Shaohua Tang
Orcid: 0000-0003-4892-6550
According to our database1,
Shaohua Tang
authored at least 122 papers
between 1997 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Theoretical perspective on synthetic man-made life: Learning from the origin of life.
Quant. Biol., December, 2023
2022
Return just your search: privacy-preserving homoglyph search for arbitrary languages.
Frontiers Comput. Sci., 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Mob. Comput., 2021
PACE: Privacy-Preserving and Quality-Aware Incentive Mechanism for Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021
ASBKS: Towards Attribute Set Based Keyword Search Over Encrypted Personal Health Records.
IEEE Trans. Dependable Secur. Comput., 2021
Repot: Real-time and privacy-preserving online task assignment for mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021
A verifiable and privacy-preserving multidimensional data aggregation scheme in mobile crowdsensing.
Trans. Emerg. Telecommun. Technol., 2021
2020
EGeoIndis: An effective and efficient location privacy protection framework in traffic density detection.
Veh. Commun., 2020
Authorized Keyword Searches on Public Key Encrypted Data With Time Controlled Keyword Privacy.
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Inf. Forensics Secur., 2020
A novel selective encryption scheme for H.264/AVC video with improved visual security.
Signal Process. Image Commun., 2020
Improved block ordering and frequency selection for reversible data hiding in JPEG images.
Signal Process., 2020
IronM: Privacy-Preserving Reliability Estimation of Heterogeneous Data for Mobile Crowdsensing.
IEEE Internet Things J., 2020
IET Image Process., 2020
2019
IEEE Trans. Emerg. Top. Comput., 2019
IEEE Trans. Circuits Syst. Video Technol., 2019
J. Vis. Commun. Image Represent., 2019
J. Parallel Distributed Comput., 2019
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things.
J. Netw. Comput. Appl., 2019
RTPT: A framework for real-time privacy-preserving truth discovery on crowdsensed data streams.
Comput. Networks, 2019
Dynamic and Privacy-Preserving Reputation Management for Blockchain-Based Mobile Crowdsensing.
IEEE Access, 2019
High-Capacity Reversible Data Hiding in Encrypted Images by Bit Plane Partition and MSB Prediction.
IEEE Access, 2019
IEEE Access, 2019
Reversible Data Hiding With Image Contrast Enhancement Based on Two-Dimensional Histogram Modification.
IEEE Access, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
A privacy-preserving data aggregation of mobile crowdsensing based on local differential privacy.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
IEEE Trans. Multim., 2018
IEEE Trans. Inf. Theory, 2018
Signal Process. Image Commun., 2018
Secur. Commun. Networks, 2018
Circulant UOV: a new UOV variant with shorter private key and faster signature generation.
KSII Trans. Internet Inf. Syst., 2018
IEEE Access, 2018
A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction.
IEEE Access, 2018
Image reversible visual transformation based on MSB replacement and histogram bin mapping.
Proceedings of the Tenth International Conference on Advanced Computational Intelligence, 2018
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018
2017
Wirel. Networks, 2017
SpatialRecruiter: Maximizing Sensing Coverage in Selecting Workers for Spatial Crowdsourcing.
IEEE Trans. Veh. Technol., 2017
Multim. Tools Appl., 2017
KSII Trans. Internet Inf. Syst., 2017
Circulant Rainbow: A New Rainbow Variant With Shorter Private Key and Faster Signature Generation.
IEEE Access, 2017
Two-Factor Data Access Control With Efficient Revocation for Multi-Authority Cloud Storage Systems.
IEEE Access, 2017
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Identity-Based Proxy-Oriented Data Uploading and Remote Data Integrity Checking in Public Cloud.
IEEE Trans. Inf. Forensics Secur., 2016
Achieving Simple, Secure and Efficient Hierarchical Access Control in Cloud Computing.
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
Peer-to-Peer Netw. Appl., 2016
Extended dual system group and shorter unbounded hierarchical identity based encryption.
Des. Codes Cryptogr., 2016
Skeleton Genetics: a comprehensive database for genes and mutations related to genetic skeletal disorders.
Database J. Biol. Databases Curation, 2016
Proceedings of the Information Security Practice and Experience, 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Theor. Comput. Sci., 2015
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Secur. Commun. Networks, 2015
Mob. Inf. Syst., 2015
一种AVR环境下KLEIN分组密码抗计时和缓存边信道攻击的快速保护方法 (Fast Implementation of KLEIN for Resisting Timing and Cache Side-channel Attacks on AVR).
计算机科学, 2015
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015
Efficient hardware implementation of PMI+ for low-resource devices in mobile cloud computing.
Future Gener. Comput. Syst., 2015
Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature Generation.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE J. Biomed. Health Informatics, 2014
Adding variables variation to Rainbow-like scheme to enhance its security level against MinRank attack.
Secur. Commun. Networks, 2014
Yet another attack on the chinese remainder theorem-based hierarchical access control scheme.
Secur. Commun. Networks, 2014
J. Comput. Sci. Technol., 2014
Future Gener. Comput. Syst., 2014
2013
Secure Data Discovery and Dissemination based on Hash Tree for Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2013
Mob. Networks Appl., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Comput. Stand. Interfaces, 2013
Proceedings of the Radio Frequency Identification System Security, 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the IEEE International Conference on Communications, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Privacy in Communication Networks, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011
Proceedings of the Trusted Systems - Third International Conference, 2011
2010
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
Cross-Domain Grid Authentication and Authorization Scheme Based on Trust Management and Delegation.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
Security Scheme for Cross-Domain Grid: Integrating WS-Trust and Grid Security Mechanism.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2006
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006
2005
J. Circuits Syst. Comput., 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2002
J. Circuits Syst. Comput., 2002
2000
J. Circuits Syst. Comput., 2000
1999
J. Circuits Syst. Comput., 1999
1997
J. Exp. Theor. Artif. Intell., 1997