Haiyan Wang

Orcid: 0000-0002-5702-9897

Affiliations:
  • Peng Cheng Laboratory, Shenzhen, China


According to our database1, Haiyan Wang authored at least 21 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search.
IEEE Trans. Mob. Comput., October, 2024

Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2024

Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2024

Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024

Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities.
Theor. Comput. Sci., 2024

Threat intelligence named entity recognition techniques based on few-shot learning.
Array, 2024

Reinforced Negative Sampling for Knowledge Graph Embedding.
Proceedings of the Database Systems for Advanced Applications, 2024

Generating Adversarial Texts by the Universal Tail Word Addition Attack.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
Multi-key Fully Homomorphic Encryption without CRS from RLWE.
Comput. Stand. Interfaces, August, 2023

ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

Revocable attribute-based encryption from standard lattices.
Comput. Stand. Interfaces, 2023

FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning.
CoRR, 2023

TSKE: Two-Stream Knowledge Embedding for Cyberspace Security.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

CY-Apollo: A Multi-view Profile System for Complicated Network Attacks.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

2022
An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain.
IEEE Internet Things J., 2022

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing.
Comput. Stand. Interfaces, 2022

Generic Construction of Trace-and-Revoke Inner Product Functional Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

2019
An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing.
IEEE Trans. Ind. Informatics, 2019

On Stability of Multi-Valued Nonlinear Feedback Shift Registers.
Complex., 2019


  Loading...