default search action
Guishan Dong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Jinhui Liu, Bo Tang, Guishan Dong, Yong Yu:
iPMRSS: An Improved privacy-preserving medical record searching scheme for intelligent diagnosis in IoMT. Expert Syst. Appl. 239: 122230 (2024) - 2023
- [j8]Yuxiang Chen, Guishan Dong, Chunxiang Xu, Yao Hao, Yue Zhao:
EStore: A User-Friendly Encrypted Storage Scheme for Distributed File Systems. Sensors 23(20): 8526 (2023) - [c13]Hanwen Zhang, Gang Wen, Dong Liu, Guishan Dong:
A Dynamic Access Control Method Based on User Behavior Trust Evaluation in Edge Cloud Environment. AIBDF 2023: 92-97 - 2022
- [j7]Hanxiao Chen, Hongwei Li, Guishan Dong, Meng Hao, Guowen Xu, Xiaoming Huang, Zhe Liu:
Practical Membership Inference Attack Against Collaborative Inference in Industrial IoT. IEEE Trans. Ind. Informatics 18(1): 477-487 (2022) - 2021
- [j6]Xuewen Mu, Guishan Dong:
A projection and contraction method for circular cone programming support vector machines. Int. J. Mach. Learn. Cybern. 12(9): 2733-2746 (2021) - [c12]Zhaolei Zhang, Jian Xu, Guishan Dong, Junyan Lin:
Application and Challenges of Blockchain in Heterogeneous Identity Trust. BlockSys 2021: 163-168 - [c11]Yun Zhang, Hongwei Li, Guowen Xu, Xizhao Luo, Guishan Dong:
Generating Audio Adversarial Examples with Ensemble Substituted Models. ICC 2021: 1-6 - [c10]Yachen He, Guishan Dong, Dong Liu, Haiyang Peng, Yuxiang Chen:
Access Control Scheme Supporting Attribute Revocation in Cloud Computing. NaNA 2021: 379-384 - 2020
- [j5]Guishan Dong, Xuewen Mu:
A novel second-order cone programming support vector machine model for binary data classification. J. Intell. Fuzzy Syst. 39(3): 4505-4513 (2020) - [c9]Guishan Dong, Yuxiang Chen, Yao Hao, Jian Bai, Zhaolei Zhang, Sijie Liao:
A Unified Trust Service Scheme for Heterogeneous Identity Alliance. NaNA 2020: 167-173 - [c8]Haiyang Peng, Guishan Dong, Yao Hao, Yue Zhao, Yuxiang Chen:
Searchable encryption scheme with limited search scope for group users. NaNA 2020: 430-435
2010 – 2019
- 2019
- [j4]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. Future Gener. Comput. Syst. 96: 185-195 (2019) - [j3]Guishan Dong, Yuxiang Chen, Jia Fan, Yao Hao, Feng Li:
区块链应用中的隐私保护策略研究 (Research on Privacy Protection Strategies in Blockchain Application). 计算机科学 46(5): 29-35 (2019) - [c7]Guishan Dong, Yuxiang Chen, Jia Fan, Jian Bai, Peng Zhang, Feng Li:
Anonymous cross-domain authentication scheme for medical PKI system. ACM TUR-C 2019: 68:1-68:7 - [c6]Yuxiang Chen, Guishan Dong, Jian Bai, Yao Hao, Feng Li, Haiyang Peng:
Trust Enhancement Scheme for Cross Domain Authentication of PKI System. CyberC 2019: 103-110 - [c5]Yuxiang Chen, Guishan Dong, Yao Hao, Zhaolei Zhang, Haiyang Peng, Shui Yu:
An Open Identity Authentication Scheme Based on Blockchain. ICA3PP (1) 2019: 421-438 - [c4]Guishan Dong, Yuxiang Chen, Yao Hao, Zhaolei Zhang, Peng Zhang, Shui Yu:
Tiger Tally: Cross-Domain Scheme for Different Authentication Mechanism. ICA3PP (1) 2019: 533-549 - 2018
- [j2]Jianbin Gao, Kwame Omono Asamoah, Emmanuel Boateng Sifah, Abla Smahi, Qi Xia, Hu Xia, Xiaosong Zhang, Guishan Dong:
GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid. IEEE Access 6: 9917-9925 (2018) - [j1]Guishan Dong, Yuxiang Chen, Zhaolei Zhang, Jian Bai, Yao Hao:
基于区块链的身份管理认证研究 (Research on Identity Management Authentication Based on Blockchain). 计算机科学 45(11): 52-59 (2018) - [c3]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI. GLOBECOM 2018: 1-6 - [c2]Guishan Dong, Yuxiang Chen, Jia Fan, Dijun Liu, Yao Hao, Zhen Wang:
A Privacy-User-Friendly Scheme for Wearable Smart Sensing Devices Based on Blockchain. MASS 2018: 481-486
2000 – 2009
- 2007
- [c1]Guishan Dong, Xin Li, Xianliang Lu:
A MLS Cooperation System Based on Virtual Machine Monitor. Security and Management 2007: 580-584
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint