Peisong Shen

Orcid: 0000-0002-4507-3356

According to our database1, Peisong Shen authored at least 18 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dynamic group fuzzy extractor.
Cybersecur., December, 2024

Privacy-Preserving and Trusted Keyword Search for Multi-Tenancy Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

One-Factor Cancelable Biometric Template Protection Scheme for Real-Valued Features.
Proceedings of the Pattern Recognition - 27th International Conference, 2024

2023
Cancelable biometric schemes for Euclidean metric and Cosine metric.
Cybersecur., December, 2023

A Biometric-Based Data Protection Scheme for RSDs.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

General Constructions of Fuzzy Extractors for Continuous Sources.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
A Secure and Practical Sample-then-lock Scheme for Iris Recognition.
Proceedings of the 26th International Conference on Pattern Recognition, 2022

Secure Sketch and Fuzzy Extractor with Imperfect Randomness: An Information-Theoretic Study.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

2020
Verify a Valid Message in Single Tuple: A Watermarking Technique for Relational Database.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
A Performance-Optimization Method for Reusable Fuzzy Extractor Based on Block Error Distribution of Iris Trait.
Proceedings of the Security and Privacy in Communication Networks, 2019

2018
A Robust Iris Segmentation Using Fully Convolutional Network with Dilated Convolutions.
Proceedings of the 2018 IEEE International Symposium on Multimedia, 2018

2017
Privacy-Preserving Relevance Ranking Scheme and Its Application in Multi-keyword Searchable Encryption.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Personalized Multi-keyword Ranked Search Method Over Encrypted Cloud Data.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

A Fine-Grained Access Control Scheme for Big Data Based on Classification Attributes.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2016
An Efficient Privacy-Preserving Ranked Keyword Search Method.
IEEE Trans. Parallel Distributed Syst., 2016

2015
SOLS: A scheme for outsourced location based service.
J. Netw. Comput. Appl., 2015

A similarity evaluation algorithm and its application in multi-keyword search on encrypted cloud data.
Proceedings of the 34th IEEE Military Communications Conference, 2015

2014
A hierarchical clustering method for big data oriented ciphertext search.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014


  Loading...