Article
Computer Science, Information Systems
Iraklis Symeonidis, Dragos Rotaru, Mustafa A. Mustafa, Bart Mennink, Bart Preneel, Panos Papadimitratos
Summary: HERMES is a scalable, secure, and privacy-enhancing system for vehicle sharing and access. It utilizes cryptographic primitives and secure multiparty computation to protect the security and privacy of vehicle and transaction information. The evaluations show that HERMES outperforms SePCAR in terms of token generation efficiency and scalability, making it practical for real-world deployments with a large number of users and vehicles.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Yuhua Xu, Zihan Li
Summary: This paper proposes a privacy-preserving identity-based redactable blockchain (PIRB) that supports flexible policies while maintaining accountability, achieved through enhanced identity-based encryption and matchmaking encryption. Extensive experimentation on the FISCO blockchain shows significant improvements in computational and communication efficiency compared to state-of-the-art works.
Article
Computer Science, Information Systems
Tong Wu, Xiaochen Ma, Hailun Yan
Summary: This paper introduces a cloud-based privacy-preserving data sharing scheme, which delegates the match algorithm to the cloud server for improved efficiency and user privacy protection. Extensive experiments show that the scheme is more efficient than other data-sharing schemes in ME-based services.
Article
Chemistry, Multidisciplinary
Tzu-Wei Lin, Chien-Lung Hsu
Summary: The application of 5G technology in healthcare, particularly in telemedicine, is expanding. A proposed 5G-based medical privacy protection scheme efficiently manages device identities and safeguards medical information privacy.
APPLIED SCIENCES-BASEL
(2021)
Article
Computer Science, Information Systems
B. D. Deebak, Fadi Al-Turjman
Summary: This study proposes a robust blockchain-based lightweight distributed architecture (RB-LDA) for 5G-enabled networks. RB-LDA authenticates device access, protects data privacy, and continuously monitors IoT device activities for better auditing processes.
COMPUTER COMMUNICATIONS
(2022)
Article
Engineering, Multidisciplinary
Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin, Weihua Zhuang, Rob Sun, Bidi Ying
Summary: This paper investigates the challenges and solutions of decentralized data management (DM) based on blockchain for 6G networks. The paper explores consensus protocols and scalability mechanisms in blockchains, investigates authentication and authorization requirements for DM stakeholders, and studies blockchain-based mechanisms for collaborative data processing. The paper presents research issues and potential solutions for blockchain-based DM in 6G networks and discusses future research directions.
Article
Computer Science, Information Systems
Tripti Rathee, Parvinder Singh
Summary: Blockchain Identity Management (BIdM) is a mechanism for identifying and authenticating user data permissions, where a trusted third party is responsible for data maintenance and activity control. The proposed approach uses MECC and MHDA for key generation, EMCRA and LDA for data scoring, and Hamming criteria for identity validation. Experimental results show that the performance of this method is better than existing techniques.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Fenghe Wang, Junquan Wang, Shaoquan Shi
Summary: This article introduces a lattice-based data-sharing system that achieves data confidentiality and identity privacy through an efficient identity-based broadcast encryption scheme. The proposed system is suitable for large receiver groups and supports efficient member joining.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Chao Wang, Shuo Wang, Xiaoman Cheng, Yunhua He, Ke Xiao, Shujia Fan
Summary: With the increasing volume of data in the Internet of Things, a new business model has emerged where data owners share their data for rewards. However, motivating data owners to participate in the data trading process is a challenge. Security and privacy issues, especially when data providers claim rewards with their real identities, are still unresolved. This paper proposes a privacy and efficiency-oriented data sharing mechanism for IoTs that utilizes a blockchain-based framework and anonymous certificate-based data sharing policy, along with novel non-interactive zero-knowledge proofs to hide the identities of data providers.
IEEE TRANSACTIONS ON BIG DATA
(2023)
Article
Computer Science, Information Systems
Myeonghyun Kim, Joonyoung Lee, Kisung Park, Yohan Park, Kil Houm Park, Youngho Park
Summary: Car-sharing systems can solve urban problems by providing shared vehicles and reducing personal vehicle usage. However, security concerns exist due to information being transmitted through a public channel. Designing a secure authentication protocol and a decentralized scheme using blockchain technology is essential for addressing these issues.
Article
Engineering, Civil
Qinglei Kong, Le Su, Maode Ma
Summary: Vehicular sensing, combined with fog computing, allows for efficient and secure data collection and sharing at the network edge. Leveraging a permissioned blockchain ensures privacy protection and verifiability in the sharing of sensory data. Performance evaluations demonstrate improvements in efficiency compared to traditional schemes without blockchain integration.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2021)
Article
Computer Science, Information Systems
Jesus Garcia-Rodriguez, Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta
Summary: The adoption of p-ABC systems in electronic services is still limited due to performance efficiency issues, lack of interoperability with standards, and reliance on a centralized architecture. This paper introduces a distributed and privacy-preserving identity management system with the PS-MS crypto scheme, providing remarkable privacy-preservation features and outperforming Identity Mixer system.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2021)
Article
Computer Science, Information Systems
Jingwei Liu, Weiyang Jiang, Rong Sun, Ali Kashif Bashir, Mohammad Dahman Alshehri, Qiaozhi Hua, Keping Yu
Summary: Electronic Medical Records (EMRs) are valuable research materials for AI and machine learning. Traditional centralized data sharing architectures cannot balance privacy and traceability effectively. Our proposed scheme using decentralized blockchain allows trackable anonymous remote healthcare data storing and sharing, providing efficient overall performance.
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
(2023)
Article
Computer Science, Information Systems
Shan Jiang, Jiannong Cao, Hanqing Wu, Kongyang Chen, Xiulong Liu
Summary: In recent years, the development and adoption of blockchain technology in intelligent transportation systems (ITS) has been witnessed due to its authenticity and traceability. However, the increasing number of ITS devices poses significant challenges in privacy-preserving and efficient data sharing. This work proposes a bloom filter-based multi-keyword search protocol for improving efficiency and privacy preservation in ITS data.
INFORMATION SCIENCES
(2023)
Article
Engineering, Multidisciplinary
Liping Zhang, Zhen Wei, Wei Ren, Xianghan Zheng, Kim-Kwang Raymond Choo, Neal N. Xiong
Summary: The popularity of electronic healthcare networks has increased during pandemics such as COVID-19, highlighting the importance of ensuring security and privacy for data-in-transit. This study introduces an effective privacy protection scheme using steganography-based schemes that utilize biological signals. By leveraging multidimensional steganography and shared keys, the proposed scheme enhances security and signal processing efficiency.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2021)
Letter
Dentistry, Oral Surgery & Medicine
Wei Liu, Yiwen Deng, Huan Shi, Xuemin Shen
Letter
Dermatology
Kai Sun, Xuemin Shen
PHOTODERMATOLOGY PHOTOIMMUNOLOGY & PHOTOMEDICINE
(2023)
Article
Dentistry, Oral Surgery & Medicine
Wei Liu, Qianqian Zhang, Xuemin Shen, Zhexuan Bao
Summary: Oral lichen planus (OLP) and pemphigus vulgaris (PV) are two common inflammatory mucocutaneous diseases of immune-based etiology. Evidence suggests that regulatory T (Treg) cells may play a role in the pathogenesis of OLP and PV. This study found that Treg levels were significantly higher in OLP patients compared to healthy controls, while Treg levels were significantly lower in PV patients compared to healthy controls.
JOURNAL OF DENTAL SCIENCES
(2023)
Article
Dentistry, Oral Surgery & Medicine
Wei Liu, Meng Li, Xinzhong Zhang, Zengtong Zhou, Zhengyu Shen, Xuemin Shen
Summary: This study aimed to investigate the genetic associations between SNPs in 6 cytokines (IFN-g, IL-18, TGFb1, IL-13, IL-2, IL-4) and OLP susceptibility. A significant association was found between IFN-g (874A/T) and IL-18 (137G/C) polymorphisms with OLP. A marginally significant association was found between TGFb1 (509C/T) polymorphism and OLP. However, no significant associations were found for IL-1b (3954C/T), IL-2 (330T/G), IL-4 (590C/T), and IL-18 (607C/A) polymorphisms with OLP.
JOURNAL OF DENTAL SCIENCES
(2023)
Letter
Oncology
Xi Yang, Lijun Liu, Xuemin Shen, Linjun Shi, Wei Liu
Summary: Increasing evidence suggests that lncRNAs act as ceRNAs by competitively binding miRNAs, and play important roles in the biological processes of TSCC. This study summarizes the ceRNA regulatory networks involving lncRNA/miRNA/mRNA axes in TSCC. Dysregulated profiles of 33 lncRNAs and 31 miRNAs were identified and found to be involved in various cancer-associated phenotypes, including cell proliferation, apoptosis, invasion, migration, and chemoresistance. The functional inactivation of ceRNAs in tumor cells may provide novel diagnostic and therapeutic strategies for TSCC.
Article
Engineering, Electrical & Electronic
Wen Wu, Mushu Li, Kaige Qu, Conghao Zhou, Xuemin Shen, Weihua Zhuang, Xu Li, Weisen Shi
Summary: This paper proposes a novel Split learning (SL) scheme called Cluster-based Parallel SL (CPSL) to reduce training latency by parallelizing device-side model training and sequentially training the whole AI model. A resource management algorithm is also proposed to consider device heterogeneity and network dynamics. Extensive simulation results demonstrate that the proposed solution greatly reduces training latency and adapts to network dynamics compared with existing SL benchmarks.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Jianbing Ni, Man Ho Au, Wei Wu, Xiapu Luo, Xiaodong Lin, Xuemin Shen
Summary: A dual-anonymous off-line electronic cash scheme is proposed using the BBS+ signature algorithm, which ensures secure payment in mobile commerce.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2023)
Article
Engineering, Electrical & Electronic
Ruoyu Su, Zijun Gong, Cheng Li, Xuemin Shen
Summary: Space-air-ground-sea integrated network, a promising networking paradigm for 6G communications, combines satellite, aerial, terrestrial, and marine networks. This paper presents a method for efficient target localization in the ocean using a mobile underwater acoustic array network and linear frequency modulated (LFM) signals. The method utilizes propagation delay and the Doppler effect to estimate the position and velocity of the moving target, achieving high accuracy with low computational complexity. Performance evaluation shows that the proposed method outperforms the least squares based approach, approaching the Cramer-Rao lower bound (CRLB) within two iterations.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2023)
Letter
Surgery
Wei Liu, Xi Yang, Linjun Shi, Xuemin Shen
INTERNATIONAL JOURNAL OF SURGERY
(2023)
Article
Infectious Diseases
Junjun Chen, Hui Yao, Xiaoling Yuan, Lei Yan, Guoyao Tang, Kepeng Yan, Xuemin Shen
Summary: In this study, a rare case of palatal perforation caused by opportunistic oral mucosal fungal infection with Alternaria alternata in an immunocompetent adolescent is presented. The patient, who had been previously healthy, underwent diagnostic investigations and was confirmed to have A. alternata infection. Surgical debridement and voriconazole treatment were performed, leading to improvement of the patient's condition. These findings emphasize the importance of considering A. alternata as a potential pathogenic factor in etiological palatal perforation.
INTERNATIONAL JOURNAL OF INFECTIOUS DISEASES
(2023)
Article
Materials Science, Multidisciplinary
Peiyu Cheng, Tong Zhao, Mingming Chen, Sixue Chen, Xuemin Shen, Yuan Liu, Shikuan Yang, Zhanguo Chen, Xiuxiu Dong, Quan Wang, Dawei Cao
Summary: Improved perovskite CH3NH3PbI3 thin films were grown through Co-based ZIF-67 additive assisted Co ion doping. These thin films exhibit low grain boundaries, low defect states, and improved structural stabilities. The performance and stability of photodetectors based on CH3NH3Pb0.98Co0.02I3 thin films were enhanced, demonstrating the positive role of suppressing defect states.
ADVANCED OPTICAL MATERIALS
(2023)
Article
Computer Science, Information Systems
Minrui Xu, Wei Chong Ng, Wei Yang Bryan Lim, Jiawen Kang, Zehui Xiong, Dusit Niyato, Qiang Yang, Xuemin Shen, Chunyan Miao
Summary: The concept of the Metaverse is growing in popularity, but current versions still fall short of realizing its immersive, embodied, and interoperable vision. This survey focuses on the edge-enabled Metaverse and explores the challenges and solutions in communication, networking, computation, and blockchain technologies to realize its ultimate vision.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2023)
Article
Computer Science, Information Systems
Wanting Yang, Hongyang Du, Zi Qin Liew, Wei Yang Bryan Lim, Zehui Xiong, Dusit Niyato, Xuefen Chi, Xuemin Shen, Chunyan Miao
Summary: This paper mainly introduces that the sixth-generation (6G) wireless networks will shift from a traditional architecture that focuses solely on a high transmission rate to a new architecture that is based on the intelligent connection of everything, and Semantic communication (SemCom) is predicted to become a new core paradigm in 6G. The paper provides a holistic review of the fundamentals of SemCom, its applications in 6G networks, and the existing challenges and open issues with insights for further in-depth investigations.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2023)
Article
Computer Science, Information Systems
Wei Quan, Ziheng Xu, Mingyuan Liu, Nan Cheng, Gang Liu, Deyun Gao, Hongke Zhang, Xuemin Shen, Weihua Zhuang
Summary: This paper presents a survey on the recent research in AI-driven packet forwarding with programmable data plane (PDP). Two representative frameworks of packet forwarding, traditional AI-driven forwarding and PDP-assisted forwarding, are described. The capacity of packet forwarding under these frameworks is evaluated in terms of delay, throughput, security, and reliability. The paper also identifies three directions in the development of AI-driven packet forwarding and highlights challenges and issues in future research.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2023)
Article
Computer Science, Information Systems
Sijing Duan, Dan Wang, Ju Ren, Feng Lyu, Ye Zhang, Huaqing Wu, Xuemin Shen
Summary: This paper provides a comprehensive survey on distributed artificial intelligence (DAI) empowered by end-edge-cloud computing (EECC). It explores the benefits of the EECC paradigm in supporting distributed AI, introduces fundamental technologies for distributed AI, and discusses optimization technologies empowered by EECC for distributed training and inference. It also addresses security and privacy threats in the DAI-EECC architecture and reviews defense technologies. Furthermore, it presents promising applications enabled by DAI-EECC and highlights research challenges and open issues.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
(2023)