Jianghong Wei
Orcid: 0000-0002-0286-7973
According to our database1,
Jianghong Wei
authored at least 63 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
IEEE Trans. Mob. Comput., May, 2024
Enhancing Generalization in Few-Shot Learning for Detecting Unknown Adversarial Examples.
Neural Process. Lett., April, 2024
IEEE Trans. Dependable Secur. Comput., 2024
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks.
IEEE Trans. Dependable Secur. Comput., 2024
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
J. Inf. Secur. Appl., December, 2023
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing.
IEEE Trans. Computers, July, 2023
Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023
Appl. Intell., April, 2023
IEEE Trans. Parallel Distributed Syst., February, 2023
VF-CART: A communication-efficient vertical federated framework for the CART algorithm.
J. King Saud Univ. Comput. Inf. Sci., January, 2023
IEEE Trans. Cloud Comput., 2023
Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting.
IEEE Trans. Cloud Comput., 2023
Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage.
Int. J. Comput. Sci. Eng., 2023
Int. J. Comput. Sci. Eng., 2023
Comput. Stand. Interfaces, 2023
A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain.
Comput. Stand. Interfaces, 2023
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Int. J. Intell. Syst., December, 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Int. J. Intell. Syst., 2022
Comput. Stand. Interfaces, 2022
Comput. Secur., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Provable and Practical Security, 2022
Proceedings of the Information Security - 25th International Conference, 2022
2021
IEEE/ACM Trans. Netw., 2021
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud.
IEEE Trans. Dependable Secur. Comput., 2021
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets.
IET Inf. Secur., 2020
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
2019
Soft Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security.
IEEE Access, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption.
IEEE Trans. Cloud Comput., 2018
Sustain. Comput. Informatics Syst., 2018
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage.
IEEE Syst. J., 2018
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS.
Int. J. Commun. Syst., 2018
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy.
Proceedings of the 8th International Conference on Communication and Network Security, 2018
2017
Secur. Commun. Networks, 2017
Knowl. Based Syst., 2017
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017
Int. J. Commun. Syst., 2017
Int. J. Comput. Math., 2017
Comput. Intell. Neurosci., 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
J. Inf. Secur. Appl., 2016
Int. J. Netw. Secur., 2016
2015
IET Comput. Digit. Tech., 2015
Proceedings of the Information Security Practice and Experience, 2015
2014
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2014
2012
J. Medical Syst., 2012