Loading [MathJax]/extensions/MathZoom.js
Yong Ding - IEEE Xplore Author Profile

Showing 1-25 of 42 results

Filter Results

Show

Results

The emergence of big data and artificial intelligence (AI) marks a significant milestone in technological advancement, impacting various sectors and transforming the essence of public and personal activities. Traditional machine learning, known as centralized learning, involves collecting data from multiple sources for the model development, which poses significant privacy risks. To address the co...Show More
As modern network services become increasingly complex, protecting the secure operation of computer systems and networks has become a major challenge. Traditional detection methods based on fixed rules have shown many limitations in the face of continuously evolving attack methods. To reduce the impact of these threats, a multitude of deep learning methods have been proposed to enhance network thr...Show More
As a distributed machine learning paradigm, federated learning has attracted wide attention from academia and industry by enabling multiple users to jointly train models without sharing local data. However, federated learning still faces various security and privacy issues. First, even if users only upload gradients, their privacy information may still be leaked. Second, when the aggregation serve...Show More
Connected vehicular cloud computing applies cloud computing to Vehicular Ad Hoc Networks (VANETs), which can provide road condition monitoring services for intelligent transportation systems. However, it brings new security and efficiency challenges to VANETs. Specifically, malicious vehicles may impersonate legitimate vehicles to tamper with or forge road conditions. Cloud servers are not fully t...Show More
Addressing the challenge of untraceable malicious activities due to excessive anonymity in ring signature, we propose a new SM2-based ring signature scheme with revocability and anonymity (SMRSRA). Our scheme innovates by integrating a third-party-generated signer identity tag, a pivotal element in generating both signature values and a revocation tag within the SMRSRA. A key feature of our scheme...Show More
Forest fire detection and resource monitoring are the focus of forest resource protection, but they often suffer from internal attacks. Insider attackers try to get away with illegal activities such as illegal logging and encroachment on forest resources by manipulating data. Illegal activities pose a huge threat to forest resources, so defending against internal attacks is key to forest regulatio...Show More
As a critical infrastructure for contemporary information technology industry, industrial internet of things (IIoT) contains a vast amount of sensitive data, making it a key requirement to ensure data security. As the use of wireless networks as a means of communication between nodes is becoming more and more common, in order to prevent malicious attacks from compromising the system, a zero-trust ...Show More
Cloud storage has benefited millions of users with its remarkable advantages of economy and flexibility. Since a single cloud service provider is not always reliable and prone to a single point of failure, multi-cloud storage is proposed to enhance data availability. However, cross multiple clouds (cross-cloud) auditing to provide users with the integrity verification of outsourced data also faces...Show More
With the development of information technology, massive and heterogeneous consumer electronic products can access the network. These products may engage third-party servers for federated learning and generating more accurate models, where they can monitor, collect and aggregate various data from households almost in real-time. Even though federated learning can update participant parameter data wi...Show More
Data aggregation technology plays a very important role in improving the efficiency of data collection of the Internet of Things (IoT). Most data collected by sensor nodes (SNs) in IoT is multidimensional. However, there are a few existing multidimensional data aggregation schemes, which are almost based on homomorphic encryption and not suitable for resource-constrained IoT smart devices. In addi...Show More
Cross-silo federated learning (FL) allows organizations to collaboratively train machine learning (ML) models by sending their local gradients to a server for aggregation, without having to disclose their data. The main security issues in FL, that is, the privacy of the gradient and the trained model, and the correctness verification of the aggregated gradient, are gaining increasing attention fro...Show More
Smart grid is the future direction of the traditional power system, with characteristics such as high efficiency and stability. Intelligent pricing, as part of the functionality of smart grids, relies on collecting a large amount of user power data to analyze and adjust electricity prices, which may lead to the possibility of user privacy data leakage. To address these issues, we propose a privacy...Show More
With the development of Automatic Dependent Surveillance-Broadcast (ADS-B) technology in the aviation industry, a large amount of data are generated in ADS-B systems everyday. Cloud storage can satisfy the requirement of storing a large amount of ADS-B data well, however, the data stored on cloud server also raises problems about the security and confidentiality. This paper proposes a secure ADS-B...Show More
Industrial Internet of Things (IIoT), is the integration of the latest scientific technology and traditional industrial networks developed on the General Electric platform. Although plenty of advantages, IIoT also suffers from many serious security challenges. As a result, IIoT would be frequently attacked by malicious adversaries. Therefore, it is necessary to design some mechanisms (such as intr...Show More
With the rapid development of Internet of Things, the related data are growing explosively. However, IoT devices have limited storage and computing capabilities so that they cannot deal with massive data storage and computing locally. The integration of IoT and cloud is regarded as an effective solution to the above issue, i.e., IoT devices outsource collected data to cloud to enjoy powerful stora...Show More
Human-beings are suffering from the rapid spread of COVID-19 throughout the world. In order to quickly identify, quarantine and cure the infected people, and to stop further infections, it is crucial to expose those origins who have been infected but are asymptomatic. However, this task is not easy, especially when the rigid security and privacy constraints on health records are taken into conside...Show More
Location-based services (LBSs) are widely used in vehicular networks. Privacy leakage from LBS is a key issue to be solved. However, the existing schemes fail to provide differentiated protection for users’ different locations, which may lead to the leakage of location information. In this paper, we propose a personalized location privacy protection scheme based on differential privacy to protect ...Show More
Vehicular ad hoc network (VANET) is one of the fastest developing technologies in intelligent transportation systems (ITS), which has made great contributions to improving traffic congestion and reducing traffic accidents. As it is deployed in an open environment, security and privacy are threatened to a certain extent. Moreover, there are huge data exchanges in high traffic areas, which require V...Show More
The rapid development of the Internet and people’s attention to personal privacy and security have put forward higher requirements for the identity authentication mechanism. The existing controllable anonymous authentication schemes can realize anonymous authentication and supervision, but they have low efficiency. The one problem is the large computational overhead in presenting and verifying the...Show More
Covert channels are data transmission methods that bypass the detection of security mechanisms and pose a serious threat to critical infrastructure. Meanwhile, it is also an effective way to ensure the secure transmission of private data. Therefore, research on covert channels helps us to quickly detect attacks and protect the security of data transmission. This paper proposes covert channels base...Show More
With the rapid development of information technology, a large number of vehicles and roadside units can be communicated through vehicular ad-hoc network (VANET). The information collected by vehicles can be shared with other entities such as vehicles and traffic management department to improve traffic condition. In order to facilitate the storage of massive data, it is a better way to maintain da...Show More
With the popularity of cloud storage, increasing users begin to outsource data to the cloud. In order to resist possible data analysis for centralized outsourced data and improve the fault tolerance, users prefer to distribute data to cloud servers of different cloud service providers. However, once the data have been outsourced, it will be out of user’s control and many security issues may occur,...Show More
At present, there are a large number of cyber-attacks in global networks, which pose a serious threat to critical infrastructure and cause a large number of potential security risks. In this paper, we discussed the hybrid application of software-defined network technology and honeypot technology to protect critical infrastructure, which can defend against attacks such as advanced persistent threat...Show More
With the prevalence of cloud computing, more and more individuals and companies are entrusting data storage and heavy computing tasks to the cloud server. Cloud computing provides services for obtaining encrypted documents on demand, so that users can selectively retrieve encrypted documents according to some keywords. Although outsourced computing and storage brings a lot of convenience, it also ...Show More
The Unmanned Aerial Vehicles (UAV) have been widely used in civilian and military fields. Due to the limited computing power and storage capacity, a single UAV is not suitable for long-distance, large-scale data transmission. Many authentication schemes have been proposed without considering the confidentiality of transmitted data. In order to address the security and privacy issues in UAV-assiste...Show More