Jinbo Xiong (熊金波)
Jinbo Xiong (熊金波)
Verified email at fjnu.edu.cn - Homepage
Cited by
Cited by
Enhancing privacy and availability for data clustering in intelligent electrical service of IoT
J Xiong, J Ren, L Chen, Z Yao, M Lin, D Wu, B Niu
IEEE Internet of Things Journal 6 (2), 1530-1540, 2018
Secure, efficient and revocable multi-authority access control system in cloud storage
Q Li, J Ma, R Li, X Liu, J Xiong, D Chen
Computers & Security 59, 45-59, 2016
A secure data self-destructing scheme in cloud computing
J Xiong, X Liu, Z Yao, J Ma, Q Li, K Geng, PS Chen
IEEE Transactions on Cloud Computing 2 (4), 448-458, 2014
A full lifecycle privacy protection scheme for sensitive data in cloud computing
J Xiong, F Li, J Ma, X Liu, Z Yao, PS Chen
Peer-to-peer Networking and Applications 8 (6), 1025-1037, 2015
A personalized privacy protection framework for mobile crowdsensing in IIoT
J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao
IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data.
X Liu, J Ma, J Xiong, G Liu
Int. J. Netw. Secur. 16 (6), 437-443, 2014
Personal health records integrity verification using attribute based proxy signature in cloud computing
X Liu, J Ma, J Xiong, T Zhang, Q Li
International Conference on Internet and Distributed Computing Systems, 238-251, 2013
RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data
J Xiong, Y Zhang, X Li, M Lin, Z Yao, G Liu
Mobile Networks and Applications 23 (3), 650-663, 2018
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT
J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian
IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019
A secure self-destruction scheme with IBE for the internet content privacy
J Xiong, Z Yao, J Ma, F Li, X Liu
Chinese Journal of Computers 37 (1), 139-150, 2014
Large universe decentralized key‐policy attribute‐based encryption
Q Li, J Ma, R Li, J Xiong, X Liu
Security and communication Networks 8 (3), 501-509, 2015
A blockchain-based secure key management scheme with trustworthiness in DWSNs
Y Tian, Z Wang, J Xiong, J Ma
IEEE Transactions on Industrial Informatics 16 (9), 6193-6202, 2020
A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing
J Xiong, X Chen, Q Yang, L Chen, Z Yao
IEEE Transactions on Network Science and Engineering, 2019
Priam: Privacy preserving identity and access management scheme in cloud
J Xiong, Z Yao, J Ma, X Liu, Q Li, J Ma
KSII Transactions on Internet and Information Systems (TIIS) 8 (1), 282-304, 2014
DPLK-means: A novel Differential Privacy K-means Mechanism
J Ren, J Xiong, Z Yao, R Ma, M Lin
2017 IEEE Second International Conference on Data Science in Cyberspace (DSC …, 2017
Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles
J Xiong, R Bi, M Zhao, J Guo, Q Yang
IEEE Wireless Communications 27 (3), 24-30, 2020
A secure document self-destruction scheme: an ABE approach
J Xiong, Z Yao, J Ma, X Liu, Q Li
2013 IEEE 10th International Conference on High Performance Computing and …, 2013
ms‐PoSW: A multi‐server aided proof of shared ownership scheme for secure deduplication in cloud
J Xiong, Y Zhang, L Lin, J Shen, X Li, M Lin
Concurrency and Computation: Practice and Experience 32 (3), e4252, 2020
A secure self-destruction scheme for composite documents with attribute based encryption
J Xiong, Z Yao, J Ma, F Li, X Liu, Q Li
Acta Electronica Sinica 42 (2), 366-376, 2014
A secure document self-destruction scheme with identity based encryption
J Xiong, Z Yao, J Ma, X Liu, Q Li
2013 5th International Conference on Intelligent Networking and …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20