Jinyue Xia

Orcid: 0000-0003-0089-7033

According to our database1, Jinyue Xia authored at least 41 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Quantum Fuzzy Support Vector Machine for Binary Classification.
Comput. Syst. Sci. Eng., 2023

2022
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Revocable Attribute-Based Encryption With Data Integrity in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Correlation Analysis between Economic Growth and Environmental Quality.
Comput. Syst. Sci. Eng., 2022

Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain.
Comput. Syst. Sci. Eng., 2022

Structured Graded Lung Rehabilitation for Children with Mechanical Ventilation.
Comput. Syst. Sci. Eng., 2022

Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward.
Comput. Syst. Sci. Eng., 2022

Operation Configuration Optimization of Power Gas Energy Hub System Considering NOx Emission.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Development of Intelligent Integrated Energy System Based on MVC.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain Cross-Chain Research Based on Verifiable Ring Signatures.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain-Based Efficient Incentive Mechanism in Crowdsensing.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Quantum Fuzzy K-Means Algorithm Based on Fuzzy Theory.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

An Integrated Artificial Neural Network-based Precipitation Revision Model.
KSII Trans. Internet Inf. Syst., 2021

Front-end Control Mechanism of Electronic Records.
Comput. Syst. Sci. Eng., 2021

Clustering Collision Power Attack on RSA-CRT.
Comput. Syst. Sci. Eng., 2021

A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain.
Comput. Syst. Sci. Eng., 2021

2020
Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371.
J. Inf. Secur. Appl., 2020

A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020

Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde.
Int. J. Embed. Syst., 2020

A multi-group e-commerce signature scheme based on quantum teleportation.
Int. J. Comput. Sci. Eng., 2020

2019
A new user behavior evaluation method in online social network.
J. Inf. Secur. Appl., 2019

A Cluster Correlation power analysis against double blinding exponentiation.
J. Inf. Secur. Appl., 2019

A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
J. Inf. Secur. Appl., 2019

Local outlier detection based on information entropy weighting.
Int. J. Sens. Networks, 2019

An efficient method for meteorological nephogram recognition in cloud environment.
EURASIP J. Wirel. Commun. Netw., 2019

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.
IEEE Access, 2019

A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Multi-function Quantum Cryptography Protocol Based on Bell State.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network.
Secur. Commun. Networks, 2018

A Secure Multimedia Data Sharing Scheme for Wireless Network.
Secur. Commun. Networks, 2018

Instructor Perspectives on Comparative Heatmap Visualizations of Student Engagement with Lecture Video: Comparative Heatmap Visualizations of Student Video Engagement.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

2014
Exploring the design space of multiple video interaction.
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014

2013
Streamlining user interaction in tag-based conversational navigation of knowledge resource libraries.
Proceedings of the 13th ACM/IEEE-CS Joint Conference on Digital Libraries, 2013

2012
Secure Key Distribution for the Smart Grid.
IEEE Trans. Smart Grid, 2012

2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008

Full Security: Fuzzy Identity Based Encryption.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM.
IACR Cryptol. ePrint Arch., 2008

Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...