Hao Wang
Orcid: 0000-0003-3472-3699Affiliations:
- Shandong University, School of Information Science and Engineering, Jinan, China (PhD 2012)
According to our database1,
Hao Wang
authored at least 83 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
Cybersecur., December, 2024
Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., March, 2024
Comput. Stand. Interfaces, March, 2024
J. King Saud Univ. Comput. Inf. Sci., February, 2024
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions.
IEEE Trans. Inf. Forensics Secur., 2024
2023
Theor. Comput. Sci., June, 2023
A privacy-preserving blockchain-based tracing model for virus-infected people in cloud.
Expert Syst. Appl., 2023
2022
Int. J. Intell. Syst., December, 2022
Int. J. Intell. Syst., December, 2022
Server-aided multiparty private set intersection protocols for lightweight clients and the application in intelligent logistics.
Int. J. Intell. Syst., December, 2022
Neural Comput. Appl., 2022
Distributed Fog Computing and Federated-Learning-Enabled Secure Aggregation for IoT Devices.
IEEE Internet Things J., 2022
IEICE Trans. Inf. Syst., 2022
Comput. Stand. Interfaces, 2022
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022
Concurr. Comput. Pract. Exp., 2022
A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort.
Comput. J., 2022
SMTWM: Secure Multiple Types Wildcard Pattern Matching Protocol from Oblivious Transfer.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Inf. Sci., 2021
Accurate Range Query With Privacy Preservation for Outsourced Location-Based Service in IoT.
IEEE Internet Things J., 2021
Int. J. Netw. Manag., 2021
Digit. Commun. Networks, 2021
IEEE Access, 2021
IEEE Access, 2021
When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
On the Security of Permissionless Blockchain Systems: Challenges and Research Perspective.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
2020
Secur. Commun. Networks, 2020
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer.
Inf. Sci., 2020
Inf. Sci., 2020
Privacy-preserving polynomial interpolation and its applications on predictive analysis.
Inf. Sci., 2020
IEEE Internet Things J., 2020
When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control.
CoRR, 2020
Comput. Electr. Eng., 2020
2019
Secur. Commun. Networks, 2019
Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud.
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Comput. Secur., 2019
IEEE Access, 2019
IEEE Access, 2019
2018
Soft Comput., 2018
J. Medical Syst., 2018
J. Inf. Secur. Appl., 2018
A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter.
J. Inf. Secur. Appl., 2018
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms.
Int. J. High Perform. Comput. Netw., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017
Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model.
Int. J. Grid Util. Comput., 2017
New directly revocable attribute-based encryption scheme and its application in cloud storage environment.
Clust. Comput., 2017
2016
New large-universe multi-authority ciphertext-policy ABE scheme and its application in cloud storage systems.
J. High Speed Networks, 2016
Frontiers Comput. Sci., 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
2015
Int. J. Inf. Secur. Priv., 2015
New identity-based key-encapsulation mechanism and its applications in cloud computing.
Int. J. High Perform. Comput. Netw., 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
J. Networks, 2014
J. Networks, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
2011
A Scalable ID-based Constant-round AGKE Protocol with Logarithmic Computation Complexity.
J. Networks, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
J. Networks, 2009
J. Networks, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009