default search action
Arthur Sandor Voundi Koe
Person information
- affiliation: Guangzhou University, School of Computer Science and Cyber Engineering, Guangzhou, China
- affiliation: Hunan University, College of Information Science and Engineering, Changsha, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Weichu Deng, Jin Li, Hongyang Yan, Arthur Sandor Voundi Koe, Teng Huang, Jianfeng Wang, Cong Peng:
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols. J. Inf. Secur. Appl. 86: 103885 (2024) - [j20]Wanqing Jie, Wangjie Qiu, Arthur Sandor Voundi Koe, Jianhong Li, Yin Wang, Yaqi Wu, Jin Li:
A Secure and Flexible Blockchain-Based Offline Payment Protocol. IEEE Trans. Computers 73(2): 408-421 (2024) - [c4]Zhengxi Zhong, Hongyang Yan, Arthur Sandor Voundi Koe, Weichu Deng, Junyang Li:
Towards Key-Escrow Free Attribute-Based Encryption for Self-Sovereign Identity Systems. IWQoS 2024: 1-10 - 2023
- [j19]Haoyu Liu, Shiwen Zhang, Mengling Li, Wei Liang, Voundi Koe Arthur Sandor:
A real-time privacy-preserving scheme based on grouping queries for continuous location-based services. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j18]Arthur Sandor Voundi Koe, Shan Ai, Qi Chen, Juan Tang, Kongyang Chen, Shiwen Zhang, Xiehua Li:
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for IoT. Inf. Sci. 632: 87-104 (2023) - [j17]Wanqing Jie, Qi Chen, Jiaqi Wang, Arthur Sandor Voundi Koe, Jin Li, Pengfei Huang, Yaqi Wu, Yin Wang:
A novel extended multimodal AI framework towards vulnerability detection in smart contracts. Inf. Sci. 636: 118907 (2023) - [j16]Shiwen Zhang, Yibin Yang, Wei Liang, Voundi Koe Arthur Sandor, Guoqi Xie, Kim-Kwang Raymond Choo:
MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration. J. Syst. Archit. 144: 102998 (2023) - 2022
- [j15]Xiaoying Wang, Zhiwei Liang, Arthur Sandor Voundi Koe, Qingwu Wu, Xiaodong Zhang, Haitao Li, Qintai Yang:
Secure and efficient parameters aggregation protocol for federated incremental learning and its applications. Int. J. Intell. Syst. 37(8): 4471-4487 (2022) - [j14]Wangyong Lv, Shijing Zeng, Jiao Zhou, Tingting Li, Arthur Sandor Voundi Koe:
Interval-valued Pythagorean fuzzy linguistic KPCA model based on TOPSIS and its application for emergency group decision making. Int. J. Intell. Syst. 37(9): 6415-6437 (2022) - [j13]Arthur Sandor Voundi Koe, Qi Chen, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang, Duncan S. Wong:
Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud. Int. J. Intell. Syst. 37(11): 9774-9797 (2022) - [j12]Yilei Wang, Zhaojie Wang, Minghao Zhao, Xueyang Han, Huiyu Zhou, Xiaoying Wang, Arthur Sandor Voundi Koe:
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems. Inf. Sci. 601: 1-17 (2022) - [j11]Arthur Sandor Voundi Koe, Shan Ai, Pengfei Huang, Anli Yan, Juan Tang, Qi Chen, Kanghua Mo, Wanqing Jie, Shiwen Zhang:
Sender anonymity: Applying ring signature in gateway-based blockchain for IoT is not enough. Inf. Sci. 606: 60-71 (2022) - [j10]Shan Ai, Guoyu Yang, Chang Chen, Kanghua Mo, Wangyong Lv, Arthur Sandor Voundi Koe:
ESM: Selfish mining under ecological footprint. Inf. Sci. 606: 601-613 (2022) - [j9]Shiwen Zhang, Mengling Li, Wei Liang, Voundi Koe Arthur Sandor, Xiong Li:
A Survey of Dummy-Based Location Privacy Protection Techniques for Location-Based Services. Sensors 22(16): 6141 (2022) - [c3]Pengfei Huang, Wanqing Jie, Arthur Sandor Voundi Koe, Ruitao Hou, Hongyang Yan, Mourad Nouioua, Phan Duc Thien, Jacques Mbous Ikong, Camara Lancine:
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric. ML4CS (2) 2022: 455-468 - 2021
- [j8]Shan Ai, Arthur Sandor Voundi Koe, Teng Huang:
Adversarial perturbation in remote sensing image recognition. Appl. Soft Comput. 105: 107252 (2021) - [j7]Shiwen Zhang, Tingting Yao, Voundi Koe Arthur Sandor, Tien-Hsiung Weng, Wei Liang, Jinshu Su:
A novel blockchain-based privacy-preserving framework for online social networks. Connect. Sci. 33(3): 555-575 (2021) - [c2]Wanqing Jie, Arthur Sandor Voundi Koe, Pengfei Huang, Shiwen Zhang:
Full-Stack Hierarchical Fusion of Static Features for Smart Contracts Vulnerability Detection. Blockchain 2021: 95-102 - [c1]Arthur Sandor Voundi Koe, Juan Tang, Shan Ai, Hongyang Yan, Shiwen Zhang:
Revocable Outsourcing Multi-Authority ABE for Medical Data in Mobile Cloud. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 338-345 - 2020
- [j6]Shiwen Zhang, Tingting Yao, Wei Liang, Voundi Koe Arthur Sandor, Kuan-Ching Li:
An Efficient Privacy-Preserving Multi-Keyword Query Scheme in Location Based Services. IEEE Access 8: 154036-154049 (2020) - [j5]Fulin Zhou, Junyi Li, Yaping Lin, Jianhao Wei, Voundi Koe Arthur Sandor:
A Secure and Efficient Task Matching Scheme for Spatial Crowdsourcing. IEEE Access 8: 155819-155831 (2020)
2010 – 2019
- 2019
- [j4]Zhou Xu, Yaping Lin, Voundi Koe Arthur Sandor, Zhisheng Huang, Xinbo Liu:
A lightweight privacy and integrity preserving range query scheme for mobile cloud computing. Comput. Secur. 84: 318-333 (2019) - [j3]Voundi Koe Arthur Sandor, Yaping Lin, Xiehua Li, Feng Lin, Shiwen Zhang:
Efficient decentralized multi-authority attribute based encryption for mobile cloud data storage. J. Netw. Comput. Appl. 129: 25-36 (2019) - [j2]Jianhao Wei, Yaping Lin, Xin Yao, Voundi Koe Arthur Sandor:
Differential privacy-based trajectory community recommendation in social network. J. Parallel Distributed Comput. 133: 136-148 (2019) - [j1]Arthur Sandor Voundi Koe, Yaping Lin:
Offline privacy preserving proxy re-encryption in mobile cloud computing. Pervasive Mob. Comput. 59 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint