Jinyong Shan

Orcid: 0000-0001-6237-986X

According to our database1, Jinyong Shan authored at least 21 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CoGNN: Towards Secure and Efficient Collaborative Graph Learning (Artifacts).
Dataset, May, 2024

Efficient Privacy-Preserving Multi-Dimensional Range Query for Cloud-Assisted Ehealth Systems.
IEEE Trans. Serv. Comput., 2024

P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection.
IEEE Trans. Inf. Forensics Secur., 2024

CoGNN: Towards Secure and Efficient Collaborative Graph Learning.
IACR Cryptol. ePrint Arch., 2024

2023
IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data.
Cybersecur., December, 2023

Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks.
IEEE Trans. Ind. Informatics, 2023

Solving Small Exponential ECDLP in EC-Based Additively Homomorphic Encryption and Applications.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive Privacy Analysis and Beyond.
CoRR, 2022

2018
A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties.
J. Syst. Sci. Complex., 2018

2015
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks.
Des. Codes Cryptogr., 2015

Further results on differentially 4-uniform permutations over F<sub>2<sup>2m</sup></sub>.
CoRR, 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s.
Proceedings of the Advances in Information and Computer Security, 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis.
Proceedings of the Information Security - 18th International Conference, 2015

2014
Improved Differential Analysis of Block Cipher PRIDE.
IACR Cryptol. ePrint Arch., 2014

Related-Key Differential Attack on Round Reduced RECTANGLE-80.
IACR Cryptol. ePrint Arch., 2014

Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher.
Cryptogr. Commun., 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack.
Proceedings of the Network and System Security - 8th International Conference, 2014

Differentially 6-uniform permutations by modifying the Gold function.
Proceedings of the IEEE International Conference on Information and Automation, 2014

2012
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions.
Finite Fields Their Appl., 2012

2011
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks.
IEEE Trans. Inf. Theory, 2011

2010
Balanced Boolean Functions with Optimum Algebraic Immunity and High Nonlinearity.
IACR Cryptol. ePrint Arch., 2010


  Loading...