Jia Yu

Orcid: 0000-0002-0574-7803

Affiliations:
  • Qingdao University, College of Computer Science and Technology, Qingdao, China
  • Nanjing University of Information Science & Technology, Nanjing, China
  • Shandong University, Jinan, China


According to our database1, Jia Yu authored at least 159 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Privacy-preserving top-k spatio-temporal keyword preference query.
Comput. Stand. Interfaces, 2025

2024
Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data.
IEEE Internet Things J., December, 2024

Privacy-Preserving Naïve Bayesian Classification for Health Monitoring Systems.
IEEE Trans. Ind. Informatics, October, 2024

Connectivity and diagnosability of a class of recursive networks.
J. Supercomput., February, 2024

Enhancing fault tolerance of balanced hypercube networks by the edge partition method.
Theor. Comput. Sci., February, 2024

Reliability evaluation for a class of recursive match networks.
Theor. Comput. Sci., January, 2024

Construction algorithms of fault-tolerant paths and disjoint paths in <i>k</i>-ary <i>n</i>-cube networks.
J. Parallel Distributed Comput., January, 2024

Towards efficient Secure Boolean Range Query over encrypted spatial data.
Comput. Secur., January, 2024

Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security.
IEEE Trans. Serv. Comput., 2024

Enabling Privacy-Preserving $K$K-Hop Reachability Query Over Encrypted Graphs.
IEEE Trans. Serv. Comput., 2024

Keyword-Based Remote Data Integrity Auditing Supporting Full Data Dynamics.
IEEE Trans. Serv. Comput., 2024

Privacy-Preserving Time-Based Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Approximate Minimum Community Search on Large Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction.
IEEE Trans. Dependable Secur. Comput., 2024

How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud.
IEEE Trans. Cloud Comput., 2024

Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things.
IEEE Internet Things J., 2024

Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024

Strongly Menger Connectedness of a Class of Recursive Networks.
Comput. J., 2024

2023
Lightweight Secure Deduplication Based on Data Popularity.
IEEE Syst. J., December, 2023

Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023

Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems.
J. Syst. Archit., September, 2023

Reliability of augmented k-ary n-cubes under the extra connectivity condition.
J. Supercomput., August, 2023

Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network.
IEEE Syst. J., June, 2023

Privacy preserving subgraph isomorphism query for dynamic graph database.
J. Netw. Comput. Appl., February, 2023

DSOS: A Distributed Secure Outsourcing System for Edge Computing Service in IoT.
IEEE Trans. Syst. Man Cybern. Syst., 2023

Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing.
IEEE Trans. Serv. Comput., 2023

Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023

PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data.
IEEE Internet Things J., 2023

Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

2022
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022

An Intelligent Fuzzy Phrase Search Scheme Over Encrypted Network Data for IoT.
IEEE Trans. Netw. Sci. Eng., 2022

Node-to-set disjoint paths problem in cross-cubes.
J. Supercomput., 2022

Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System.
IEEE Trans. Ind. Informatics, 2022

Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022

Synchronized Provable Data Possession Based on Blockchain for Digital Twin.
IEEE Trans. Inf. Forensics Secur., 2022

Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Connectivity and constructive algorithms of disjoint paths in dragonfly networks.
Theor. Comput. Sci., 2022

Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022

Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things.
IEEE Internet Things J., 2022

Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT.
IEEE Internet Things J., 2022

Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022

An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022

Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT.
IEEE Internet Things J., 2022

Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data.
Future Gener. Comput. Syst., 2022

Enabling efficient privacy-preserving subgraph isomorphic query over graphs.
Future Gener. Comput. Syst., 2022

Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022

Privacy-Preserving cloud-Aided broad learning system.
Comput. Secur., 2022

Privacy-Preserving Convolution Neural Network Inference with Edge-assistance.
Comput. Secur., 2022

The 3-Extra Connectivity of the Data Center Network BCube.
Comput. J., 2022

The Reliability of <i>k</i>-Ary <i>n</i>-Cube Based on Component Connectivity.
Comput. J., 2022

Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022

Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids.
Proceedings of the 13th Asian Control Conference, 2022

2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Component conditional fault tolerance of hierarchical folded cubic networks.
Theor. Comput. Sci., 2021

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing.
IEEE Syst. J., 2021

RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021

Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021

Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021

Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021

Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data.
IEEE Internet Things J., 2021

Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images.
IEEE Internet Things J., 2021

Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network.
Comput. Secur., 2021

The Conditional Reliability Evaluation of Data Center Network BCDC.
Comput. J., 2021

Modification and Performance Improvement of Paillier Homomorphic Cryptosystem.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020

The reliability analysis of <i>k</i>-ary <i>n</i>-cube networks.
Theor. Comput. Sci., 2020

Secure auditing and deduplication for encrypted cloud data supporting ownership modification.
Soft Comput., 2020

Secure Computation Outsourcing for Inversion in Finite Field.
J. Internet Serv. Inf. Secur., 2020

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020

Blockchain-based two-party fair contract signing scheme.
Inf. Sci., 2020

Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things.
IEEE Internet Things J., 2020

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020

2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019

Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019

Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019

Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018

Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

2017
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

How to securely outsource the inversion modulo a large composite number.
J. Syst. Softw., 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017

Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wirel. Networks, 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Inf. Forensics Secur., 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Netw. Comput. Appl., 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016

IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016

A public cloud storage auditing scheme for resource-constrained clients.
Int. J. High Perform. Syst. Archit., 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Inf. Forensics Secur., 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
An ID-Based Short Group Signature Scheme.
J. Softw., 2013

Security analysis and improvement of two verifiable multi-secret sharing schemes.
Int. J. Secur. Networks, 2013

2012
Intrusion-resilient identity-based signature: Security definition and construction.
J. Syst. Softw., 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

A Practical ID-Based Group Signature Scheme.
J. Comput., 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2012

2011
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges.
Theor. Comput. Sci., 2011

ID-Based Sequential Aggregate Signatures.
J. Softw., 2011

New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

A New Approach to Group Signature Schemes.
J. Comput., 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Embedding meshes into twisted-cubes.
Inf. Sci., 2011

Efficient unicast in bijective connection networks with the restricted faulty node set.
Inf. Sci., 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Informaticae, 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Security Analysis of an RSA Key Generation Algorithm with a Large Private Key.
Proceedings of the Information Security, 14th International Conference, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
J. Networks, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
J. Softw., 2009

Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
J. Commun., 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
J. Commun., 2008

A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2007
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
Proceedings of the Theory and Applications of Models of Computation, 2007

New Left-to-Right Radix- <i>r</i> Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007

Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Identity-Based Blind Signature Scheme with Batch Verifications.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two Threshold Multisignature Schemes from Bilinear Pairings.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Key-Insulated Group Signature Scheme with Selective Revocation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett., 2006

Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...