H
Haiping Huang
Researcher at Nanjing University
Publications - 9
Citations - 51
Haiping Huang is an academic researcher from Nanjing University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 1, co-authored 1 publications receiving 1 citations.
Papers
More filters
Journal ArticleDOI
TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-enabled IIoT
TL;DR: TRAC as discussed by the authors is an efficient, traceable and revocable access control scheme named TRAC for mHealth in 5G-enabled Industrial Internet of Things (IIoT) devices, which also brings the challenge of keeping the PHRs confidentiality and preventing unauthorized access.
Journal ArticleDOI
Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT
TL;DR: Comprehensive comparisons and implementation results indicate that SEWAC can better achieve weighted access control, compressed ciphertext length, efficient key generation, and the assurance of the outsourced decryption result.
Journal ArticleDOI
Differential privacy protection scheme based on community density aggregation and matrix perturbation
TL;DR: Wang et al. as mentioned in this paper proposed a differential privacy protection scheme for social network data based on community density aggregation and matrix perturbation (MPCD) and introduced the correlation coefficient k to preserve differential privacy and availability of edge-related data.
Proceedings ArticleDOI
On the Privacy Risks of Cell-Based NAS Architectures
TL;DR: Through extensive experiments, this paper sheds light on how to design robust NAS architectures against privacy attacks, and also offers a general methodology to understand the hidden correlation between the NAS-searched architectures and other privacy risks.
Journal ArticleDOI
MB-BC: Drug Traceability System Based on Multibranched Blockchain Structure
TL;DR: Security and performance evaluations show that the proposed drug traceability scheme, MB-BC, is advantageous in terms of data security, system robustness, supervisibility, and traceability, as well as efficient interms of blockchain throughput, data query time, and blockchain consensus consumptions, compared with other typical approaches.