Skip to the content of the web site.
an exploration to the future of secure and privacy systems ...

Publications

Many papers downloadable on this page are under copyright protection. Please abide by all applicable copyright laws.
    [J][C][B]

Journal Papers:

    2018
  1. J. Ni, K. Zhang, X. Lin, X. Shen: Securing Fog Computing for Internet of Things Applications: Challenges and Solutions. IEEE Communications Surveys and Tutorials 20(1): 601-628 (2018).


  2. 2017
  3. J. Ni, A. Zhang, X. Lin, X. Shen: Security, Privacy, and Fairness in Fog-Based Vehicular Crowdsensing. IEEE Communications Magazine 55(6): 146-152 (2017).

  4. K. Alharbi, X. Lin, J. Shao: A Privacy-Preserving Data-Sharing Framework for Smart Grid. IEEE Internet of Things Journal 4(2): 555-562 (2017).

  5. S. Basudan, X. Lin, K. Sankaranarayanan: A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing. IEEE Internet of Things Journal 4(3): 772-782 (2017).

  6. A. Zhang, X. Lin: Security-Aware and Privacy-Preserving D2D Communications in 5G. IEEE Network 31(4): 70-77 (2017).

  7. A. Zhang, L. Wang, X. Ye, X. Lin: Light-Weight and Robust Security-Aware D2D-Assist Data Transmission Protocol for Mobile-Health Systems. IEEE Trans. Information Forensics and Security 12(3): 662-675 (2017).

  8. J. Ni, K. Zhang, K. Alharbi, X. Lin, N. Zhang, X. Shen: Differentially Private Smart Metering With Fault Tolerance and Range-Based Filtering. IEEE Trans. Smart Grid 8(5): 2483-2493 (2017).

  9. B. Liu, W. Zhou, T. Zhu, H. Zhou, X. Lin: Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models. IEEE Trans. Vehicular Technology 66(5): 4410-4423 (2017).


  10. 2016
  11. Y. Sun, M. Chen, A. Bacchus, X. Lin: Towards collusion-attack-resilient group key management using one-way function tree. Computer Networks 104: 16-26 (2016).

  12. X. Li, Q. Yang, X. Lin, S. Wu, M. P. Wittie: Itrust: interpersonal trust measurements from social interactions. IEEE Network 30(4): 54-58 (2016).

  13. J. Shao, R. Lu, X. Lin, K. Liang: Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing 28: 113-121 (2016).

  14. A Zhang, A. Bacchus, X. Lin: Consent-based access control for secure and privacy-preserving health information exchange. Security and Communication Networks 9(16): 3496-3508 (2016).

  15. J. Shao, X. Lin, R. Lu, C. Zuo: A Threshold Anonymous Authentication Protocol for VANETs. IEEE Trans. Vehicular Technology 65(3): 1711-1720 (2016).


  16. 2015
  17. H. Li, D. Liu, K. Alharbi, S. Zhang, X. Lin: Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid. TIIS 9(4): 1404-1423 (2015).

  18. J. Zhou, Z. Cao, X. Dong, X. Lin: PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems. J. Sel. Topics Signal Processing 9(7): 1332-1344 (2015).

  19. Y Wang, X. Lin: CHetNet: crowdsourcing to heterogeneous cellular networks. IEEE Network 29(6): 62-67 (2015).

  20. L. Chen, R. Lu, Z. Cao, K. Alharbi, X. Lin: MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications. Peer-to-Peer Networking and Applications 8(5): 777-792 (2015).

  21. H. Zhu, X. Lin, Y. Zhang, R. Lu: Duth: a user-friendly dual-factor authentication for Android smartphone devices. Security and Communication Networks 8(7): 1213-1222 (2015).

  22. L. Chen, R. Lu, K. Alharbi, X. Lin, Z. Cao: ReDD: recommendation-based data dissemination in privacy-preserving mobile social networks. Security and Communication Networks 8(7): 1291-1305 (2015).

  23. S. Zou, J. Zhang, X. Lin: An effective behavior-based Android malware detection system. Security and Communication Networks 8(12): 2079-2089 (2015).

  24. T. Chen, X. Lin, J. Huang, A. Bacchus, X. Zhang: An empirical investigation into path divergences for concolic execution using CREST. Security and Communication Networks 8(18): 3667-3681 (2015).

  25. J. Seto, Y. Wang, X. Lin: User-Habit-Oriented Authentication Model: Toward Secure, User-Friendly Authentication for Mobile Devices. IEEE Trans. Emerging Topics Comput. 3(1): 107-118 (2015).

  26. J. Ning, X. Dong, Z. Cao, L. Wei, X. Lin: White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Trans. Information Forensics and Security 10(6): 1274-1288 (2015).

  27. M. Mahmoud, X. Lin, X. Shen: Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks. IEEE Trans. Parallel Distrib. Syst. 26(4): 1140-1153 (2015).

  28. J. Zhou, X. Lin, X. Dong, Z. Cao: PSMPA: Patient Self-Controllable and Multi-Level Privacy-Preserving Cooperative Authentication in Distributedm-Healthcare Cloud Computing System. IEEE Trans. Parallel Distrib. Syst. 26(6): 1693-1703 (2015).

  29. J. Zhou, Z. Cao, X. Dong, X. Lin: Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions. IEEE Wireless Commun. 22(2): 136-144 (2015).

  30. Y. Wang, X. Lin: User-provided networking for QoE provisioning in mobile networks. IEEE Wireless Commun. 22(4): 26-33 (2015).


  31. 2014
  32. J. Ren, Y. Zhang, X. Lin: NUND: Non-Uniform Node Distribution in Cluster-based Wireless Sensor Networks. TIIS 8(7): 2302-2324 (2014).

  33. H. Wang, Z. Zhang, X. Lin, H. Fang: Socialized WBANs in mobile sensing environments. IEEE Network 28(5): 91-95 (2014).

  34. Q. Shen, X. Liang, X. Shen, X. Lin, H. Y. Luo: Exploiting Geo-Distributed Clouds for a E-Health Monitoring System With Minimum Service Delay and Privacy Preservation. IEEE J. Biomedical and Health Informatics 18(2): 430-439 (2014).

  35. X. Liang, X. Lin, X. Shen: Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks. IEEE Trans. Parallel Distrib. Syst. 25(2): 310-320 (2014).

  36. H. Li, X. Lin, H. Yang, X. Liang, R. Lu, X. Shen: EPPDR: An Efficient Privacy-Preserving Demand Response Scheme with Adaptive Key Evolution in Smart Grid. IEEE Trans. Parallel Distrib. Syst. 25(8): 2053-2064 (2014).

  37. X. Liang, K. Zhang, X. Shen, X. Lin: Security and privacy in mobile social networks: challenges and solutions. IEEE Wireless Commun. 21(1): 33-41 (2014).


  38. 2013
  39. R. Lu, X. Lin, Z. Shi, X. Shen: A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems. IEEE Intelligent Systems 28(3): 62-65 (2013).

  40. X. Liang, X. Li, K. Zhang, R. Lu, X. Lin, X. Shen: Fully Anonymous Profile Matching in Mobile Social Networks. IEEE Journal on Selected Areas in Communications 31(9-Supplement): 641-655 (2013).

  41. X. Lin: LSR: Mitigating Zero-Day Sybil Vulnerability in Privacy-Preserving Vehicular Peer-to-Peer Networks. IEEE Journal on Selected Areas in Communications 31(9-Supplement): 237 - 246 (2013).

  42. R. Lu, X. Lin, X. Shen: SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. IEEE Trans. Parallel Distrib. Syst. 24(3): 614-624 (2013).

  43. X. Liang, X. Li, R. Lu, X. Lin, X. Shen: UDP: Usage-Based Dynamic Pricing With Privacy Preservation for Smart Grid. IEEE Trans. Smart Grid 4(1): 141-150 (2013).

  44. X. Lin, X. Li: Achieving Efficient Cooperative Message Authentication in Vehicular Ad Hoc Networks. IEEE Trans. Vehicular Technology 62(7): 3339-3348 (2013) A New Delay Analysis for IEEE 802.11 PCF. IEEE Trans. Vehicular Technology 62(8): 4064-4069 (2013).

  45. Q. Zhang, B. Cao, Y. Wang, N. Zhang, X. Lin, L. Sun: On exploiting polarization for energy-harvesting enabled cooperative cognitive radio networking. IEEE Wireless Commun. 20(4) (2013).

  46. J. Zhou, Z. Cao, X. Dong, X. Lin, A. V. Vasilakos: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wireless Commun. 20(4) (2013).


  47. 2012
  48. X. Li, X. Liang, R. Lu, X. Shen, X. Lin, H. Zhu: Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine 50(8): 38-45 (2012).

  49. X. Liang, M. Barua, R. Lu, X. Lin, X. Shen: HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks. Computer Communications 35(15): 1910-1920 (2012).

  50. Z. Jia, X. Lin, S.-H. Tan, L. Li, Y. Yang: Public key distribution scheme for delay tolerant networks based on two-channel cryptography. J. Network and Computer Applications 35(3): 905-913 (2012).

  51. R. Lu, X. Lin, X. Liang, X. Shen: A Dynamic Privacy-Preserving Key Management Scheme for Location-Based Services in VANETs. IEEE Trans. Intelligent Transportation Systems 13(1): 127-139 (2012).

  52. R. Lu, X. Lin, H. Zhu, X. Liang, X. Shen: BECAN: A Bandwidth-Efficient Cooperative Authentication Scheme for Filtering Injected False Data in Wireless Sensor Networks. IEEE Trans. Parallel Distrib. Syst. 23(1): 32-43 (2012).

  53. R. Lu, X. Liang, X. Li, X. Lin, X. Shen: EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications. IEEE Trans. Parallel Distrib. Syst. 23(9): 1621-1631 (2012).

  54. R. Lu, X. Lin, T. H. Luan, X. Liang, X. Shen: Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs. IEEE Trans. Vehicular Technology 61(1): 86-96 (2012).

  55. X. Liang, X. Li, T. H. Luan, R. Lu, X. Lin, X. Shen: Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks. IEEE Trans. Vehicular Technology 61(7): 3209-3222 (2012).


  56. 2011
  57. R. Lu, X. Li, X. Liang, X. Shen, X. Lin: GRS: The green, reliability, and security of emerging machine to machine communications. IEEE Communications Magazine 49(4): 28-35 (2011).

  58. X. Li, R. Lu, X. Liang, X. Shen, J. Chen, X. Lin: Smart community: an internet of things application. IEEE Communications Magazine 49(11): 68-75 (2011).

  59. X. Liang, R. Lu, L. Chen, X. Lin, X. Shen: PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. Journal of Communications and Networks 13(2): 102-112 (2011).

  60. Q. Chen, Z. M. Fadlullah, X. Lin, N. Kato: A clique-based secure admission control scheme for mobile ad hoc networks (MANETs). J. Network and Computer Applications 34(6): 1827-1835 (2011).

  61. R. Lu, X. Lin, X. Liang, X. Shen: A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network. MONET 16(6): 683-694 (2011).

  62. X. Lin: A provably secure threshold signature scheme based on DDH assumption. Security and Communication Networks 4(6): 678-684 (2011).

  63. R. Lu, X. Lin, X. Liang, X. Shen: An efficient and provably secure public key encryption scheme based on coding theory. Security and Communication Networks 4(12): 1440-1447 (2011).

  64. X. Lin, H.-H. Chen: A secure and efficient RSU-aided bundle forwarding protocol for vehicular delay tolerant networks. Wireless Communications and Mobile Computing 11(2): 187-195 (2011).


  65. 2010
  66. X. Lin, R. Lu, D. Kwan, X. Shen: REACT: An RFID-based privacy-preserving children tracking scheme for large amusement parks. Computer Networks 54(15): 2744-2755 (2010).

  67. R. Lu, X. Lin, H. Zhu, X. Shen: An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications. IEEE Trans. Vehicular Technology 59(6): 2772-2785 (2010).

  68. Y. Sun, R. Lu, X. Lin, X. Shen, J. Su: An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications. IEEE Trans. Vehicular Technology 59(7): 3589-3603 (2010).

  69. R. Lu, X. Lin, H. Zhu, X. Shen, Bruno R. Preiss: Pi: a practical incentive protocol for delay tolerant networks. IEEE Trans. Wireless Communications 9(4): 1483-1493 (2010).

  70. A. Wasef, R. Lu, X. Lin, X. Shen: Complementing public key infrastructure to secure vehicular ad hoc networks. IEEE Wireless Commun. 17(5): 22-28 (2010).

  71. X. Lin, R. Lu, X. Shen: MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Communications and Mobile Computing 10(6): 843-856 (2010).


  72. 2009
  73. X. Lin, R. Lu, X. Shen, Y. Nemoto, N. Kato: Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems. IEEE Journal on Selected Areas in Communications 27(4): 365-378 (2009).

  74. R. Lu, X. Lin, H. Zhu, P.-H. Ho, X. Shen: A Novel Anonymous Mutual Authentication Protocol With Provable Link-Layer Location Privacy. IEEE Trans. Vehicular Technology 58(3): 1454-1466 (2009).

  75. H. Zhu, X. Lin, M. Shi, P.-H. Ho, X. Shen: PPAB: A Privacy-Preserving Authentication and Billing Architecture for Metropolitan Area Sharing Networks. IEEE Trans. Vehicular Technology 58(5): 2529-2543 (2009).

  76. H. Zhu, X. Lin, R. Lu, Y. Fan, X. Shen: SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks. IEEE Trans. Vehicular Technology 58(8): 4628-4639 (2009).

  77. H. Zhu, R. Lu, X. Shen, X. Lin: Security in service-oriented vehicular networks. IEEE Wireless Commun. 16(4): 16-22 (2009).


  78. 2008
  79. X. Lin, R. Lu, C. Zhang, H. Zhu, P.-H. Ho, X. Shen: Security in vehicular ad hoc networks. IEEE Communications Magazine 46(4): 88-95 (2008).

  80. R. Lu, X. Lin, Z. Cao, L. Qin, X. Liang: A simple deniable authentication protocol based on the Diffie-Hellman algorithm. Int. J. Comput. Math. 85(9): 1315-1323 (2008).

  81. X. Lin, X. Ling, H. Zhu, P.-H. Ho, X. Shen: A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks. IJSN 3(2): 122-132 (2008).

  82. R. Lu, X. Lin, Z. Cao, J. Shao, X. Liang: New (t, n) threshold directed signature scheme with provable security. Inf. Sci. 178(3): 756-765 (2008).

  83. C. Zhang, X. Lin, R. Lu, P.-H. Ho, X. Shen: An Efficient Message Authentication Scheme for Vehicular Communications. IEEE Trans. Vehicular Technology 57(6): 3357-3368 (2008).

  84. X. Lin, R. Lu, P.-H. Ho, X. Shen, Z. Cao: TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. IEEE Trans. Wireless Communications 7(4): 1389-1399 (2008).

  85. H. Zhu, X. Lin, R. Lu, P.-H. Ho, X. Shen: SLAB: A secure localized authentication and billing scheme for wireless mesh networks. IEEE Trans. Wireless Communications 7(10): 3858-3868 (2008).

  86. X. Lin, X. Sun, X. Wang, C. Zhang, P.-H. Ho, X. Shen: TSVC: timed efficient and secure vehicular communications with privacy preserving. IEEE Trans. Wireless Communications 7(12-1): 4987-4998 (2008).


  87. 2007
  88. X. Lin, X. Sun, P.-H. Ho, X. Shen: GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications. IEEE Trans. Vehicular Technology 56(6): 3442-3456 (2007).

Conference Papers:

    2017
  1. N. Scrivens, X. Lin: Android digital forensics: data, extraction and analysis. ACM TUR-C 2017: 26:1-26:10.

  2. S. Basudan, X. Lin, K. Sankaranarayanan: An Efficient Compromised Node Revocation Scheme in Fog-Assisted Vehicular Crowdsensing. GLOBECOM 2017: 1-6.

  3. J. Ni, X. Lin, X. Shen: Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach. GLOBECOM 2017: 1-6.

  4. A. Alamer, Y. Deng, X. Lin: A privacy-preserving and truthful tendering framework for vehicle cloud computing. ICC 2017: 1-7.

  5. J. Ni, X. Lin, Q. Xia, X. Shen: Dual-anonymous reward distribution for mobile crowdsensing. ICC 2017: 1-6.

  6. T. Chen, Y. Feng, X. Luo, X. Lin, X. Zhang: Cloud-based parallel concolic execution. SANER 2017: 437-441.

  7. A. Alamer, Y. Deng, X. Lin: Secure and privacy-preserving task announcement in vehicular cloud. WCSP 2017: 1-6.

  8. A. Alamer, J. Ni, X. Lin, X. Shen: Location privacy-aware task recommendation for spatial crowdsourcing. WCSP 2017: 1-6.


  9. 2016
  10. X. Lin, R. Lu: Proxy Re-encryption with Delegatable Verifiability. ACISP (2) 2016: 120-133.

  11. C. Huang, R. Lu, H. Zhu, J. Shao, X. Lin: FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System. AsiaCCS 2016: 95-106.

  12. K. Alharbi, X. Lin: Efficient and Privacy-Preserving Smart Grid Downlink Communication Using Identity Based Signcryption. GLOBECOM 2016: 1-6.

  13. T. Chen, H. Tang, X. Lin, K. Zhou, X. Zhang: Silent Battery Draining Attack against Android Systems by Subverting Doze Mode. GLOBECOM 2016: 1-6.

  14. C. Huang, R. Lu, H. Zhu, H. Hu, X. Lin: PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing. GLOBECOM 2016: 1-6.

  15. Q. Kong, R. Lu, H. Zhu, A. Alamer, X. Lin: A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road. GLOBECOM 2016: 1-6.

  16. J. Ni, X. Lin, K. Zhang, Y. Yu: Secure and Deduplicated Spatial Crowdsourcing: A Fog-Based Approach. GLOBECOM 2016: 1-6.

  17. A. Zhang, A. Bacchus, X. Lin: A Fairness-Aware and Privacy-Preserving Online Insurance Application System. GLOBECOM 2016: 1-6.

  18. C. Huang, R. Lu, H. Zhu, J. Shao, A. Alamer, X. Lin: EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques. ICC 2016: 1-6.

  19. J. Ni, K. Zhang, X. Lin, X. Shen: EDAT: Efficient data aggregation without TTP for privacy-assured smart metering. ICC 2016: 1-6.

  20. J. Ni, K. Zhang, X. Lin, H. Yang, X. Shen: AMA: Anonymous mutual authentication with traceability in carpooling systems. ICC 2016: 1-6.

  21. J. Ni, X. Lin, K. Zhang, Y. Yu, X. Shen: Secure outsourced data transfer with integrity verification in cloud storage. ICCC 2016: 1-6.

  22. J. Ni, X. Lin, K. Zhang, Y. Yu, X. Shen: Device-invisible two-factor authenticated key agreement protocol for BYOD. ICCC 2016: 1-6.

  23. J. Ni, K. Zhang, X. Lin, Y. Yu, X. Shen: Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. SecureComm 2016: 85-103.

  24. Y. Liu, M. Xu, J. Xu, N. Zheng, X. Lin: SQLite Forensic Analysis Based on WAL. SecureComm 2016: 557-574.

  25. J. Ni, X. Lin, K. Zhang, X. Shen: Privacy-Preserving Real-Time Navigation System Using Vehicular Crowdsourcing. VTC Fall 2016: 1-5.


  26. 2015
  27. R. Lu, K. Alharbi, X. Lin, C. Huang: A Novel Privacy-Preserving Set Aggregation Scheme for Smart Grid Communications. GLOBECOM 2015: 1-6.

  28. J. Ni, K. Alharbi, X. Lin, X. Shen: Security-Enhanced Data Aggregation against Malicious Gateways in Smart Grid. GLOBECOM 2015: 1-6.

  29. H. Li, Y. Dai, X. Lin: Efficient e-health data release with consistency guarantee under differential privacy. HealthCom 2015: 602-608.

  30. C. Song, X. Lin: Blurred License Plate Recognition based on single snapshot from drive recorder. ICC 2015: 7108-7113.

  31. H. Li, D. Liu, K. Jia, X. Lin: Achieving authorized and ranked multi-keyword search over encrypted cloud data. ICC 2015: 7450-7455.

  32. J. Shao, R. Lu, X. Lin, C. Zuo: New threshold anonymous authentication for VANETs. ICCC 2015: 1-6.

  33. J. Zhou, Z. Cao, X. Dong, X. Lin: TR-MABE: White-box traceable and revocable multi-authority attribute-based encryption and its applications to multi-level privacy-preserving e-healthcare cloud computing systems. INFOCOM 2015: 2398-2406.

  34. J. Shao, R. Lu, X. Lin: Fine-grained data sharing in cloud computing for mobile devices. INFOCOM 2015: 2677-2685.


  35. 2014
  36. J. Ning, Z. Cao, X. Dong, L. Wei, X. Lin: Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS (2) 2014: 55-72.

  37. Y. Wang, X. Lin: Cooperative sensing scheduling in Cognitive Radio Networks with multiple Primary Networks. GLOBECOM 2014: 822-827.

  38. J. Seto, Y. Wang, X. Lin: Toward secure user-habit-oriented authentication for mobile devices. GLOBECOM 2014: 1225-1231.

  39. X. Dong, J. Zhou, K. Alharbi, X. Lin, Z. Cao: An ElGamal-based efficient and privacy-preserving data aggregation scheme for smart grid. GLOBECOM 2014: 4720-4725.

  40. J. Shao, R. Lu, X. Lin: FINE: A fine-grained privacy-preserving location-based service framework for mobile devices. INFOCOM 2014: 244-252.

  41. R. Lu, X. Lin, Z. Shi, J. Shao: PLAM: A privacy-preserving framework for local-area mobile social networks. INFOCOM 2014: 763-771.

  42. G. Liu, Q. Yang, H. Wang, X. Lin, M. P. Wittie: Assessment of multi-hop interpersonal trust in social networks by Three-Valued Subjective Logic. INFOCOM 2014: 1698-1706.

  43. R. Lu, X. Lin, J. Shao, K. Liang: RCCA-Secure Multi-use Bidirectional Proxy Re-encryption with Master Secret Security. ProvSec 2014: 194-205.


  44. 2013
  45. C. Song, X. Lin, X. Shen: Secure and effective image storage for cloud based e-healthcare systems. GLOBECOM 2013: 653-658.

  46. S. Ma, Z. Tang, Q. Xiao, J. Liu, T. T. Duong, X. Lin, H. Zhu: Detecting GPS information leakage in Android applications. GLOBECOM 2013: 826-831.

  47. Z. Zhang, H. Wang, X. Lin, H. Fang, D. Xuan: Effective epidemic control and source tracing through mobile social sensing over WBANs. INFOCOM 2013: 300-304.

  48. R. Lu, X. Lin, Z. Shi, B. Cao, X. Shen: IPAD: An incentive and privacy-aware data dissemination scheme in opportunistic networks. INFOCOM 2013: 445-449.

  49. B. Cao, J. W. Mark, Q. Zhang, R. Lu, X. Lin, X. Shen: On optimal communication strategies for cooperative cognitive radio networking. INFOCOM 2013: 1726-1734.

  50. R. Lu, X. Lin, Z. Shi, X. Shen: EATH: An efficient aggregate authentication protocol for smart grid communications. WCNC 2013: 1819-1824.

  51. C. Song, X. Lin, X. Shen, H. Y. Luo: Kernel regression based encrypted images compression for e-healthcare systems. WCSP 2013: 1-6.


  52. 2012
  53. X. Liang, X. Li, R. Lu, X. Lin, X. Shen: Enabling pervasive healthcare with privacy preservation in smart community. ICC 2012: 3451-3455.

  54. C. Carver, X. Lin: A privacy-preserving proximity friend notification scheme with opportunistic networking. ICC 2012: 5387-5392.

  55. H. Luo, G. He, X. Lin, X. Shen: Towards hierarchical security framework for smartphones. ICCC 2012: 214-219.

  56. X. Liang, X. Li, R. Lu, X. Lin, X. Shen: SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks. ICDCS 2012: 647-656.


  57. K. Alharbi, X. Lin: PDP: A Privacy-Preserving Data Provenance Scheme. ICDCS Workshops 2012: 500-505.

  58. X. Liang, X. Li, Q. Shen, R. Lu, X. Lin, X. Shen, W. Zhuang: Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks. INFOCOM 2012: 388-396.

  59. R. Lu, X. Lin, T. H. Luan, X. Liang, X. Li, L. Chen, X. Shen: PReFilter: An efficient privacy-preserving Relay Filtering scheme for delay tolerant networks. INFOCOM 2012: 1395-1403.

  60. K. Alharbi, X. Lin: LPDA: A lightweight privacy-preserving data aggregation scheme for smart grid. WCSP 2012: 1-6.


  61. 2011
  62. X. Liang, X. Li, R. Lu, X. Lin, X. Shen: An Efficient and Secure User Revocation Scheme in Mobile Social Networks. GLOBECOM 2011: 1-5.

  63. A. Alganas, X. Lin, A. Grami: EVSE: An Efficient Vehicle Social Evaluation Scheme with Location Privacy Preservation for Vehicular Communications. ICC 2011: 1-5.

  64. X. Liang, X. Li, R. Lu, X. Lin, X. Shen: Fine-Grained Identification with Real-Time Fairness in Mobile Social Networks. ICC 2011: 1-5.

  65. R. Lu, X. Lin, T. H. Luan, X. Liang, X. Shen: Anonymity Analysis on Social Spot Based Pseudonym Changing for Location Privacy in VANETs. ICC 2011: 1-5.

  66. X. Lin, R. Lu, X. Liang, X. Shen: STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. INFOCOM 2011: 2147-2155.


  67. 2010
  68. R. Lu, X. Lin, X. Liang, X. Shen: Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network. BODYNETS 2010: 8-15.

  69. R. Lu, X. Lin, X. Liang, X. Shen: Secure provenance: the essential of bread and butter of data forensics in cloud computing. AsiaCCS 2010: 282-292.

  70. X. Lin, C. Zhang, T. Dule: On Achieving Encrypted File Recovery. e-Forensics 2010: 1-13
  71. Z. Lei, T. Dule, X. Lin: A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space. e-Forensics 2010: 53-65.

  72. X. Lin, R. Lu, K. Foxton, X. Shen: An Efficient Searchable Encryption Scheme and Its Application in Network Forensics. e-Forensics 2010: 66-78.

  73. Y. Fan, J. Chen, X. Lin, X. Shen: Preventing Traffic Explosion and Achieving Source Unobservability in Multi-Hop Wireless Networks Using Network Coding. GLOBECOM 2010: 1-5.

  74. X. Liang, R. Lu, X. Lin, X. Shen: Message Authentication with Non-Transferability for Location Privacy in Mobile Ad hoc Networks. GLOBECOM 2010: 1-5.

  75. R. Lu, X. Lin, X. Liang, X. Shen: Sacrificing the Plum Tree for the Peach Tree: A Socialspot Tactic for Protecting Receiver-Location Privacy in VANET. GLOBECOM 2010: 1-5.

  76. R. Lu, X. Lin, X. Liang, X. Shen: FLIP: An Efficient Privacy-Preserving Protocol for Finding Like-Minded Vehicles on the Road. GLOBECOM 2010: 1-5.

  77. R. Lu, X. Lin, H. Zhu, X. Shen: TESP2: Timed Efficient Source Privacy Preservation Scheme for Wireless Sensor Networks. ICC 2010: 1-6.

  78. Y. Sun, R. Lu, X. Lin, X. Shen, J. Su: A Secure and Efficient Revocation Scheme for Anonymous Vehicular Communications. ICC 2010: 1-6.

  79. Y. Sun, X. Lin, R. Lu, X. Shen, J. Su: Roadside Units Deployment for Efficient Short-Time Certificate Updating in VANETs. ICC 2010: 1-5.

  80. H. Zhu, X. Lin, R. Lu, X. Shen, D. Xing, Z. Cao: An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. INFOCOM 2010: 605-613.

  81. R. Lu, X. Lin, X. Shen: SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. INFOCOM 2010: 632-640.

  82. X. Liang, R. Lu, X. Lin, X. Shen: PPC: Privacy-Preserving Chatting in Vehicular Peer-to-Peer Networks. VTC Fall 2010: 1-5.


  83. 2009
  84. Q. Chen, X. Lin, X. Shen, K. Hashimoto, N. Kato: A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. GLOBECOM 2009: 1-5.

  85. X. Lin: CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks. GLOBECOM 2009: 1-6.

  86. X. Lin, R. Lu, X. Shen: Location-Release Signature for Vehicular Communications. ICCCN 2009: 1-7.

  87. R. Lu, X. Lin, H. Zhu, X. Shen: SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. INFOCOM 2009: 1413-1421.


  88. 2008
  89. H. Zhu, X. Lin, R. Lu, X. Shen, P.-H. Ho: BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. GLOBECOM 2008: 1882-1886.

  90. H. Zhu, X. Lin, R. Lu, P.-H. Ho, X. Shen: AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. ICC 2008: 1436-1440.

  91. C. Zhang, X. Lin, R. Lu, P.-H. Ho: RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. ICC 2008: 1451-1457.

  92. R. Lu, X. Lin, C. Zhang, H. Zhu, P.-H. Ho, X. Shen: AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. ICC 2008: 1499-1504.

  93. X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen: Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. ICC 2008: 1530-1535.

  94. C. Zhang, R. Lu, X. Lin, Pin-Han Ho, X. Shen: An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. INFOCOM 2008: 246-250.

  95. R. Lu, X. Lin, H. Zhu, P.-H. Ho, X. Shen: ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. INFOCOM 2008: 1229-1237.

  96. R. Lu, X. Lin, H. Zhu, C. Zhang, P.-H. Ho, X. Shen: A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. WCNC 2008: 3237-3242.

  97. R. Lu, X. Lin, H. Zhu, P.-H. Ho, X. Shen, Z. Cao: A New Dynamic Group Key Management Scheme with Low Rekeying Cost. WCNC 2008: 3243-3248.


  98. 2007
  99. X. Lin, C. Zhang, X. Sun, P.-H. Ho, X. Shen: Performance Enhancement for Secure Vehicular Communications. GLOBECOM 2007: 480-485.

  100. H. Zhu, X. Lin, R. Lu, P.-H. Ho, X. Shen: Secure Localized Authentication and Billing for Wireless Mesh Networks. GLOBECOM 2007: 486-491.

  101. X. Lin, H. Zhu, P.-H. Ho, X. Shen: Two-Factor Localized Authentication Scheme for WLAN Roaming. ICC 2007: 1172-1178.

  102. X. Lin, R. Lu, H. Zhu, P.-H. Ho, X. Shen, Z. Cao: ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. ICC 2007: 1247-1253.

  103. X. Sun, X. Lin, P.-H. Ho: Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme. ICC 2007: 1539-1545.


  104. X. Lin, P.-H. Ho, X. Shen: Towards compromise-resilient localized authentication architecture for wireless mesh networks. QSHINE 2007: 23.

  105. C. Zhang, X. Sun, X. Lin, P.-H. Ho: A keyless facility access control system with wireless enabled personal devices. QSHINE 2007: 44.

  106. H. Zhu, X. Lin, P.-H. Ho, X. Shen, M. Shi: TTP Based Privacy Preserving Inter-WISP Roaming Architecture for Wireless Metropolitan Area Networks. WCNC 2007: 2957-2962.

  107. X. Lin, R. Lu, P.-H. Ho, X. Shen, Z. Cao: A Novel Compromise-Resilient Authentication System for Wireless Mesh Networks. WCNC 2007: 3541-3546.


  108. 2006
  109. X. Lin, H. Zhu, B. Lin, P.-H. Ho, X. Shen: A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. GLOBECOM 2006.

  110. Z. Zhang, P.-H. Ho, X. Lin, H. Shen: Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. ICISC 2006: 136-154.


  111. 2000
  112. X. Lin, J. W. Wong, W. Kou: Performance Analysis of Secure Web Server Based on SSL. ISW 2000: 249-261.

Book & Book Chapters:

  1. X. Lin, A. Ghorbani, K. Ren, S. Zhu, A. Zhang. Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 238, Springer 2018. (ISBN: 978-3-319-78812-8)

  2. X. Lin, A. Ghorbani, K. Ren, S. Zhu, A. Zhang. Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 239, Springer 2018. (ISBN: 978-3-319-78815-9)

  3. S. Guo, G. Wei, Y. Xiang, X. Lin, P. Lorenz. Testbeds and Research Infrastructures for the Development of Networks and Communities - 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 177, Springer 2017. (ISBN: 978-3-319-49579-8)

  4. S. Yu, X. Lin, J. Misic, X. Shen (Editors). Networking for Big Data. Chapman and Hall/CRC 2015. (ISBN: 9781482263497)

  5. X. Lin, R. Lu. Vehicular Ad Hoc Network Security and Privacy. Wiley-IEEE Press 2015. (ISBN: 978-1-118-91390-1)

  6. X. Liang, R. Lu, X. Lin and X. Shen. Security and Privacy in Mobile Social Networks. Springer Briefs in Computer Science, Springer 2013. (ISBN 978-1-4614-8856-9)

  7. X. Lin, H. Zhu, M. Shi, R. Lu, P.-H. Ho, X. Shen. Universal Authentication and Billing Architecture for Wireless MANs. Emerging Wireless LANs, Wireless PANs, and Wireless MANs: IEEE 802.11, IEEE 802.15, 802.16 Wireless Standard Family, Editor Y. Xiao, John Wiley & Sons, Inc., March 2009. (ISBN: 978-0-471-72069-0)

  8. J. W. Wong, L. Mirlas, W. Kou, X. Lin. Credit Card-Based Secure Online Payment. Payment Technologies for E-Commerce, Editor Weidong Kou, Springer-Verlag, 2003. (ISBN: 3-540-44007-0)