Jianghong Wei

Orcid: 0000-0002-0286-7973

According to our database1, Jianghong Wei authored at least 63 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Practically secure linear-map vector commitment and its applications.
Comput. Stand. Interfaces, 2025

2024
Aggregatably Verifiable Data Streaming.
IEEE Internet Things J., July, 2024

Optimal Verifiable Data Streaming Under Concurrent Queries.
IEEE Trans. Mob. Comput., May, 2024

Enhancing Generalization in Few-Shot Learning for Detecting Unknown Adversarial Examples.
Neural Process. Lett., April, 2024

Abuse-resistant deniable encryption.
Comput. Stand. Interfaces, January, 2024

Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing.
IEEE Trans. Dependable Secur. Comput., 2024

SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks.
IEEE Trans. Dependable Secur. Comput., 2024

Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
System-widely and fine-grained forward secure identity-based signature scheme.
J. Inf. Secur. Appl., December, 2023

VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers, July, 2023

Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023

Improving temporal knowledge graph embedding using tensor factorization.
Appl. Intell., April, 2023

Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems.
IEEE Trans. Parallel Distributed Syst., February, 2023

VF-CART: A communication-efficient vertical federated framework for the CART algorithm.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Blockchain-Based Accountable Auditing With Multi-Ownership Transfer.
IEEE Trans. Cloud Comput., 2023

Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting.
IEEE Trans. Cloud Comput., 2023

Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage.
Int. J. Comput. Sci. Eng., 2023

Blockchain-based collaborative intrusion detection scheme.
Int. J. Comput. Sci. Eng., 2023

A blockchain-based compact audit-enabled deduplication in decentralized storage.
Comput. Stand. Interfaces, 2023

A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain.
Comput. Stand. Interfaces, 2023

Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Verifiable data streaming protocol supporting update history queries.
Int. J. Intell. Syst., December, 2022

Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy.
IEEE Trans. Dependable Secur. Comput., 2022

Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage.
IEEE Trans. Dependable Secur. Comput., 2022

Verifiable data streaming with efficient update for intelligent automation systems.
Int. J. Intell. Syst., 2022

Efficient public-key authenticated deniable encryption schemes.
Comput. Stand. Interfaces, 2022

VAEPass: A lightweight passwords guessing model based on variational auto-encoder.
Comput. Secur., 2022

Publicly Verifiable Private Set Intersection from Homomorphic Encryption.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems.
Proceedings of the Provable and Practical Security, 2022

Batched Fully Homomorphic Encryption from TFHE.
Proceedings of the Information Security - 25th International Conference, 2022

2021
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging.
IEEE/ACM Trans. Netw., 2021

RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021

Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Optimal Verifiable Data Streaming Protocol with Data Auditing.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets.
IET Inf. Secur., 2020

Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
Forward and backward secure fuzzy encryption for data sharing in cloud computing.
Soft Comput., 2019

TG-SPSR: A Systematic Targeted Password Attacking Model.
KSII Trans. Internet Inf. Syst., 2019

An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security.
IEEE Access, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption.
IEEE Trans. Cloud Comput., 2018

A certificateless aggregate signature scheme for healthcare wireless sensor network.
Sustain. Comput. Informatics Syst., 2018

Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage.
IEEE Syst. J., 2018

Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018

On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS.
Int. J. Commun. Syst., 2018

A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

2017
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing.
Secur. Commun. Networks, 2017

Compressed constrained spectral clustering framework for large-scale data sets.
Knowl. Based Syst., 2017

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017

Two-factor authentication scheme using attribute and password.
Int. J. Commun. Syst., 2017

Forward-secure identity-based signature with efficient revocation.
Int. J. Comput. Math., 2017

Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection.
Comput. Intell. Neurosci., 2017

Universally Composable Three-Party Password Authenticated Key Exchange.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Security pitfalls of "ePASS: An expressive attribute-based signature scheme".
J. Inf. Secur. Appl., 2016

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme.
Int. J. Netw. Secur., 2016

Practical Attribute-based Signature: Traceability and Revocability.
Comput. J., 2016

2015
Secure control protocol for universal serial bus mass storage devices.
IET Comput. Digit. Tech., 2015

Forward-Secure Threshold Attribute-Based Signature Scheme.
Comput. J., 2015

Revocable Threshold Attribute-Based Signature against Signing Key Exposure.
Proceedings of the Information Security Practice and Experience, 2015

2014
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2014

Traceable attribute-based signcryption.
Secur. Commun. Networks, 2014

2012
An Improved Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012


  Loading...