supported by the Natural Science Foundation of China(No.U22A2099);the Innovation Project of Guangxi Graduate Education(YCBZ2023130).
Dynamic publishing of social network graphs offers insights into user behavior but brings privacy risks, notably re-identification attacks on evolving data snapshots. Existing methods based on -anonymity can mitigate ...
supported by the Tianjin Education Commission Research Program Project No.2019KJ024.
In order to address the shortcomings of traditional anonymity network anonymity evaluation methods,which only analyze from the perspective of the overall network and ignore the attributes of individual nodes,we propos...
supported in part by the National Natural Science Foundation of China(No.61702067);in part by the Natural Science Foundation of Chongqing(No.cstc2020jcyj-msxmX0343).
Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication,access control,dynamic evaluation,and so on.This work focuses on authentication technolog...
supported by the National Natural Science Foundation of China(61662089).
In the realm of vehicular ad hoc networks(VANETs),data aggregation plays a pivotal role in bringing together data from multiple vehicles for further processing and sharing.Erroneous data feedback can significantly imp...
supported by Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(RS-2022-00167197,Development of Intelligent 5G/6G Infrastructure Technology for The Smart City)and this work was funded by BK21 FOUR(Fostering Outstanding Universities for Research)(5199990914048);supported by the National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(2022R1A2B5B01002490);the Soonchunhyang University Research Fund.
Blockchain technology provides transparency and reliability by sharing transactions and maintaining the same information through consensus among all participants.However,single-signature applications in transactions c...
Wireless sensor networks have been deployed in areas such as healthcare,military,transportation and home automation to collect data and forward it to remote users for further processing.Since open wireless communicati...
supported by the National Natural Science Foundation of China (Grant Nos.61966009,U22A2099).
With the emergence of network-centric data,social network graph publishing is conducive to data analysts to mine the value of social networks,analyze the social behavior of individuals or groups,implement personalized...
The“Momo Army”is an anonymous group on social media platforms like Douban and Xiaohongshu.It uses similar avatars and nicknames to demonstrate collective identity and engage in group interactions.This group rapidly ...
This work was supported by Institute of Information&Communications Technology Planning&Evaluation(IITP)under the Artificial Intelligence Convergence Innovation Human Resources Development(IITP-2023-RS-2023-00255968)Grant;the ITRC(Information Technology Research Center)Support Program(IITP-2021-0-02051)funded by theKorea government(MSIT).
With the increase in IoT(Internet of Things)devices comes an inherent challenge of security.In the world today,privacy is the prime concern of every individual.Preserving one’s privacy and keeping anonymity throughou...
funded by the National Natural Science Foundation of China (Grant Number 12171114);National Key R&D Program of China (Grant Number 2021YFA1000600).
In recent years,the issue of preserving the privacy of parties involved in blockchain transactions has garnered significant attention.To ensure privacy protection for both sides of the transaction,many researchers are...