Jian Weng
Orcid: 0000-0003-4067-8230Affiliations:
- Jinan University, College of Information Science and Technology, Guangzhou, China
- Singapore Management University, Singapore (2008 - 2010)
- Shanghai Jiao Tong University, China (PhD 2008)
According to our database1,
Jian Weng
authored at least 386 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Knowl. Data Eng., November, 2024
A Reputation-Aided Lightweight Consensus Service Framework for Multi-Chain Metaverse.
IEEE Netw., November, 2024
Byzantine-Robust and Privacy-Preserving Federated Learning With Irregular Participants.
IEEE Internet Things J., November, 2024
Score-Based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization.
IEEE Trans. Medical Imaging, October, 2024
IEEE Internet Things J., October, 2024
IEEE Trans. Intell. Transp. Syst., September, 2024
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication.
Inf., September, 2024
Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality.
Int. J. Hum. Comput. Interact., September, 2024
EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing.
IEEE Trans. Circuits Syst. Video Technol., August, 2024
Int. J. Comput. Vis., August, 2024
IEEE Trans. Mob. Comput., July, 2024
Lightweight Context-Aware Network Using Partial-Channel Transformation for Real-Time Semantic Segmentation.
IEEE Trans. Intell. Transp. Syst., July, 2024
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery.
J. Cryptol., June, 2024
IEEE Internet Things J., June, 2024
Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks.
Future Internet, June, 2024
Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems.
IEEE Trans. Intell. Transp. Syst., May, 2024
IEEE Trans. Neural Networks Learn. Syst., April, 2024
IEEE Internet Things J., April, 2024
Reliability-Driven End-End-Edge Collaboration for Energy Minimization in Large-Scale Cyber-Physical Systems.
IEEE Trans. Reliab., March, 2024
IEEE Trans. Circuits Syst. Video Technol., March, 2024
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy.
IEEE Trans. Computers, February, 2024
IEEE Trans. Pattern Anal. Mach. Intell., February, 2024
IEEE Trans. Neural Networks Learn. Syst., January, 2024
Inf. Sci., January, 2024
IEEE Internet Things J., January, 2024
REPFS: Reliability-Ensured Personalized Function Scheduling in Sustainable Serverless Edge Computing.
IEEE Trans. Sustain. Comput., 2024
Multi-Stage Network With Geometric Semantic Attention for Two-View Correspondence Learning.
IEEE Trans. Image Process., 2024
DACO-BD: Data Augmentation Combinatorial Optimization-Based Backdoor Defense in Deep Neural Networks for SAR Image Classification.
IEEE Trans. Instrum. Meas., 2024
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
AFANet: A Multibackbone Compatible Feature Fusion Framework for Effective Remote Sensing Object Detection.
IEEE Geosci. Remote. Sens. Lett., 2024
J. Inf. Secur. Appl., 2024
PPMGS: An efficient and effective solution for distributed privacy-preserving semi-supervised learning.
Inf. Sci., 2024
IEEE Internet Things J., 2024
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2024
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
IACR Cryptol. ePrint Arch., 2024
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber.
IACR Cryptol. ePrint Arch., 2024
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation.
IACR Cryptol. ePrint Arch., 2024
DoFA: Adversarial examples detection for SAR images by dual-objective feature attribution.
Expert Syst. Appl., 2024
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification.
CoRR, 2024
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network.
CoRR, 2024
CoRR, 2024
Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search.
Comput. Secur., 2024
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices.
Sci. China Inf. Sci., 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Enhancing Length Generalization for Attention Based Knowledge Tracing Models with Linear Biases.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach.
IEEE Trans. Neural Networks Learn. Syst., December, 2023
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET.
IEEE Trans. Veh. Technol., November, 2023
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation.
Pattern Recognit., November, 2023
Inf. Sci., November, 2023
Des. Codes Cryptogr., November, 2023
IEEE Trans. Veh. Technol., October, 2023
Multim. Tools Appl., October, 2023
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services.
Frontiers Comput. Sci., October, 2023
Sci. China Inf. Sci., October, 2023
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems.
Comput. Secur., September, 2023
IEEE Trans. Neural Networks Learn. Syst., July, 2023
LMFFNet: A Well-Balanced Lightweight Network for Fast and Accurate Semantic Segmentation.
IEEE Trans. Neural Networks Learn. Syst., June, 2023
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services.
IEEE Trans. Mob. Comput., June, 2023
IEEE Trans. Knowl. Data Eng., May, 2023
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing.
IEEE Trans. Knowl. Data Eng., May, 2023
Theor. Comput. Sci., May, 2023
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.
Inf. Sci., May, 2023
Wirel. Networks, February, 2023
A screen-shooting resilient document image watermarking scheme using deep neural network.
IET Image Process., February, 2023
ACM Trans. Knowl. Discov. Data, January, 2023
Appl. Soft Comput., January, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction.
IEEE Trans. Image Process., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cybern., 2023
A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network.
IEEE Trans. Cloud Comput., 2023
Signal Process. Image Commun., 2023
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification.
Clust. Comput., 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2023
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
IEEE Trans. Veh. Technol., 2022
Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022
ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks.
IEEE Trans. Dependable Secur. Comput., 2022
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders.
IEEE Trans. Dependable Secur. Comput., 2022
Learning and Near-Optimal Control of Underactuated Surface Vessels With Periodic Disturbances.
IEEE Trans. Cybern., 2022
IEEE Trans. Cybern., 2022
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022
J. Parallel Distributed Comput., 2022
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance.
Inf. Sci., 2022
Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages.
Inf. Sci., 2022
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022
PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks.
IEEE Internet Things J., 2022
Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Edge Intelligent Joint Optimization for Lifetime and Latency in Large-Scale Cyber-Physical Systems.
IEEE Internet Things J., 2022
Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs).
IET Commun., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients.
CoRR, 2022
A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network.
CoRR, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Proceedings of the Progress in Cryptology, 2022
2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
BDFL: A Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle.
IEEE Trans. Veh. Technol., 2021
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing.
IEEE Trans. Netw. Sci. Eng., 2021
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles.
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Neural Networks Learn. Syst., 2021
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Image Process., 2021
Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Inf. Forensics Secur., 2021
Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI.
IEEE Trans. Inf. Forensics Secur., 2021
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage.
IEEE Trans. Cloud Comput., 2021
Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems.
Softw. Pract. Exp., 2021
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021
IEEE Internet Things J., 2021
BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks.
IEEE Internet Things J., 2021
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications.
Inf. Fusion, 2021
A defense method based on attention mechanism against traffic sign adversarial samples.
Inf. Fusion, 2021
IACR Cryptol. ePrint Arch., 2021
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Veh. Technol., 2020
Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping.
IEEE Trans. Veh. Technol., 2020
On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction.
IEEE Trans. Signal Process., 2020
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid.
IEEE Trans. Smart Grid, 2020
ACM Trans. Multim. Comput. Commun. Appl., 2020
IEEE Trans. Neural Networks Learn. Syst., 2020
IEEE Trans. Inf. Theory, 2020
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Dependable Secur. Comput., 2020
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices.
Secur. Commun. Networks, 2020
Qual. Reliab. Eng. Int., 2020
Inf. Sci., 2020
Key regeneration-free ciphertext-policy attribute-based encryption and its application.
Inf. Sci., 2020
Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations.
Inf. Sci., 2020
IEEE Internet Things J., 2020
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs.
IEEE Internet Things J., 2020
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain.
IACR Cryptol. ePrint Arch., 2020
Future Gener. Comput. Syst., 2020
CoRR, 2020
CoRR, 2020
CoRR, 2020
SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles.
CoRR, 2020
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020
Sci. China Inf. Sci., 2020
Proceedings of the 2020 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
IEEE Trans. Veh. Technol., 2019
BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET.
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Veh. Technol., 2019
IEEE Trans. Smart Grid, 2019
IEEE Trans. Serv. Comput., 2019
IEEE Trans. Parallel Distributed Syst., 2019
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields.
IEEE Trans. Inf. Theory, 2019
IEEE Trans. Ind. Informatics, 2019
Adaptive population extremal optimization-based PID neural network for multivariable nonlinear control systems.
Swarm Evol. Comput., 2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019
A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and LSTM.
IEEE Internet Things J., 2019
Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications.
CoRR, 2019
CoRR, 2019
IEEE Access, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Smart Grid, 2018
IEEE Trans. Parallel Distributed Syst., 2018
Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition.
IEEE Trans. Neural Networks Learn. Syst., 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation.
IEEE Trans. Cybern., 2018
IEEE Trans. Cogn. Dev. Syst., 2018
IEEE Syst. J., 2018
Signal Process., 2018
Quantum Inf. Process., 2018
IEEE Trans. Pattern Anal. Mach. Intell., 2018
REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.
IEEE Netw., 2018
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018
Inf. Sci., 2018
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive.
IACR Cryptol. ePrint Arch., 2018
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018
Sci. China Inf. Sci., 2018
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017
Cloudde: A Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud Version.
IEEE Trans. Parallel Distributed Syst., 2017
IEEE Trans. Intell. Transp. Syst., 2017
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data.
IEEE Trans. Inf. Forensics Secur., 2017
ACM Trans. Embed. Comput. Syst., 2017
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Secur. Commun. Networks, 2017
Quantum Inf. Process., 2017
Anonymous identity-based broadcast encryption technology for smart city information system.
Pers. Ubiquitous Comput., 2017
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017
J. Vis. Commun. Image Represent., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Eng. Appl. Artif. Intell., 2017
IEEE Access, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security Practice and Experience, 2017
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model.
Proceedings of the Information and Communications Security - 19th International Conference, 2017
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
Proceedings of the 15th IEEE Intl Conf on Dependable, 2017
Data verification in information-centric networking with efficient revocable certificateless signature.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing.
IEEE Trans. Multim., 2016
IEEE Trans. Multim., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption.
IEEE Trans. Dependable Secur. Comput., 2016
Theor. Comput. Sci., 2016
IEEE Trans. Computers, 2016
Soft Comput., 2016
Pervasive Mob. Comput., 2016
J. Vis. Commun. Image Represent., 2016
Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer.
J. Vis. Commun. Image Represent., 2016
A novel asymmetric three-party based authentication scheme in wearable devices environment.
J. Netw. Comput. Appl., 2016
CoRR, 2016
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Pseudorandom generators from regular one-way functions: New constructions with improved parameters.
Theor. Comput. Sci., 2015
Secur. Commun. Networks, 2015
J. High Speed Networks, 2015
IACR Cryptol. ePrint Arch., 2015
Congestion-aware message forwarding in delay tolerant networks: a community perspective.
Concurr. Comput. Pract. Exp., 2015
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract).
Proceedings of the Algorithms and Computation - 26th International Symposium, 2015
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
Robust password changing and DoS resilience for human-centric password authentication.
Secur. Commun. Networks, 2014
Towards semantically secure outsourcing of association rule mining on categorical data.
Inf. Sci., 2014
Unforgeability of an improved certificateless signature scheme in the standard model.
IET Inf. Secur., 2014
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices.
Proceedings of the Information Security, 16th International Conference, 2013
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption.
J. Inf. Sci. Eng., 2011
Inf. Sci., 2011
Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
Inf. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes.
IACR Cryptol. ePrint Arch., 2010
Efficient discrete logarithm based multi-signature scheme in the plain public key model.
Des. Codes Cryptogr., 2010
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles.
Sci. China Inf. Sci., 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the 34th Annual IEEE Conference on Local Computer Networks, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
J. Inf. Sci. Eng., 2008
IACR Cryptol. ePrint Arch., 2008
J. Res. Pract. Inf. Technol., 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Sci. China Ser. F Inf. Sci., 2007
2006
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006