Jiabo Wang

Orcid: 0009-0007-4999-3401

According to our database1, Jiabo Wang authored at least 20 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient FHE-Enabled Secure Cloud-Edge Computing Architecture for IoMT Data Protection With its Application to Pandemic Modeling.
IEEE Internet Things J., May, 2024

PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data.
CoRR, 2024

LogExpert: Log-based Recommended Resolutions Generation using Large Language Model.
Proceedings of the 2024 ACM/IEEE 44th International Conference on Software Engineering: New Ideas and Emerging Results, 2024

Towards Semantic Consistency: Dirichlet Energy Driven Robust Multi-Modal Entity Alignment.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

2023
Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling.
Des. Codes Cryptogr., May, 2023

Polar Codes for Module-LWE Public Key Encryption: The Case of Kyber.
Cryptogr., March, 2023

Polar coding for Ring-LWE-based public key encryption.
Cryptogr. Commun., March, 2023

User-Centric Federated Matrix Factorization Based on Differential Privacy.
IEEE Internet Comput., 2023

2022
Quantum-safe cryptography: crossroads of coding theory and cryptography.
Sci. China Inf. Sci., 2022

Fault diagnosis of wet clutch control system of tractor hydrostatic power split continuously variable transmission.
Comput. Electron. Agric., 2022

2021
Coding techniques in lattice-based cryptography
PhD thesis, 2021

Lattice-Based Minimum-Distortion Data Hiding.
IEEE Commun. Lett., 2021

GAPIT Version 3: Boosting Power and Accuracy for Genomic Association and Prediction.
Genom. Proteom. Bioinform., 2021

How to Construct Polar Codes for Ring-LWE-Based Public Key Encryption.
Entropy, 2021

Efficient Construction of Public-Key Matrices in Lattice-Based Cryptography: Chaos Strikes Again.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2019
Polar Sampler: Discrete Gaussian Sampling over the Integers Using Polar Codes.
IACR Cryptol. ePrint Arch., 2019

2018
Method of trajectory privacy protection based on restraining trajectory in LBS.
Int. J. Inf. Commun. Technol., 2018

2016
Performance Analysis on Delay-Multiply Acquisition for Space-Borne GNSS Receivers.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

2013
Robust all-source positioning of UAVs based on belief propagation.
EURASIP J. Adv. Signal Process., 2013

An Experimental Study on Wireless Magnetic Communication with Smart Phone Using a MEMS Magnetometer.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013


  Loading...