Searched for: +
(1 - 7 of 7)
document
Li, H. (author)
Electronic devices have permeated into all aspects of our lives, from basic smart cards to sophisticated hybrid automobile systems. These devices comprise a range of products like sensors, wearable gadgets, mobile phones, personal computers, and others, playing vital roles in many applications and enabling the Internet of Things (IoT). However,...
doctoral thesis 2024
document
Wei, Xiaoguang (author), Liu, Y. (author), Shi, Jian (author), Gao, Shibin (author), Li, Xingpeng (author), Han, Zhu (author)
This article offers a novel perspective on identifying the critical branches under load redistribution (LR) attacks. Compared to the existing literature that is largely disruption-driven and based on dc state estimation, we propose to address the threat from LR attacks on a more fundamental level by modeling and analyzing the circulation of...
journal article 2023
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
Li, Meng (author), Gao, Jianbo (author), Zhang, Zijian (author), Fu, Chaoping (author), Lal, C. (author), Conti, M. (author)
Shortest distance queries over large-scale graphs bring great benefits to various applications, i.e., save planning time and travelling expenses. To protect the sensitive nodes and edges in the graph, a user outsources an encrypted graph to an untrusted server without losing the query ability. However, no prior work has considered the user...
conference paper 2022
document
Li, Jie (author), Goerlandt, Floris (author), van Nunen, K.L.L. (author), Reniers, G.L.L.M.E. (author)
Safety and security are often considered in complimentary or opposing terms. Discussions on their conceptual meaning have been put forward, and calls for an increased integration of these domains have been made. Nevertheless, there is currently no high-level empirical comparison of the development and contents of these research domains. In this...
journal article 2021
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
E-commerce platforms incorporate reputation systems that allow customers to rate suppliers following financial transactions. Existing reputation systems cannot defend the centralized server against arbitrarily tampering with the supplier’s reputation. Furthermore, they do not offer reputation access across platforms. Rates are faced with privacy...
journal article 2021
document
Li, Wenting (author), Cheng, Haibo (author), Wang, Ping (author), Liang, K. (author)
Multi-factor authentication (MFA) has been widely used to safeguard high-value assets. Unlike single-factor authentication (e.g., password-only login), t-factor authentication (tFA) requires a user always to carry and present t specified factors so as to strengthen the security of login. Nevertheless, this may restrict user experience in...
journal article 2021
Searched for: +
(1 - 7 of 7)