default search action
Pengtao Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Guiyun Qin, Limin Li, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Blockchain-based secure deduplication of encrypted data supporting client-side semantically secure encryption without trusted third party. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j23]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Controlled Search: Building Inverted-Index PEKS With Less Leakage in Multiuser Setting. IEEE Internet Things J. 11(1): 403-417 (2024) - [j22]Pengtao Liu, Kang An, Jing Lei, Yifu Sun, Wei Liu, Symeon Chatzinotas:
Grant-Free SCMA Enhanced Mobile Edge Computing: Protocol Design and Performance Analysis. IEEE Internet Things J. 11(15): 25895-25909 (2024) - [j21]Pengtao Liu, Kang An, Jing Lei, Yifu Sun, Wei Liu, Symeon Chatzinotas:
Computation Rate Maximization for SCMA-Aided Edge Computing in IoT Networks: A Multi-Agent Reinforcement Learning Approach. IEEE Trans. Wirel. Commun. 23(8): 10414-10429 (2024) - [c13]Pengtao Liu, Jing Lei, Haotong Cao, Sahil Garg, Kuljeet Kaur, Georges Kaddoum:
A Stochastic Geometry Model and Analysis Scheme for SCMA Aided Mobile Edge Computing. WCNC 2024: 1-6 - 2023
- [j20]Guiyun Qin, Pengtao Liu, Chengyu Hu, Zengpeng Li, Shanqing Guo:
Retrieval Transformation: Dynamic Searchable Symmetric Encryption With Strong Security. IEEE Syst. J. 17(4): 5519-5530 (2023) - [j19]Pengtao Liu, Kang An, Jing Lei, Wei Liu, Yifu Sun, Gan Zheng, Symeon Chatzinotas:
SCMA-Enabled Multi-Cell Edge Computing Networks: Design and Optimization. IEEE Trans. Veh. Technol. 72(6): 7987-8003 (2023) - [c12]Pengtao Liu, Jing Lei, Wei Liu:
Learning-Based Latency and Energy Optimization in SCMA-Enhanced UAV-MEC Networks. ICCC 2023: 1-6 - 2022
- [j18]Junjie Jia, Pengtao Liu, Xiaojin Du, Yewang Yao, Zhipeng Lei:
The overlapping community discovery algorithm based on the local interaction model. Intell. Data Anal. 26(1): 153-171 (2022) - [j17]Pengtao Liu, Kang An, Jing Lei, Gan Zheng, Yifu Sun, Wei Liu:
SCMA-Based Multiaccess Edge Computing in IoT Systems: An Energy-Efficiency and Latency Tradeoff. IEEE Internet Things J. 9(7): 4849-4862 (2022) - [j16]Yifu Sun, Yonggang Zhu, Kang An, Gan Zheng, Symeon Chatzinotas, Kai-Kit Wong, Pengtao Liu:
Robust Design for RIS-Assisted Anti-Jamming Communications With Imperfect Angular Information: A Game-Theoretic Perspective. IEEE Trans. Veh. Technol. 71(7): 7967-7972 (2022) - [j15]Yifu Sun, Kang An, Yonggang Zhu, Gan Zheng, Kai-Kit Wong, Symeon Chatzinotas, Haifan Yin, Pengtao Liu:
RIS-Assisted Robust Hybrid Beamforming Against Simultaneous Jamming and Eavesdropping Attacks. IEEE Trans. Wirel. Commun. 21(11): 9212-9231 (2022) - [c11]Pengtao Liu, Jing Lei, Wei Liu:
A Deep Reinforcement Learning Scheme for SCMA-Based Edge Computing in IoT Networks. GLOBECOM 2022: 5044-5049 - [c10]Limin Li, Guiyun Qin, Pengtao Liu, Chengyu Hu, Shanqing Guo:
Secure and Efficient Cloud Ciphertext Deduplication Based on SGX. ICPADS 2022: 696-703 - 2021
- [j14]Chengyu Hu, Zhen Li, Pengtao Liu, Rupeng Yang, Shanqing Guo, Hailong Zhang:
Verifiable Public-Key Encryption with Keyword Search Secure against Continual Memory Attacks. Mob. Networks Appl. 26(6): 2490-2500 (2021) - [j13]Junjie Jia, Yewang Yao, Zhipeng Lei, Pengtao Liu:
Dynamic Group Recommendation Algorithm Based on Member Activity Level. Sci. Program. 2021: 1969118:1-1969118:18 (2021) - [c9]Pengtao Liu, Jing Lei, Wei Liu:
An Optimization Scheme for SCMA-Based Multi-Access Edge Computing. VTC Spring 2021: 1-6 - [c8]Pengtao Liu, Jin Qi, Bin Xu, Yanfei Sun:
A Cascaded Adaboost-BP Diabetes Prediction Model. WCSP 2021: 1-6 - 2020
- [j12]Pengtao Liu:
Public-Key Encryption Secure Against Related Randomness Attacks for Improved End-to-End Security of Cloud/Edge Computing. IEEE Access 8: 16750-16759 (2020) - [j11]Chengyu Hu, Yuqin Xu, Pengtao Liu, Jia Yu, Shanqing Guo, Minghao Zhao:
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Inf. Sci. 520: 15-30 (2020)
2010 – 2019
- 2019
- [j10]Pengtao Liu, Zhipeng Pan, Jing Lei:
Parameter Identification of Reed-Solomon Codes Based on Probability Statistics and Galois Field Fourier Transform. IEEE Access 7: 33619-33630 (2019) - [j9]Chengyu Hu, Xiangfu Song, Pengtao Liu, Yue Xin, Yuqin Xu, Yuyu Duan, Rong Hao:
Forward Secure Conjunctive-Keyword Searchable Encryption. IEEE Access 7: 35035-35048 (2019) - [j8]Chengyu Hu, Pengtao Liu, Rupeng Yang, Yan Xu:
Public-Key Encryption With Keyword Search via Obfuscation. IEEE Access 7: 37394-37405 (2019) - [j7]Chengyu Hu, Rupeng Yang, Pengtao Liu, Tong Li, Fanyu Kong:
A countermeasure against cryptographic key leakage in cloud: public-key encryption with continuous leakage and tampering resilience. J. Supercomput. 75(6): 3099-3122 (2019) - [c7]Pengtao Liu:
A Standard Model Secure Verifiably Encrypted Signature Scheme Based on Dual System. CSS (2) 2019: 242-252 - 2017
- [j6]Chengyu Hu, Pengtao Liu, Shanqing Guo, Qiuliang Xu:
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application. Int. J. High Perform. Comput. Netw. 10(3): 226-239 (2017) - 2016
- [j5]Chengyu Hu, Pengtao Liu, Shanqing Guo:
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs. J. Ambient Intell. Humaniz. Comput. 7(5): 681-692 (2016) - [j4]Chengyu Hu, Rupeng Yang, Pengtao Liu, Zuoxia Yu, Yongbin Zhou, Qiuliang Xu:
Public-key encryption with keyword search secure against continual memory attacks. Secur. Commun. Networks 9(11): 1613-1629 (2016) - [j3]Chengyu Hu, Pengtao Liu, Yongbin Zhou, Shanqing Guo, Yilei Wang, Qiuliang Xu:
Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks. Soft Comput. 20(12): 4919-4932 (2016) - 2015
- [j2]Chengyu Hu, Bo Yang, Pengtao Liu:
Multi-keyword ranked searchable public-key encryption. Int. J. Grid Util. Comput. 6(3/4): 221-231 (2015) - [c6]Pengtao Liu, Chengyu Hu, Shanqing Guo, Yilei Wang:
Anonymous Identity-Based Encryption with Bounded Leakage Resilience. AINA Workshops 2015: 287-292 - 2013
- [c5]Chengyu Hu, Pengtao Liu:
Public Key Encryption with Ranked Multi-keyword Search. INCoS 2013: 109-113 - 2012
- [j1]Chengyu Hu, Pengtao Liu:
An Enhanced Searchable Public Key Encryption Scheme with a Designated Tester and Its Extensions. J. Comput. 7(3): 716-723 (2012) - 2011
- [c4]Chengyu Hu, Pengtao Liu:
A Secure Searchable Public Key Encryption Scheme with a Designated Tester against Keyword Guessing Attacks and Its Extension. CSEE (2) 2011: 131-136
2000 – 2009
- 2009
- [c3]Chengyu Hu, Pengtao Liu:
A New ID-Based Deniable Ring Authentication with Constant-Size Signature. BMEI 2009: 1-4 - [c2]Chengyu Hu, Pengtao Liu, Guoyan Zhang:
Nominative Proxy Ring Signature. SNPD 2009: 225-228 - 2007
- [c1]Chengyu Hu, Pengtao Liu, Daxing Li:
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity and No Info Leaked. MCAM 2007: 262-266
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 01:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint