default search action
Cheng Huang 0001
Person information
- affiliation: University of Waterloo, Department of Electrical and Computer Engineering, Ontario, Canada
Other persons with the same name
- Cheng Huang — disambiguation page
- Cheng Huang 0002 — Microsoft Research, Redmond, WA, USA
- Cheng Huang 0003 — Sichuan University, Chengdu, China
- Cheng Huang 0004 — Iowa State University, Ames, IA, USA
- Cheng Huang 0005 — Southeast University, National ASIC Center, Nanjing, China
- Cheng Huang 0006 — Harbin University of Science and Technology, Heilongjiang Provincial Key Laboratory of Complex Intelligent System and Integration, Harbin, China
- Cheng Huang 0007 — Shanghai Jiao Tong University, UM-SJTU Joint Institute, Shanghai, China
- Cheng Huang 0008 — Cranfield University, School of Aerospace, Transport and Manufacturing, Cranfield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [b2]Cheng Huang, Xuemin (Sherman) Shen:
Decentralized Privacy Preservation in Smart Cities. Wireless Networks, Springer 2024, ISBN 978-3-031-54074-5, pp. 1-166 - [j44]Zian Zhang, Haiyong Bao, Rongxing Lu, Cheng Huang, Beibei Li:
KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare. IEEE Internet Things J. 11(5): 7918-7934 (2024) - [j43]Xinqi Tu, Haiyong Bao, Rongxing Lu, Cheng Huang, Hong-Ning Dai:
PMRK: Privacy-Preserving Multidimensional Range Query With Keyword Search Over Spatial Data. IEEE Internet Things J. 11(6): 10464-10478 (2024) - [j42]Dongxiao Liu, Cheng Huang, Liang Xue, Weihua Zhuang, Xuemin Shen, Bidi Ying:
Collaborative and Verifiable VNF Management for Metaverse With Efficient Modular Designs. IEEE J. Sel. Areas Commun. 42(3): 616-628 (2024) - [j41]Xinchao Wang, Wei Wang, Cheng Huang, Ping Cao, Youwen Zhu, Qihui Wu:
Blockchain-Based Certificateless Conditional Anonymous Authentication for IIoT. IEEE Syst. J. 18(1): 656-667 (2024) - [j40]Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen:
Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 21(1): 353-371 (2024) - [j39]Dan Zhu, Hui Zhu, Cheng Huang, Rongxing Lu, Dengguo Feng, Xuemin Shen:
Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation. IEEE Trans. Dependable Secur. Comput. 21(2): 860-875 (2024) - [j38]Jiahui Hou, Dongxiao Liu, Cheng Huang, Weihua Zhuang, Xuemin Shen, Rob Sun, Bidi Ying:
Data Protection: Privacy-Preserving Data Collection With Validation. IEEE Trans. Dependable Secur. Comput. 21(4): 3422-3438 (2024) - [j37]Zhirun Zheng, Zhetao Li, Cheng Huang, Saiqin Long, Mushu Li, Xuemin Shen:
Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing. IEEE Trans. Dependable Secur. Comput. 21(5): 4861-4878 (2024) - [j36]Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin Shen:
PPRP: Preserving Location Privacy for Range-Based Positioning in Mobile Networks. IEEE Trans. Mob. Comput. 23(10): 9451-9468 (2024) - [j35]Xi Zhang, Cheng Huang, Ye Su, Jing Qin:
Secure, Dynamic, and Efficient Keyword Search With Flexible Merging for Cloud Storage. IEEE Trans. Serv. Comput. 17(5): 2822-2835 (2024) - [i1]Xinyu Huang, Shisheng Hu, Mushu Li, Cheng Huang, Xuemin Shen:
Efficient Digital Twin Data Processing for Low-Latency Multicast Short Video Streaming. CoRR abs/2404.13749 (2024) - 2023
- [j34]Fei Tong, Xing Chen, Cheng Huang, Yujian Zhang, Xuemin Shen:
Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things. IEEE Internet Things J. 10(9, May 1): 7761-7773 (2023) - [j33]Xiaohu Chen, Anjia Yang, Jian Weng, Yao Tong, Cheng Huang, Tao Li:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. IEEE Trans. Serv. Comput. 16(4): 2316-2329 (2023) - [j32]Cheng Huang, Wei Wang, Dongxiao Liu, Rongxing Lu, Xuemin Shen:
Blockchain-Assisted Personalized Car Insurance With Privacy Preservation and Fraud Resistance. IEEE Trans. Veh. Technol. 72(3): 3777-3792 (2023) - [c24]Xinghan Wang, Cheng Huang, Jiahong Ning, Tingting Yang, Xuemin Shen:
Adaptive Distributed Learning with Byzantine Robustness: A Gradient-Projection-Based Method. GLOBECOM 2023: 7520-7525 - [c23]Cheng Huang, Anjia Yang, Dongxiao Liu, Rongxing Lu, Xuemin Sherman Shen:
Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth. ICCC 2023: 1-6 - 2022
- [j31]Cheng Huang, Liang Xue, Dongxiao Liu, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Blockchain-Assisted Transparent Cross-Domain Authorization and Authentication for Smart City. IEEE Internet Things J. 9(18): 17194-17209 (2022) - [j30]Dongxiao Liu, Huaqing Wu, Cheng Huang, Jianbing Ni, Xuemin Shen:
Blockchain-Based Credential Management for Anonymous Authentication in SAGVN. IEEE J. Sel. Areas Commun. 40(10): 3104-3116 (2022) - [j29]Liang Xue, Dongxiao Liu, Cheng Huang, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Blockchain-Based Data Sharing With Key Update for Future Networks. IEEE J. Sel. Areas Commun. 40(12): 3437-3451 (2022) - [j28]Dongxiao Liu, Cheng Huang, Jianbing Ni, Xiaodong Lin, Xuemin Sherman Shen:
Blockchain-Cloud Transparent Data Marketing: Consortium Management and Fairness. IEEE Trans. Computers 71(12): 3322-3335 (2022) - [j27]Jialu Hao, Cheng Huang, Wenjuan Tang, Yang Zhang, Shuai Yuan:
Smart Contract-Based Access Control Through Off-Chain Signature and On-Chain Evaluation. IEEE Trans. Circuits Syst. II Express Briefs 69(4): 2221-2225 (2022) - [j26]Jialu Hao, Wenjuan Tang, Cheng Huang, Jian Liu, Huimei Wang, Ming Xian:
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT. IEEE Trans. Emerg. Top. Comput. 10(2): 933-947 (2022) - [j25]Anjia Yang, Jian Weng, Kan Yang, Cheng Huang, Xuemin Shen:
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(2): 1284-1298 (2022) - [j24]Chuan Zhang, Liehuang Zhu, Chang Xu, Jianbing Ni, Cheng Huang, Xuemin Shen:
Location Privacy-Preserving Task Recommendation With Geometric Range Query in Mobile Crowdsensing. IEEE Trans. Mob. Comput. 21(12): 4410-4425 (2022) - [j23]Dongxiao Liu, Cheng Huang, Liang Xue, Jiahui Hou, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Authenticated and Prunable Dictionary for Blockchain-Based VNF Management. IEEE Trans. Wirel. Commun. 21(11): 9312-9324 (2022) - [c22]Chunyang Qi, Jie Huang, Cheng Huang, Huaqing Wu, Xuemin Sherman Shen:
Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model. GLOBECOM 2022: 1-6 - [c21]Dan Zhu, Hui Zhu, Cheng Huang, Rongxing Lu, Xuemin Shen, Dengguo Feng:
Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation. GLOBECOM 2022: 3041-3046 - [c20]Xi Zhang, Cheng Huang, Ye Su, Jing Qin, Xuemin Shen:
Divertible Searchable Symmetric Encryption for Secure Cloud Storage. GLOBECOM 2022: 3785-3790 - [c19]Lingshuang Liu, Cheng Huang, Dan Zhu, Dongxiao Liu, Jianbing Ni, Xuemin Sherman Shen:
Secure and Distributed Access Control for Dynamic Pervasive Edge Computing Services. GLOBECOM 2022: 5487-5492 - [c18]Liang Xue, Dongxiao Liu, Cheng Huang, Xuemin Sherman Shen, Weihua Zhuang, Rob Sun, Bidi Ying:
Secure and Flexible Data Sharing for Distributed Storage with Efficient Key Management. ICC 2022: 4408-4413 - 2021
- [j22]Xuemin Sherman Shen, Cheng Huang, Dongxiao Liu, Liang Xue, Weihua Zhuang, Rob Sun, Bidi Ying:
Data Management for Future Wireless Networks: Architecture, Privacy Preservation, and Regulation. IEEE Netw. 35(1): 8-15 (2021) - [j21]Cheng Huang, Dongxiao Liu, Jianbing Ni, Rongxing Lu, Xuemin Shen:
Achieving Accountable and Efficient Data Sharing in Industrial Internet of Things. IEEE Trans. Ind. Informatics 17(2): 1416-1427 (2021) - [j20]Dongxiao Liu, Cheng Huang, Jianbing Ni, Xiaodong Lin, Xuemin Shen:
Blockchain-Based Smart Advertising Network With Privacy-Preserving Accountability. IEEE Trans. Netw. Sci. Eng. 8(3): 2118-2130 (2021) - [j19]Xiang Liu, Anjia Yang, Cheng Huang, Yuxian Li, Tao Li, Ming Li:
Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks. IEEE Trans. Veh. Technol. 70(8): 7764-7777 (2021) - 2020
- [b1]Cheng Huang:
Effective Privacy-Preserving Mechanisms for Vehicle-to-Everything Services. University of Waterloo, Ontario, Canada, 2020 - [j18]Dongxiao Liu, Jianbing Ni, Cheng Huang, Xiaodong Lin, Xuemin Sherman Shen:
Secure and Efficient Distributed Network Provenance for IoT: A Blockchain-Based Approach. IEEE Internet Things J. 7(8): 7564-7574 (2020) - [j17]Liang Xue, Dongxiao Liu, Cheng Huang, Xiaodong Lin, Xuemin Sherman Shen:
Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity. J. Commun. Inf. Networks 5(1): 16-25 (2020) - [j16]Cheng Huang, Rongxing Lu, Jianbing Ni, Xuemin Shen:
DAPA: A Decentralized, Accountable, and Privacy-Preserving Architecture for Car Sharing Services. IEEE Trans. Veh. Technol. 69(5): 4869-4882 (2020) - [j15]Chuan Zhang, Liehuang Zhu, Jianbing Ni, Cheng Huang, Xuemin Shen:
Verifiable and Privacy-Preserving Traffic Flow Statistics for Advanced Traffic Management Systems. IEEE Trans. Veh. Technol. 69(9): 10336-10347 (2020) - [c17]Chuan Zhang, Liehuang Zhu, Chang Xu, Jianbing Ni, Cheng Huang, Xuemin Sherman Shen:
Efficient and Privacy-Preserving Non-Interactive Truth Discovery for Mobile Crowdsensing. GLOBECOM 2020: 1-6 - [c16]Hui Guo, Shuguang Huang, Min Zhang, Zulie Pan, Fan Shi, Cheng Huang, Beibei Li:
Classification of Malware Variant Based on Ensemble Learning. ML4CS (1) 2020: 125-139
2010 – 2019
- 2019
- [j14]Jialu Hao, Cheng Huang, Jianbing Ni, Hong Rong, Ming Xian, Xuemin (Sherman) Shen:
Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Networks 153: 1-10 (2019) - [j13]Guoming Wang, Rongxing Lu, Cheng Huang, Yong Liang Guan:
An efficient and privacy-Preserving pre-clinical guide scheme for mobile eHealthcare. J. Inf. Secur. Appl. 46: 271-280 (2019) - [c15]Cheng Huang, Jianbing Ni, Rongxing Lu, Xuemin Shen:
Exploring Anonymous User Reviews: Linkability Analysis Based on Machine Learning. GLOBECOM 2019: 1-6 - [c14]Jialu Hao, Cheng Huang, Guangyu Chen, Ming Xian, Xuemin Sherman Shen:
Privacy-Preserving Interest-Ability Based Task Allocation in Crowdsourcing. ICC 2019: 1-6 - [c13]Cheng Huang, Jianbing Ni, Rongxing Lu, Xuemin Sherman Shen:
Online Advertising with Verifiable Fairness. ICC 2019: 1-6 - [c12]Liang Xue, Jianbing Ni, Cheng Huang, Xiaodong Lin, Xuemin Sherman Shen:
Forward Secure and Fine-grained Data Sharing for Mobile Crowdsensing. PST 2019: 1-9 - 2018
- [j12]Liehuang Zhu, Chuan Zhang, Chang Xu, Ximeng Liu, Cheng Huang:
An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing. IEEE Access 6: 19025-19033 (2018) - [j11]Cheng Huang, Rongxing Lu, Xiaodong Lin, Xuemin Shen:
Secure Automated Valet Parking: A Privacy-Preserving Reservation Scheme for Autonomous Vehicles. IEEE Trans. Veh. Technol. 67(11): 11169-11180 (2018) - [c11]Jialu Hao, Cheng Huang, Jian Liu, Ming Xian, Xuemin Shen:
Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT. GLOBECOM 2018: 1-6 - [c10]Cheng Huang, Dongxiao Liu, Jianbing Ni, Rongxing Lu, Xuemin Shen:
Reliable and Privacy-Preserving Selective Data Aggregation for Fog-Based IoT. ICC 2018: 1-6 - 2017
- [j10]Chang Xu, Rongxing Lu, Huaxiong Wang, Liehuang Zhu, Cheng Huang:
TJET: Ternary Join-Exit-Tree Based Dynamic Key Management for Vehicle Platooning. IEEE Access 5: 26973-26989 (2017) - [j9]Cheng Huang, Rongxing Lu, Kim-Kwang Raymond Choo:
Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges. IEEE Commun. Mag. 55(11): 105-111 (2017) - [j8]Cheng Huang, Rongxing Lu, Hui Zhu:
Privacy-friendly spatial crowdsourcing in vehicular networks. J. Commun. Inf. Networks 2(2): 59-74 (2017) - [j7]Cheng Huang, Rongxing Lu, Kim-Kwang Raymond Choo:
Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases. J. Comput. Syst. Sci. 89: 51-63 (2017) - [j6]Hao Hu, Rongxing Lu, Cheng Huang, Zonghua Zhang:
PTRS: A privacy-preserving trust-based relay selection scheme in VANETs. Peer-to-Peer Netw. Appl. 10(5): 1204-1218 (2017) - [j5]Chang Xu, Rongxing Lu, Huaxiong Wang, Liehuang Zhu, Cheng Huang:
PAVS: A New Privacy-Preserving Data Aggregation Scheme for Vehicle Sensing Systems. Sensors 17(3): 500 (2017) - [c9]Fengwei Wang, Hui Zhu, Rongxing Lu, Fen Liu, Cheng Huang, Hui Li:
Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications. SecureComm 2017: 339-355 - 2016
- [j4]Lichun Li, Rongxing Lu, Cheng Huang:
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data. IEEE Internet Things J. 3(2): 206-218 (2016) - [j3]Hao Hu, Rongxing Lu, Cheng Huang, Zonghua Zhang:
TripSense: A Trust-Based Vehicular Platoon Crowdsensing Scheme with Privacy Preservation in VANETs. Sensors 16(6): 803 (2016) - [j2]Hui Zhu, Rongxing Lu, Cheng Huang, Le Chen, Hui Li:
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud. IEEE Trans. Veh. Technol. 65(9): 7729-7739 (2016) - [c8]Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Xiaodong Lin:
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System. AsiaCCS 2016: 95-106 - [c7]Cheng Huang, Rongxing Lu, Hui Zhu, Hao Hu, Xiaodong Lin:
PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing. GLOBECOM 2016: 1-6 - [c6]Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, Abdulrahman Alamer, Xiaodong Lin:
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques. ICC 2016: 1-6 - 2015
- [j1]Hui Zhu, Cheng Huang, Hui Li:
Information Diffusion Model Based on Privacy Setting in Online Social Networking Services. Comput. J. 58(4): 536-548 (2015) - [c5]Guoming Wang, Rongxing Lu, Cheng Huang:
PSLP: Privacy-preserving single-layer perceptron learning for e-Healthcare. ICICS 2015: 1-5 - [c4]Rongxing Lu, Khalid Nawaf Alharbi, Xiaodong Lin, Cheng Huang:
A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications. GLOBECOM 2015: 1-6 - [c3]Guoming Wang, Rongxing Lu, Cheng Huang:
PGuide: An Efficient and Privacy-Preserving Smartphone-Based Pre-Clinical Guidance Scheme. GLOBECOM 2015: 1-6 - [c2]Cheng Huang, Rongxing Lu:
EFPA: Efficient and flexible privacy-preserving mining of association rule in cloud. ICCC 2015: 1-6 - 2014
- [c1]Hui Zhu, Cheng Huang, Hui Li:
MPPM: Malware propagation and prevention model in online SNS. ICC Workshops 2014: 682-687
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint