Qi Jiang

Orcid: 0000-0002-0894-4992

Affiliations:
  • Xidian University, Xi'an, China


According to our database1, Qi Jiang authored at least 82 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection.
IEEE Trans. Inf. Forensics Secur., 2024

Deep Hashing Based Cancelable Multi-Biometric Template Protection.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Electrocardiogram Based Group Device Pairing for Wearables.
IEEE Trans. Mob. Comput., November, 2023

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023

DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS.
IEEE Trans. Intell. Transp. Syst., February, 2023

Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy.
IEEE Trans. Dependable Secur. Comput., 2023

Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap.
IEEE Trans. Cloud Comput., 2023

Network Slicing in 6G: An Authentication Framework for Unattended Terminals.
IEEE Netw., 2023

2022
A geometric approach to analysing the effects of time delays on stability of vehicular platoons with ring interconnections.
Peer-to-Peer Netw. Appl., 2022

NOSnoop: An Effective Collaborative Meta-Learning Scheme Against Property Inference Attack.
IEEE Internet Things J., 2022

Enabling efficient traceable and revocable time-based data sharing in smart city.
EURASIP J. Wirel. Commun. Netw., 2022

Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment.
Comput. Networks, 2022

Self-Anomaly-Detection Model Training via Initialized Meta Model.
Proceedings of the International Conference on Networking and Network Applications, 2022

Community Detection with Graph Neural Network using Markov Stability.
Proceedings of the 2022 International Conference on Artificial Intelligence in Information and Communication, 2022

Blockchain-Based Encrypted Image Storage and Search in Cloud Computing.
Proceedings of the Database Systems for Advanced Applications, 2022

2021
An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs.
IEEE Trans. Veh. Technol., 2021

PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys.
IEEE Trans. Serv. Comput., 2021

Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network.
IEEE Trans. Emerg. Top. Comput., 2021

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing.
Secur. Commun. Networks, 2021

Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network.
Secur. Commun. Networks, 2021

An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones.
Peer-to-Peer Netw. Appl., 2021

Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users.
Mob. Networks Appl., 2021

Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2021

Three-factor authentication protocol using physical unclonable function for IoV.
Comput. Commun., 2021

2020
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems.
Wirel. Commun. Mob. Comput., 2020

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020

A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks.
IEEE Trans. Sustain. Comput., 2020

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.
IEEE Trans. Serv. Comput., 2020

A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access.
Secur. Commun. Networks, 2020

Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols.
Int. J. Netw. Secur., 2020

Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT.
Proceedings of the International Conference on Networking and Network Applications, 2020

BUA: A Blockchain-based Unlinkable Authentication in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Pruneable sharding-based blockchain protocol.
Peer-to-Peer Netw. Appl., 2019

Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices.
IEEE Internet Things J., 2019

User centric three-factor authentication protocol for cloud-assisted wearable devices.
Int. J. Commun. Syst., 2019

Online handwritten signature verification based on the most stable feature and partition.
Clust. Comput., 2019

Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV.
Proceedings of the 2019 IEEE/CIC International Conference on Communications in China, 2019

2018
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services.
IEEE Syst. J., 2018

User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs.
Secur. Commun. Networks, 2018

AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service.
Peer-to-Peer Netw. Appl., 2018

Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing.
IEEE Netw., 2018

A provably secure biometrics-based authenticated key agreement scheme for multi-server environments.
Multim. Tools Appl., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intell. Humaniz. Comput., 2018

ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks.
Future Gener. Comput. Syst., 2018

Verifiable keyword search over encrypted cloud data in smart city.
Comput. Electr. Eng., 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive Mob. Comput., 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017

A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing.
J. Inf. Sci. Eng., 2017

A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks.
Int. J. Netw. Manag., 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Comput. Electr. Eng., 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A privacy preserving three-factor authentication protocol for e-Health clouds.
J. Supercomput., 2016

A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities.
Secur. Commun. Networks, 2016

Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card.
Multim. Tools Appl., 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Netw. Comput. Appl., 2016

A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.
J. Medical Syst., 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
Inf. Technol. Control., 2016

Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks.
Int. J. Netw. Secur., 2016

Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A New Privacy-Aware Handover Authentication Scheme for Wireless Networks.
Wirel. Pers. Commun., 2015

An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks.
Peer-to-Peer Netw. Appl., 2015

Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.
Int. J. Commun. Syst., 2015

Improvement of robust smart-card-based password authentication scheme.
Int. J. Commun. Syst., 2015

A delegation based cross trusted domain direct anonymous attestation scheme.
Comput. Networks, 2015

Bayesian mechanism for rational secret sharing scheme.
Sci. China Inf. Sci., 2015

2014
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks.
Wirel. Pers. Commun., 2014

Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems.
J. Medical Syst., 2014

2013
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks.
Wirel. Pers. Commun., 2013

A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2013

An Improved Password-Based Remote User Authentication Protocol without Smart Cards.
Inf. Technol. Control., 2013

Fair (t, n) threshold secret sharing scheme.
IET Inf. Secur., 2013

2012
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing.
Int. J. Netw. Secur., 2012

Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems.
IET Inf. Secur., 2012

2011
A novel re-authentication scheme based on tickets in wireless local area networks.
J. Parallel Distributed Comput., 2011

2010
Security Analysis of the Newest ID-Transfer Scheme for Low-Cost RFID Tags.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

SAM: Secure Access of Media Independent Information Service with User Anonymity.
EURASIP J. Wirel. Commun. Netw., 2010

A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks.
Proceedings of the International Conference on E-Business and E-Government, 2010


  Loading...