Skip to main content

and
  1. Article

    Open Access

    Evicting and filling attack for linking multiple network addresses of Bitcoin nodes

    Bitcoin is a decentralized P2P cryptocurrency. It supports users to use pseudonyms instead of network addresses to send and receive transactions at the data layer, hiding users’ real network identities. Tradit...

    Huashuang Yang, **qiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun in Cybersecurity (2023)

  2. Article

    Open Access

    An efficient confidentiality protection solution for pub/sub system

    Publish/subscribe(pub/sub) systems are widely used in large-scale messaging systems due to their asynchronous and decoupled nature. With the population of pub/sub cloud services, the privacy protection problem...

    **glei Pei, Yuyang Shi, Qingling Feng, Ruisheng Shi, Lina Lan, Shui Yu in Cybersecurity (2023)

  3. No Access

    Chapter and Conference Paper

    A Lightweight Time Series Main-Memory Database for IoT Real-Time Services

    With the rapid development of Internet of things (IoT), a large number of IoT sensing devices produces amounts of sensing data in every second. These data should be processed in real-time to support IoT real-t...

    Lina Lan, Ruisheng Shi, Bai Wang, Lei Zhang in Internet of Vehicles. Technologies and Ser… (2020)

  4. No Access

    Chapter and Conference Paper

    Privacy-Preserving Content-Based Publish/Subscribe Service Based on Order Preserving Encryption

    The publish/subscribe model offers a loose-couple communication paradigm for large-scale distribute applications. Content-based publish/subscribe system allows publishers send events with attributes to admin s...

    Mingdong Li, Qifeng Luo, Lu Wang in Internet of Vehicles. Technologies and Ser… (2020)

  5. No Access

    Chapter and Conference Paper

    Design of Personalized News Comments Recommendation System

    Nowadays people spend lots of time on browsing news on the Internet. News comment as one of the most common things that people find on the website, is earning more attention than before. News comments have sig...

    Mingnan Zhou, Ruisheng Shi, Zhaozhen Xu, Yuan He, Yiyi Zhou, Lina Lan in Data Science (2015)