闫峥
个人信息:Personal Information
教授 博士生导师 研究生导师
性别:女
毕业院校:Helsinki University of Technology
学历:博士研究生毕业
学位:博士学位
在职信息:在岗
所在单位:网络与信息安全学院
学科:网络空间安全
电子邮箱:
扫描关注
- [1]兰佳禾.FlowMur: A Stealthy and Practical Audio Backdoor Attack with Limited Knowledge.The 45th IEEE Symposium on Security and Privacy (S&P 2024)
- [2]Physical Layer Key Generation between Backscatter Devices over Ambient RF Signals.IEEE INFOCOM
- [3]Game Theoretical Analysis on Acceptance of a Cloud Data Access Control System Based on Reputation.IEEE Transactions on Cloud Computing
- [4]Autonomic Trust Management for a Component Based Software System.IEEE Transactions on Dependable and Secure Computing
- [5]Deduplication on Encrypted Big Data in Cloud.IEEE Transactions on Big Data
- [6]Privacy-Preserving Data Processing with Flexible Access Control.IEEE Transactions on Dependable and Secure Computing
- [7]Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications.IEEE Transactions on Industrial Informatics
- [8]Flexible Data Access Control Based on Trust and Reputation in Cloud Computing.IEEE Transactions on Cloud Computing
- [9]Secure Pervasive Social Communications Based on Trust in a Distributed Way.IEEE ACCESS.2016,4 :9225-9238
- [10]Anonymous Authentication for Trustworthy Pervasive Social Networking.IEEE Transactions on Computational Social Systems.2015,2 (3):88-98
- [11]Controlling Cloud Data Access Based on Reputation.MOBILE NETWORKS & APPLICATIONS.2015,20 (6):828-839
- [12]TruSMS: A trustworthy SMS spam control system based on trust management.FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID##COMPUTING AND ESCIENCE.2015,49 :77-93
- [13]A Survey on Future Internet Security Architectures.IEEE ACCESS.2016,4 :4374-4393
- [14]A security and trust framework for virtualized networks and software-defined networking.SECURITY AND COMMUNICATION NETWORKS.2016,9 (16):3059-3069
- [15]Encrypted Data Management with Deduplication in Cloud Computing.IEEE Cloud Computing.2016,3 (2):28-35
- [16]A Survey on Security in D2D Communications.Mobile Networks and Applications.2017,22 (2):195-208
- [17]Two Schemes of Privacy-Preserving Trust Evaluation.FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE.2016,62 :175-189
- [18]Fusing and mining opinions for reputation generation.Information Fusion.2017,36 :172-184
- [19]Deduplication on Encrypted Big Data in Cloud.IEEE Transactions on Big Data.2016,2 (2):138-150
- [20]PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management.ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS.2015,12 (1)