Jia Yu
Orcid: 0000-0002-0574-7803Affiliations:
- Qingdao University, College of Computer Science and Technology, Qingdao, China
- Nanjing University of Information Science & Technology, Nanjing, China
- Shandong University, Jinan, China
According to our database1,
Jia Yu
authored at least 159 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
IEEE Internet Things J., December, 2024
IEEE Trans. Ind. Informatics, October, 2024
J. Supercomput., February, 2024
Enhancing fault tolerance of balanced hypercube networks by the edge partition method.
Theor. Comput. Sci., February, 2024
Theor. Comput. Sci., January, 2024
Construction algorithms of fault-tolerant paths and disjoint paths in <i>k</i>-ary <i>n</i>-cube networks.
J. Parallel Distributed Comput., January, 2024
Comput. Secur., January, 2024
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud.
IEEE Trans. Cloud Comput., 2024
Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024
2023
IEEE Syst. J., December, 2023
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023
Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems.
J. Syst. Archit., September, 2023
J. Supercomput., August, 2023
IEEE Syst. J., June, 2023
J. Netw. Comput. Appl., February, 2023
IEEE Trans. Syst. Man Cybern. Syst., 2023
IEEE Trans. Serv. Comput., 2023
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023
PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data.
IEEE Internet Things J., 2023
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
2022
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022
IEEE Trans. Serv. Comput., 2022
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Ind. Informatics, 2022
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Comput. Soc. Syst., 2022
Theor. Comput. Sci., 2022
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data.
Future Gener. Comput. Syst., 2022
Future Gener. Comput. Syst., 2022
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022
Comput. Secur., 2022
Comput. J., 2022
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 13th Asian Control Conference, 2022
2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
Theor. Comput. Sci., 2021
IEEE Trans. Cloud Comput., 2021
IEEE Syst. J., 2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021
Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Comput. Secur., 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020
Theor. Comput. Sci., 2020
Secure auditing and deduplication for encrypted cloud data supporting ownership modification.
Soft Comput., 2020
J. Internet Serv. Inf. Secur., 2020
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020
2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019
Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019
Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019
Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
J. Syst. Softw., 2017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017
J. Internet Serv. Inf. Secur., 2017
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Wirel. Pers. Commun., 2016
Wirel. Networks, 2016
IEEE Trans. Inf. Forensics Secur., 2016
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016
J. Netw. Comput. Appl., 2016
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016
Int. J. High Perform. Syst. Archit., 2016
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 10th International Conference on P2P, 2015
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Inf. Sci., 2014
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Int. J. Secur. Networks, 2013
2012
J. Syst. Softw., 2012
J. Inf. Sci. Eng., 2012
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012
2011
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges.
Theor. Comput. Sci., 2011
Inf. Sci., 2011
Efficient unicast in bijective connection networks with the restricted faulty node set.
Inf. Sci., 2011
Fundam. Informaticae, 2011
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
Proceedings of the Information Security, 14th International Conference, 2011
2010
J. Networks, 2010
2009
J. Softw., 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008
J. Commun., 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Provable Security, Second International Conference, 2008
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of The International Symposium on Electronic Commerce and Security, 2008
2007
Proceedings of the Theory and Applications of Models of Computation, 2007
New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Inf. Process. Lett., 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006