default search action
Tao Feng 0007
Person information
- affiliation: Lanzhou University of Technology, School of Computer and Communication, China
Other persons with the same name
- Tao Feng — disambiguation page
- Tao Feng 0001 — Zhejiang University, School of Mathematical Sciences, China (and 3 more)
- Tao Feng 0002 — Beijing Jiaotong University, Institute of Mathematics, Beijing, China
- Tao Feng 0003 — Nanjing University of Science and Technology, Department of Applied Mathematics, China (and 1 more)
- Tao Feng 0004 — UIH America, Inc., Houston, TX, USA
- Tao Feng 0005 — University of Science and Technology Beijing, School of Automation and Electrical Engineering, China
- Tao Feng 0006 — Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China (and 1 more)
- Tao Feng 0008 — Eindhoven University of Technology, Urban Planning and Transportation Group, Netherlands (and 1 more)
- Tao Feng 0009 — North China Electric Power University, State Key Laboratory of Alternative Electrical Power System With Renewable Energy Sources, Beijing, China
- Tao Feng 0010 — Hebei University of Science and Technology, College of Science, Shijiazhuang, China (and 1 more)
- Tao Feng 0011 — University of Houston, Department of Computer Science, TX, USA
- Tao Feng 0012 — Cadence Design Systems, Inc., USA (and 1 more)
- Tao Feng 0013 — Monash University, Melbourne, VIC, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Xian Guo, Sarah Almadhehagi, Tao Feng, Di Zhang, Yongbo Jiang, Junli Fang:
A practical and UC-secure decentralized key management and authentication scheme based on blockchain for VNDN. Comput. Sci. Inf. Syst. 21(3): 725-757 (2024) - [j44]Tao Feng, Wentao Jin, Minghu Zhang, Lu Zheng:
Security assessment and improvement of smart grid NIKE protocol. Int. J. Inf. Sec. 23(1): 411-429 (2024) - [j43]Tao Feng, Taining Chen, Xiang Gong:
Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool. Inf. 15(2): 118 (2024) - [j42]Rong Ma, Tao Feng, Jinbo Xiong, Qi Li, Youliang Tian:
DScPA: A Dynamic Subcluster Privacy-Preserving Aggregation Scheme for Mobile Crowdsourcing in Industrial IoT. IEEE Internet Things J. 11(2): 1880-1892 (2024) - [j41]Junli Fang, Tao Feng, Xian Guo, Rong Ma, Ye Lu:
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials. J. Cloud Comput. 13(1): 30 (2024) - [j40]Chunyan Liu, Tao Feng:
Blockchain based multi-signature smart contract electronic seal orienting mobile IoT terminals. Peer Peer Netw. Appl. 17(5): 3445-3458 (2024) - [j39]Buzhen He, Tao Feng, Junli Fang, Chunyan Liu, Chunhua Su:
A Secure and Efficient Charitable Donation System Based on Ethereum Blockchain and Searchable Encryption. IEEE Trans. Consumer Electron. 70(1): 263-276 (2024) - 2023
- [j38]Xian Guo, Ying Xue, Tao Feng, Yongbo Jiang, Yan Yan:
Simulation Implementation and Verification of a Security Framework for ICS Based on SPD. Autom. Control. Comput. Sci. 57(1): 37-47 (2023) - [j37]Buzhen He, Tao Feng:
Encryption Scheme of Verifiable Search Based on Blockchain in Cloud Environment. Cryptogr. 7(2): 16 (2023) - [j36]Tao Feng, Yufeng Liu:
Research on PoW Protocol Security under Optimized Long Delay Attack. Cryptogr. 7(2): 32 (2023) - [j35]Jinze Du, Chengtai Gao, Tao Feng:
Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service. Future Internet 15(1): 24 (2023) - [j34]Tao Feng, Dewei Wang, Renbin Gong:
A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme. Inf. 14(5): 281 (2023) - [j33]Tao Feng, Chengfan Liu, Xiang Gong, Ye Lu:
Security Analysis and Enhancement of INTERBUS Protocol in ICS Based on Colored Petri Net. Inf. 14(11): 589 (2023) - [j32]Tao Feng, Bugang Zhang:
Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB. Inf. 14(12): 653 (2023) - [j31]Eyeleko Anselme Herman, Tao Feng:
A Critical Overview of Industrial Internet of Things Security and Privacy Issues Using a Layer-Based Hacking Scenario. IEEE Internet Things J. 10(24): 21917-21941 (2023) - [j30]Tao Feng, Fanqi Kong, Chunyan Liu, Ye Lu:
Multi-Authorization Attribute-Based Verifiable Encryption Scheme Based on Blockchain. Mob. Networks Appl. 28(5): 1617-1624 (2023) - [j29]Rong Ma, Tao Feng, Youliang Tian, Jinbo Xiong:
EPMA: Edge-Assisted Hierarchical Privacy-Preserving Multidimensional Data Aggregation Mechanism. Mob. Networks Appl. 28(5): 1831-1841 (2023) - [j28]Xian Guo, Hongbo Xian, Tao Feng, Yongbo Jiang, Di Zhang, Junli Fang:
An intelligent zero trust secure framework for software defined networking. PeerJ Comput. Sci. 9: e1674 (2023) - [j27]Muhammad Shoaib Akhtar, Tao Feng:
Evaluation of Machine Learning Algorithms for Malware Detection. Sensors 23(2): 946 (2023) - [j26]Tao Feng, Sirui Miao, Chunyan Liu, Rong Ma:
Verifiable Keyword Search Encryption Scheme That Supports Revocation of Attributes. Symmetry 15(4): 914 (2023) - [c5]Tao Feng, Yufeng Liu:
Optimized model analysis of blockchain PoW procotol under long delay attack. CACML 2023: 25-30 - 2022
- [j25]Tao Feng, Jiewen Si:
Certificateless Searchable Encryption Scheme in Multi-User Environment. Cryptogr. 6(4): 61 (2022) - [j24]Muhammad Shoaib Akhtar, Tao Feng:
Techniques For Reducing Energy And Delay For Data Aggregation In Wireless Sensor Networks. EAI Endorsed Trans. Creative Technol. 9(3): e4 (2022) - [j23]Muhammad Shoaib Akhtar, Tao Feng:
IOTA Based Anomaly Detection Machine learning in Mobile Sensing. EAI Endorsed Trans. Creative Technol. 9(30): e1 (2022) - [j22]Muhammad Shoaib Akhtar, Tao Feng:
An Intelligent and Secured Privacy Preserving Framework For Wireless Body Area Networks (WBANs). EAI Endorsed Trans. Creative Technol. 9(30): e5 (2022) - [j21]Muhammad Shoaib Akhtar, Tao Feng:
IoT Based Detection of Molded Bread and Expiry Prediction using Machine Learning Techniques. EAI Endorsed Trans. Creative Technol. 9(31): e1 (2022) - [j20]Muhammad Shoaib Akhtar, Tao Feng:
Using Blockchain to Ensure the Integrity of Digital Forensic Evidence in an IoT Environment. EAI Endorsed Trans. Creative Technol. 9(31): e2 (2022) - [j19]Yongbo Jiang, Yuan Zhou, Tao Feng:
A Blockchain-Based Secure Multi-Party Computation Scheme with Multi-Key Fully Homomorphic Proxy Re-Encryption. Inf. 13(10): 481 (2022) - [j18]Yongbo Jiang, Juncheng Lu, Tao Feng:
Fuzzy Keyword Searchable Encryption Scheme Based on Blockchain. Inf. 13(11): 517 (2022) - [j17]Yongbo Jiang, Gongxue Sun, Tao Feng:
Research on Data Transaction Security Based on Blockchain. Inf. 13(11): 532 (2022) - [j16]Yi Wu, Tao Feng:
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol. Sensors 22(17): 6713 (2022) - [j15]Jinze Du, Rui Tang, Tao Feng:
Security Analysis and Improvement of Vehicle Ethernet SOME/IP Protocol. Sensors 22(18): 6792 (2022) - [j14]Xiang Gong, Tao Feng:
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things. Sensors 22(19): 7191 (2022) - [j13]Muhammad Shoaib Akhtar, Tao Feng:
A Systemic Security and Privacy Review: Attacks and Prevention Mechanisms over IOT Layers. EAI Endorsed Trans. Security Safety 8(30): 5 (2022) - [j12]Muhammad Shoaib Akhtar, Tao Feng:
Comparison of Classification Model for the Detection of Cyber-attack using Ensemble Learning Models. EAI Endorsed Trans. Scalable Inf. Syst. 9(5): e6 (2022) - [j11]Muhammad Shoaib Akhtar, Tao Feng:
Malware Analysis and Detection Using Machine Learning Algorithms. Symmetry 14(11): 2304 (2022) - [j10]Muhammad Shoaib Akhtar, Tao Feng:
Detection of Malware by Deep Learning as CNN-LSTM Machine Learning Techniques in Real Time. Symmetry 14(11): 2308 (2022) - [j9]Lu Zheng, Tao Feng:
Research on a Vehicle Authentication and Key Transmission Protocol Based on CPN. Symmetry 14(11): 2398 (2022) - [c4]Rong Ma, Tao Feng, Qi Li, Jinbo Xiong:
Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT. GLOBECOM 2022: 4383-4388 - 2021
- [j8]Tao Feng, Muhammad Shoaib Akhtar, Jiayuan Zhang:
The future of Artificial Intelligence in Cybersecurity: A Comprehensive Survey. EAI Endorsed Trans. Creative Technol. 8(28): e3 (2021) - [j7]Muhammad Shoaib Akhtar, Tao Feng:
An overview of the applications of Artificial Intelligence in Cybersecurity. EAI Endorsed Trans. Creative Technol. 8(29): e4 (2021) - [j6]Junli Fang, Tao Feng:
Group signature with time-bound keys and unforgeability of expiry time for smart cities. EURASIP J. Wirel. Commun. Netw. 2021(1): 113 (2021) - [j5]Tao Feng, Xusheng Wang, Chunyan Liu, Junli Fang:
Secure Data Collaborative Computing Scheme Based on Blockchain. Secur. Commun. Networks 2021: 6630291:1-6630291:9 (2021) - [j4]Rong Ma, Tao Feng, Junli Fang:
Edge Computing Assisted an Efficient Privacy Protection Layered Data Aggregation Scheme for IIoT. Secur. Commun. Networks 2021: 7776193:1-7776193:10 (2021) - [c3]Jiayuan Zhang, Mengyue Feng, Yuhang Huang, Tao Feng, Wenjie Wang, He Wang, Han Zhang:
Survey of 3D Printer Security Offensive and Defensive. FCS 2021: 163-178
2010 – 2019
- 2019
- [j3]Tao Feng, Xiaoyu Yin, Ye Lu, Junli Fang, Fenghua Li:
A Searchable CP-ABE Privacy Preserving Scheme. Int. J. Netw. Secur. 21(4): 680-689 (2019) - [j2]Tao Feng, Xuan Chen, Chunyan Liu, Xiaoqin Feng:
Research on privacy enhancement scheme of blockchain transactions. Secur. Priv. 2(6) (2019) - [c2]Tao Feng, Ying Jiao, Junli Fang:
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper). CollaborateCom 2019: 429-438 - 2018
- [c1]Tao Feng, Xiaoyu Yin, Chunyan Liu:
An Efficient and Anonymous KP-ABE Scheme with Keyword Search. ICISA 2018: 251-258 - 2016
- [j1]Xian Guo, Tao Feng, Jun-li Fang, Jing Wang, Ye Lu:
Secure Content Delivery Scheme Based on Yaksha System for CCMANETs. J. Commun. 11(2): 221-230 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 22:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint