Jinyue Xia
Orcid: 0000-0003-0089-7033
According to our database1,
Jinyue Xia
authored at least 41 papers
between 2008 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Comput. Syst. Sci. Eng., 2023
2022
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Comput. Syst. Sci. Eng., 2022
Comput. Syst. Sci. Eng., 2022
Comput. Syst. Sci. Eng., 2022
Comput. Syst. Sci. Eng., 2022
Operation Configuration Optimization of Power Gas Energy Hub System Considering NOx Emission.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
KSII Trans. Internet Inf. Syst., 2021
Comput. Syst. Sci. Eng., 2021
2020
Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371.
J. Inf. Secur. Appl., 2020
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020
Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde.
Int. J. Embed. Syst., 2020
Int. J. Comput. Sci. Eng., 2020
2019
J. Inf. Secur. Appl., 2019
J. Inf. Secur. Appl., 2019
A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
J. Inf. Secur. Appl., 2019
Int. J. Sens. Networks, 2019
EURASIP J. Wirel. Commun. Netw., 2019
IEEE Access, 2019
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
2018
A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Instructor Perspectives on Comparative Heatmap Visualizations of Student Engagement with Lecture Video: Comparative Heatmap Visualizations of Student Video Engagement.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
2014
Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, 2014
2013
Streamlining user interaction in tag-based conversational navigation of knowledge resource libraries.
Proceedings of the 13th ACM/IEEE-CS Joint Conference on Digital Libraries, 2013
2012
2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008