Follow
Xiaohui Liang
Title
Cited by
Cited by
Year
Smart community: an internet of things application
X Li, R Lu, X Liang, X Shen, J Chen, X Lin
IEEE Communications magazine 49 (11), 68-75, 2011
9862011
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications
R Lu, X Liang, X Li, X Lin, X Shen
IEEE Transactions on Parallel and Distributed Systems 23 (9), 1621-1631, 2012
9002012
Security and privacy in smart city applications: Challenges and solutions
K Zhang, J Ni, K Yang, X Liang, J Ren, XS Shen
IEEE communications magazine 55 (1), 122-129, 2017
6642017
Pseudonym changing at social spots: An effective strategy for location privacy in vanets
R Lu, X Lin, TH Luan, X Liang, X Shen
IEEE transactions on vehicular technology 61 (1), 86-96, 2011
5742011
Secure provenance: the essential of bread and butter of data forensics in cloud computing
R Lu, X Lin, X Liang, XS Shen
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
4942010
Securing smart grid: cyber attacks, countermeasures, and challenges
X Li, X Liang, R Lu, X Shen, X Lin, H Zhu
IEEE Communications Magazine 50 (8), 38-45, 2012
4692012
Sybil attacks and their defenses in the internet of things
K Zhang, X Liang, R Lu, X Shen
IEEE Internet of Things Journal 1 (5), 372-383, 2014
4092014
GRS: The green, reliability, and security of emerging machine to machine communications
R Lu, X Li, X Liang, X Shen, X Lin
IEEE communications magazine 49 (4), 28-35, 2011
3742011
Secure threshold multi authority attribute based encryption without a central authority
H Lin, Z Cao, X Liang, J Shao
Progress in Cryptology-INDOCRYPT 2008, 426-436, 2008
3672008
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
H Li, X Lin, H Yang, X Liang, R Lu, X Shen
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2053-2064, 2013
3622013
Attribute based proxy re-encryption with delegating capabilities
X Liang, Z Cao, H Lin, J Shao
Proceedings of the 4th international symposium on information, computer, and …, 2009
3552009
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data
H Li, Y Yang, TH Luan, X Liang, L Zhou, XS Shen
IEEE Transactions on Dependable and Secure Computing 13 (3), 312-325, 2015
3182015
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs
R Lu, X Lin, X Liang, X Shen
Intelligent Transportation Systems, IEEE Transactions on 13 (1), 127-139, 2012
2572012
Proxy re-encryption with keyword search
J Shao, Z Cao, X Liang, H Lin
Information Sciences 180 (13), 2576-2587, 2010
2192010
Privacy leakage of location sharing in mobile social networks: Attacks and defense
H Li, H Zhu, S Du, X Liang, X Shen
IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016
2152016
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
2142016
UDP: Usage-based dynamic pricing with privacy preservation for smart grid
X Liang, X Li, R Lu, X Lin, X Shen
IEEE Transactions on smart grid 4 (1), 141-150, 2013
2062013
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks
R Lu, X Lin, H Zhu, X Liang, XS Shen
Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010
2042010
Energy theft detection with energy privacy preservation in the smart grid
D Yao, M Wen, X Liang, Z Fu, K Zhang, B Yang
IEEE Internet of Things Journal 6 (5), 7659-7669, 2019
1942019
ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing
M Barua, X Liang, R Lu, X Shen
International Journal of Security and Networks 6 (2-3), 67-76, 2011
1892011
The system can't perform the operation now. Try again later.
Articles 1–20