Chengliang Tian
Orcid: 0000-0002-2474-910X
According to our database1,
Chengliang Tian
authored at least 34 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Forward-Secure multi-user and verifiable dynamic searchable encryption scheme within a zero-trust environment.
Future Gener. Comput. Syst., 2025
2024
How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud.
IEEE Trans. Cloud Comput., 2024
MFCANet: A road scene segmentation network based on Multi-Scale feature fusion and context information aggregation.
J. Vis. Commun. Image Represent., 2024
Inf. Sci., 2024
2023
Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database.
World Wide Web (WWW), July, 2023
GMetaNet: Multi-scale ghost convolutional neural network with auxiliary MetaFormer decoding path for brain tumor segmentation.
Biomed. Signal Process. Control., May, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Theory, 2022
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy.
Peer-to-Peer Netw. Appl., 2022
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability.
J. Cloud Comput., 2022
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage.
IACR Cryptol. ePrint Arch., 2022
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022
IEEE Access, 2022
Privacy-Enhanced and Verifiable Compressed Sensing Reconstruction for Medical Image Processing on the Cloud.
IEEE Access, 2022
2021
Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems.
Mob. Inf. Syst., 2021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time.
IEEE Access, 2021
Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
2020
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Securely and Efficiently Computing the Hermite Normal Form of Integer Matrices via Cloud Computing.
IEEE Access, 2020
2019
Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations.
J. Cloud Comput., 2019
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019
2018
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018
2017
J. Syst. Softw., 2017
2016
J. Netw. Comput. Appl., 2016
2015
Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle.
J. Comput. Sci. Technol., 2015
2014
New transference theorems on lattices possessing n<sup>∈</sup>-unique shortest vectors.
Discret. Math., 2014
2012
New Transference Theorems on Lattices Possessing n<sup>ε</sup>-unique Shortest Vectors.
IACR Cryptol. ePrint Arch., 2012
2010
IACR Cryptol. ePrint Arch., 2010