default search action
Entao Luo
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Zheng Wu, Kehua Guo, Entao Luo, Tian Wang, Shoujin Wang, Yi Yang, Xiangyuan Zhu, Rui Ding:
Medical long-tailed learning for imbalanced data: Bibliometric analysis. Comput. Methods Programs Biomed. 247: 108106 (2024) - [j27]Xiaowu Li, Fuan Xiao, Kun Tang, Entao Luo:
Outage performance and energy efficiency optimization of wireless-powered millimeter-wave sensor networks. EURASIP J. Wirel. Commun. Netw. 2024(1): 1 (2024) - [j26]Tao Peng, Wentao Zhong, Guojun Wang, Shaobo Zhang, Entao Luo, Tian Wang:
Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing. IEEE Internet Things J. 11(2): 2394-2406 (2024) - [j25]Tao Peng, Wei You, Kejian Guan, Entao Luo, Shaobo Zhang, Guojun Wang, Tian Wang, Youke Wu:
Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing. J. Netw. Comput. Appl. 224: 103836 (2024) - [j24]Kehua Guo, Zheng Wu, Weizheng Wang, Sheng Ren, Xiaokang Zhou, Thippa Reddy Gadekallu, Entao Luo, Chao Liu:
GRTR: Gradient Rebalanced Traffic Sign Recognition for Autonomous Vehicles. IEEE Trans Autom. Sci. Eng. 21(3): 2349-2361 (2024) - [j23]Tao Peng, Wentao Zhong, Guojun Wang, Entao Luo, Shui Yu, Yi-Ning Liu, Yi Yang, Xuyun Zhang:
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing. IEEE Trans. Intell. Transp. Syst. 25(7): 7767-7779 (2024) - [c17]Guorui Chen, Jiyan Liu, Chaoliang Li, Chen Zhang, Sirui Jiang, Bin Zhang, Entao Luo:
Research on Recognition and Feature Extraction of SQL Attack Action. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 464-470 - [c16]Yuquan Zhou, Hejin Huang, Wenyu Liao, Jiyan Liu, Xiangdong Ying, Chen Zhang, Entao Luo:
CRT-Paillier Homomorphic Privacy Protection Scheme Based on BLS Signatures in Mobile Vehicular Networks. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2024: 489-496 - 2023
- [j22]Danlei Du, Entao Luo, Yang Yi, Tao Peng, Xubin Li, Shaobo Zhang, Xu Jiang, Tian Wang:
Differential privacy protection method for trip-oriented shared data. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j21]Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo, Guojun Wang:
ALPS: Achieving accuracy-aware location privacy service via assisted regions. Future Gener. Comput. Syst. 145: 189-199 (2023) - [j20]Shaobo Zhang, Yuechao Wang, Entao Luo, Qin Liu, Ke Gu, Guojun Wang:
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse. J. Syst. Archit. 140: 102899 (2023) - [j19]Yipeng Zou, Tao Peng, Guojun Wang, Entao Luo, Jinbo Xiong:
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing. J. Syst. Archit. 144: 102984 (2023) - [j18]Zheng Wu, Changchun Shen, Kehua Guo, Entao Luo, Liwei Wang:
NC2E: boosting few-shot learning with novel class center estimation. Neural Comput. Appl. 35(9): 7049-7062 (2023) - [j17]Sheng Ren, Kehua Guo, Xiaokang Zhou, Bin Hu, Feihong Zhu, Entao Luo:
Medical Image Super-Resolution Based on Semantic Perception Transfer Learning. IEEE ACM Trans. Comput. Biol. Bioinform. 20(4): 2598-2609 (2023) - [j16]Yangfan Liang, Entao Luo, Yi-Ning Liu:
Physically Secure and Conditional-Privacy Authenticated Key Agreement for VANETs. IEEE Trans. Veh. Technol. 72(6): 7914-7925 (2023) - 2022
- [j15]Jiwei Zhang, Md. Zakirul Alam Bhuiyan, Yang Xu, Amit Kumar Singh, D. Frank Hsu, Entao Luo:
Trustworthy Target Tracking With Collaborative Deep Reinforcement Learning in EdgeAI-Aided IoT. IEEE Trans. Ind. Informatics 18(2): 1301-1309 (2022) - 2021
- [j14]Lei Zhou, Entao Luo, Guojun Wang, Shui Yu:
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks. Inf. Sci. 554: 15-32 (2021) - [j13]Cheng Zhang, Zhifei Ni, Yang Xu, Entao Luo, Linweiya Chen, Yaoxue Zhang:
A trustworthy industrial data management scheme based on redactable blockchain. J. Parallel Distributed Comput. 152: 167-176 (2021) - [j12]Runchuan Li, Shuhong Chen, Jiawei Yang, Entao Luo:
Edge-Based Detection and Classification of Malicious Contents in Tor Darknet Using Machine Learning. Mob. Inf. Syst. 2021: 8072779:1-8072779:13 (2021) - [c15]Xiaobing Liu, Entao Luo, Jie Yang, Xiangdong Yin, Tangsen Huang, Lehua Hu:
Semi-Supervised Intrusion Detection Method based on Adversarial Autocoder. DASC/PiCom/CBDCom/CyberSciTech 2021: 637-643 - [c14]Wenzhi Cheng, Entao Luo, Yayuan Tang, Li Wan, Meiyan Wei:
A Survey on Privacy-security in Internet of Vehicles. DASC/PiCom/CBDCom/CyberSciTech 2021: 644-650 - [c13]Shaobo Zhang, Shuo Yang, Gengming Zhu, Entao Luo, Jiyong Zhang, Desheng Xiang:
A Fine-Grained Access Control Scheme for Electronic Health Records Based on Roles and Attributes. UbiSec 2021: 25-37 - 2020
- [j11]Lei Zhou, Entao Luo, Guojun Wang:
RAitc: Securely Auditing the Remotely Executed Applications. IEEE Access 8: 163045-163059 (2020) - [j10]Jun Long, Yueyi Luo, Xiaoyu Zhu, Entao Luo, Mingfeng Huang:
Computation offloading through mobile vehicles in IoT-edge-cloud network. EURASIP J. Wirel. Commun. Netw. 2020(1): 244 (2020) - [j9]Entao Luo, Kehua Guo, Yayuan Tang, Xiangdong Ying, Wen Huang:
Hidden the true identity and dating characteristics based on quick private matching in mobile social networks. Future Gener. Comput. Syst. 109: 633-641 (2020) - [j8]Jinbo Xiong, Lei Chen, Md. Zakirul Alam Bhuiyan, Chunjie Cao, Minshen Wang, Entao Luo, Ximeng Liu:
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis. Future Gener. Comput. Syst. 111: 741-753 (2020) - [j7]Kun Tang, Wenjuan Tang, Entao Luo, Zhiyuan Tan, Weizhi Meng, Lianyong Qi:
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things. Secur. Commun. Networks 2020: 7542726:1-7542726:10 (2020)
2010 – 2019
- 2019
- [j6]Mian Ahmad Jan, Wenjing Zhang, Muhammad Usman, Zhiyuan Tan, Fazlullah Khan, Entao Luo:
SmartEdge: An end-to-end encryption framework for an edge-enabled smart city application. J. Netw. Comput. Appl. 137: 1-10 (2019) - [c12]Wei Ou, Mingwei Deng, Entao Luo:
A Decentralized and Anonymous Data Transaction Scheme Based on Blockchain and Zero-Knowledge Proof in Vehicle Networking (Workshop Paper). CollaborateCom 2019: 712-726 - [c11]Wei Ou, Mingwei Deng, Entao Luo, Wei Shi, Zhiyuan Tan, Md. Zakirul Alam Bhuiyan:
Multi-Miner's Cooperative Evolution Method of Bitcoin Pool Based on Temporal Difference Leaning Method. iThings/GreenCom/CPSCom/SmartData 2019: 687-693 - [c10]Wei Ou, Entao Luo, Zhiyuan Tan, Lihong Xiang, Qin Yi, Chen Tian:
A Multi-attributes-Based Trust Model of Internet of Vehicle. NSS 2019: 706-713 - 2018
- [j5]Kun Tang, Ronghua Shi, Heyuan Shi, Md. Zakirul Alam Bhuiyan, Entao Luo:
Secure beamforming for cognitive cyber-physical systems based on cognitive radio with wireless energy harvesting. Ad Hoc Networks 81: 174-182 (2018) - [j4]Entao Luo, Md. Zakirul Alam Bhuiyan, Guojun Wang, Md. Arafatur Rahman, Jie Wu, Mohammed Atiquzzaman:
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems. IEEE Commun. Mag. 56(2): 163-168 (2018) - [c9]Entao Luo, Guojun Wang, Kun Tang, Quanyou Zhao, Chen He, Liyong Guo:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. ISPEC 2018: 495-505 - 2017
- [j3]Entao Luo, Qin Liu, Jemal H. Abawajy, Guojun Wang:
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68: 222-233 (2017) - [c8]Kun Tang, Ronghua Shi, Entao Luo:
Secure Beamforming Design with Bidirectional Secondary Transmissions in Wireless-Powered Cognitive Radio Networks. ISPA/IUCC 2017: 428-432 - [c7]Entao Luo, Guojun Wang, Shuhong Chen, Xiangdong Yin, Wen Li:
Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks. ISPA/IUCC 2017: 975-981 - [c6]Qifan Wang, Guihua Duan, Entao Luo, Guojun Wang:
Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext. SpaCCS 2017: 42-55 - [c5]Entao Luo, Guojun Wang, Qin Liu:
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks. TrustCom/BigDataSE/ICESS 2017: 58-64 - 2016
- [j2]Entao Luo, Qin Liu, Guojun Wang:
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks. IEEE Commun. Lett. 20(9): 1772-1775 (2016) - [j1]Xiaoling Sun, Mian Zheng, Weiqin Li, Entao Luo:
位置信息记录中基于期望最大化的名称消重算法 (Expectation Maximization Based Name Deduplicating Algorithm in Spatial Records). 计算机科学 43(3): 238-241 (2016) - [c4]Dacheng Meng, Entao Luo, Guojun Wang:
A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare. MASS 2016: 299-306 - [c3]Dacheng Meng, Wenbo Wang, Entao Luo, Guojun Wang:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. SpaCCS 2016: 178-189 - [c2]Entao Luo, Wenbo Wang, Dacheng Meng, Guojun Wang:
A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks. SpaCCS 2016: 190-203 - 2015
- [c1]Entao Luo, Qin Liu, Guojun Wang:
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks. ICA3PP (3) 2015: 463-474
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint