Wenfen Liu
Orcid: 0000-0001-5601-8347
According to our database1,
Wenfen Liu
authored at least 65 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., June, 2024
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks.
IEEE Trans. Dependable Secur. Comput., 2024
Generative Architecture for Data Imputation in Secure Blockchain-enabled Spatiotemporal Data Management.
J. Web Eng., 2024
2023
ACM Trans. Asian Low Resour. Lang. Inf. Process., January, 2023
Inf. Process. Manag., 2023
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
2022
Frontiers Neurorobotics, September, 2022
FCSF-TABS: two-stage abstractive summarization with fact-aware reinforced content selection and fusion.
Neural Comput. Appl., 2022
J. Intell. Inf. Syst., 2022
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption.
Comput. Stand. Interfaces, 2022
Comput. Secur., 2022
3FO: The Three-Frame-Only Approach for Fast and Accurate Monocular SLAM Initialization.
IEEE Access, 2022
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022
2021
KSII Trans. Internet Inf. Syst., 2021
Inf. Process. Manag., 2021
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021
2020
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets.
IET Inf. Secur., 2020
Composition of Boolean functions: An application to the secondary constructions of bent functions.
Discret. Math., 2020
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
2019
Soft Comput., 2019
KSII Trans. Internet Inf. Syst., 2019
An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security.
IEEE Access, 2019
Proceedings of the Data Science, 2019
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption.
IEEE Trans. Cloud Comput., 2018
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage.
IEEE Syst. J., 2018
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS.
Int. J. Commun. Syst., 2018
A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network.
Proceedings of the 8th International Conference on Communication and Network Security, 2018
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy.
Proceedings of the 8th International Conference on Communication and Network Security, 2018
2017
Secur. Commun. Networks, 2017
Knowl. Based Syst., 2017
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017
Int. J. Commun. Syst., 2017
Int. J. Comput. Math., 2017
Comput. Intell. Neurosci., 2017
An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model.
Proceedings of the Social Media Processing - 6th National Conference, 2017
An Effective Approach for Chinese News Headline Classification Based on Multi-representation Mixed Model with Attention and Ensemble Learning.
Proceedings of the Natural Language Processing and Chinese Computing, 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
J. Inf. Secur. Appl., 2016
Int. J. Netw. Secur., 2016
Int. J. Comput. Math., 2016
2015
一种多参量评估的云计算信任模型 (Trust Model of Cloud Computing Based on Multi-parameters Evaluation).
计算机科学, 2015
IET Comput. Digit. Tech., 2015
Proceedings of the Information Security Practice and Experience, 2015
2014
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2014
BeTrust: A Dynamic Trust Model Based on Bayesian Inference and Tsallis Entropy for Medical Sensor Networks.
J. Sensors, 2014
A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions.
J. Comb. Theory A, 2014
IET Inf. Secur., 2014
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
2012
IEEE Trans. Inf. Theory, 2012
J. Medical Syst., 2012
2011
The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables.
IEEE Trans. Inf. Theory, 2011
2009
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009
2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006