data Clustering for Jamming Detection in Smart Mobility

    Smart mobility, with its urban transportation services ranging from real-time traffic control to cooperative vehicle infrastructure systems, is becoming increasingly critical in smart cities. These smart mobil...

    Hind Bangui, Mouzhi Ge, Barbora Buhnova in ICT Systems Security and Privacy Protection (2020)

  8. No Access

    Chapter and Conference Paper

    A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication

    Privacy-preserving machine learning is a hot topic in Artificial Intelligence (AI) area. However, there are also many security issues in all stages of privacy-oriented machine learning. This paper focuses on t...

    Yang Hong, Lisong Wang, Weizhi Meng, Jian Cao, Chunpeng Ge in Network and System Security (2022)

  9. No Access

    Chapter and Conference Paper

    Commodity-Tra: A Traceable Transaction Scheme Based on FISCO BCOS

    In recent years, because online shop** has the advantages of abundant products, easy selection, fast door-to-door delivery, and timely information feedback, people are more and more fond of online shop** c...

    Chunmei Li, Lei Shang, Zheng Wei, Jun Ge in Security and Privacy in Social Networks an… (2022)

  10. No Access

    Chapter and Conference Paper

    A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks

    Protecting Internet of Things (IoT) network from private data breach is a grand challenge. Data breach may occur when networks’ statistical information is disclosed due to network scanning or data stored on th...

    Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu in Network and System Security (2022)