Annual 2025
Annual 2024
[C46] Wang Shuai, Renwan Bi, Youliang Tian, Jinbo Xiong. Why Not Model Privacy?: An Efficient and Practical Scheme for Federated Learning Model Security, 16th EAI International Conference, 2024.[J127] Li Lin, Jiapeng Wu, Zhi Zhou, Jin Zhao, Peng Li, Jinbo Xiong. Computing Power Networking Meets Blockchain: A reputation-enhanced trading framework for decentralized IoT cloud services, IEEE Internet of Things Journal, 2024,11(10) 170280-17096,DOI:10.1109/JIOT.2024.3359379. (SCI,IF=10.6)
[J126] Zheng Yuan, Youliang Tian*, Zhou Zhou, Ta Li, Shuai Wang and Jinbo Xiong*. Trustworthy federated learning against malicious attacks in web 3.0, IEEE Transactions on Network Science and Engineering, 2024,1-14. DOI:10.1109/TNSE.2024.3350365.(SCI,IF=6.6)
Annual 2023
[C39] Wangsheng Yan; Li Lin; Ruihong Huang; Jinbo Xiong; Tianqiang Huang; Mingwei Lin. Enhancing resource allocation efficiency for collaborative end-edge tasks in the metaverse's virtual reality, 2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), 21-24 Dec. 2023, Wuhan, China. DOI: 10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00099
[C38] Ta Li; Youliang Tian; Jinbo Xiong; Linjie Wang. A verifiable privacy-preserving outsourced prediction scheme based on blockchain in smart healthcare, 2023 IEEE International Conference on E-health Networking, Application & Services (Healthcom), 15-17 Dec. 2023, Chongqing, China. DOI: 10.1109/Healthcom56612.2023
[J125] Li Lin, Yuhang Chen, Zhi Zhou, Peng Li, Jinbo Xiong. When metaVerse meets computing power networking: an energy-efficient framework for service placement, IEEE Wireless Communications, 2023, 30(5):76-85. DOI:10.1109/MWC.016.2300111. (SCI,IF=6.6)
[C37] Xianyu Mu, Youliang Tian, Jinbo Xiong, Shuai Wang, Boxiang Gong. FLAP: federated learning aggregation scheme based on privileged secret sharing, in proc. of 2023 International Conference on Networking and Network Applications (NaNA), 18-21 August 2023, Qingdao, China.
[J124] Rong Ma, Tao Feng*, Jinbo Xiong*, Qi Li, Youliang Tian. DScPA: A Dynamic Sub-cluster Privacy-preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT, IEEE Internet of Things Journal, 2024, 11(2):1880-1892. DOI:10.1109/JIOT.2023.3318862. (SCI,IF=6.6)
[J123] Lindong Wang, Youliang Tian, Kedi Yang, Man Xiao, Jinbo Xiong. Verifiable traceable electronic license sharing deposit scheme, Journal of Xidian University, 2023.
[J122] Youliang Tian, Min Zhao, Renwan Bi, Jinbo Xiong. Secure K-prototype clustering against the collusion of rational adversaries, Journal of Xidian University, 2023.
[C36] Yunsen Cai, Haolin Gao, Junkai Liao, Xinwei Li, Yushan Xu, Jinbo Xiong. A personalized recommendation model based on collaborative filtering and federated learning for cultural tourism attractions in fujian-taiwan, in proc. of 2023 International Conference on Software and System Engineering (ICoSSE), 13-15 April 2023, Marseille, France.
[J121] Rong Ma, Tao Feng, Youliang Tian,Jinbo Xiong. EPMA: edge-assisted hierarchical privacy-preserving multidimensional data aggregation mechanism, Mobile Networks and Applications, 2023. (SCI,IF=6.6)
[J120] Yipeng Zou, Tao Peng, Guojun Wang, Entao Luo, Jinbo Xiong. Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing, Journal of Systems Architecture, 2023. (SCI,IF=6.6)
[J119] Biao Jin, Yikang Li, Zhiqiang Yao*, Yulin Chen, Jinbo Xiong.GenFedRL:a general federated reinforcement learning framework for deep reinforcement learning agents, Journal on Communications, 2023, 44(6): 183-197.
[J118] Xuan Li*, Tianpeng Deng, Jinbo Xiong, Biao Jin,Jie Lin.Federated learning watermark based on model backdoor, Journal of Software, 2023, 35(7):3454-3468.
[J117] Renwan Bi, Dalong Guo, Yuanyuan Zhang, Ruihong Huang, Li Lin, Jinbo Xiong*, Outsourced and privacy-preserving collaborative k-prototype clustering for mixed data via additive secret sharing, IEEE Internet of Things Journal, 2023, 10(18): 15810-15821. DOI: 10.1109/JIOT.2023.3266028. (SCI,IF=10.6)
[J116] Youliang Tian, Shuai Wang, Jinbo Xiong*, Renwan Bi, Zhou Zhou, Alam Bhuiyan, Robust and privacy-preserving decentralized deep federated learning training: focusing on digital healthcare applications, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2023. DOI: 10.1109/TCBB.2023.3243932. (CCF B, SCI, IF=3.702)
Annual 2022
[C35] Zuobin Ying, Minghao Liu, Siokong Kong, Shengmin Xu, Jinbo Xiong, Anonymous herarchical identity-based encryption EHR sharing mechanism based on SM9, in proc. of the 21st IEEE International Conference on Ubiquitous Computing and Communications (IUCC-2022), 19-21 December 2022, Chongqing, China.
[J115] Zhou Zhou, Youliang Tian*, Jinbo Xiong, Jianfeng Ma, Changgen Peng, Blockchain-enabled secure and trusted federated data sharing In IIoT, IEEE Transactions on Industrial Informatics, 2022. DOI: 10.1109/TII.2022.3215192. (SCI,IF=11.648)
[J114] Tao Peng, Wentao Zhong, Guojun Wang, Entao Luo, Jinbo Xiong*, Yining Liu, P3M: privacy-preserving precise profile matching in mobile social networks, Journal on Communications, 2022, 43(11): 90-103. DOI:10.11959/j.issn.1000-436x.2022208.
[J113] Youliang Tian, Maoqing Tian, Hongfeng Gao, Miao He, Jinbo Xiong, Cooperation-based location authentication scheme for crowdsensing applications, Journal on Communications, 2022, 43(9): 121-133. DOI:10.11959/j.issn.1000-436x.2022173.
[J112] Renwan Bi, Jinbo Xiong*, Youliang Tian, Qi Li, Ximeng Liu, Edge-Cooperative Privacy-Preserving object detection over random point cloud shares for connected autonomous vehicles, IEEE Transactions on Intelligent Transportation Systems, 2022, 23(12): 24979-24990. DOI: 10.1109/TITS.2022.3213548. (CCF B, SCI, IF=9.551)
[J111] Renwan Bi, Jinbo Xiong*, Youliang Tian, Qi Li, Kim-Kwang Raymond Choo, Achieving lightweight and privacy-preserving object detection for connected autonomous vehicles, IEEE Internet of Things Journal, 2022. DOI: 10.1109/JIOT.2022.3212464. (SCI,IF=10.238)
[J110] Dapeng Wu, Shaoen Wu, Danda B Rawat, Paulo RL Gondim, Periklis Chatzimisios, Jinbo Xiong, special issue on knowledge and service-oriented industrial internet of things: architectures, challenges, and methodologies, IEEE Internet of Things Journal, 2022, 9(18): 16738-16741. DOI: 10.1109/JIOT.2022.3187543. (SCI,IF=10.238)
[C34] Li Lin, Yuanyuan Zhang, Jinbo Xiong, Jiayin Lin, An incentive mechanism for collaborative intelligence, in proc. of the ACM International Conference on Research in Adaptive and Convergent Systems (ACM RACS 2022), 3-4 October 2022, Aizu, Japan. 112-118. DOI: 10.1145/3538641.3561497
[C33] Rong Ma, Tao Feng*, Qi Li, Jinbo Xiong, Blockchain-enabled secure distributed data aggregation and verification mechanism for IIoT, in proc. of the 2022 IEEE Global Communications Conference (IEEE Globecom 2022 MWN), 4-8 December 2022, Rio de Janeiro, Brazil. 4383-4388. DOI: 10.1109/GLOBECOM48099.2022.10000773.
[J109] Yanyan Gu, Limin Shen*, Futai Zhang, Jinbo Xiong, Provably secure linearly homomorphic aggregate signature scheme for electronic healthcare system, Mathematics, 2022, 10(15):2588. DOI: 10.3390/math10152588. (SCI,IF=2.592)
[J108] Min Zhao, Youliang Tian, Jinbo Xiong*, Renwan Bi, Hongtao Xie, Neural network model training method based on homomorphic encryption, Computer Science, 2023, 50(5): 372-381.
[J107] Ruiqi Feng, Leilei Wang, Xiang Lin, Jinbo Xiong*, SGX-based secure data processing framework for traffic monitoring of internet of vehicle, Journal of Computer Applications, 2022. DOI: 10.11772/j.issn.1001-9081.2022050734.
[C32] Renwan Bi, Jinbo Xiong*, Qi Li, Ximeng Liu, Youliang Tian, FPPNet: fast privacy-preserving neural network via three-party arithmetic secret sharing, in proc. of the 15th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA 2022), 22-24 July, 2021, Hangzhou, China. LNICST, volume 451, 165-178. (Best Paper Award)
[J106] Renwan Bi, Mingfeng Zhao, Zuobin Ying, Youliang Tian, Jinbo Xiong*, Achieving dynamic privacy measurement and protection based on reinforcement learning for mobile edge crowdsensing of IoT, Digital Communications and Networks, 2024,10(2): 300-388. DOI: 10.1016/j.dcan.2022.07.013. (SCI,IF=6.348)
[J105] Ta Li, Youliang Tian*, Jinbo Xiong, M. Bhuiyan, FVP-EOC: fair, verifiable and privacy-preserving edge outsourcing computing in 5G-enabled IIoT, IEEE Transactions on Industrial Informatics, 2022, 19(1): 940-950. DOI:10.1109/TII.2022.3179531. (SCI, IF=11.648)
[J104] Linjie Wang, Youliang Tian*, Jinbo Xiong*, Achieving reliable and anti-collusive outsourcing computation and cerification based on blockchain in 5G-bnabled IoT, Digital Communications and Networks, 2022, 8(5):644-653. DOI: 10.1016/j.dcan.2022.05.012. (SCI,IF=6.348)
[C31] Yongjie Zhou, Jinbo Xiong*, Renwan Bi, Youliang Tian, Secure YOLOv3-SPP: Edge-Cooperation Privacy-Preserving Object Detection for Connected Autonomous Vehicles, in proc. of the 2022 International Conference on Networking and Network Applications (NaNA2022).
[J103] Qiuling Chen, Ayong Ye*, Ziwen Zhao, Jinbo Xiong, The dummy-based trajectory privacy protection method to resist correlation attacks in internet of vehicle, Concurrency and Computation: Practice and Experience, 2022, 35(19). DOI: 10.1002/cpe.7154. (CCF C, SCI,IF=1.831)
[J102] Qianxin Chen, Renwan Bi, Jie Lin*, Biao Jin, Jinbo Xiong, Privacy-preserving federated learning framework with irregular-majority users, Chinese Journal of Network and Information Security, 2022, 8(1): 139-150. DOI:10.11959/j.issn.2096-109x.2022011.
[J101] Yang Zhong, Renwan Bi, Xishan Yan, Zuobin Ying, Jinbo Xiong*, Efficient homomorphic neural network supporting privacy-preserving training, Journal of Computer Applications, 2022, 42(12):3792-3800. DOI:10.11772/j.issn.1001-9081.2021101775.
[C30] Renwan Bi, Jinbo Xiong*, Jie Lin, Min Zhao, Youliang Tian, Outsourced and practical privacy-preserving k-prototype clustering supporting mixed data, in proc. of the IEEE International Conference on Communications (IEEE ICC'22-CISS Symposium), 5645-5650. DOI: 10.1109/ICC45855.2022.9838328. 16-20 May, 2022, Seoul, South Korea. (CCF C)
[J100] Jinbo Xiong, Yongjie Zhou, Renwan Bi, Liang Wan*, Youliang Tian, Towards edge-collaborative, lightweight and privacy-preserving classification framework, Journal on Communications, 2022, 43(1):127-137. DOI:10.11959/j.issn.1000-436x.2022004.
Annual 2021
[J99] Tianpeng Deng*, Xuan Li, Jinbo Xiong, Ying Wu, POISIDD: privacy-preserving outsourced image sharing scheme with illegal distributor detection in cloud computing, Multimedia Tools and Applications, 2022, 81(3): 3693-3714. DOI:10.1007/s11042-021-11737-8. (SCI,IF=2.577)
[B01] Jinbo Xiong, Shaoen Wu, Changgen Peng, Youliang Tian, Mobile Multimedia Communications (MobiMedia 2021), 14th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2021, Virtual Event, July 23-25, 2021, Proceedings, book series, Springer LNICST, volume 394, Guiyang, China. DOI:10.1007/978-3-030-89814-4. Softcover ISBN: 978-3-030-89813-7. Series E-ISSN: 1867-822X. eBook ISBN: 978-3-030-89814-4.
[J98] Hongtao Li, Xingsi Xue, Zhiying Li, Long Li*, Jinbo Xiong, Location privacy protection scheme for LBS in IoT, Wireless Communications and Mobile Computing, 2021, DOI: 10.1155/2021/9948543. (SCI,IF=2.336)
[J97] Jianping Cai, Ximeng Liu*, Jinbo Xiong, Zuobin Ying, Yingjie Wu, Approximation method of multiple consistency constraint under differential privacy, Journal on Communications, 2021, 42(6):107-117. DOI:10.11959/j.issn.1000-436x.2021122. (in Chinese with English abstract)
[J96] Youliang Tian, Ta Li, Jinbo Xiong*, M. Bhuiyan, Jianfeng Ma, Changgen Peng, A blockchain-based machine learning framework for edge services in IIoT, IEEE Transactions on Industrial Informatics, 2022, 18(3):1918-1929. DOI:10.1109/TII.2021.3097131. (SCI, IF=11.648)
[J95] Jinbo Xiong, Renwan Bi, Youliang Tian*, Ximeng Liu, Dapeng Wu, Towards lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles, IEEE Internet of Things Journal, 2022, 9(4):2787-2801. DOI: 10.1109/JIOT.2021.3093573. (SCI,IF=10.238)
[J94] Jinbo Xiong, Renwan Bi, Youliang Tian*, Ximeng Liu, Jianfeng Ma, Security and privacy in mobile crowdsensing: Models, progresses, and trends, Chinese Journal of Computers, 2021, 44(9):1949-1966. (in Chinese with English abstract)
[J93] Youliang Tian, Zhiying Zhang, Jinbo Xiong*, Lei Chen, Jianfeng Ma, Changgen Peng, Achieving graph clustering privacy preservation based on structure entropy in social IoT, IEEE Internet of Things Journal, 2022, 9(4):2761-2777. DOI: 10.1109/JIOT.2021.3092185 (SCI,IF=10.238)
[J92] Yuanyuan Zhang, Jinbo Xiong*, Ximeng Liu, Privacy-preserving traffic violation image filtering and searching via crowdsensing, Mobile Networks and Applications, 2022, 27(6):2374–2390. DOI: 10.1007/s11036-021-01882-7. (SCI,IF=3.077)
[J91] Guangjun Liu, Wangmei Guo, Jinbo Xiong, Ximeng Liu, Changyu Dong, Lightweight privacy-preserving data auditing for regenerating-coding-based distributed storage, Journal on Communications, 2021, 42(7): 220-230. DOI:10.11959/j.issn.1000-436x.2021116. (in Chinese with English abstract)
[C29] Ujwal Gullapalli, Lei Chen*, Jinbo Xiong, Image Classification with transfer learning and FastAI, in proc. of the 14th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA 2021), 23-25 July, 2021, Guiyang, China.
[J90] Guangjun Liu*, Wangmei Guo, Ximeng Liu, Jinbo Xiong, Security analysis and improvements on a remote integrity checking scheme for regenerating-coding-based distributed storage, Security and Communication Networks, 2021, Article ID 6652606, DOI:10.1155/2021/6652606 (SCI,IF=1.791)
[J89] Zerui Chen, Youliang Tian*, Jinbo Xiong, Changgen Peng, Jianfeng Ma, Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme, Information Sciences, 2021, 568:286-316, INS16344, DOI:10.1016/j.ins.2021.03.047. (SCI,IF=8.233)
[J88] Jun Ma, Minshen Wang, Jinbo Xiong*, Yongjin Hu, CP-ABE-based secure and verifiable data deletion in cloud, Security and Communication Networks, 2021, Article ID 8855341, DOI:10.1155/2020/8855341. (SCI,IF=1.791)
[J87] Mingfeng Zhao, Lei Chen, Yang Zhong, Jinbo Xiong*, A dynamic privacy measurement model and evaluation system for mobile edge crowdsensing, Chinese Journal of Network and Information Security, 2021, 7(1):157-166. DOI:10.11959/j.issn.2096-109x.2021016. (in Chinese with English abstract)
Annual 2020
[J86] Guangjun Liu, Jinbo Xiong, Lining Zhang, Weiqing Yang, Shaowu Li, Xunlei Xu. An efficient privacy-preserving data auditing scheme for regenerating-code-based cloud storage. Journal of Southwest University, 2020, 42(10): 37-45. DOI:10.13718/j.cnki.xdzk.2020.10.005. (in Chinese with English abstract)
[C28] Tianpeng Deng, Xuan Li*, Biao Jin, Jinbo Xiong, Who distributes it? Privacy-preserving image sharing scheme with illegal distribution detection, in proc. of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, 18-20 Dec. 2020, Nanjing, China, 257-268.
[J85] Ximeng Liu, Lehui Xie, Yaopeng Wang, Jian Zou*, Jinbo Xiong, Zuobin Ying, Athanasios V. Vasilakos, Privacy and security issues in deep learning: A survey, IEEE Access, 2020, 9:4566-4593. DOI:10.1109/ACCESS.2020.3045078. (SCI,IF=3.367)
[J84] Renwan Bi, Qianxin Chen, Lei Chen, Jinbo Xiong*, Dapeng Wu, A privacy-preserving personalized service framework through Bayesian game in social IoT, Wireless Communications and Mobile Computing, 2020, DOI:10.1155/2020/8891889 (SCI, IF=1.819)
[J83] Jinbo Xiong, Renwan Bi, Qianxin Chen, Ximeng Liu*, Towards edge-collaborative, lightweight and secure region proposal network, Journal on Communications, 2020, 41(10): 188-201. (in Chinese with English abstract)
[J82] Renwan Bi, Qianxin Chen, Jinbo Xiong*, Ximeng Liu, Design method of secure computing protocol for deep neural network, Chinese Journal of Network and Information Security, 2020, 6(4):130-139. (in Chinese with English abstract)
[J81] Qi Li, Yinghui Zhang, Tao Zhang, Haiping Huang, Yingjie He, Jinbo Xiong*, HTAC: fine-grained policy-hiding and traceable access control in mHealth, IEEE Access, 2020. DOI:10.1109/ACCESS.2020.3004897. (SCI,IF=3.745)
[C27] Linjie Wang, Youliang Tian*, Jinbo Xiong, Achieving trustworthiness, transferable, cross-domain dynamic accumulator authentication in industrial Internet of Things, in proc. of the 13th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA 2020), 27-28 August, 2020, Harbin, China.
[C26] Mingfeng Zhao, Lei Chen, Jinbo Xiong*, Youliang Tian, A three-party repeated game model for data privacy in mobile edge crowdsensing of IoT, in proc. of the 13th EAI International Conference on Mobile Multimedia Communications (MOBIMEDIA 2020), 27-28 August, 2020, Harbin, China.
[J80] Jinbo Xiong, Hui Liu, Biao Jin*, Qi Li, Zhiqiang Yao, A lightweight privacy protection scheme based on user preference in mobile crowdsensing, Transactions on Emerging Telecommunications Technologies, 2021, 32(5):1-16, e4000, DOI:10.1002/ett.4000. (SCI,IF=1.594)
[J79] Jinbo Xiong, Renwan Bi, Mingfeng Zhao, Jingda Guo, Qing Yang*, Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles, IEEE Wireless Communications, 2020, 27(3):24-30, DOI:10.1109/MWC.001.1900463. (SCI,IF=11.391)
[J78] Youliang Tian, Zuan Wang, Jinbo Xiong*, Jianfeng Ma, A blockchain-based secure key management scheme with trustworthiness in DWSNs, IEEE Transactions on Industrial Informatics, 2020, 16(9):6193-6202, DOI:10.1109/TII.2020.2965975. (SCI,IF=9.112)
Annual 2019
[J77] Jinbo Xiong, Mingfeng Zhao, M. Bhuiyan, Lei Chen, Youliang Tian*, An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT, IEEE Transactions on Industrial Informatics, 2021, 17(2):922-933. DOI:10.1109/TII.2019.2957130. (SCI, IF=10.215, ESI Highly Cited Paper)
[J76] Jinbo Xiong, Lei Chen, Alam Bhuiyan, Chunjie Cao*, Minshen Wang, Entao Luo, Ximeng Liu, A secure data deletion scheme for IoT devices through key derivation encryption and data analysis, Future Generation Computer Systems, 2020, 111:741-753. DOI:10.1016/j.future.2019.10.017. (SCI,IF=6.125)
[J75] Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian*, Qi Li, Ximeng Liu, Zhiqiang Yao, A personalized privacy protection framework for mobile crowdsensing in IIoT, IEEE Transactions on Industrial Informatics, 2020, 16(6):4231-4241, DOI:10.1109/TII.2019.2948068. (SCI,IF=9.112)
[J74] Cheng Liu, Youliang Tian*, Jinbo Xiong, Yanhua Lu, Qiuxian Li, Changgen Peng, Towards attack and defense views to k-anonymous using information theory approach, IEEE Access, 2019, 7:156025-156032, DOI:10.1109/ACCESS.2019.2947233. (SCI,IF=4.098)
[J73] Jinbo Xiong, Xiuhua Chen, Qing Yang*, Lei Chen, Zhiqiang Yao, A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing, IEEE Transactions on Network Science and Engineering, 2020, 7(4):2347-2360. DOI:10.1109/TNSE.2019.2940958. (SCI,IF=5.213)
[C25] Rong Ma, Lei Chen, Jinbo Xiong*, Youliang Tian, Qi Li, Ximeng Liu, A personalized privacy protection data uploading scheme for mobile crowdsensing, in proc. of the 2019 IEEE International Conference on Industrial Internet (ICII 2019), 11-12 Nov., Orlando, FL, USA. 2019, 227-232. DOI:10.1109/ICII.2019.00048.
[C24] Qi Chen, Sihai Tang, Jacob Hochstetler, Jingda Guo, Yuan Li, Jinbo Xiong, Qing Yang*, Song Fu, Low-latency high-level data sharing for connected and autonomous vehicular networks, in proc. of the 2019 IEEE International Conference on Industrial Internet (ICII 2019), 11-12 Nov., Orlando, FL, USA. 2019, 287-296. DOI:10.1109/ICII.2019.00055.
[J72] Hui Liu, Renwan Bi, Jinbo Xiong*, Mingfeng Zhao, Biao Jin, Jie Lin, Fog-aided identity privacy protection scheme for sensing users in mobile crowdsensing, Chinese Journal of Network and Information Security, 2019, 5(6):75-84.
[J71] Jinbo Xiong, Yuanyuan Zhang*, Shaohua Tang, Ximeng Liu, Zhiqiang Yao, Secure encrypted data with authorized deduplication in cloud, IEEE Access, 2019, 7:75090-75104, DOI:10.1109/ACCESS.2019.2920998. (SCI, IF=4.098)
[J70] Qi Li*, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Zuobin Ying, Huaqun Wang, Fine-grained multi-authority access control in IoT-enabled mHealth, Annals of Telecommunications, 2019,74(7-8):389-400, DOI:10.1007/s12243-018-00702-6. (SCI IF=1.552)
[C23] Yuanyuan Zhang, Shaohua Tang*, Jinbo Xiong, Xin'an Wei, A crowdsensing-based auxiliary monitoring with privacy-preserving applied to traffic violation, in proc. of the 5th International Symposium on Privacy Computing (PriCom 2019), Canterbury, UK, 2019.
[J69] Fangfang Shan, Hui Li, Fenghua Li*, Yunchuan Guo, Jinbo Xiong, An attribute-based assured deletion scheme in cloud computing, International Journal of Information Technology and Web Engineering (IJITWE), 2019, 14(2):74-91.
[P2] Li Lin*, Peng Li, Jinbo Xiong, Mingwei Lin, Distributed and application-aware task scheduling in edge-clouds, https://arxiv.org/abs/1902.04362, 2019.
[J68] Li Lin, Jinbo Xiong*, Ruliang Xiao, Mingwei Lin, Xiuhua Chen, Gaming@Edge: A low latency cloud gaming system based on edge nodes, Journal of Computer Applications, 2019,39(7):2001-2007.
[J67] Xiuhua Chen, Hui Liu, Jinbo Xiong*, Rong Ma, A task requirement-oriented user selection incentive mechanism in mobile crowdsensing, Journal of Computer Applications, 2019,39(8):2310-2317.
[J66] Jinbo Xiong, Jun Ren, Lei Chen, Zhiqiang Yao*, Mingwei Lin, Dapeng Wu, Ben Niu, Enhancing privacy and availability for data clustering in intelligent electrical service of IoT, IEEE Internet of Things Journal, 2019, 6(2):1530-1540, DOI:10.1109/JIOT.2018.2842773. (SCI, IF=9.515, ESI Highly Cited Paper )
Annual 2018
[J65] Jinbo Xiong, Yuanyuan Zhang, Xuan Li, Mingwei Lin, Zhiqiang Yao*, Guangjun Liu, RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data, Mobile Networks and Applications, 2018, 23(3):650-663. DOI: 10.1007/s11036-017-0975-x. (SCI, IF=3.259, ESI Highly Cited Paper)
[J64] Jinbo Xiong, Rong Ma, Lei Chen, Youliang Tian*, Li Lin, Biao Jin, Achieving incentive, security, and scalable privacy protection in mobile crowdsensing services, Wireless Communications and Mobile Computing, 2018, DOI: 10.1155/2018/8959635. (SCI, IF=0.869, CCF C)
[J63] Ayong Ye*, Jianfei Shao, Li Xu, Jianwei Chen, Jinbo Xiong, A local HMM for indoor positioning based on fingerprinting and displacement ranging, IET Communications, 2018, 12(10):1163-1170. DOI:10.1049/iet-com.2017.1055. (SCI, IF=1.061)
[J62] Biao Jin, Dongshuo Jiang, Jinbo Xiong*, Lei Chen, Qi Li, D2D data privacy protection mechanism based on reliability and homomorphic encryption, IEEE Access, 2018, 6(1):51140-51150, DOI:10.1109/ACCESS.2018.2869575. (SCI, IF=3.557)
[C22] Minshen Wang, Jinbo Xiong*, Rong Ma, Biao Jin, Qi Li, A novel data secure deletion scheme for mobile device, in proc. of the 27th International Conference on Computer Communications and Networks (ICCCN 2018), Hangzhou, China, 2018, 1-8. (CCF C )
[J61] Jinbo Xiong, Minshen Wang, Youliang Tian, Rong Ma, Zhiqiang Yao*, Mingwei Lin, Research progress on privacy measurement for cloud data, Journal of Software, 2018, 29(7):1963-1980.
[J60] Jinbo Xiong, Yuanyuan Zhang, Youliang Tian*, Zuobin Ying, Qi Li, Rong Ma, A cloud data secure deduplication scheme via role-based symmetric encryption, Journal on Communications, 2018,39(5):59-73. (in Chinese with English abstract)
[J59] Jinbo Xiong, Rong Ma, Ben Niu*, Yunchuan Guo, Li Lin, Privacy Protection Incentive Mechanism Based on User-union Matching in Mobile Crowdsensing, Journal of Computer Research and Development, 2018,55(7):1359-1370. (in Chinese with English abstract)
[J58] Minshen Wang, Jinbo Xiong*, Qian Lin, Lili Wang, Cloud data assured deletion scheme based on key distribution and ciphertext sampling, Journal of Computer Applications, 2018, 38(1):194-200.
[J57] Rong Ma, Shengyuan Feng, Jinbo Xiong*, Biao Jin, Lili Wang, Privacy protection method based on security game model, Journal of Wuhan University (Natural Science Edition), 2018,64(2):165-174.
[J56] Qi Li*, Hongbo Zhu, Jinbo Xiong, Ruo Mo, Multi-authority attribute-based access control system in mHealth with traceability, Journal on Communications, 2018,39(6):1-10. (in Chinese with English abstract)
[J55] Rong Ma, Xiuhua Chen, Hui Liu, Jinbo Xiong*, Research on user privacy measurement and privacy protection in mobile crowdsensing, Netinfo Security, 2018,18(8):64-72.
[C21] Li Lin, Xiaofei Liao, Peng Li, Hai Jin, Jinbo Xiong, Distributed and application-aware task scheduling in edge-clouds, in proc. of the International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2018), Shenyang, China, 2018.
[J54] Jinbo Xiong, Xiuhua Chen, Youliang Tian*, Rong Ma, Lei Chen, Zhiqiang Yao, MAIM: a novel incentive mechanism based on multi-attribute user selection in mobile crowdsensing, IEEE Access, 2018, 6(1):65384-65396. DOI: 10.1109/ACCESS.2018.2878761. (SCI, IF=3.557)
[J53] Xuan Li, Jin Li, Siuming Yiu, Chongzhi Gao, Jinbo Xiong, Privacy-preserving edge-assisted image retrieval and classification in IoT, Frontiers of Computer Science,2019,13(5):1136-1147. (SCI, IF=1.129)
Annual 2017
[J52] Jinbo Xiong, Yuanyuan Zhang, Li Lin*, Jian Shen, Xuan Li, Mingwei Lin, ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud, Concurrency Computat: Pract Exper, 2020, 32(3):e4252, DOI:10.1002/cpe.4252 (SCI, IF=1.167, ESI Highly Cited Paper)
[J51] Mingwei Lin, Riqing Chen*, Jinbo Xiong, Xuan Li, Zhiqiang Yao, Efficient sequential data migration scheme considering dying data for HDD/SSD hybrid storage systems, IEEE Access, 2017, 23366-23373, DOI:10.1109/ACCESS.2017.2766667. (SCI, IF=3.244)
[J50] Jinbo Xiong, Suping Li, Yuanyuan Zhang, Xuan Li, Ayong Ye, Zhiqiang Yao*, PoSW: A novel secure deduplicatin scheme for collaborative cloud applications, Journal on Communications, 2017, 38(7):18-27. (in Chinese with English abstract)
[C20] Rong Ma, Jinbo Xiong*, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye, Privacy Protection-oriented Mobile Crowdsensing Analysis Based on Game Theory, in proc. of the 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Sydney, Australia, 2017, 990-995. (CCF C)
[C19] Yuanyuan Zhang, Jinbo Xiong*, Mingwei Lin, Lili Wang, Xuan Li Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications, in proc. of the 3rd International Conference on Cloud Computing and Security (IEEE ICCCS), Nanjing, China, 2017, 262-274.
[C18] Huibing Wang, Mingwei Lin*, Jinbo Xiong, Li Lin, Zheyu Chen, Workload-aware Page-level Flash Translation Layer for NAND Flash-based Storage Systems, in proc. of the 3rd International Conference on Cloud Computing and Security (IEEE ICCCS), Nanjing, China, 2017, 576-588.
[C17] Yuanyuan Zhang, Jinbo Xiong*, Jun Ren, Lili Wang, Mingwei Lin, A novel role symmetric encryption algorithm for authorized deduplication in cloud, in proc. of the 10th EAI International Conference on Mobile Multimedia Communications (EAI MOBIMEDIA), Chongqing, China, 2017, 104-110.
[C16] Huibing Wang, Jinbo Xiong, Zhiqiang Yao*, Mingwei Lin, Jun Ren, Research survey on support vector machine, in proc. of the 10th EAI International Conference on Mobile Multimedia Communications (EAI MOBIMEDIA), Chongqing, China, 2017, 95-103.
[C15] Jun Ren, Jinbo Xiong, Zhiqiang Yao*, Rong Ma, Mingwei Lin, DPLK-means: A novel Differential Privacy K-means Mechanism, 2017 IEEE Second International Conference on Data Science in Cyberspace (IEEE DSC), Shenzhen, China, 2017, 133-139.
[J49] Jinbo Xiong*, Rong Ma, Yuanyuan Zhang, Ruiyu Dai, Image information hiding method and implementation for social network, Netinfo Security, 2017(3):6-13. (in Chinese with English abstract)
[J48] Jun Ren, Jinbo Xiong, Zhiqiang Yao*, A security control scheme for cloud data copy based on differential privacy model, Chinese Journal of Network and Information Security, 2017, 3(5):38-46. (in Chinese with English abstract)
Annual 2016
[J47] Qi Li*, Jianfeng Ma, Rui Li, Jinbo Xiong, Danwei Chen, Secure, efficient and revocable multi-authority access control system in cloud storage, Computers & Security, 2016, 59(6):45-59.
[J46] Tao Zhang*, Jianfeng Ma, Ning Xi, Ximeng Liu, Jinbo Xiong, Trust based decentralized service composition approach in service oriented mobile social networks, Acta Electronica Sinica, 2016, 44(2):258-267. (in Chinese with English abstract)
[J45] Mingwei Lin, Zhiqiang Yao*, Jinbo Xiong, History-aware page replacement algorithm for NAND flash-based consumer electronics, IEEE Transactions on Consumer Electronics, 2016, 62(1):23-29.
[J44] Weiwei Shen,Jinbo Xiong,Yangqun Huang,Zhiqiang Yao*, Privacy protection scheme design for short message, Computer Sysyems & Applications,2016, 25(4):118-122. (in Chinese with English abstract)
[J43] Weiwei Shen,Jinbo Xiong*,Yangqun Huang,Zhiqiang Yao, An assured deletion scheme for electronic files based on life cycle control, Journal of Chinese Computer Systems, 2016, 37(5):1091-1096. (in Chinese with English abstract)
[J42] Mang Su, Fenghua Li*, Guozhen Shi, Kui Geng, Jinbo Xiong, A user-centric data secure creation scheme in cloud computing, Chinese Journal of Electronics, 2016, 25(4):753-760.
[J41] Fenghua Li, Yanchao Wang, Lihua Yin*, Rongna Xie, Jinbo Xiong, Novel cyberspace-oriented access control model, Journal on Communications, 2016, 37(5): 9-20. (in Chinese with English abstract)
[J40] Jinbo Xiong, Fenghua Li*, Yanchao Wang, Jianfeng Ma, Zhiqiang Yao, Research progress on cloud data assured deletion based on cryptography, Journal on Communications, 2016, 37(8):167-184. (in Chinese with English abstract)
[J39] Dong Wang, Jinbo Xiong*, Xiaoying Zhang, A trust evaluation mechanism for the dht network node in cloud data secure self-destruction system, Journal of Computer Applications, 2016, 36 (10):2715-2722. (in Chinese with English abstract)
[C14] Yuanyuan Zhang, Jinbo Xiong*, Xuan Li, Biao Jin, Suping Li, Xu An Wang, A multi-replica associated deleting scheme in cloud, in proc. of the 10th International Conference on Complex, Intelligent, and Software Intensive Systems (IEEE CISIS), Fukuoka, Japan, 2016, 444-448.
[C13] Cui Zhang, Jinbo Xiong, Qiong Wu*, An efficient CGA algorithm against DoS attack on duplicate address detection process, in proc. of the IEEE Wireless Communications and Networking Conference Workshops (IEEE WCNC), Doha, Qatar, 2016, 471-476.
[J38] Jinbo Xiong, Yuanyuan Zhang, Fenghua Li*, Suping Li, Jun Ren, Zhiqiang Yao, Research progress on secure data deduplication in cloud, Journal on Communications, 2016,37(11):169-180.
[J37] Jinbo Xiong, Suping Li, Xuan Li*, Yuanyuan Zhang, Biao Jin, A secure access and associate deleting scheme for multi-replica in multi-cloud environment, International Journal of High Performance Systems Architecture, 2016, 6(3):143-152.
[C12] Jun Ren, Zhiqiang Yao, Jinbo Xiong*, Yuanyuan Zhang, Ayong Ye, A secure data deduplication scheme based on differential privacy, in proc. of the 22nd IEEE International Conference on Parallel and Distributed Systems (IEEE ICPADS), Wuhan, China, 2016, 1241-1246. (CCF C)
[J36] Shasha Wu, Jinbo Xiong*, Guohua Ye, Zhiqiang Yao, Location privacy protection scheme based on dummy locations in mobile Internet environment, Netinfo Security, 2016,(10):54-59.
Annual 2015
[J35] Qi Li, Jianfeng Ma*, Rui Li, Jinbo Xiong, Ximeng Liu, Large Universe Decentralized Key-Policy Attribute-Based Encryption, Security and Communication Networks, 2015, 8(3):501-509.
[J34] Ximeng Liu, Hui Zhu, Jianfeng Ma*, Qi Li, Jinbo Xiong, Attribute Based Multi-Signature Scheme for Wireless Communications, Mobile Information Systems, 2015. http://dx.doi.org/10.1155/2015/827320.
[J33] Weiwei Shen, Zhiqiang Yao*, Jinbo Xiong, Ximeng Liu, Secure Storage and Self-Destruction Scheme for Privacy Data in Mobile Devices, Journal of Computer Applications, 2015, 35(1):77-82. (in Chinese with English abstract)
[J32] Sufen Dai, Zhiqiang Yao*, Jinbo Xiong, Weiwei Shen, A Secure-Destruction Scheme for OOXML Document with Identity-Based Encryption, Journal of Fujian Normal University (Natural Science Edition), 2015, 31(1):40-47. (in Chinese with English abstract)
[J31] Qi Li, Jianfeng Ma*, Rui Li, Jinbo Xiong, Ximeng Liu, Provably Secure Unbounded Multi-Authority Ciphertext-Policy Attribute-Based Encryption, Security and Communication Networks, 2015, 8(18):4098-4109.
[J30] Jinbo Xiong, Fenghua Li, Jianfeng Ma, Ximeng Liu, Zhiqiang Yao*, Patrick S. Chen, A Full Lifecycle Privacy Protection Scheme for Sensitive Data in Cloud Computing, Peer-to-Peer Networking and Applications, 2015, 8(6):1025-1037.
[J29] Fangfang Shan, Fenghua Li*, Rongna Xie, Jinbo Xiong, Yanchao Wang, Multidimensional Digital Media-Oriented Access Control Scheme, Journal on Communications, 2015,36(11):52-60. (in Chinese with English abstract)
[P1] Fenghua Li, Yanchao Wang, Rongna Xie, Jinbo Xiong, A Novel Cyberspace-Oriented Access Control Model, Cryptology ePrint Archive, 2015.
[C11] Yanchao Wang, Fenghua Li*, Jinbo Xiong, Ben Niu, Fangfang Shan, Achieving Lightweight and Secure Access Control in Multi-Authority Cloud, in proc. of the 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Helsinki, Finland, 2015, 459-466. (Best Paper Award)
[J28] Yazhou Xia, Zhiqiang Yao*, Jinbo Xiong, Accss Control Framework for Composite Electronic Health Records in the Cloud Computing Environment, Computer Systems & Applications, 2015,24(2):35-40. (in Chinese with English abstract)
[J27] Jinbo Xiong*, Weiwei Shen, Yangqun Huang, Zhiqiang Yao, Security Sharing and Associated Deleting Scheme for Multi-Replica in Coud, Journal of communication, 2015, 36(Z1):136-140.
Annual 2014
[J26] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Fenghua Li, Ximeng Liu, A Secure Self-Destruction Scheme with IBE for the Internet Content Privacy, Chinese Journal of Computers, 2014, 37(1):139-150. (in Chinese with English abstract)
[J25] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Jun Ma, A Composite Document Model and Its Access Control Scheme in Cloud Computing, Journal of Xi'an Jiaotong University, 2014, 48(2):25-31. (in Chinese with English abstract)
[J24] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Fenghua Li, Ximeng Liu, Qi Li, A Secure Self-Destruction Scheme for Composite Documents with Attribute Based Encryption, Acta Electronica Sinica, 2014, 42(2):366-376. (in Chinese with English abstract)
[J23] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Guangjun Liu, Ciphertext-Policy Hierarchical Attribute-Based Encryption for Fine-Grained Access Control of Encryption Data, International Journal of Network Security (IJNS), 2014, 16(4):351-357.
[J22] Ximeng Liu, Jianfeng Ma, JinboXiong, Qi Li, Tao Zhang, Hui Zhu, Threshold Attribute Based Encryption with Attribute Hierarchy for Lattices in the Standard Model, IET information security, 2014, 8(4):217-223.
[J21] Qi Li, Jianfeng Ma, Jinbo Xiong, Ximeng Liu, Jun Ma, An Adaptively Secure Multi-Authority Ciphertext-Policy ABE Scheme in Prime Order Groups, Acta Electronica Sinica, 2014, 42(4):696-702. (in Chinese with English abstract)
[J20] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Jun Ma, PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud, KSII Transactions on Internet and Information Systems, 2014, 8(1):282-304.
[C10] Tao Zhang, Jianfeng Ma, Ning Xi, Ximeng Liu, Zhiquan Liu, Jinbo Xiong, Trustworthy Service Composition in Service-Oriented Mobile Social Networks, in proc. of the 22nd IEEE International Conference on Web Services (IEEE ICWS), Alaska, USA, 2014, 684-687.
[J19] Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu, A Secure Electronic Document Self-Destructing Scheme in Cloud Computing, Journal of Computer Research and Development, 2014, 51(7):1417-1423. (in Chinese with English abstract)
[J18] Jian Lin, Jinbo Xiong, Zhiqiang Yao, Ximeng Liu, Identity Traceable Attribute-Based Multi-Signature Scheme, Journal of Fujian Normal University (Natural Science Edition), 2014, 30(3):34-42. (in Chinese with English abstract)
[J17] Faliang Huang, Jinbo Xiong, Tianqiang Huang, Ximeng Liu, Gender Identification of Microblog Users Based on Rough Set, Journal of Computer Applications, 2014, 34(8):2209-2211. (in Chinese with English abstract)
[J16] Qi Li, Jianfeng Ma, Jinbo Xiong, Ximeng Liu, Attribute-Based Encryption Based Access Control Scheme with Constant-Size Ciphertext in Cloud Computing, Journal of Jilin University (Engineering and Technology Edition), 2014, 44(3):788-794. (in Chinese with English abstract)
[J15] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tuo He, Qi Li, Attribute Based Sanitizable Signature Scheme in Cloud Computing, Journal of Electronics and Information Technology, 2014, 36(7):1749-1754. (in Chinese with English abstract)
[J14] Guangjun Liu, Ximeng Liu, Jinbo Xiong, A Lightweight Secure Network Coding Scheme Against Wiretapping, Wuhan University Journal of Natural Sciences, 2014, 19(2): 156-160.
[J13] Ximeng Liu, Hui Zhu, Jianfeng Ma, Qi Li, Jinbo Xiong, Efficient Attribute Based Sequential Aggregate Signature for Wireless Sensor Networks, International Journal of Sensor Networks (IJSNet), 2014, 16(3):172-184.
[J12] Jinbo Xiong, Ximeng Liu, Zhiqiang Yao, Jianfeng Ma, Qi Li, Kui Geng, Patrick S. Chen, A Secure Data Self-Destructing Scheme in Cloud Computing, IEEE Transactions on Cloud Computing, 2014, 2(4):448-458.
Annual 2013
[J11] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Fenghua Li, Qi Li, Action-Based Multilevel Access Control for Structured Document, Journal of Computer Research and Development, 2013, 50(7):1399-1408. (in Chinese with English abstract) (2013 Journal of Computer Research and Development, Most Cited Papers TOP10)
[J10] Jinbo Xiong, Zhiqiang Yao, Biao Jin, Formal Modeling for Structured Document in Cloud Computing, Journal of computer applications, 2013, 33(5):1267-1270. (in Chinese with English abstract)
[C9] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, A Secure Document Self-Destruction Scheme: An ABE Approach, in proc. of the 15th IEEE International Conference on High Performance Computing and Communications (IEEE HPCC), Hangzhou, China, 2013, 59-64.
[C8] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, Tao Zhang, PRAM: Privacy Preserving Access Management Scheme in Cloud Services, in proc. of the International Workshop on Security in Cloud Computing (ACM ASIACCS-SCC), Hangzhou, China, 2013, 41-46.
[C7] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Ximeng Liu, Qi Li, A Secure Document Self-Destruction Scheme with Identity Based Encryption, in proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS), Xian, China, 2013, 239-243.
[C6] Jinbo Xiong, Zhiqiang Yao, Jun Ma, Ximeng Liu, Qi Li, Structured Document Model and Its Secure Access Control in Cloud Computing, in proc. of the 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia), Fuzhou, China, 2013, 592-596.
[J9] Yao Zhiqiang, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu, Community Field-Centric Trust-Based Access Control Model, Journal on Communications, 2013, 34(9):1-9. (in Chinese with English abstract)
[J8] Zhiqiang Yao, Jinbo Xiong, Jianfeng Ma, Qi Li, Ximeng Liu, Access Control Requirements for Structured Document in Cloud Computing, International Journal of Grid and Utility Computing (IJGUC), 2013, 4(2/3): 95-102.
[J7] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Ciphertext Policy Weighted Attribute Based Encryption Scheme, Journal of Xi'an Jiaotong University, 2013, 47(8):44-48. (in Chinese with English abstract)
[C5] Ximeng Liu, Jianfeng Ma, Qi Li, Jinbo Xiong, Faliang Huang. Attribute Based Multi-Signature Scheme in the Standard Model, in proc. of the 9th International Conference on Computational Intelligence and Security (IEEE CIS), Leshan, China, 2013, 738-742.
[C4] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Qi Li, Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing, in proc. of the 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Hangzhou, China, Springer LNCS 8223, 2013:238-251.
[C3] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Jun Ma, Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control, in proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS), Xian, China, 2013, 51-57.
[C2] Qi Li, Jianfeng Ma, Jinbo Xiong, Tao Zhang, Ximeng Liu, Fully Secure Decentralized Key-Policy Attribute-Based Encryption, in proc. of the 5th IEEE International Conference on Intelligent Networking and Collaborative Systems (IEEE INCoS), Xian, China, 2013, 220-225.
[J6] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Jun Ma, Qi Li, Attribute Based Sanitizable Signature Scheme, Journal on Communications, 2013, (Z1): 148-155. (in Chinese with English abstract)
[J5] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Qi Li, Tao Zhang, Hui Zhu, Ciphertext-Policy Weighted Attribute-Based Encryption Scheme in Cloud Computing, Jounal of Sichuan University (Engineering Science Edition), 2013, 45(6):21-26. (in Chinese with English abstract)
[J4] Ximeng Liu,Guangjun Liu,Jianfeng Ma,Jinbo Xiong, Secure Network Coding Scheme for Scalable Video Streaming, Journal on Communications,2013,(5):184-191. (in Chinese with English abstract)
[J3] Jun Ma, Yuanbo Guo, Jianfeng Ma, Jinbo Xiong, Tao Zhang, A Hierarchical Access Control Scheme for Perceptual Layer of IoT, Journal of Computer Research and Development, 2013, 50(6):1267-1275. (in Chinese with English abstract)
[C1] Ximeng Liu, Jianfeng Ma, Jinbo Xiong, Hongtao Li, Attribute Based Sequential Aggregate Signature,in proc. of the 2013 International Conference on Cloud Computing and Big Data (CloudCom-Asia), Fuzhou, China, 2013, 603-609.
[J2] Biao Jin, Jinbo Xiong, Zhiqiang Yao, Ximeng Liu, Identity-Based on-the-Fly Encryption and Decryption Scheme for Controlled Documents, Journal of Computer Applications, 2013, 33(11):3235-3238.
Annual 2012
[J1] Jinbo Xiong, Zhiqiang Yao, Jianfeng Ma, Qi Li, Multilevel access control model for video database, Journal on Communications, 2012, 33(8):147-154. (in Chinese with English abstract)