Qiong Huang
Orcid: 0000-0002-7666-8985Affiliations:
- South China Agricultural University, Guangzhou, China
According to our database1,
Qiong Huang
authored at least 157 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud.
Cybersecur., December, 2024
Joint Energy and Completion Time Difference Minimization for UAV-Enabled Intelligent Transportation Systems: A Constrained Multi-Objective Optimization Approach.
IEEE Trans. Intell. Transp. Syst., October, 2024
IEEE Trans. Emerg. Top. Comput. Intell., August, 2024
IEEE Trans. Knowl. Data Eng., July, 2024
Controllable forward secure identity-based encryption with equality test in privacy-preserving text similarity analysis.
Inf. Sci., March, 2024
A lightweight open-world pest image classifier using ResNet8-based matching network and NT-Xent loss function.
Expert Syst. Appl., March, 2024
Post-quantum secure group signature with verifier local revocation and backward unlinkability.
Comput. Stand. Interfaces, March, 2024
A fully secure lattice-based signcryption with designated equality test in standard model.
Inf. Sci., February, 2024
Comput. J., February, 2024
A two-stage robust reversible watermarking using polar harmonic transform for high robustness and capacity.
Inf. Sci., January, 2024
Comput. Stand. Interfaces, January, 2024
Comput. Stand. Interfaces, January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Identity-Based Encryption With Disjunctive, Conjunctive and Range Keyword Search From Lattices.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Deep dual incomplete multi-view multi-label classification via label semantic-guided contrastive learning.
Neural Networks, 2024
Neural Networks, 2024
Int. J. Appl. Cryptogr., 2024
A novel robust black-box fingerprinting scheme for deep classification neural networks.
Expert Syst. Appl., 2024
FFEC: Fast and forward-secure equivalence-based ciphertext comparability for multiple users in cloud environment.
Comput. Stand. Interfaces, 2024
2023
A novel multi-label pest image classifier using the modified Swin Transformer and soft binary cross entropy loss.
Eng. Appl. Artif. Intell., November, 2023
IEEE Trans. Cybern., October, 2023
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems.
Future Gener. Comput. Syst., August, 2023
Comput. Stand. Interfaces, August, 2023
J. Syst. Archit., April, 2023
Peer Peer Netw. Appl., March, 2023
A Novel Encryption-Then-Lossy-Compression Scheme of Color Images Using Customized Residual Dense Spatial Network.
IEEE Trans. Multim., 2023
MTER: An Efficient Multi-User Threshold Equality Retrieval for Double Auction in Smart Grid Market.
IEEE Trans. Inf. Forensics Secur., 2023
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search.
IEEE Trans. Inf. Forensics Secur., 2023
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Inf., 2023
Forward Secure Online/Offline Key Policy Attribute-Based Encryption with Keyword Search.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Public Key Authenticated Encryption with Keyword Search Improved: Strong Security Model and Multi-keyword Construction.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
Cybersecur., December, 2022
IEEE Trans. Serv. Comput., 2022
Blockchain Based Multi-Authority Fine-Grained Access Control System With Flexible Revocation.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Blockchain Assisted Multi-Copy Provable Data Possession With Faults Localization in Multi-Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022
Efficient Public Key Encryption With Outsourced Equality Test for Cloud-Based IoT Environments.
IEEE Trans. Inf. Forensics Secur., 2022
A Secure Cloud Data Sharing Protocol for Enterprise Supporting Hierarchical Keyword Search.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Theor. Comput. Sci., 2022
J. Cloud Comput., 2022
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
Cybersecur., 2021
CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model.
Comput. J., 2021
Comput. J., 2021
Comput. J., 2021
A CCA-Full-Anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model.
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Public-key authenticated encryption with keyword search revisited: Security model and constructions.
Inf. Sci., 2020
Group public key encryption with equality test against offline message recovery attack.
Inf. Sci., 2020
Privacy-preserving polynomial interpolation and its applications on predictive analysis.
Inf. Sci., 2020
Comput. J., 2020
IEEE Access, 2020
Improving Multi-Histogram-Based Reversible Watermarking Using Optimized Features and Adaptive Clustering Number.
IEEE Access, 2020
IEEE Access, 2020
Decentralized and Privacy-Preserving Public Auditing for Cloud Storage Based on Blockchain.
IEEE Access, 2020
Reducing Sensor Failure and Ensuring Scheduling Fairness for Online Charging in Heterogeneous Rechargeable Sensor Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020
2019
Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Comput. J., 2019
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups.
IEEE Access, 2019
Optimizing the Sensor Movement for Barrier Coverage in a Sink-Based Deployed Mobile Sensor Network.
IEEE Access, 2019
Authorized Equality Test on Identity-Based Ciphertexts for Secret Data Sharing via Cloud Storage.
IEEE Access, 2019
Proceedings of the Provable Security, 2019
Towards Enhanced Security for Certificateless Public-Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable Security, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Data Science, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018
Constant-size ciphertexts in threshold attribute-based encryption without dummy attributes.
Inf. Sci., 2018
Inf. Sci., 2018
A General Two-Server Framework for Ciphertext-Checkable Encryption Against Offline Message Recovery Attack.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
IEEE Trans. Serv. Comput., 2017
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Syst. J., 2017
J. Internet Serv. Inf. Secur., 2017
J. Inf. Secur. Appl., 2017
An efficient public-key searchable encryption scheme secure against inside keyword guessing attacks.
Inf. Sci., 2017
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting.
Int. J. Found. Comput. Sci., 2017
2016
Int. J. Netw. Secur., 2016
Sakai-Ohgishi-Kasahara identity-based non-interactive key exchange revisited and more.
Int. J. Inf. Sec., 2016
A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurr. Comput. Pract. Exp., 2016
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model.
Proceedings of the Provable Security, 2016
2015
IEEE Trans. Mob. Comput., 2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015
Theor. Comput. Sci., 2015
Signal Process. Image Commun., 2015
A distributed secret share update scheme with public verifiability for ad hoc network.
Secur. Commun. Networks, 2015
Inf. Sci., 2015
Comput. J., 2015
2014
Sakai-Ohgishi-Kasahara Non-Interactive Identity-Based Key Exchange Scheme, Revisited.
IACR Cryptol. ePrint Arch., 2014
Future Gener. Comput. Syst., 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Theor. Comput. Sci., 2013
Efficient Multicast Key Distribution Using HOWP-Based Dynamic Group Access Structures.
IEEE Trans. Computers, 2013
The construction of ambiguous optimistic fair exchange from designated confirmer signature without random oracles.
Inf. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
2012
Int. J. Inf. Sec., 2012
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
2011
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange.
IEEE Trans. Inf. Forensics Secur., 2011
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
Int. J. Inf. Sec., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information Security Practice and Experience, 2011
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
IEEE Trans. Wirel. Commun., 2010
Generic Certificateless Encryption Secure Against Malicious-but-Passive KGC Attacks in the Standard Model.
J. Comput. Sci. Technol., 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
A New Construction of Designated Confirmer Signature and Its Application to Optimistic Fair Exchange - (Extended Abstract).
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the Topics in Cryptology, 2010
2009
Efficient Strong Designated Verifier Signature Schemes without Random Oracles or Delegatability.
IACR Cryptol. ePrint Arch., 2009
New Constructions of Convertible Undeniable Signature Schemes without Random Oracles.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Security Technology, 2009
Proceedings of the Computing and Combinatorics, 15th Annual International Conference, 2009
2008
J. Comput. Sci. Technol., 2008
Int. J. Appl. Cryptogr., 2008
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006