Smart community: an internet of things application X Li, R Lu, X Liang, X Shen, J Chen, X Lin IEEE Communications magazine 49 (11), 68-75, 2011 | 1007 | 2011 |
EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications R Lu, X Liang, X Li, X Lin, X Shen IEEE Transactions on Parallel and Distributed Systems 23 (9), 1621-1631, 2012 | 905 | 2012 |
Security and privacy in smart city applications: Challenges and solutions K Zhang, J Ni, K Yang, X Liang, J Ren, XS Shen IEEE communications magazine 55 (1), 122-129, 2017 | 685 | 2017 |
Pseudonym changing at social spots: An effective strategy for location privacy in vanets R Lu, X Lin, TH Luan, X Liang, X Shen IEEE transactions on vehicular technology 61 (1), 86-96, 2011 | 581 | 2011 |
Secure provenance: the essential of bread and butter of data forensics in cloud computing R Lu, X Lin, X Liang, XS Shen Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 498 | 2010 |
Securing smart grid: cyber attacks, countermeasures, and challenges X Li, X Liang, R Lu, X Shen, X Lin, H Zhu IEEE Communications Magazine 50 (8), 38-45, 2012 | 471 | 2012 |
Sybil attacks and their defenses in the internet of things K Zhang, X Liang, R Lu, X Shen IEEE Internet of Things Journal 1 (5), 372-383, 2014 | 419 | 2014 |
GRS: The green, reliability, and security of emerging machine to machine communications R Lu, X Li, X Liang, X Shen, X Lin IEEE communications magazine 49 (4), 28-35, 2011 | 378 | 2011 |
Secure threshold multi authority attribute based encryption without a central authority H Lin, Z Cao, X Liang, J Shao Progress in Cryptology-INDOCRYPT 2008, 426-436, 2008 | 371 | 2008 |
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid H Li, X Lin, H Yang, X Liang, R Lu, X Shen IEEE Transactions on Parallel and Distributed Systems 25 (8), 2053-2064, 2013 | 363 | 2013 |
Attribute based proxy re-encryption with delegating capabilities X Liang, Z Cao, H Lin, J Shao Proceedings of the 4th international symposium on information, computer, and …, 2009 | 361 | 2009 |
Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data H Li, Y Yang, TH Luan, X Liang, L Zhou, XS Shen IEEE Transactions on Dependable and Secure Computing 13 (3), 312-325, 2015 | 319 | 2015 |
A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs R Lu, X Lin, X Liang, X Shen Intelligent Transportation Systems, IEEE Transactions on 13 (1), 127-139, 2012 | 261 | 2012 |
Proxy re-encryption with keyword search J Shao, Z Cao, X Liang, H Lin Information Sciences 180 (13), 2576-2587, 2010 | 223 | 2010 |
Privacy leakage of location sharing in mobile social networks: Attacks and defense H Li, H Zhu, S Du, X Liang, X Shen IEEE Transactions on Dependable and Secure Computing 15 (4), 646-660, 2016 | 221 | 2016 |
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 219 | 2016 |
UDP: Usage-based dynamic pricing with privacy preservation for smart grid X Liang, X Li, R Lu, X Lin, X Shen IEEE Transactions on smart grid 4 (1), 141-150, 2013 | 206 | 2013 |
BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks R Lu, X Lin, H Zhu, X Liang, XS Shen Parallel and Distributed Systems, IEEE Transactions on, 1-1, 2010 | 205 | 2010 |
Energy theft detection with energy privacy preservation in the smart grid D Yao, M Wen, X Liang, Z Fu, K Zhang, B Yang IEEE Internet of Things Journal 6 (5), 7659-7669, 2019 | 204 | 2019 |
Provably secure and efficient bounded ciphertext policy attribute based encryption X Liang, Z Cao, H Lin, D Xing Proceedings of the 4th international symposium on information, computer, and …, 2009 | 191 | 2009 |