Changji Wang
Orcid: 0000-0003-2988-4404
According to our database1,
Changji Wang
authored at least 34 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
LDCDroid: Learning data drift characteristics for handling the model aging problem in Android malware detection.
Comput. Secur., 2025
2024
Online/offline remote data auditing with strong key-exposure resilience for cloud storage.
Comput. Stand. Interfaces, March, 2024
FedSCD: Federated Learning with Semi-centralization, Discrepancy-Awareness and Dual-Model Collaboration.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Proceedings of the Information Security Practice and Experience, 2023
2017
Sensors, 2017
Cloud-aided scalable revocable identity-based encryption scheme with ciphertext update.
Concurr. Comput. Pract. Exp., 2017
Privacy-Preserving Handover Authentication Protocol from Lightweight Identity-Based Signature for Wireless Networks.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Insecurity of Cheng et al.'s Efficient Revocation in Ciphertext-Policy Attribute-Based Encryption Based Cryptographic Cloud Storage.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
P3ASC: Privacy-Preserving Pseudonym and Attribute-Based Signcryption Scheme for Cloud-Based Mobile Healthcare System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
2016
J. Ambient Intell. Humaniz. Comput., 2016
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme.
Proceedings of the Smart Computing and Communication, 2016
2015
Privacy-preserving Cloud-based Personal Health Record System Using Attribute-based Encryption and Anonymous Multi-ReceiverIdentity-based Encryption.
Informatica (Slovenia), 2015
Attribute-Based Ring Signcryption Scheme and Its Application in Wireless Body Area Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
Quantum Inf. Process., 2013
Design and implementation of a secure cloud-based personal health record system using ciphertext-policy attribute-based encryption.
Int. J. Intell. Inf. Database Syst., 2013
Int. J. Grid Util. Comput., 2013
A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Keyword Search Function.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Implementing a Personal Health Record Cloud Platform Using Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2009
2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Cryptanalysis and Improvement of a Certificateless Proxy Signature Scheme from Bilinear Pairings.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
On the Security of an Identity-Based Threshold Proxy Signature Scheme with Known Signers.
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of ICEBE 2007, 2007
2005
Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy.
Proceedings of the Distributed and Parallel Computing, 2005