Peng Jiang

Orcid: 0000-0001-5786-1512

Affiliations:
  • Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing, China (PhD 2017)


According to our database1, Peng Jiang authored at least 57 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Locally Verifiable Batch Authentication in IoMT.
IEEE Trans. Inf. Forensics Secur., 2024

Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy Enhancement.
IEEE Trans. Inf. Forensics Secur., 2024

Purified Authorization Service With Encrypted Message Moderation.
IEEE Trans. Inf. Forensics Secur., 2024

SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement.
IEEE Trans. Inf. Forensics Secur., 2024

Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems.
IEEE Trans. Inf. Forensics Secur., 2024

Detecting Malicious Websites From the Perspective of System Provenance Analysis.
IEEE Trans. Dependable Secur. Comput., 2024

A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN.
Proceedings of the IEEE INFOCOM 2024, 2024

Lightweight Privacy-Preserving Mechanisms for Cross-Chain Transactions.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification.
Proceedings of the 10th IEEE Conference on Big Data Security on Cloud, 2024

CrossAAD: Cross-Chain Abnormal Account Detection.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
BTAA: Blockchain and TEE-Assisted Authentication for IoT Systems.
IEEE Internet Things J., July, 2023

EthereumX: Improving Signature Security With Randomness Preprocessing Module.
IEEE Trans. Serv. Comput., 2023

Subject-Level Membership Inference Attack via Data Augmentation and Model Discrepancy.
IEEE Trans. Inf. Forensics Secur., 2023

Research Philosophy of Modern Cryptography.
IACR Cryptol. ePrint Arch., 2023

Enabling privacy and leakage resistance for dynamic blockchain-based access control systems.
Comput. Stand. Interfaces, 2023

Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation.
Proceedings of the 32nd USENIX Security Symposium, 2023

HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy.
Proceedings of the 5th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2023

2022
Accelerating Decentralized and Partial-Privacy Data Access for VANET via Online/Offline Functional Encryption.
IEEE Trans. Veh. Technol., 2022

Data Access Control in Cloud Computing: Flexible and Receiver Extendable.
IEEE Trans. Serv. Comput., 2022

Report When Malicious: Deniable and Accountable Searchable Message-Moderation System.
IEEE Trans. Inf. Forensics Secur., 2022

Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers.
IEEE Trans. Dependable Secur. Comput., 2022

Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts.
Inf. Sci., 2022

RePEL: Blockchain-Empowered Conditional Privacy-Preserving Encrypted Learning.
IEEE Internet Things J., 2022

Toward Reliable and Confidential Release for Smart Contract via ID-Based TRE.
IEEE Internet Things J., 2022

FastPRS: Augmenting Fast and Hidden Query in EPR Systems via Online/Offline Puncturable Search.
IEEE Internet Things J., 2022

Edge Computing and Lightning Network Empowered Secure Food Supply Management.
IEEE Internet Things J., 2022

Blockchain Meets Covert Communication: A Survey.
IEEE Commun. Surv. Tutorials, 2022

2021
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format.
IEEE Trans. Serv. Comput., 2021

PPFilter: Provider Privacy-Aware Encrypted Filtering System.
IEEE Trans. Serv. Comput., 2021

Efficient and Adaptive Procurement Protocol with Purchasing Privacy.
IEEE Trans. Serv. Comput., 2021

Generic construction for tightly-secure signatures from discrete log.
Theor. Comput. Sci., 2021

SearchBC: A Blockchain-Based PEKS Framework for IoT Services.
IEEE Internet Things J., 2021

SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud Storage.
Proceedings of the 6th IEEE International Conference on Smart Cloud, 2021

SM9-based Anonymous Search over Encrypted Data.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Heuristic-based Blockchain Assignment: An Empirical Study.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

2020
A survey on the security of blockchain systems.
Future Gener. Comput. Syst., 2020

Searchain: Blockchain-based private keyword search in decentralized storage.
Future Gener. Comput. Syst., 2020

Reputation-Based Trustworthy Supply Chain Management Using Smart Contract.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems.
Theor. Comput. Sci., 2019

Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019

Location-based Privacy-preserving Techniques in Connected Environment: A Survey.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Privacy-enhanced attribute-based private information retrieval.
Inf. Sci., 2018

Identity-Based Broadcast Encryption for Inner Products.
Comput. J., 2018

2017
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2017

Private Keyword-Search for Database Systems Against Insider Attacks.
J. Comput. Sci. Technol., 2017

Secure-channel free keyword search with authorization in manager-centric databases.
Comput. Secur., 2017

2016
Centralized keyword search on encrypted data for cloud applications.
Secur. Commun. Networks, 2016

Online/Offline Ciphertext Retrieval on Resource Constrained Devices.
Comput. J., 2016

Oblivious Keyword Search with Authorization.
Proceedings of the Provable Security, 2016

Public Key Encryption with Authorized Keyword Search.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015


  Loading...