default search action
Shoushan Luo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Yuqing Zhang, Zhaofeng Ma, Shoushan Luo, Pengfei Duan:
Dynamic Trust-Based Redactable Blockchain Supporting Update and Traceability. IEEE Trans. Inf. Forensics Secur. 19: 821-834 (2024) - 2023
- [j29]Yuqing Zhang, Zhaofeng Ma, Shoushan Luo, Shushuang Wang, Pengfei Duan, Xiao Liu:
DBSDS: A dual-blockchain security data sharing model with supervision and privacy-protection. Concurr. Comput. Pract. Exp. 35(21) (2023) - [j28]Liwei Xu, Han Wu, Jianguo Xie, Qiong Yuan, Ying Sun, Guozhen Shi, Shoushan Luo:
An SSL-PUF Based Access Authentication and Key Distribution Scheme for the Space-Air-Ground Integrated Network. Entropy 25(5): 760 (2023) - [j27]Zhaofeng Ma, Jingyu Wang, Keke Gai, Pengfei Duan, Yuqing Zhang, Shoushan Luo:
Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network. J. Syst. Archit. 134: 102782 (2023) - 2022
- [j26]Liwei Xu, Han Wu, Jianguo Xie, Jing Liu, Qiong Yuan, Shengwei Xu, Xiaoming Chen, Shoushan Luo, Huamin Feng:
Chaotic analysis and entropy estimation of the entropy source based on semiconductor superlattice chaos. Microelectron. J. 129: 105556 (2022) - [j25]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks. IEEE Trans. Cloud Comput. 10(3): 2038-2049 (2022) - 2021
- [j24]Xiangjian Zuo, Lixiang Li, Shoushan Luo, Haipeng Peng, Yixian Yang, Linming Gong:
Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks. IEEE Internet Things J. 8(6): 4590-4603 (2021) - [j23]Xiangjian Zuo, Lixiang Li, Haipeng Peng, Shoushan Luo, Yixian Yang:
Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid. IEEE Syst. J. 15(1): 395-406 (2021) - [j22]Hongmin Gao, Zhaofeng Ma, Shoushan Luo, Yanping Xu, Zheng Wu:
BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control. Wirel. Commun. Mob. Comput. 2021: 6658920:1-6658920:20 (2021) - 2020
- [j21]Xuefeng Li, Yang Xin, Chensu Zhao, Yixian Yang, Shoushan Luo, Yuling Chen:
Using User Behavior to Measure Privacy on Online Social Networks. IEEE Access 8: 108387-108401 (2020) - [j20]Zhaofeng Ma, Weizhe Zhao, Shoushan Luo, Lingyun Wang:
TrustedBaaS: Blockchain-Enabled Distributed and Higher-Level Trusted Platform. Comput. Networks 183: 107600 (2020)
2010 – 2019
- 2019
- [j19]Huan Zhang, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, Bin Wu:
Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks. IEEE Access 7: 65982-65995 (2019) - [j18]Hongmin Gao, Zhaofeng Ma, Shoushan Luo, Zhen Wang:
BFR-MPC: A Blockchain-Based Fair and Robust Multi-Party Computation Scheme. IEEE Access 7: 110439-110450 (2019) - [j17]Zhen Wang, Zhaofeng Ma, Shoushan Luo, Hongmin Gao:
Key Escrow Protocol Based on a Tripartite Authenticated Key Agreement and Threshold Cryptography. IEEE Access 7: 149080-149096 (2019) - [j16]Kai Zhang, Fei Zhao, Shoushan Luo, Yang Xin, Hongliang Zhu:
An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework. IEEE Access 7: 150540-150551 (2019) - [j15]Jianchao Bian, Shoushan Luo, Zhengwen Li, Yixian Yang:
Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme. IEEE Access 7: 151120-151130 (2019) - [j14]Guangcan Yang, Shoushan Luo, Hongliang Zhu, Yang Xin, Ke Xiao, Yuling Chen, Mingzhen Li, Yunfeng Wang:
A Mechanism to Improve Effectiveness and Privacy Preservation for Review Publication in LBS. IEEE Access 7: 156659-156674 (2019) - [j13]Yunfeng Wang, Mingzhen Li, Shoushan Luo, Yang Xin, Hongliang Zhu, Yuling Chen, Guangcan Yang, Yixian Yang:
LRM: A Location Recombination Mechanism for Achieving Trajectory k-Anonymity Privacy Protection. IEEE Access 7: 182886-182905 (2019) - [j12]Jianchao Bian, Shoushan Luo, Wei Li, Yaxing Zha, Yixian Yang:
IR-RBT Codes: A New Scheme of Regenerating Codes for Tolerating Node and Intra-node Failures in Distributed Storage Systems. KSII Trans. Internet Inf. Syst. 13(10): 5058-5077 (2019) - [j11]Wei Li, Bonnie M. Liu, Dongxi Liu, Ren Ping Liu, Peishun Wang, Shoushan Luo, Wei Ni:
Unified Fine-Grained Access Control for Personal Health Records in Cloud Computing. IEEE J. Biomed. Health Informatics 23(3): 1278-1289 (2019) - [c10]Huan Zhang, Kangfeng Zheng, Xiaodan Yan, Shoushan Luo, Bin Wu:
Moving Target Defense Against Injection Attacks. ICA3PP (1) 2019: 518-532 - [c9]Shuangshuang Xu, Yang Xin, Hongliang Zhu, Shoushan Luo, Yuling Chen:
A Authentication and Access Authorization Mechanism on the PaaS Platform. SSCI 2019: 893-900 - 2018
- [j10]Zhen Wang, Zhaofeng Ma, Shoushan Luo, Hongmin Gao:
Enhanced Instant Message Security and Privacy Protection Scheme for Mobile Social Network Systems. IEEE Access 6: 13706-13715 (2018) - [j9]Hongliang Zhu, Zhihua Zhang, Juan Du, Shoushan Luo, Yang Xin:
Detection of selective forwarding attacks based on adaptive learning automata and communication quality in wireless sensor networks. Int. J. Distributed Sens. Networks 14(11) (2018) - [j8]Zhihua Zhang, Shoushan Luo, Hongliang Zhu, Yang Xin:
A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks. J. Sensors 2018: 4396381:1-4396381:16 (2018) - 2017
- [j7]Zhihua Zhang, Hongliang Zhu, Shoushan Luo, Yang Xin, Xiaoming Liu:
Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks. IEEE Access 5: 12088-12102 (2017) - [c8]Jing Zhang, Shoushan Luo, Yixian Yang:
Secure Multi-party Comparison Protocol and Application. ICPCSEE (1) 2017: 292-304 - [c7]Wei Li, Wei Ni, Dongxi Liu, Ren Ping Liu, Peishun Wang, Shoushan Luo:
Fine-Grained Access Control for Personal Health Records in Cloud Computing. VTC Spring 2017: 1-5 - 2016
- [j6]Chun Guo, Yuan Ping, Nian Liu, Shoushan Luo:
A two-level hybrid approach for intrusion detection. Neurocomputing 214: 391-400 (2016) - 2015
- [j5]Fangfang Dai, Kangfeng Zheng, Bin Wu, Shoushan Luo:
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph. KSII Trans. Internet Inf. Syst. 9(5): 1920-1937 (2015) - [c6]Fangfang Dai, Kangfeng Zheng, Shoushan Luo, Bin Wu:
Towards a multiobjective framework for evaluating network security under exploit attacks. ICC 2015: 7186-7191 - [c5]Chuiyi Xie, Ying Huo, Sihan Qing, Shoushan Luo, Lingli Hu:
A Self-Matching Sliding Block Algorithm Applied to Deduplication in Distributed Storage System. ICICS 2015: 406-413 - 2013
- [j4]Chun Guo, Yajian Zhou, Yuan Ping, Shoushan Luo, Yu-Ping Lai, Zhongkun Zhang:
Efficient intrusion detection using representative instances. Comput. Secur. 39: 255-267 (2013) - [j3]Ting Han, Shoushan Luo, Hongliang Zhu, Yang Xin, Yong Peng:
A Novel Trust Evaluation Model Based on Grey Clustering Theory for Routing Networks. J. Comput. 8(11): 2743-2749 (2013) - 2012
- [j2]Qian Xiao, Kangfeng Zheng, Shoushan Luo, Xu Cui:
A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks. Int. J. Comput. Intell. Syst. 5(5): 887-895 (2012) - [j1]Mingming Wang, Xiu-Bo Chen, Shoushan Luo, Yi-Xian Yang:
Efficient entanglement channel construction schemes for a theoretical quantum network model with d-level system. Quantum Inf. Process. 11(6): 1715-1739 (2012) - 2011
- [c4]Qian Xiao, Kangfeng Zheng, Shoushan Luo, Yajian Zhou:
A study on energy efficient cluster-based network coding protocol for aggregated-data gathering in wireless sensor networks. GLOBECOM Workshops 2011: 1221-1225 - [c3]Tao Geng, Shoushan Luo, Yang Xin, Xiaofeng Du, Yixian Yang:
Research on Secure Multi-party Computational Geometry. ICICA (LNCS) 2011: 322-329 - 2010
- [c2]Jin-ye Liu, Lize Gu, Shoushan Luo, Yixian Yang:
An anonymous authentication scheme for mobile communication. WCNIS 2010: 359-364
2000 – 2009
- 2007
- [c1]Wen Liu, Shoushan Luo, Ping Chen:
A Study of Secure Multi-party Ranking Problem. SNPD (2) 2007: 727-732
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint