default search action
Bei Gong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j55]Fenhua Bai, Zikang Wang, Kai Zeng, Chi Zhang, Tao Shen, Xiaohui Zhang, Bei Gong:
ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices. Comput. Secur. 148: 104136 (2025) - 2024
- [j54]Tengfei Tu, Hua Zhang, Bei Gong, Daizhong Du, Qiaoyan Wen:
Intelligent analysis of android application privacy policy and permission consistency. Artif. Intell. Rev. 57(7): 172 (2024) - [j53]Yu Zhang, Bei Gong, Qian Wang:
BLS-identification: A device fingerprint classification mechanism based on broad learning for Internet of Things. Digit. Commun. Networks 10(3): 728-739 (2024) - [j52]Bian Ma, Lijuan Duan, Zhaoyang Huang, Yuanhua Qiao, Bei Gong:
A federated semi-supervised automatic sleep staging method based on relationship knowledge sharing. Expert Syst. Appl. 237(Part A): 121427 (2024) - [j51]Jiangjiang Zhang, Bei Gong, Qian Wang, Yong Wu, Guiping Zheng:
An Intelligent Edge Dual-Structure Ensemble Method for Data Stream Detection and Releasing. IEEE Internet Things J. 11(1): 863-879 (2024) - [j50]Kai Zhang, Minjun Deng, Bei Gong, Yinbin Miao, Jianting Ning:
Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT. IEEE Internet Things J. 11(2): 3484-3496 (2024) - [j49]Deshuai Yin, Bei Gong:
A Lightweight Certificateless Mutual Authentication Scheme Based on Signatures for IIoT. IEEE Internet Things J. 11(16): 26852-26865 (2024) - [j48]Lei Chen, Chong Guo, Bei Gong, Muhammad Waqas, Lihua Deng, Haowen Qin:
A secure cross-domain authentication scheme based on threshold signature for MEC. J. Cloud Comput. 13(1): 70 (2024) - [j47]Fangtian Zhong, Xiuzhen Cheng, Dongxiao Yu, Bei Gong, Shuaiwen Song, Jiguo Yu:
MalFox: Camouflaged Adversarial Malware Example Generation Based on Conv-GANs Against Black-Box Detectors. IEEE Trans. Computers 73(4): 980-993 (2024) - [j46]Bei Gong, Chong Guo, Chong Guo, Chen Guo, Yao Sun, Muhammad Waqas, Sheng Chen:
SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT. IEEE Trans. Inf. Forensics Secur. 19: 1299-1312 (2024) - [j45]Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lyu:
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 23(5): 6133-6148 (2024) - [j44]Yinghong Yang, Fenhua Bai, Zhuo Yu, Tao Shen, Yingli Liu, Bei Gong:
An Anonymous and Supervisory Cross-chain Privacy Protection Protocol for Zero-trust IoT Application. ACM Trans. Sens. Networks 20(2): 32:1-32:20 (2024) - [j43]Siben Tian, Fenhua Bai, Tao Shen, Chi Zhang, Bei Gong:
VSSB-Raft: A Secure and Efficient Zero Trust Consensus Algorithm for Blockchain. ACM Trans. Sens. Networks 20(2): 34:1-34:22 (2024) - [j42]Fenhua Bai, Tao Shen, Zhuo Yu, Jian Song, Bei Gong, Muhammad Waqas, Hisham Alasmary:
Blockchain-Enhanced Time-Variant Mean Field-Optimized Dynamic Computation Sharing in Mobile Network. IEEE Trans. Wirel. Commun. 23(9): 12140-12156 (2024) - 2023
- [j41]Jianli Liu, Yu Zhang, Bei Gong:
A data compression and encryption method for green edge computing. Clust. Comput. 26(5): 3341-3359 (2023) - [j40]Zipeng Diao, Qian Wang, Bei Gong:
MSKNP: Multistage Key Negotiation Protocol for IoT-Blockchain Environment. IEEE Internet Things J. 10(14): 11975-11984 (2023) - [j39]Bei Gong, Guiping Zheng, Muhammad Waqas, Shanshan Tu, Sheng Chen:
LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things. IEEE Internet Things J. 10(14): 12590-12602 (2023) - [j38]Kuo Zhou, Jing Huang, Honggui Han, Bei Gong, Ao Xiong, Wei Wang, Qihui Wu:
Smart contracts vulnerability detection model based on adversarial multi-task learning. J. Inf. Secur. Appl. 77: 103555 (2023) - [j37]Bei Gong, Chong Guo, Yi-Jing Liu, Qian Wang:
Toward Secure Data Storage in Web 3.0: Ciphertext-Policy Attribute-Based Encryption. IEEE Netw. 37(6): 42-49 (2023) - [j36]Tao Shen, Hongchao Li, Fenhua Bai, Bei Gong:
Blockchain-Assisted Integrity Attestation of Distributed Dependency IoT Services. IEEE Syst. J. 17(4): 6169-6180 (2023) - [j35]Shaoyong Guo, Keqin Zhang, Bei Gong, Liandong Chen, Yinlin Ren, Feng Qi, Xuesong Qiu:
Sandbox Computing: A Data Privacy Trusted Sharing Paradigm Via Blockchain and Federated Learning. IEEE Trans. Computers 72(3): 800-810 (2023) - [j34]Yinhao Xiao, Yizhen Jia, Qin Hu, Xiuzhen Cheng, Bei Gong, Jiguo Yu:
CommandFence: A Novel Digital-Twin-Based Preventive Framework for Securing Smart Home Systems. IEEE Trans. Dependable Secur. Comput. 20(3): 2450-2465 (2023) - [j33]Jiangjiang Zhang, Bei Gong, Muhammad Waqas, Shanshan Tu, Sheng Chen:
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security. IEEE Trans. Intell. Transp. Syst. 24(12): 15051-15065 (2023) - [j32]Honglu Jiang, Jian Pei, Dongxiao Yu, Jiguo Yu, Bei Gong, Xiuzhen Cheng:
Applications of Differential Privacy in Social Network Analysis: A Survey. IEEE Trans. Knowl. Data Eng. 35(1): 108-127 (2023) - [j31]Jiangjiang Zhang, Bei Gong, Muhammad Waqas, Shanshan Tu, Zhu Han:
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks. IEEE Trans. Serv. Comput. 16(5): 3101-3114 (2023) - [c9]Zipeng Diao, Bei Gong, Haotian Zhu, Yong Wu:
A Trusted Routing Schemes for IoT. ICCCS 2023: 298-303 - [c8]Mengjie Cao, Qian Wang, Xiaojiang Du, Juan Fang, Bei Gong, Mohsen Guizani:
A Fine-Grained Cross-Chain Spectrum Sharing Mechanism Based on Oracle. GLOBECOM 2023: 5427-5432 - 2022
- [j30]Rui Mu, Bei Gong, Zhenhu Ning, Jiangjiang Zhang, Yang Cao, Zheng Li, Wei Wang, Xiaoping Wang:
An identity privacy scheme for blockchain-based on edge computing. Concurr. Comput. Pract. Exp. 34(1) (2022) - [j29]Bei Gong, Yong Wu, Qian Wang, Yuheng Ren, Chong Guo:
A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things. Future Gener. Comput. Syst. 127: 23-30 (2022) - [j28]Bei Gong, Chi Cui, Mingsheng Hu, Chong Guo, Xiaochong Li, Yuheng Ren:
Anonymous Traceability protocol based on Group Signature for Blockchain. Future Gener. Comput. Syst. 127: 160-167 (2022) - [j27]Jianli Liu, Bei Gong, Qian Wang:
A trusted proof mechanism of data source for smart city. Future Gener. Comput. Syst. 128: 349-364 (2022) - [j26]Fenhua Bai, Tao Shen, Zhuo Yu, Kai Zeng, Bei Gong:
Trustworthy Blockchain-Empowered Collaborative Edge Computing-as-a-Service Scheduling and Data Sharing in the IIoE. IEEE Internet Things J. 9(16): 14752-14766 (2022) - [j25]Pengge Chen, Fenhua Bai, Tao Shen, Bei Gong, Lei Zhang, Lin Huang, Zhengyuan An, Talha Mir, Shanshan Tu, Muhammad Waqas:
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing. Peer-to-Peer Netw. Appl. 15(4): 1964-1978 (2022) - [j24]Honglu Jiang, Jiguo Yu, Xiuzhen Cheng, Cheng Zhang, Bei Gong, Haotian Yu:
Structure-Attribute-Based Social Network Deanonymization With Spectral Graph Partitioning. IEEE Trans. Comput. Soc. Syst. 9(3): 902-913 (2022) - [c7]Jiazheng Zhang, Fenhua Bai, Tao Shen, Bei Gong, Jianzhao Luo:
Trusted Blockchain-based Data Fingerprinting Differential-Traceability and SkipList Indexing Methods in Privacy Protection. BIOTC 2022: 73-83 - [c6]Miao He, Fenhua Bai, Chi Zhang, Tao Shen, Bei Gong:
A Blockchain-Enabled Location Privacy-preserving under Local Differential Privacy for Internet of Vehicles. BIOTC 2022: 84-91 - [c5]Bei Gong, Zhenhu Ning, Junmiao Liang, Shanshan Tu:
Fast identification method of malicious code based on extreme learning machine. ICSCA 2022: 55-60 - [c4]Bei Gong, Zhenhu Ning, Wenjing Li, Shanshan Tu:
Consensus Algorithm Based on Subject Credit. ICSCA 2022: 108-115 - [c3]Bei Gong, Zhenhu Ning, Yi Zhu, Shanshan Tu:
Character-level domain name generation algorithm based on ED-GAN. ICSCA 2022: 198-205 - 2021
- [j23]Shaoyong Guo, Keqin Zhang, Bei Gong, Wenchen He, Xuesong Qiu:
A delay-sensitive resource allocation algorithm for container cluster in edge computing environment. Comput. Commun. 170: 144-150 (2021) - [j22]Zhenhu Ning, Bei Gong, Meng Xu, Caiqiu Zhou:
Trusted data collection for Internet of Things. Concurr. Comput. Pract. Exp. 33(10) (2021) - [j21]Bei Gong, Xinyi Zhang, Yang Cao, Zheng Li, Jia Yang, Wei Wang:
A threshold group signature scheme suitable for the Internet of Things. Concurr. Comput. Pract. Exp. 33(13) (2021) - [j20]Chong Guo, Bei Gong:
Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT. EURASIP J. Wirel. Commun. Netw. 2021(1): 82 (2021) - [j19]Jinghan Chen, Bei Gong, Yubo Wang, Yu Zhang:
Construction of Internet of things trusted group based on multidimensional attribute trust model. Int. J. Distributed Sens. Networks 17(1): 155014772198988 (2021) - [j18]Junxi Zhuang, Xu Zhao, Bei Gong, Jing Zhan:
A trusted behaviour measurement scheme based on feedback and control in trusted network. Int. J. Wirel. Mob. Comput. 20(2): 99-106 (2021) - [j17]Shuzhen Chen, Youming Tao, Dongxiao Yu, Feng Li, Bei Gong, Xiuzhen Cheng:
Privacy-Preserving Collaborative Learning for Multiarmed Bandits in IoT. IEEE Internet Things J. 8(5): 3276-3286 (2021) - [j16]Dongxiao Yu, Yifei Zou, Minghui Xu, Yicheng Xu, Yong Zhang, Bei Gong, Xiaoshuang Xing:
Competitive Age of Information in Dynamic IoT Networks. IEEE Internet Things J. 8(20): 15160-15169 (2021) - [j15]Bei Gong, Jianli Liu, Shaoyong Guo:
A Trusted Attestation Scheme for Data Source of Internet of Things in Smart City Based on Dynamic Trust Classification. IEEE Internet Things J. 8(21): 16121-16141 (2021) - [j14]Peng Hu, Yongli Wang, Ahmadreza Vajdi, Bei Gong, Yongjian Wang:
Secure Multi-Subinterval Data Aggregation Scheme with Interval Privacy Preservation for Vehicle Sensing Systems. J. Circuits Syst. Comput. 30(16): 2150286:1-2150286:22 (2021) - [j13]Shuzhen Chen, Youming Tao, Dongxiao Yu, Feng Li, Bei Gong:
Distributed learning dynamics of Multi-Armed Bandits for edge intelligence. J. Syst. Archit. 114: 101919 (2021) - [j12]Bei Gong, Jingxuan Zhu, Yubo Wang:
Construction of Trusted Routing Based on Trust Computation. Wirel. Commun. Mob. Comput. 2021: 6657580:1-6657580:10 (2021) - [j11]Guiping Zheng, Bei Gong, Yu Zhang:
Dynamic Network Security Mechanism Based on Trust Management in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2021: 6667100:1-6667100:10 (2021) - 2020
- [j10]Quan Liu, Bei Gong, Zhenhu Ning:
Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment. Comput. Commun. 157: 410-416 (2020) - [j9]Siya Xu, Qingchuan Liu, Bei Gong, Feng Qi, Shaoyong Guo, Xuesong Qiu, Chao Yang:
RJCC: Reinforcement-Learning-Based Joint Communicational-and-Computational Resource Allocation Mechanism for Smart City IoT. IEEE Internet Things J. 7(9): 8059-8076 (2020) - [j8]Yizhen Jia, Fangtian Zhong, Arwa Alrawais, Bei Gong, Xiuzhen Cheng:
FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks. IEEE Internet Things J. 7(10): 9552-9562 (2020) - [j7]Peng Hu, Yongli Wang, Gang Xiao, Junlong Zhou, Bei Gong, Yongjian Wang:
An efficient privacy-preserving data query and dissemination scheme in vehicular cloud. Pervasive Mob. Comput. 65: 101152 (2020) - [j6]Peng Hu, Yongli Wang, Bei Gong, Yongjian Wang, Yanchao Li, Ruxin Zhao, Hao Li, Bo Li:
A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. Peer-to-Peer Netw. Appl. 13(3): 1002-1013 (2020) - [j5]Qian Wang, Juan Fang, Bei Gong, Xiaojiang Du, Mohsen Guizani:
An Intelligent Data Uploading Selection Mechanism for Offloading Uplink Traffic of Cellular Networks. Sensors 20(21): 6287 (2020) - [c2]Zhibo Wang, Wei Ma, Bei Gong:
An Attack Scheme of RSA Encryption System with Protocol Failure. SmartBlock 2020: 87-91 - [c1]Yifei Zou, Minghui Xu, Yicheng Xu, Yong Zhang, Bei Gong, Xiaoshuang Xing:
Distributed Data Aggregation in Dynamic Sensor Networks. WASA (1) 2020: 822-833 - [i3]Honglu Jiang, Jian Pei, Dongxiao Yu, Jiguo Yu, Bei Gong, Xiuzhen Cheng:
Differential Privacy and Its Applications in Social Network Analysis: A Survey. CoRR abs/2010.02973 (2020) - [i2]Fangtian Zhong, Xiuzhen Cheng, Dongxiao Yu, Bei Gong, Shuaiwen Song, Jiguo Yu:
MalFox: Camouflaged Adversarial Malware Example Generation Based on C-GANs Against Black-Box Detectors. CoRR abs/2011.01509 (2020) - [i1]Chun-Chi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lv:
Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things. CoRR abs/2011.04919 (2020)
2010 – 2019
- 2019
- [j4]Meng Wang, Chuangbai Xiao, Zhen-Hu Ning, Tong Li, Bei Gong:
Neural Networks for Compressed Sensing Based on Information Geometry. Circuits Syst. Signal Process. 38(2): 569-589 (2019) - 2018
- [j3]Bei Gong, Yu Zhang, Yubo Wang:
A remote attestation mechanism for the sensing layer nodes of the Internet of Things. Future Gener. Comput. Syst. 78: 867-886 (2018) - [j2]Cai-Qiu Zhou, Yuwang Yang, Bei Gong, Mengkun Li, Jin Li, Renqiang Wen:
The Model Design of Mobile Resource Scheduling in Large Scale Activities. Mob. Networks Appl. 23(3): 382-394 (2018) - 2011
- [j1]Zhi-Hua Zhang, Si-Rong Zhang, Wen-Jin Yu, Jianjun Li, Bei Gong, Wei Jiang:
A Threshold Signature Scheme Based on TPM. Int. J. Commun. Netw. Syst. Sci. 4(10): 622-625 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint