Huiyong Wang

Orcid: 0000-0001-5886-9647

According to our database1, Huiyong Wang authored at least 48 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Privacy-preserving federated learning based on partial low-quality data.
J. Cloud Comput., December, 2024

Fine-Grained Entity-Type Completion Based on Neighborhood-Attention and Cartesian-Polar Coordinates Mapping.
Int. J. Softw. Eng. Knowl. Eng., August, 2024

TRAFMEL: Multimodal Entity Linking Based on Transformer Reranking and Multimodal Co-Attention Fusion.
Int. J. Softw. Eng. Knowl. Eng., June, 2024

Privacy-preserving blockchain-based contract signing with multi-party supervision.
Trans. Emerg. Telecommun. Technol., April, 2024

SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning.
Peer Peer Netw. Appl., March, 2024

Semi-shadow file system: An anonymous files storage solution.
Peer Peer Netw. Appl., January, 2024

Privacy-preserving multi-party logistic regression in cloud computing.
Comput. Stand. Interfaces, 2024

VPPFL: Verifiable Privacy-Preserving Federated Learning in Cloud Environment.
IEEE Access, 2024

A Verifiable Federated Learning Algorithm Supporting Distributed Pseudonym Tracking.
Proceedings of the Database Systems for Advanced Applications, 2024

A new SM2-based ring signature scheme with revocability and anonymity.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Blockchain-based UAV-assisted Forest Fire Detection and Monitoring System.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
An efficient blockchain-based anonymous authentication and supervision system.
Peer Peer Netw. Appl., September, 2023

Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data.
J. Inf. Secur. Appl., March, 2023

Data Augmentation Method for Pedestrian Dress Recognition in Road Monitoring and Pedestrian Multiple Information Recognition Model.
Inf., February, 2023

A blockchain-based framework for privacy-preserving and verifiable billing in smart grid.
Peer Peer Netw. Appl., January, 2023

Personalized Learning Path Recommendation for E-Learning Based on Knowledge Graph and Graph Convolutional Network.
Int. J. Softw. Eng. Knowl. Eng., January, 2023

Joint modeling method of question intent detection and slot filling for domain-oriented question answering system.
Data Technol. Appl., 2023

Output regeneration defense against membership inference attacks for protecting data privacy.
Int. J. Web Inf. Syst., 2023

Person Event Detection Method in Computer Discipline Domain Based on BiGRU and CNN in Series.
Int. J. Softw. Eng. Knowl. Eng., 2023

Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health.
Comput. Stand. Interfaces, 2023

Secure Multi-Keyword Retrieval with Integrity Guarantee for Outsourced ADS-B Data in Clouds.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Blockchain-based Secure Key Distribution for WSNs in Soil Monitoring.
Proceedings of the 2023 5th International Conference on Blockchain Technology, 2023

IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability.
Proceedings of the Database Systems for Advanced Applications, 2023

Secure Traffic Data Sharing in UAV-Assisted VANETs.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

2022
Multi-Party Electronic Contract Signing Protocol Based on Blockchain.
IEICE Trans. Inf. Syst., 2022

Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

An efficient anonymous authentication and supervision system based on blockchain.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2021
A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks.
Secur. Commun. Networks, 2021

PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model.
Mob. Networks Appl., 2021

An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

An Anti-forensic Method Based on RS Coding and Distributed Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
Secure Metering Data Aggregation With Batch Verification in Industrial Smart Grid.
IEEE Trans. Ind. Informatics, 2020

Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020

Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs.
IEEE Trans. Inf. Forensics Secur., 2019

A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE.
Soft Comput., 2019

A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds.
Proceedings of the Data Science, 2019

Privacy and Integrity Protection of Metering Data in Smart Grid.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Ciphertext retrieval via attribute-based FHE in cloud computing.
Soft Comput., 2018

Metallic materials ontology population from LOD based on conditional random field.
Comput. Ind., 2018

2017
An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2014
A general framework for multi-accent Mandarin speech recognition using adaptive neural networks.
Proceedings of the 9th International Symposium on Chinese Spoken Language Processing, 2014

2013
Research on Frequent Itemsets Mining Algorithm based on Relational Database.
J. Softw., 2013

2009
A New Association Rules Mining Algorithm Based on Vector.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009

Analysis and Modification on Existing Objective Weighting Methods in MADM.
Proceedings of the 2009 Third International Conference on Genetic and Evolutionary Computing, 2009


  Loading...