default search action
Bidi Ying
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Dongxiao Liu, Cheng Huang, Liang Xue, Weihua Zhuang, Xuemin Shen, Bidi Ying:
Collaborative and Verifiable VNF Management for Metaverse With Efficient Modular Designs. IEEE J. Sel. Areas Commun. 42(3): 616-628 (2024) - [j18]Jiahui Hou, Dongxiao Liu, Cheng Huang, Weihua Zhuang, Xuemin Shen, Rob Sun, Bidi Ying:
Data Protection: Privacy-Preserving Data Collection With Validation. IEEE Trans. Dependable Secur. Comput. 21(4): 3422-3438 (2024) - 2022
- [j17]Cheng Huang, Liang Xue, Dongxiao Liu, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Blockchain-Assisted Transparent Cross-Domain Authorization and Authentication for Smart City. IEEE Internet Things J. 9(18): 17194-17209 (2022) - [j16]Liang Xue, Dongxiao Liu, Cheng Huang, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Blockchain-Based Data Sharing With Key Update for Future Networks. IEEE J. Sel. Areas Commun. 40(12): 3437-3451 (2022) - [j15]Dongxiao Liu, Cheng Huang, Liang Xue, Jiahui Hou, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Authenticated and Prunable Dictionary for Blockchain-Based VNF Management. IEEE Trans. Wirel. Commun. 21(11): 9312-9324 (2022) - [c20]Liang Xue, Dongxiao Liu, Cheng Huang, Xuemin Sherman Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Secure and Flexible Data Sharing for Distributed Storage with Efficient Key Management. ICC 2022: 4408-4413 - 2021
- [j14]Xuemin Sherman Shen, Cheng Huang, Dongxiao Liu, Liang Xue, Weihua Zhuang, Rob Sun, Bidi Ying:
Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation. IEEE Netw. 35(1): 8-15 (2021) - [j13]Bidi Ying, Nada Radwan Mohsen, Amiya Nayak:
Efficient Authentication Protocol for Continuous Monitoring in Medical Sensor Networks. IEEE Open J. Comput. Soc. 2: 130-138 (2021) - [c19]Yuxin Xu, Bidi Ying:
Proof of Freezing Time Algorithm Based on IOTA with Hierarchical Structure. ICCT 2021: 765-769 - [c18]Shumeng Zhou, Bidi Ying:
VG-Raft: An Improved Byzantine Fault Tolerant Algorithm Based on Raft Algorithm. ICCT 2021: 882-886
2010 – 2019
- 2019
- [j12]Bidi Ying, Kai Xu, Amiya Nayak:
Fair and Social-Aware Message Forwarding Method in Opportunistic Social Networks. IEEE Commun. Lett. 23(4): 720-723 (2019) - [j11]Bidi Ying, Amiya Nayak:
Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography. J. Netw. Comput. Appl. 131: 66-74 (2019) - [j10]Bidi Ying, Amiya Nayak:
A Distributed Social-Aware Location Protection Method in Untrusted Vehicular Social Networks. IEEE Trans. Veh. Technol. 68(6): 6114-6124 (2019) - [c17]Bidi Ying, Amiya Nayak:
Location Privacy Protection Method Based on a Proxy in Un-Trusted Mobile Social Networks. DASC/PiCom/DataCom/CyberSciTech 2019: 295-300 - [c16]Bidi Ying, Nada Radwan Mohsen, Amiya Nayak:
Privacy Protection for E-Health Systems using Three-Factor User Authentication. ICC 2019: 1-6 - [c15]Nada Radwan Mohsen, Bidi Ying, Amiya Nayak:
Authentication Protocol for Real-Time Wearable Medical Sensor Networks Using Biometrics and Continuous Monitoring. iThings/GreenCom/CPSCom/SmartData 2019: 1199-1206 - [c14]Bidi Ying, Wen Sun, Nada Radwan Mohsen, Amiya Nayak:
A Secure Blockchain-based Prescription Drug Supply in Health-care Systems. SmartNets 2019: 1-6 - 2018
- [j9]Bidi Ying, Amiya Nayak:
A Power-Efficient and Social-Aware Relay Selection Method for Multi-Hop D2D Communications. IEEE Commun. Lett. 22(7): 1450-1453 (2018) - [c13]Rui Huang, Yichao Lin, Bidi Ying, Amiya Nayak:
ACP: An Efficient User Location Privacy Preserving Protocol for Opportunistic Mobile Social Networks. COMPSAC (1) 2018: 610-619 - [c12]Rui Huang, Bidi Ying, Amiya Nayak:
Protecting location privacy in opportunistic mobile social networks. NOMS 2018: 1-8 - 2017
- [j8]Yuanping Zou, Bidi Ying, Dimitrios Makrakis:
FMSLPP: fake-message based sink location privacy preservation for WSNs against global eavesdroppers. Int. J. Parallel Emergent Distributed Syst. 32(6): 572-592 (2017) - [j7]Bidi Ying, Amiya Nayak:
Anonymous and Lightweight Authentication for Secure Vehicular Networks. IEEE Trans. Veh. Technol. 66(12): 10626-10636 (2017) - [c11]Bidi Ying, Amiya Nayak:
Location privacy-protection based on p-destination in mobile social networks: A game theory analysis. DSC 2017: 243-250 - [c10]Bidi Ying, Amiya Nayak:
Social Location privacy Protection method in vehicular social networks. ICC Workshops 2017: 1288-1292 - 2015
- [j6]Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:
Sink Privacy Protection with Minimum Network Traffic in WSNs. Ad Hoc Sens. Wirel. Networks 25(1-2): 69-87 (2015) - [j5]Bidi Ying, Dimitrios Makrakis:
Protecting location privacy in vehicular networks against location-based attacks. Int. J. Parallel Emergent Distributed Syst. 30(2): 101-117 (2015) - [j4]Bidi Ying, Dimitrios Makrakis, Zhengzhou Hou:
Motivation for Protecting Selfish Vehicles' Location Privacy in Vehicular Networks. IEEE Trans. Veh. Technol. 64(12): 5631-5641 (2015) - [c9]Bidi Ying, Dimitrios Makrakis:
Reputation-based Pseudonym Change for Location Privacy in vehicular networks. ICC 2015: 7041-7046 - [c8]Bidi Ying, Dimitrios Makrakis:
Pseudonym Changes scheme based on Candidate-location-list in vehicular networks. ICC 2015: 7292-7297 - 2014
- [j3]Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:
Anti-traffic analysis attack for location privacy in WSNs. EURASIP J. Wirel. Commun. Netw. 2014: 131 (2014) - [c7]Bidi Ying, Dimitrios Makrakis:
Protecting Location Privacy with Clustering Anonymization in vehicular networks. INFOCOM Workshops 2014: 305-310 - [c6]Bidi Ying, Amiya Nayak:
Efficient Authentication Protocol for Secure Vehicular Communications. VTC Spring 2014: 1-5 - 2013
- [j2]Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:
Dynamic Mix-Zone for Location Privacy in Vehicular Networks. IEEE Commun. Lett. 17(8): 1524-1527 (2013) - [j1]Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:
Privacy preserving broadcast message authentication protocol for VANETs. J. Netw. Comput. Appl. 36(5): 1352-1364 (2013) - 2011
- [c5]Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:
A Protocol for Sink Location Privacy Protection in Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c4]Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah, Wenjun Lu:
Dynamic Combinatorial Key Pre-distribution Scheme for Heterogeneous Sensor Networks. STA 2011: 88-95 - [c3]Mohamed Helmy Megahed, Dimitrios Makrakis, Bidi Ying:
SurvSec: A New Security Architecture for Reliable Network Recovery from Base Station Failure of Surveillance WSN. ANT/MobiWIS 2011: 141-148 - 2010
- [c2]Bidi Ying, Dimitrios Makrakis, Hussein T. Mouftah:
Pre-broadcast based time efficient privacy protocol for secure vehicular communications. WiMob 2010: 607-613
2000 – 2009
- 2006
- [c1]Bidi Ying, Huifang Chen, Wendao Zhao, Peiliang Qiu:
Energy-Based Key Management Scheme in Wireless Sensor Networks. ICICIC (3) 2006: 267-270
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint