Huiwen Jia
Orcid: 0000-0002-9289-5918
According to our database1,
Huiwen Jia
authored at least 45 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Oper. Res., 2024
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption.
IET Inf. Secur., 2024
IET Inf. Secur., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices.
Int. J. Secur. Networks, 2023
IACR Cryptol. ePrint Arch., 2023
2022
Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022
The University of Michigan Implements a Hub-and-Spoke Design to Accommodate Social Distancing in the Campus Bus System Under COVID-19 Restrictions.
INFORMS J. Appl. Anal., 2022
IET Inf. Secur., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Online Learning and Pricing with Reusable Resources: Linear Bandits with Sub-Exponential Rewards.
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
Benders Cut Classification via Support Vector Machines for Solving Two-Stage Stochastic Programs.
INFORMS J. Optim., July, 2021
INFORMS J. Comput., 2021
Int. J. Inf. Sec., 2021
Entropy, 2021
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the Network and System Security - 15th International Conference, 2021
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
An Optimization-and-Simulation Framework for Redesigning University Campus Bus System with Social Distancing.
CoRR, 2020
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Context-aware Route Recommendation with Weight Learning through Deep Neural Networks.
Proceedings of the 2020 American Control Conference, 2020
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe.
J. Inf. Secur. Appl., 2019
Des. Codes Cryptogr., 2019
Track Occupation Detection Based on a Maximum Posterior Probability Model Using Multisensor Data Fusion.
Comput. Sci. Eng., 2019
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security - 22nd International Conference, 2019
Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications.
Int. J. High Perform. Comput. Netw., 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
2017
Des. Codes Cryptogr., 2017
2015
Int. J. Inf. Technol. Web Eng., 2015
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015