Jian Weng

Orcid: 0000-0003-4067-8230

Affiliations:
  • Jinan University, College of Information Science and Technology, Guangzhou, China
  • Singapore Management University, Singapore (2008 - 2010)
  • Shanghai Jiao Tong University, China (PhD 2008)


According to our database1, Jian Weng authored at least 386 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective.
IEEE Trans. Knowl. Data Eng., November, 2024

A Reputation-Aided Lightweight Consensus Service Framework for Multi-Chain Metaverse.
IEEE Netw., November, 2024

Byzantine-Robust and Privacy-Preserving Federated Learning With Irregular Participants.
IEEE Internet Things J., November, 2024

Score-Based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization.
IEEE Trans. Medical Imaging, October, 2024

Preimage Attacks on Xoodyak and Gaston Based on Algebraic Strategies.
IEEE Internet Things J., October, 2024

MTDCAP: Moving Target Defense-Based CAN Authentication Protocol.
IEEE Trans. Intell. Transp. Syst., September, 2024

Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication.
Inf., September, 2024

Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality.
Int. J. Hum. Comput. Interact., September, 2024

EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing.
IEEE Trans. Circuits Syst. Video Technol., August, 2024

Robust Heterogeneous Model Fitting for Multi-source Image Correspondences.
Int. J. Comput. Vis., August, 2024

A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks.
IEEE Trans. Mob. Comput., July, 2024

Lightweight Context-Aware Network Using Partial-Channel Transformation for Real-Time Semantic Segmentation.
IEEE Trans. Intell. Transp. Syst., July, 2024

Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
J. Cryptol., June, 2024

WVFL: Weighted Verifiable Secure Aggregation in Federated Learning.
IEEE Internet Things J., June, 2024

Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks.
Future Internet, June, 2024

Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems.
IEEE Trans. Intell. Transp. Syst., May, 2024

Fast Multilabel Feature Selection via Global Relevance and Redundancy Optimization.
IEEE Trans. Neural Networks Learn. Syst., April, 2024

PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace.
IEEE Internet Things J., April, 2024

Reliability-Driven End-End-Edge Collaboration for Energy Minimization in Large-Scale Cyber-Physical Systems.
IEEE Trans. Reliab., March, 2024

Multi-Motion Segmentation via Co-Attention-Induced Heterogeneous Model Fitting.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy.
IEEE Trans. Computers, February, 2024

Explanatory Object Part Aggregation for Zero-Shot Learning.
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024

GNN Model for Time-Varying Matrix Inversion With Robust Finite-Time Convergence.
IEEE Trans. Neural Networks Learn. Syst., January, 2024

HRA-secure attribute-based threshold proxy re-encryption from lattices.
Inf. Sci., January, 2024

Enabling Secure and Flexible Streaming Media With Blockchain Incentive.
IEEE Internet Things J., January, 2024

REPFS: Reliability-Ensured Personalized Function Scheduling in Sustainable Serverless Edge Computing.
IEEE Trans. Sustain. Comput., 2024

Multi-Stage Network With Geometric Semantic Attention for Two-View Correspondence Learning.
IEEE Trans. Image Process., 2024

DACO-BD: Data Augmentation Combinatorial Optimization-Based Backdoor Defense in Deep Neural Networks for SAR Image Classification.
IEEE Trans. Instrum. Meas., 2024

Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

Client-Side Embedding of Screen-Shooting Resilient Image Watermarking.
IEEE Trans. Inf. Forensics Secur., 2024

Proof of Unlearning: Definitions and Instantiation.
IEEE Trans. Inf. Forensics Secur., 2024

PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query.
IEEE Trans. Inf. Forensics Secur., 2024

PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data.
IEEE Trans. Dependable Secur. Comput., 2024

IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-Preserving and Byzantine-Robust Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

AFANet: A Multibackbone Compatible Feature Fusion Framework for Effective Remote Sensing Object Detection.
IEEE Geosci. Remote. Sens. Lett., 2024

Enabling privacy-preserving medication analysis in distributed EHR systems.
J. Inf. Secur. Appl., 2024

Conditional image hiding network based on style transfer.
Inf. Sci., 2024

PPMGS: An efficient and effective solution for distributed privacy-preserving semi-supervised learning.
Inf. Sci., 2024

CCID-CAN: Cross-Chain Intrusion Detection on CAN Bus for Autonomous Vehicles.
IEEE Internet Things J., 2024

Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2024

PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
IACR Cryptol. ePrint Arch., 2024

Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
IACR Cryptol. ePrint Arch., 2024

Generic Differential Key Recovery Attacks and Beyond.
IACR Cryptol. ePrint Arch., 2024

Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber.
IACR Cryptol. ePrint Arch., 2024

Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation.
IACR Cryptol. ePrint Arch., 2024

DoFA: Adversarial examples detection for SAR images by dual-objective feature attribution.
Expert Syst. Appl., 2024

Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification.
CoRR, 2024

OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network.
CoRR, 2024

Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales.
CoRR, 2024

Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search.
Comput. Secur., 2024

Optimizing c-sum BKW and Faster Quantum Variant for LWE.
IACR Commun. Cryptol., 2024

Provably secure attribute-based authenticated encryption with keyword search from ideal lattices.
Sci. China Inf. Sci., 2024

Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

Enhancing Length Generalization for Attention Based Knowledge Tracing Models with Linear Biases.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Enabling Privacy-Preserving and Publicly Auditable Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024

2023
Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach.
IEEE Trans. Neural Networks Learn. Syst., December, 2023

TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023

Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation.
Pattern Recognit., November, 2023

Single-state distributed <i>k</i>-winners-take-all neural network model.
Inf. Sci., November, 2023

Generalized attack on ECDSA: known bits in arbitrary positions.
Des. Codes Cryptogr., November, 2023

ECQV-GDH-Based Group Key Exchange Protocol for CAN Bus.
IEEE Trans. Veh. Technol., October, 2023

A robust document image watermarking scheme using deep neural network.
Multim. Tools Appl., October, 2023

DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services.
Frontiers Comput. Sci., October, 2023

Lattice-based autonomous path proxy re-encryption in the standard model.
Sci. China Inf. Sci., October, 2023

Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems.
Comput. Secur., September, 2023

Feature Distillation in Deep Attention Network Against Adversarial Examples.
IEEE Trans. Neural Networks Learn. Syst., July, 2023

LMFFNet: A Well-Balanced Lightweight Network for Fast and Accurate Semantic Segmentation.
IEEE Trans. Neural Networks Learn. Syst., June, 2023

DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023

Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security.
IEEE Trans. Knowl. Data Eng., May, 2023

Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023

Simulatable verifiable random function from the LWE assumption.
Theor. Comput. Sci., May, 2023

Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.
Inf. Sci., May, 2023

TUSQ: Targeted High-Utility Sequence Querying.
IEEE Trans. Big Data, April, 2023

Concurrent and efficient IoT data trading based on probabilistic micropayments.
Wirel. Networks, February, 2023

A screen-shooting resilient document image watermarking scheme using deep neural network.
IET Image Process., February, 2023

US-Rule: Discovering Utility-driven Sequential Rules.
ACM Trans. Knowl. Discov. Data, January, 2023

DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks.
Appl. Soft Comput., January, 2023

VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2023

A Blockchain-Based Copyright Protection Scheme With Proactive Defense.
IEEE Trans. Serv. Comput., 2023

Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction.
IEEE Trans. Image Process., 2023

Fuzzy Identity-Based Matchmaking Encryption and Its Application.
IEEE Trans. Inf. Forensics Secur., 2023

pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits.
IEEE Trans. Inf. Forensics Secur., 2023

Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking.
IEEE Trans. Inf. Forensics Secur., 2023

Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes.
IEEE Trans. Dependable Secur. Comput., 2023

RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network.
IEEE Trans. Dependable Secur. Comput., 2023

Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation.
IEEE Trans. Dependable Secur. Comput., 2023

Distributed k-Winners-Take-All Network: An Optimization Perspective.
IEEE Trans. Cybern., 2023

A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data.
IEEE Trans. Cloud Comput., 2023

A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023

High-capacity coverless image steganographic scheme based on image synthesis.
Signal Process. Image Commun., 2023

PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023

Non-Interactive Zero-Knowledge Functional Proofs.
IACR Cryptol. ePrint Arch., 2023

Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
IACR Cryptol. ePrint Arch., 2023

Asymmetric Group Message Franking: Definitions & Constructions.
IACR Cryptol. ePrint Arch., 2023

Security and Privacy on Generative Data in AIGC: A Survey.
CoRR, 2023

A Survey of Secure Computation Using Trusted Execution Environments.
CoRR, 2023

Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification.
Clust. Comput., 2023

Enhancing Deep Knowledge Tracing with Auxiliary Tasks.
Proceedings of the ACM Web Conference 2023, 2023

Behavioral Authentication with Head-Tilt Based Locomotion for Metaverse.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023

Towards Robust Knowledge Tracing Models via k-Sparse Attention.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

XES3G5M: A Knowledge Tracing Benchmark Dataset with Auxiliary Information.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Asymmetric Group Message Franking: Definitions and Constructions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Predicate Private Set Intersection with Linear Complexity.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
Analysis of ID Sequences Similarity Using DTW in Intrusion Detection for CAN Bus.
IEEE Trans. Veh. Technol., 2022

Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022

VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022

Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022

ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs.
IEEE Trans. Intell. Transp. Syst., 2022

A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT.
IEEE Trans. Ind. Informatics, 2022

Improving Generalization by Commonality Learning in Face Forgery Detection.
IEEE Trans. Inf. Forensics Secur., 2022

Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features.
IEEE Trans. Inf. Forensics Secur., 2022

Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022

Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS.
IEEE Trans. Dependable Secur. Comput., 2022

Peripheral-Free Device Pairing by Randomly Switching Power.
IEEE Trans. Dependable Secur. Comput., 2022

Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders.
IEEE Trans. Dependable Secur. Comput., 2022

Learning and Near-Optimal Control of Underactuated Surface Vessels With Periodic Disturbances.
IEEE Trans. Cybern., 2022

Distributed Estimation of Algebraic Connectivity.
IEEE Trans. Cybern., 2022

Secure Halftone Image Steganography Based on Feature Space and Layer Embedding.
IEEE Trans. Cybern., 2022

Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022

ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero.
J. Parallel Distributed Comput., 2022

Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance.
Inf. Sci., 2022

Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages.
Inf. Sci., 2022

Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022

PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022

Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization.
IEEE Internet Things J., 2022

A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET.
IEEE Internet Things J., 2022

Edge Intelligent Joint Optimization for Lifetime and Latency in Large-Scale Cyber-Physical Systems.
IEEE Internet Things J., 2022

Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs).
IET Commun., 2022

Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation.
IACR Cryptol. ePrint Arch., 2022

Cross-Domain Identity-based Matchmaking Encryption.
IACR Cryptol. ePrint Arch., 2022

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery.
IACR Cryptol. ePrint Arch., 2022

GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks.
IACR Cryptol. ePrint Arch., 2022

Anonymous Public Key Encryption under Corruptions.
IACR Cryptol. ePrint Arch., 2022

Identity-Based Matchmaking Encryption from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2022

Towards Target Sequential Rules.
CoRR, 2022

Deniable Steganography.
CoRR, 2022

Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients.
CoRR, 2022

A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022

A Robust Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022

Learning Second Order Local Anomaly for General Face Forgery Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

EHNP Strikes Back: Analyzing SM2 Implementations.
Proceedings of the Progress in Cryptology, 2022

2021
Anomaly Detection for In-Vehicle Network Using CNN-LSTM With Attention Mechanism.
IEEE Trans. Veh. Technol., 2021

Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET.
IEEE Trans. Veh. Technol., 2021

BDFL: A Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle.
IEEE Trans. Veh. Technol., 2021

A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing.
IEEE Trans. Netw. Sci. Eng., 2021

Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021

Adaptive Dropout Method Based on Biological Principles.
IEEE Trans. Neural Networks Learn. Syst., 2021

Multi-Task Travel Route Planning With a Flexible Deep Learning Framework.
IEEE Trans. Intell. Transp. Syst., 2021

Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances.
IEEE Trans. Inf. Theory, 2021

Multi-View Gait Image Generation for Cross-View Gait Recognition.
IEEE Trans. Image Process., 2021

Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System.
IEEE Trans. Ind. Informatics, 2021

PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting.
IEEE Trans. Inf. Forensics Secur., 2021

Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI.
IEEE Trans. Inf. Forensics Secur., 2021

DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive.
IEEE Trans. Dependable Secur. Comput., 2021

Far Proximity Identification in Wireless Systems.
IEEE Trans. Dependable Secur. Comput., 2021

An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing.
IEEE Trans. Dependable Secur. Comput., 2021

Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness.
IEEE Trans. Dependable Secur. Comput., 2021

Looking Back! Using Early Versions of Android Apps as Attack Vectors.
IEEE Trans. Dependable Secur. Comput., 2021

Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems.
Softw. Pract. Exp., 2021

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021

Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns.
IEEE Internet Things J., 2021

BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks.
IEEE Internet Things J., 2021

LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications.
Inf. Fusion, 2021

A defense method based on attention mechanism against traffic sign adversarial samples.
Inf. Fusion, 2021

Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE.
IACR Cryptol. ePrint Arch., 2021

IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability.
IACR Cryptol. ePrint Arch., 2021

Simulation-Based Bi-Selective Opening Security for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2021

Robustly reusable fuzzy extractor with imperfect randomness.
Des. Codes Cryptogr., 2021

Utility-driven Mining of Contiguous Sequences.
CoRR, 2021

FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Efficient and Fully Secure Lattice-Based IBE with Equality Test.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET.
IEEE Trans. Veh. Technol., 2020

An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks.
IEEE Trans. Veh. Technol., 2020

Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping.
IEEE Trans. Veh. Technol., 2020

On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction.
IEEE Trans. Signal Process., 2020

Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid.
IEEE Trans. Smart Grid, 2020

Flexible Wildcard Searchable Encryption System.
IEEE Trans. Serv. Comput., 2020

Attention-Based Modality-Gated Networks for Image-Text Sentiment Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2020

Sample Balancing for Deep Learning-Based Visual Recognition.
IEEE Trans. Neural Networks Learn. Syst., 2020

New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks.
IEEE Trans. Inf. Theory, 2020

Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020

You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020

Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2020

Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices.
Secur. Commun. Networks, 2020

A new combinatorial model for deterministic competing failure analysis.
Qual. Reliab. Eng. Int., 2020

Scalable revocable identity-based signature over lattices in the standard model.
Inf. Sci., 2020

Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020

Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations.
Inf. Sci., 2020

TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs.
IEEE Internet Things J., 2020

PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020

Deep understanding of big multimedia data.
Neurocomputing, 2020

Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting.
IACR Cryptol. ePrint Arch., 2020

Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security.
IACR Cryptol. ePrint Arch., 2020

How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020

BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
IACR Cryptol. ePrint Arch., 2020

An overview on smart contracts: Challenges, advances and platforms.
Future Gener. Comput. Syst., 2020

Secure Computation on Additive Shares.
CoRR, 2020

Privacy-Preserving Image Retrieval Based on Additive Secret Sharing.
CoRR, 2020

Efficient Privacy-Preserving Computation Based on Additive Secret Sharing.
CoRR, 2020

Parameter-controlled inserting constructions of constant dimension subspace codes.
CoRR, 2020

MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing.
CoRR, 2020

SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles.
CoRR, 2020

A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020

General construction of revocable identity-based fully homomorphic signature.
Sci. China Inf. Sci., 2020

Hand Motion with Eyes-free Interaction for Authentication in Virtual Reality.
Proceedings of the 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2020

Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

BLESS: A BLE Application Security Scanning Framework.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation.
IEEE Trans. Veh. Technol., 2019

BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET.
IEEE Trans. Veh. Technol., 2019

Sparse Signal Recovery With Minimization of 1-Norm Minus 2-Norm.
IEEE Trans. Veh. Technol., 2019

Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks.
IEEE Trans. Veh. Technol., 2019

False Load Attack to Smart Meters by Synchronously Switching Power Circuits.
IEEE Trans. Smart Grid, 2019

Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing.
IEEE Trans. Serv. Comput., 2019

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing.
IEEE Trans. Parallel Distributed Syst., 2019

Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields.
IEEE Trans. Inf. Theory, 2019

Novel Properties of Successive Minima and Their Applications to 5G Tactile Internet.
IEEE Trans. Ind. Informatics, 2019

Adaptive population extremal optimization-based PID neural network for multivariable nonlinear control systems.
Swarm Evol. Comput., 2019

Feature selection for text classification: A review.
Multim. Tools Appl., 2019

RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019

A hybrid universal blind quantum computation.
Inf. Sci., 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and LSTM.
IEEE Internet Things J., 2019

Long Optimal or Small-Defect LRC Codes with Unbounded Minimum Distances.
CoRR, 2019

Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications.
CoRR, 2019

On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode.
CoRR, 2019

Secure Software-Defined Networking Based on Blockchain.
CoRR, 2019

A Comprehensive Survey on Secure Outsourced Computation and Its Applications.
IEEE Access, 2019

CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

Improved Upper Bounds on the Hermite and KZ Constants.
Proceedings of the IEEE International Symposium on Information Theory, 2019

Random Delay Attack and Its Applications on Load Frequency Control of Power Systems.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Collision Resistant Hashing from Sub-exponential Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.
IEEE Trans. Veh. Technol., 2018

Resonance Attacks on Load Frequency Control of Smart Grids.
IEEE Trans. Smart Grid, 2018

Secure Integrated Circuit Design via Hybrid Cloud.
IEEE Trans. Parallel Distributed Syst., 2018

Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition.
IEEE Trans. Neural Networks Learn. Syst., 2018

Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Secur. Comput., 2018

A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation.
IEEE Trans. Cybern., 2018

Real-Time Myocontrol of a Human-Computer Interface by Paretic Muscles After Stroke.
IEEE Trans. Cogn. Dev. Syst., 2018

A Geographic Multicopy Routing Scheme for DTNs With Heterogeneous Mobility.
IEEE Syst. J., 2018

Adopting secret sharing for reversible data hiding in encrypted images.
Signal Process., 2018

Single-server blind quantum computation with quantum circuit model.
Quantum Inf. Process., 2018

Review on mining data from multiple data sources.
Pattern Recognit. Lett., 2018

Multi-Gait Recognition Based on Attribute Discovery.
IEEE Trans. Pattern Anal. Mach. Intell., 2018

REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.
IEEE Netw., 2018

Double JPEG compression detection based on block statistics.
Multim. Tools Appl., 2018

Feedback weight convolutional neural network for gait recognition.
J. Vis. Commun. Image Represent., 2018

Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive.
IACR Cryptol. ePrint Arch., 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018

AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018

Privacy-Preserving Image Processing in the Cloud.
IEEE Cloud Comput., 2018

Fully distributed certificateless threshold signature without random oracles.
Sci. China Inf. Sci., 2018

Reputation-based Distributed Knowledge Sharing System in Blockchain.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

Cloudde: A Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud Version.
IEEE Trans. Parallel Distributed Syst., 2017

Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems.
IEEE Trans. Intell. Transp. Syst., 2017

Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017

Efficient Elliptic Curve Cryptography for Embedded Devices.
ACM Trans. Embed. Comput. Syst., 2017

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Secur. Commun. Networks, 2017

Indistinguishability of pure orthogonal product states by LOCC.
Quantum Inf. Process., 2017

Anonymous identity-based broadcast encryption technology for smart city information system.
Pers. Ubiquitous Comput., 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017

Multi-gait recognition using hypergraph partition.
Mach. Vis. Appl., 2017

Steganalysis of content-adaptive binary image data hiding.
J. Vis. Commun. Image Represent., 2017

CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing.
IACR Cryptol. ePrint Arch., 2017

Collision Resistant Hashing from Learning Parity with Noise.
IACR Cryptol. ePrint Arch., 2017

Copy-move forgery detection based on hybrid features.
Eng. Appl. Artif. Intell., 2017

HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive.
IEEE Access, 2017

Machine Learning-Based Malicious Application Detection of Android.
IEEE Access, 2017

Tightly Secure IBE Under Constant-Size Master Public Key.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Improved Algorithms for Robust Histogram Shape-Based Image Watermarking.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

New Proof for BKP IBE Scheme and Improvement in the MIMC Setting.
Proceedings of the Information Security Practice and Experience, 2017

New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Steganalysis with CNN Using Multi-channels Filtered Residuals.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Detecting Android Malware Based on Extreme Learning Machine.
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017

Data verification in information-centric networking with efficient revocable certificateless signature.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Vulnerable Implicit Service: A Revisit.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multim., 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Inf. Forensics Secur., 2016

Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Secur. Comput., 2016

On the security of two identity-based conditional proxy re-encryption schemes.
Theor. Comput. Sci., 2016

Verifiable Computation over Large Database with Incremental Updates.
IEEE Trans. Computers, 2016

Cloud-based electronic health record system supporting fuzzy keyword search.
Soft Comput., 2016

Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive Mob. Comput., 2016

Joint image splicing detection in DCT and Contourlet transform domain.
J. Vis. Commun. Image Represent., 2016

Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer.
J. Vis. Commun. Image Represent., 2016

A novel asymmetric three-party based authentication scheme in wearable devices environment.
J. Netw. Comput. Appl., 2016

A Geographic Multi-Copy Routing Scheme for DTNs With Heterogeneous Mobility.
CoRR, 2016

Secure Subway Train-to-Train Communications via GSM-R Communication Systems.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016

Multiple Watermarking Using Multilevel Quantization Index Modulation.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Mobile Authentication System Based on National Regulation and NFC Technology.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Pseudorandom generators from regular one-way functions: New constructions with improved parameters.
Theor. Comput. Sci., 2015

A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

Efficient revocable identity-based encryption from multilinear maps.
Secur. Commun. Networks, 2015

Signcryption KEM/tag-KEM, revisited.
Secur. Commun. Networks, 2015

Emerging services and technologies in wireless networks.
J. High Speed Networks, 2015

Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack.
IACR Cryptol. ePrint Arch., 2015

Congestion-aware message forwarding in delay tolerant networks: a community perspective.
Concurr. Comput. Pract. Exp., 2015

The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015

(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Robust password changing and DoS resilience for human-centric password authentication.
Secur. Commun. Networks, 2014

Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014

Unforgeability of an improved certificateless signature scheme in the standard model.
IET Inf. Secur., 2014

(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptol. ePrint Arch., 2014

Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof.
IACR Cryptol. ePrint Arch., 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014

Fine-Grained Conditional Proxy Re-Encryption and Application.
Proceedings of the Provable Security - 8th International Conference, 2014

Identity-Embedding Method for Decentralized Public-Key Infrastructure.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Authorized Keyword Search on Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

Verifiable Computation on Outsourced Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Attribute-Based Encryption With Verifiable Outsourced Decryption.
IEEE Trans. Inf. Forensics Secur., 2013

Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013

Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication.
IACR Cryptol. ePrint Arch., 2013

Adaptable Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013

Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Accountable Authority Identity-Based Encryption with Public Traceability.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

Security Model and Analysis of FHMQV, Revisited.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Zero-Knowledge Argument for Simultaneous Discrete Logarithms.
Algorithmica, 2012

A Generic Approach for Providing Revocation Support in Secret Handshake.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011

On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011

Cryptanalysis of a certificateless signcryption scheme in the standard model.
Inf. Sci., 2011

Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011

Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy.
IACR Cryptol. ePrint Arch., 2011

On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2011

Multi-User Private Keyword Search for Cloud Computing.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Security Mediated Certificateless Signatures Without Pairing.
J. Comput., 2010

Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings.
Inf. Sci., 2010

Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010.
IACR Cryptol. ePrint Arch., 2010

Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes.
IACR Cryptol. ePrint Arch., 2010

Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010

Generic Constructions of Parallel Key-Insulated Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Efficient Unidirectional Proxy Re-Encryption.
IACR Cryptol. ePrint Arch., 2009

Self-enforcing Private Inference Control.
Proceedings of the Provable Security, Third International Conference, 2009

Private handshakes with optional accountability.
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009

Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security, 12th International Conference, 2009

Optionally Identifiable Private Handshakes.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

A New Approach for Anonymous Password Authentication.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Identity-Based Parallel Key-Insulated Signature Without Random Oracles.
J. Inf. Sci. Eng., 2008

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings.
IACR Cryptol. ePrint Arch., 2008

Identity-Based Parallel Key-Insulated Signature: Framework and Construction.
J. Res. Pract. Inf. Technol., 2008

Identity-Based Threshold Key-Insulated Encryption without Random Oracles.
Proceedings of the Topics in Cryptology, 2008

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions.
IACR Cryptol. ePrint Arch., 2007

Pirate decoder for the broadcast encryption schemes from Crypto 2005.
Sci. China Ser. F Inf. Sci., 2007

2006
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006

Identity-Based Key-Insulated Signature with Secure Key-Updates.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

Identity-Based Key-Insulated Signature Without Random Oracles.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...