Qing Wu
Orcid: 0000-0002-9400-236XAffiliations:
- Xi'an University of Posts and Communications, School of Automation, China
According to our database1,
Qing Wu
authored at least 51 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Publicly Accountable Data-Sharing Scheme Supporting Privacy Protection for Fog-Enabled VANETs.
IEEE Trans. Veh. Technol., June, 2024
Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT.
IEEE Internet Things J., January, 2024
Flexibly expressive and revocable multi-authority KP-ABE scheme from RLWE for Internet of Medical Things.
J. Syst. Archit., 2024
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage.
J. Syst. Archit., 2024
Enhanced Secure Attribute-Based Dynamic Data Sharing Scheme With Efficient Access Policy Hiding and Policy Updating for IoMT.
IEEE Internet Things J., 2024
IACR Cryptol. ePrint Arch., 2024
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle.
IACR Cryptol. ePrint Arch., 2024
2023
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023
Application of asymmetric proximal support vector regression based on multitask learning in the stock market.
Expert Syst. Appl., October, 2023
Collusion resistant multi-authority access control scheme with privacy protection for personal health records.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
J. King Saud Univ. Comput. Inf. Sci., July, 2023
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records.
IEEE Syst. J., June, 2023
L1-Norm Robust Regularized Extreme Learning Machine with Asymmetric C-Loss for Regression.
Axioms, February, 2023
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem.
IACR Cryptol. ePrint Arch., 2023
Doubly Regularized Least Squares Twin Extreme Learning Machine for Pattern Classification.
Proceedings of the 6th International Conference on Artificial Intelligence and Pattern Recognition, 2023
Proceedings of the 6th International Conference on Artificial Intelligence and Pattern Recognition, 2023
2022
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV.
J. King Saud Univ. Comput. Inf. Sci., November, 2022
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing.
IEEE Syst. J., 2022
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth.
J. Syst. Archit., 2022
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud.
J. Syst. Archit., 2022
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks.
IEEE Internet Things J., 2022
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain.
IEEE Internet Things J., 2022
Multitask Learning Based on Least Squares Support Vector Regression for Stock Forecast.
Axioms, 2022
Application of online multitask learning based on least squares support vector regression in the financial market.
Appl. Soft Comput., 2022
2021
One novel class of Bézier smooth semi-supervised support vector machines for classification.
Neural Comput. Appl., 2021
Proceedings of the 2021 International Conference on Control, 2021
2020
Int. J. Knowl. Based Intell. Eng. Syst., 2020
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
2016
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
Comput. J., 2016
2015
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups.
Math. Comput. Model., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
2011
J. Networks, 2011
KSII Trans. Internet Inf. Syst., 2011
2010
J. Inf. Sci. Eng., 2010
J. Inf. Sci. Eng., 2010
KSII Trans. Internet Inf. Syst., 2010
Proceedings of the Information Computing and Applications - First International Conference, 2010
2009
Fundam. Informaticae, 2009
2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006