Jianfeng Ma

Jianfeng Ma
Lanzhou University of Technology · SHENYANG BLOWER WORKS GROUP

About

473
Publications
37,129
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,444
Citations

Publications

Publications (473)
Article
Because of its closeness to users, fog computing responds faster than cloud computing. Thus, it has been deployed to various applications, such as healthcare system. Recently, to ensure the secure communication of the fog-based healthcare system, Jia et al. proposed an authenticated key agreement scheme. Moreover, in view of the high computation co...
Article
A [email protected]3O4 material, Fe3O4 coated with carbon, was prepared by a simple one-pot hydrothermal method. The [email protected]3O4 material was investigated with persulfate (PS) and light to degrade tetracycline (TC) as a function of pH, aeration conditions and quenching. Experimental results suggest that TC was effectively degraded in the [...
Article
Pollution of the environment with hexavalent chromium (Cr(VI)) has attracted a lot of concern recently as the high toxicity and mobility of Cr(VI). Hence, the removal of Cr(VI) from aquatic systems has become an urgent issue. In this study, we synthesized an efficient photocatalyst of cubic CaTiO3 particles via a facile solvothermal method, and inv...
Article
Full-text available
MnO2/Ni(OH)2 was grown in situ on three-dimensional nickel foam (NF), which was then used to activate potassium persulfate (PS) for orange II (OII) degradation. The structure and morphology of the prepared materials were characterized by X-ray diffraction, field emission scanning electron microscopy and transmission electron microscopy. The removal...
Article
Full-text available
In this paper, the g-C3N4/ZnIn2S4 composite was synthesized by a two-stage hydrothermal method. The microstructure, surface, and optical properties of the composite were thoroughly characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), X-ray photoelectron spectroscopy (XPS), Brunauer-Emmett-Teller (BET) surface area analysis,...
Article
With the popularity of image editing tools, the originality and information security of images are facing serious threats. The most common threat is splicing forgery that copies a part of the area from one donor image to the acceptor one. Some research works were proposed to protect the image originality, whereas they are still difficult to apply i...
Article
Full-text available
Because of the powerful computing and storage capability in cloud computing, machine learning as a service (MLaaS) has recently been valued by the organizations for machine learning training over some related representative datasets. When these datasets are collected from different organizations and have different distributions, multi-task learning...
Article
Full-text available
Biochar derived from Lentinus edodes (LBC) and CuFe2O4 (CuFe2O4@LBC) composites were prepared by the hydrothermal method, and were applied to activate persulfate (PDS) for degrading tetracycline (TC) in a wide pH range. The CuFe2O4@LBC composites were characterized by XRD, FTIR, SEM, and XPS. LBC-derived biochars greatly reduced the aggregation of...
Conference Paper
Full-text available
In Internet-of-vehicles, vehicles cooperate with each other by transmitting Internet-of-vehicles and location-based service (LBS) providers optimize services by analyzing trajectory data collected from drivers. Nevertheless, illegal trajectories generated by attackers or malicious drivers can obfuscate the process of analysis and breach the quality...
Article
Carbon dots (CDs)-modified Cr2O3 ([email protected]2O3) composites were synthesized by solvothermal process followed by calcination to improve their catalytic performance. The physical and chemical properties of the composites were determined by XRD, SEM, TEM, BET and XPS. With the aid of sodium persulfate, the activity of [email protected]2O3 to o...
Article
The Ti3C2-based MXene with unique lamellar nanostructure and high conductivity is expected to effectively improve photocatalytic ability of composites as a cocatalyst. Herein, two dimensional Ti3C2-based MXene nanosheets decorated with copper sulfide particles ([email protected]) were synthesized by hydrothermal treatment to boost catalytic persulf...
Preprint
MnO 2 /Ni(OH) 2 was grown in situ on three-dimensional nickel foam (NF), which was then used to activate potassium persulfate (PS) for orange II (OII) degradation. The structure and morphology of the prepared materials were characterized by X-ray diffraction (XRD), field emission scanning electron microscopy (FE-SEM) and transmission electron micro...
Article
The MoS2-ZnFe2O4 composite catalyst was fabricated by a hydrothermal method and applied to decompose tetracycline (TC) by activating persulfate (PS) with the assistance of visible light (Vis). The TC elimination efficiency of MoS2-ZnFe2O4 catalyst reached 84.5% within 30 min, which was much higher than that of either MoS2 or ZnFe2O4 alone and this...
Article
Full-text available
Industrial Internet of Things (IIoT) devices have been widely used for monitoring and controlling the process of the automated manufacturing. Due to limited computing capacity of the IIoT sensors in the production line, the scheduling task in production line needs to be offloaded to the edge computing servers (ECS). To obtain desired quality of ser...
Preprint
Artificial intelligence and machine learning have been integrated into all aspects of our lives and the privacy of personal data has attracted more and more attention. Since the generation of the model needs to extract the effective information of the training data, the model has the risk of leaking the privacy of the training data. Membership infe...
Article
Full-text available
Cloud operating system (Cloud OS) is the heart of cloud management platform that takes control of various cloud resources. Therefore, it attracts numerous attacks, especially unauthorized access. Many existing works adopt role-based access control (RBAC) model for Cloud OS access control and token-based approaches as user credentials of sessions or...
Article
Recently, the explosive development of unmanned aerial vehicles (UAVs) promotes its wide application in various services such as package delivery, traffic monitoring. However, due to the high‐speed movement, current UAVs usually adopts the unsecure channel without the complicated authentication mechanism to ensure real‐time communication. In this p...
Article
Full-text available
In the process of handling criminal cases, it is crucial to avoid evidence tampering and ensure the integrity, consistency, and nonrepudiation of evidence transfer records, which is highly related to the fairness and credibility of the judiciary. To address this problem, we propose a consortium blockchain network to record evidence transfer events...
Preprint
Full-text available
Backdoor injection attack is an emerging threat to the security of neural networks, however, there still exist limited effective defense methods against the attack. In this paper, we propose BAERASE, a novel method that can erase the backdoor injected into the victim model through machine unlearning. Specifically, BAERASE mainly implements backdoor...
Article
Here in, a special catalytic system of potassium persulfate (K2S2O8, PS) activated by Bi2MoO6–CuS composite was established for the orange II (OII) degradation under visible light. The Bi2MoO6–CuS composite was synthesized by a two-step hydrothermal and solvothermal methods. The structure, morphology, light absorption and photocatalytic properties...
Article
Location-Based Services (LBSs) are one of the most frequently used mobile applications in the modern society. Geo-Indistinguishability (Geo-Ind) is a promising privacy protection model for LBSs since it can provide formal security guarantees for location privacy. However, Geo-Ind undermines the statistical location distribution of users on the LBS...
Article
Full-text available
With the assistance of emerging techniques, such as cloud computing, fog computing and Internet of Things (IoT), smart city is developing rapidly into a novel and well-accepted service pattern these days. The trend also facilitates numerous relevant applications, e.g., smart health care, smart office, smart campus, etc., and drives the urgent deman...
Article
Searchable encryption(SE) allows users to efficiently retrieve data over encrypted cloud data, but most existing SE schemes only support exact keyword search, resulting in false results due to minor typos or format inconsistencies of queried keywords. The fuzzy keyword search can avoid this limitation, but still incurs low search accuracy and effic...
Article
Load balancing mechanism in technologies such as cloud computing has provided a huge opportunity for the development of large-scale projects. Although the conventional view is to build mechanisms that adopt a dynamic load balancing strategy, existing strategies cannot automatically scale platform (network) servers (nodes) to adapt for dynamic reque...
Article
The complicated multi-step attacks, such as Advanced Persistent Threats (APTs), have brought considerable threats to cybersecurity because they are naturally varied and complex. Therefore, studying the strategies of adversaries and making predictions are still significant challenges for attack preventions. To address these problems, we propose Deep...
Article
Layered α-Fe2O3/CuS nanoflowers with abundant active sites were synthesized by a hydrothermal method. The heterogeneous composite catalyst of α-Fe2O3/CuS nanoflowers exhibited remarkable degradation capacity of 97.8% within 25 min for...
Article
Full-text available
Wrist-worn smart devices are being used to share various sensitive personal information in various fields such as social, medical treatment, sports, etc. Secure pairing establishing a trusted channel between involved devices is a prerequisite to ensure data transmission security. Handshake has been employed to realize secure pairing between devices...
Article
With the popularity of location based services, spatial keyword query has become an important application. In order to save the storage and computational costs, most data owners will outsource the data to the cloud server, but this will lead to two problems, such as privacy leakage and heavy network bandwidth burden. To solve above problems, we pro...
Article
Full-text available
5G heterogeneous network (HetNet) is a novel network topology that integrates various kinds of wireless access technologies such as 4G Long-Term Evolution (LTE), Wi-Fi, and so on. Despite greatly improving spectrum efficiency, it poses enormous challenges to spectrum e-auction. Firstly, due to high mobility, bidders may be interested in different s...
Article
Novel core shell CoFe2O4–CeO2 (CoFe–Ce) nanocomposite was synthesized and investigated as an efficient photocatalyst to activate sodium persulfate (Na2S2O8, PS) for orange Ⅱ (OⅡ) degradation. The CoFe–Ce nanocomposite was successfully designed and synthesized by a facile hydrothermal reaction followed by calcination and characterized by X-ray diffr...
Article
Fog-assisted Internet of Things (IoT) can outsource the massive data of resource-constraint IoT devices to cloud and fog nodes. Meanwhile, it enables convenient and low time-delay data sharing services which relies heavily on high security of data confidentiality and fine-grained access control. Many efforts have been focused on this urgent require...
Article
Symmetric Searchable Encryption (SSE) schemes facilitate searching over encrypted data, and have been extensively explored to improve function, efficiency or security. There are, however, additional functions that we need to consider in a real-world setting. For example, forward and backward privacy are required to adequately secure newly added doc...
Article
Edge computing is a new computing paradigm, whichprovides computing resources at the edge of the network close to the data source and reduces the response delay and data transmission bandwidth. Data aggregation is a fundamental computing service in edge computing. However, existing data aggregation schemes do not consider the problem of fine-graine...
Article
Full-text available
It is crucial to generate random graphs with specific structural properties from real graphs, which could anonymize graphs or generate targeted graph data sets. The state-of-the-art method called spectral graph forge (SGF) was proposed at INFOCOM 2018. This method uses a low-rank approximation of the matrix by throwing away some spectrums, which pr...
Article
Collaborative learning has been used to train a joint model on geographically diverse data through periodically sharing knowledge. Although participants keep the data locally in collaborative learning, the adversary can still launch inference attacks through participants’ shared information. In this paper, we focus on the property inference attack...
Article
Federated Learning (FL), a cooperative distributed learning framework, has been employed in various intelligent Internet-of-Things (IoT) applications (e.g., smart health-care, smart home, smart industry). However, there may be malicious devices in these IoT applications inferring other devices’ privacy or destroying the uploaded model parameters. B...
Article
Full-text available
Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security concerns such as illegally access and user privacy leakage are inflicted. Aiming to protect the secu...
Article
Full-text available
Due to the mobility, flexibility and autonomy of drones, the Internet of Drones (IoD) have gained momentum recently and are being widely used in a variety of fields, such as agriculture, industry, and transportation. However, due to the intrinsic openness of wireless communication channels in IoD, the data generated by drones are facing new securit...
Article
The increasing awareness in privacy has partly contributed to the renewed interest in privacy-preserving encrypted image retrieval, and designing for outsourced images stored on cloud servers, etc. However, there are some limitations in these existing schemes such as low retrieval accuracy, low retrieval efficiency, and less efficient result verifi...
Article
Full-text available
As an emerging concept in the intelligent transportation system (ITS), Opportunistic Autonomous Vehicle Platoon (OAVP) enables autonomous vehicles to self-organize a temporary platoon and travel together. Whereas, electing the platoon leader is a crucial issue to be solved in this scenario. The platoon leader not only suffers from more wind resista...
Article
Blockchain allows for secure management of a shared ledger by agreement protocols, where transactions are validated over network without central authorities. Although the agreement protocol has been thoroughly conducted of propagation and consensus researches, mobility of nodes in unstructured overlay networks has not received much attention. Besid...
Article
Fe2O3@CeO2 nanocomposites were synthesized by water bath heating method to activate NaHSO3 for Orange II dye (50 mgL⁻¹) degradation, which reached up to 98.2% within 120 min. The Fe2O3@CeO2 and NaHSO3 dosages and the molar ratios of Ce and Fe in Fe2O3@CeO2 were investigated to obtain the optimum conditions as follows: 0.02 g Fe2O3@CeO2, 0.1 g NaHSO...
Article
Ciphertext retrieval under heterogeneous datasets is a critical concern in the cloud-assisted Internet of Things (IoT). Previous ciphertext retrieval schemes eliminate computation burden and security concerns to some extent, but cannot support the encrypted heterogeneous datasets. To solve this problem, in this paper we propose a transparent cipher...
Article
Ranked keyword search has gained increasing attention due to its attractive advantages such as flexibility and accessibility. However, most existing ranked keyword search schemes ignore the semantic associations between the documents and queries. To solve this challenging issue in cloud-assisted edge computing, we first design the Semantic-aware Ra...
Article
Vehicular Ad hoc Networks (VANETs) play an increasing role in a number of applications, particularly those associated with location-based services (e.g., spatial keyword searches -- SKS). However, there is a need to strike a balance between privacy guarantee and search efficiency, and existing SKS solutions cannot be directly implemented in VANETs....
Article
Edge services provide an effective and superior means of real-time transmissions and rapid processing of information in the Industrial Internet of Things (IIoT). However, the continuous increase in the number of smart devices results in privacy leakage and insufficient model accuracy of edge services. To tackle these challenges, in this research, w...
Article
Vehicles gather data collected by sensor nodes, combined with messages obtained from the other nodes in vehicular ad hoc networks (VANETs), to achieve safe driving. An announcement type of message is sent in the VANET; it is collected by mobile vehicles, uploaded to a cloud server for storage, and provided to other vehicles for reference. However...
Article
Automatic community divisions often facilitate the convenience of rich community applications such as interest group recommendations. However, it faces a serious community security issue referred to as community penetration (CommPen) such that the colluding attackers might very smartly deceive the community detection mechanism and infiltrate into...
Article
Searchable Symmetric Encryption (SSE), which enables users to search over encrypted data without decryption, has gained increasing attention from both academic and industrial fields. However, existing SSE schemes either have low search efficiency or cannot support multi-keyword search, dynamic updates, and result verification simultaneously. To sol...
Article
Mg doped Ni(OH)2 was synthesized and investigated as an efficient material to activate persulfate (PS) for phenol degradation. The property of the Ni(OH)2 material was enhanced by Mg doping as the removal efficiency of phenol was increased from 74.82 % in Ni(OH)2/PS system to 89.53 % in Mg-doped Ni(OH)2/PS system within 20 min. Such a high removal...
Article
Decoding the real structure from the Social Internet of Things (SIoT) network with large-scale noise structure plays a fundamental role in data mining. Protecting private information from leakage in the mining process and obtaining accurate mining results is a significant challenge. To tackle this issue, we present a graph clustering privacy-preser...
Article
Federated learning has become prevalent in medical diagnosis due to its effectiveness in training a federated model among multiple health institutions (i.e., Data Islands (DIs)). However, increasingly massive DI-level poisoning attacks have shed light on a vulnerability in federated learning, which inject poisoned data into certain DIs to corrupt t...