Haifeng Qian
Orcid: 0000-0002-7189-6903
According to our database1,
Haifeng Qian
authored at least 189 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Des. Codes Cryptogr., July, 2024
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control.
Frontiers Comput. Sci., June, 2024
Des. Codes Cryptogr., January, 2024
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024
Efficient and privacy-preserving outsourced unbounded inner product computation in cloud computing.
J. Syst. Archit., 2024
Constrained Decoding for Code Language Models via Efficient Left and Right Quotienting of Context-Sensitive Grammars.
CoRR, 2024
Joint Beamforming Design for Secure Communications Over An IRS-Aided Untrusted Relay Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Efficient and Scalable Circuit-Based Protocol for Multi-party Private Set Intersection.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
IEEE Trans. Wirel. Commun., December, 2023
IEEE Trans. Inf. Theory, August, 2023
IET Inf. Secur., July, 2023
Theor. Comput. Sci., June, 2023
PartitionChain: A Scalable and Reliable Data Storage Strategy for Permissioned Blockchain.
IEEE Trans. Knowl. Data Eng., April, 2023
Characterization of the East - West Spatial Uniformity for GOES-16/17 ABI Bands Using the Moon.
Remote. Sens., April, 2023
Peer Peer Netw. Appl., January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
CoRR, 2023
CoRR, 2023
NLSP: A novel lattice-based secure primitive for privacy-preserving smart grid communications.
Concurr. Comput. Pract. Exp., 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
IEEE Trans. Veh. Technol., 2022
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage.
IEEE Trans. Cloud Comput., 2022
Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks.
EURASIP J. Wirel. Commun. Netw., 2022
Comput. J., 2022
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the Neural Information Processing - 29th International Conference, 2022
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022
2021
IEEE Trans. Inf. Theory, 2021
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
IEEE Trans. Inf. Forensics Secur., 2021
Theor. Comput. Sci., 2021
Secur. Commun. Networks, 2021
IEEE Commun. Lett., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Theor. Comput. Sci., 2020
Calibration and Validation of Antenna and Brightness Temperatures from Metop-C Advanced Microwave Sounding Unit-A (AMSU-A).
Remote. Sens., 2020
KSII Trans. Internet Inf. Syst., 2020
Joint Beamforming Design for IRS-Aided Communications with Channel Estimation Errors.
CoRR, 2020
With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models.
CoRR, 2020
CoRR, 2020
CoRR, 2020
Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data.
IEEE Access, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Beamforming Design for Intelligent Reflecting Surface Aided Multi-Antenna MU-MIMO Communications with Imperfect CSI.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019
Proceedings of the 7th International Conference on Learning Representations, 2019
2018
IEEE Trans. Wirel. Commun., 2018
Pervasive Mob. Comput., 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure Communications.
Proceedings of the 2018 International Conference on Computing, 2018
Proceedings of the Earth Observing Systems XXIII, 2018
In-orbit response versus scan-angle (RVS) validation for the GOES-16 ABI solar reflective bands.
Proceedings of the Earth Observing Systems XXIII, 2018
Proceedings of the Earth Observing Systems XXIII, 2018
Validation of GOES-16 ABI reflective solar band calibration through reanalysis and comparison with field campaign data.
Proceedings of the Earth Observing Systems XXIII, 2018
Proceedings of the Earth Observing Systems XXIII, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
Wirel. Commun. Mob. Comput., 2017
Machine Learning for Noise Sensor Placement and Full-Chip Voltage Emergency Detection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017
Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study.
Peer-to-Peer Netw. Appl., 2017
Buffer-aided secure two-hop communications with adaptive link selection and on/off power control.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Multi-resolution codebook design for two-stage precoding in FDD massive MIMO networks.
Proceedings of the 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2017
Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
Proceedings of the Earth Observing Systems XXII, 2017
Proceedings of the ACM Turing 50th Celebration Conference, 2017
2016
Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Inf. Forensics Secur., 2016
New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Proceedings of the 17th International Symposium on Quality Electronic Design, 2016
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
I know where you are: Thwarting privacy protection in location-based social discovery services.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015
A statistical methodology for noise sensor placement and full-chip voltage map generation.
Proceedings of the 52nd Annual Design Automation Conference, 2015
2014
Generating signatures with optimal overhead: practical paddings for signature schemes.
Secur. Commun. Networks, 2014
Robust password changing and DoS resilience for human-centric password authentication.
Secur. Commun. Networks, 2014
Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the ACM/IEEE International Workshop on System Level Interconnect Prediction, 2014
Proceedings of the International Symposium on Low Power Electronics and Design, 2014
Proceedings of the 51st Annual Design Automation Conference 2014, 2014
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014
2013
Fast 3-D Thermal Simulation for Integrated Circuits With Domain Decomposition Method.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013
2012
ACM Trans. Design Autom. Electr. Syst., 2012
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2012
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Secur. Commun. Networks, 2012
Secur. Commun. Networks, 2012
Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012
Informatica, 2012
Appl. Math. Lett., 2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
An information-theoretic framework for optimal temperature sensor allocation and full-chip thermal monitoring.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
2011
Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011
2010
Non-interactive multisignatures in the plain public-key model with efficient verification.
Inf. Process. Lett., 2010
Proceedings of the Web-Age Information Management, 11th International Conference, 2010
Proceedings of the 2010 International Conference on Computer-Aided Design, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
Wirel. Commun. Mob. Comput., 2009
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009
Informatica, 2009
IEEE Commun. Lett., 2009
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009
Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009
Research of Chang'an Street Coordinated Fuzzy Control Based on Traffic Flow Forecasting.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
SIAM J. Sci. Comput., 2008
Des. Codes Cryptogr., 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
J. Low Power Electron., 2007
Clustering based pruning for statistical criticality computation under process variations.
Proceedings of the 2007 International Conference on Computer-Aided Design, 2007
Proceedings of the Topics in Cryptology, 2007
A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations.
Proceedings of the Computer Mathematics, 8th Asian Symposium, 2007
2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
2005
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005
Informatica, 2005
Appl. Math. Comput., 2005
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Appl. Math. Comput., 2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Proceedings of the 2005 International Conference on Computer-Aided Design, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
Sci. China Ser. F Inf. Sci., 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Integrated Circuit and System Design, 2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 2004 International Conference on Computer-Aided Design, 2004
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004
2003
Proceedings of the 40th Design Automation Conference, 2003
1997
Int. J. Found. Comput. Sci., 1997
1996
1995
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995
Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), 1995