Sign in
Guohua Tian
ORCID
Publication Activity (10 Years)
Years Active: 2018-2023
Publications (10 Years): 16
Top Topics
Ciphertext
Cloud Storage
Data Streaming
Nearest Neighbor
Top Venues
Int. J. Comput. Sci. Eng.
Comput. Stand. Interfaces
FCS
IEEE Trans. Computers
</>
Publications
</>
Shuqin Liu
,
Yusong Yao
,
Guohua Tian
,
Jianghong Wei
,
Xialin Liu
A blockchain-based compact audit-enabled deduplication in decentralized storage.
Comput. Stand. Interfaces
85 (2023)
Yunhan Hu
,
Guohua Tian
,
Anqi Jiang
,
Shuqin Liu
,
Jianghong Wei
,
Jianfeng Wang
,
Shichong Tan
A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain.
Comput. Stand. Interfaces
83 (2023)
Tianran Dang
,
Guohua Tian
,
Jianghong Wei
,
Shuqin Liu
Blockchain-based collaborative intrusion detection scheme.
Int. J. Comput. Sci. Eng.
26 (4) (2023)
Jingkai Zhou
,
Guohua Tian
,
Jianghong Wei
Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage.
Int. J. Comput. Sci. Eng.
26 (4) (2023)
Guohua Tian
,
Jianghong Wei
,
Miroslaw Kutylowski
,
Willy Susilo
,
Xinyi Huang
,
Xiaofeng Chen
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers
72 (7) (2023)
Zehao Li
,
Guohua Tian
,
Shichong Tan
Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication.
SocialSec
(2022)
Guohua Tian
,
Yunhan Hu
,
Jianghong Wei
,
Zheli Liu
,
Xinyi Huang
,
Xiaofeng Chen
,
Willy Susilo
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput.
19 (6) (2022)
Ruichi Yan
,
Guohua Tian
,
Shichong Tan
,
Zhengtao Jiang
A Practical Detection and Defense Scheme Against Smart Contract Attacks Based on Transaction Features.
MobiSec
(2022)
Angtai Li
,
Guohua Tian
,
Meixia Miao
,
Jianpeng Gong
Blockchain-based cross-user data shared auditing.
Connect. Sci.
34 (1) (2022)
Jianghong Wei
,
Guohua Tian
,
Jun Shen
,
Xiaofeng Chen
,
Willy Susilo
Optimal Verifiable Data Streaming Protocol with Data Auditing.
ESORICS (2)
(2021)
Meixia Miao
,
Guohua Tian
,
Willy Susilo
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model.
Int. J. Intell. Syst.
36 (6) (2021)
Ying Xie
,
Guohua Tian
,
Haoran Yuan
,
Chong Jiang
,
Jianfeng Wang
Client-side ciphertext deduplication scheme with flexible access control.
Int. J. Comput. Sci. Eng.
23 (2) (2020)
Guohua Tian
,
Hua Ma
,
Ying Xie
,
Zhenhua Liu
Randomized deduplication with ownership management and data sharing in cloud storage.
J. Inf. Secur. Appl.
51 (2020)
Hua Ma
,
Guohua Tian
,
Linchao Zhang
Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing.
Int. J. Netw. Secur.
22 (1) (2020)
Hua Ma
,
Ying Xie
,
Jianfeng Wang
,
Guohua Tian
,
Zhenhua Liu
Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access
7 (2019)
Hua Ma
,
Guohua Tian
,
Zhenhua Liu
,
Linchao Zhang
Secure Data Deduplication with Ownership Management and Sharing in Cloud Storage.
FCS
(2018)