Anjia Yang
Orcid: 0000-0002-7958-6571
According to our database1,
Anjia Yang
authored at least 73 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Byzantine-Robust and Privacy-Preserving Federated Learning With Irregular Participants.
IEEE Internet Things J., November, 2024
IEEE Trans. Mob. Comput., October, 2024
Privacy-Preserving Travel Recommendation Based on Stay Points Over Outsourced Spatio-Temporal Data.
IEEE Trans. Intell. Transp. Syst., October, 2024
An Identity-Based Strong Designated Verifier Dual-Signature Scheme With Constrained Delegatability.
IEEE Internet Things J., May, 2024
IEEE Internet Things J., April, 2024
IEEE Trans. Circuits Syst. Video Technol., March, 2024
IEEE Internet Things J., January, 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers.
IEEE Internet Things J., September, 2023
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.
Inf. Sci., May, 2023
Ad Hoc Networks, March, 2023
Wirel. Networks, February, 2023
PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation.
IEEE Trans. Dependable Secur. Comput., 2023
Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud.
IEEE Trans. Cloud Comput., 2023
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
2022
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Dynamic Multitarget Detection Algorithm of Voxel Point Cloud Fusion Based on PointRCNN.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Dependable Secur. Comput., 2022
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Internet Things J., 2022
IACR Cryptol. ePrint Arch., 2022
Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients.
CoRR, 2022
2021
Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage.
IEEE Trans. Cloud Comput., 2021
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021
IEEE Internet Things J., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid.
IEEE Trans. Smart Grid, 2020
IEEE Trans. Emerg. Top. Comput., 2020
Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization.
IACR Cryptol. ePrint Arch., 2020
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Parallel Distributed Syst., 2019
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019
2018
IEEE Trans. Mob. Comput., 2018
REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.
IEEE Netw., 2018
J. Inf. Secur. Appl., 2018
Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Sci. China Inf. Sci., 2018
2017
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Serv. Comput., 2017
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Secur. Commun. Networks, 2017
Int. J. Bifurc. Chaos, 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017
2016
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization.
Comput. Networks, 2016
Proceedings of the Computer Security - ESORICS 2016, 2016
2015
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction.
Secur. Commun. Networks, 2015
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015
2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
2012
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.
Proceedings of the Information and Communications Security - 14th International Conference, 2012