Paper

12
2021.03.22
SCI(E) / IEEE Access
A Federated Framework for Fine-Grained Cloud Access Control for Service Providers
Vol: 9 / pp.: 47084-47095
ISSN: 2169-3536
Impact Factor: 3.4
DOI: 10.1109/ACCESS.2021.3067958
11
2021.03.02
SCI(E) / IEEE Access
On Differential Privacy based Framework for Enhancing User Data Privacy in Mobile Edge Computing Environment
Vol: 9 / pp.: 38107-38118
ISSN: 2169-3536
Impact Factor: 3.4
DOI: 10.1109/ACCESS.2021.3063603
10
2021.01.02
SCI(E) / Journal of Combinatorial Optimization (JOCO)
Differentially private approximate aggregation based on feature selection
Vol: 41 / pp.: 318–327
ISSN: 1382-6905
Impact Factor: 0.9
DOI: 10.1007/s10878-020-00666-1
9
2021.01.01
SCI(E) / Computer Communications (ComCom)
An Intelligent Recommendation Algorithm for Red Team Strategy in Edge Computing Powered Massive Cyber Defense Exercise
Vol: 165 / pp.: 141-148
ISSN: 0140-3664
Impact Factor: 4.5
DOI: 10.1016/j.comcom.2020.10.008
8
2020.07.22
SCI(E) / Electronics
An Anonymous Protocol with User Identification and Linking Capabilities for User Privacy in a Permissioned Blockchain
Vol: 9 / No: 8.0 / pp.: 1-22
ISSN: 2079-9292
Impact Factor: 2.6
DOI: 10.3390/electronics9081183
7
2019.07.22
SCI(E) / Tshinghua Science and Technology
A Novel Transparent and Auditable Fog-Cloud Storage Framework with Compensation Mechanism
Vol: 25 / No: 1 / pp.: 28-43
ISSN: 1007-0214
Impact Factor: 5.2
DOI: 10.26599/TST.2019.9010025
6
2014.08
Non-SCI(E) / International Journal of Control and Automation
Anchorage Deviation Ship Management and Monitoring Scheme
Vol: 7 / No: 8 / pp.: 13-18
ISSN: 2005-4297
DOI: 0.14257/ijca.2014.7.8.02
5
2014.05
Non-SCI(E) / Information-An International Interdisciplinary Journal
Improved Secure Durability Service for Digital Content support OSMU
Vol: 17 / No: 5 / pp.: 1343-4500
4
2014.05
Non-SCI(E) / INFORMATION-An International Interdisciplinary Journal
Architecture for Dynamic Security Service in Overlay Network Environments
Vol: 17 / No: 5 / pp.: 1877-1884
3
2013.05
Non-SCI(E) / International Journal of Security and Its Applications
File Multi-analyses for Real-time attack source and spread site trace
Vol: 7 / No: 3 / pp.: 215-222
New