Xiaoyuan Yang

Orcid: 0000-0003-4095-3837

Affiliations:
  • Engineering University of Chinese Armed Police Force (CAPF), Xi'an, China


According to our database1, Xiaoyuan Yang authored at least 143 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SFPDA: Secure Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme for Smart Grid Without TA.
IEEE Internet Things J., November, 2024

AI-generated video steganography based on semantic segmentation.
IET Image Process., September, 2024

MDA-FLH: Multidimensional Data Aggregation Scheme With Fine-Grained Linear Homomorphism for Smart Grid.
IEEE Internet Things J., January, 2024

Round efficient privacy-preserving federated learning based on MKFHE.
Comput. Stand. Interfaces, January, 2024

A structure-preserving linearly homomorphic signature scheme with designated combiner.
PeerJ Comput. Sci., 2024

Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing.
J. King Saud Univ. Comput. Inf. Sci., 2024

Motion vector-domain video steganalysis exploiting skipped macroblocks.
IET Image Process., 2024

NeR-VCP: A Video Content Protection Method Based on Implicit Neural Representation.
CoRR, 2024

Concise and Efficient Multi-Identity Fully Homomorphic Encryption Scheme.
IEEE Access, 2024

2023
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product.
J. King Saud Univ. Comput. Inf. Sci., December, 2023

Investigation on principles for cost assignment in motion vector-based video steganography.
J. Inf. Secur. Appl., March, 2023

Attacks and Improvement of Unlinkability of Biometric Template Protection Scheme Based on Bloom Filters.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing.
IEEE Trans. Cloud Comput., 2023

SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.
Sensors, 2023

Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction.
IACR Cryptol. ePrint Arch., 2023

A One-dimensional HEVC video steganalysis method using the Optimality of Predicted Motion Vectors.
CoRR, 2023

The Realizations of Steganography in Encrypted Domain.
CoRR, 2023

Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid.
IEEE Access, 2023

Construction of a Fully Homomorphic Encryption Scheme with Shorter Ciphertext and Its Implementation on the CUDA Platform.
Proceedings of the Advances in Internet, Data & Web Technologies, 2023

2022
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem.
IEEE Trans. Circuits Syst. Video Technol., 2022

VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning.
Pervasive Mob. Comput., 2022

Identity-based threshold proxy re-encryption scheme from lattices and its applications.
Frontiers Inf. Technol. Electron. Eng., 2022

Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit.
J. King Saud Univ. Comput. Inf. Sci., 2022

IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.
J. Ambient Intell. Humaniz. Comput., 2022

Secure Cloud Data Storage with Selecting Auditors.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Improved Lightweight Cloud Storage Auditing Protocol for Shared Medical Data.
Wirel. Commun. Mob. Comput., 2021

Improved Outsourced Provable Data Possession for Secure Cloud Storage.
Secur. Commun. Networks, 2021

High-Capacity Image Steganography Algorithm Based on Image Style Transfer.
Secur. Commun. Networks, 2021

Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations.
IET Inf. Secur., 2021

Multi-key Fully Homomorphic Encryption Scheme with Compact Ciphertext.
IACR Cryptol. ePrint Arch., 2021

Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram.
Proceedings of the Theoretical Computer Science, 2021

2020
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Circuits Syst. Video Technol., 2020

Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles.
IEEE Access, 2020

Recent Advances of Image Steganography With Generative Adversarial Networks.
IEEE Access, 2020

Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition.
Secur. Commun. Networks, 2019

A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS.
Secur. Commun. Networks, 2019

Two-dimensional histogram modification based reversible data hiding using motion vector for H.264.
Multim. Tools Appl., 2019

Generative steganography with Kerckhoffs' principle.
Multim. Tools Appl., 2019

Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019

A Secure and Efficient Code-Based Signature Scheme.
Int. J. Found. Comput. Sci., 2019

A compressive sensing-based adaptable secure data collection scheme for distributed wireless sensor networks.
Int. J. Distributed Sens. Networks, 2019

Recent Advances of Image Steganography with Generative Adversarial Networks.
CoRR, 2019

Generative Steganography by Sampling.
IEEE Access, 2019

Hybrid Adaptive Video Steganography Scheme Under Game Model.
IEEE Access, 2019

Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol.
IEEE Access, 2019

2018
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme.
Secur. Commun. Networks, 2018

Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding.
Multim. Tools Appl., 2018

A multilevel reversible data hiding scheme in encrypted domain based on LWE.
J. Vis. Commun. Image Represent., 2018

A new class of quaternary generalized cyclotomic sequences of order 2d and length 2pm with high linear complexity.
Int. J. Wavelets Multiresolution Inf. Process., 2018

Functional encryption with efficient verifiable outsourced decryption for secure data access control in social network.
Int. J. High Perform. Syst. Archit., 2018

Efficient Multi-key FHE with short extended ciphertexts and less public parameters.
IACR Cryptol. ePrint Arch., 2018

Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations.
IACR Cryptol. ePrint Arch., 2018

Generative Steganography by Sampling.
CoRR, 2018

The Reincarnation of Grille Cipher.
CoRR, 2018

Digital Cardan Grille: A Modern Approach for Information Hiding.
CoRR, 2018

Improved outsourced private set intersection protocol based on polynomial interpolation.
Concurr. Comput. Pract. Exp., 2018

Improved group-oriented proofs of cloud storage in IoT setting.
Concurr. Comput. Pract. Exp., 2018

Improved functional proxy re-encryption schemes for secure cloud data sharing.
Comput. Sci. Inf. Syst., 2018

Faster Bootstrapping With Multiple Addends.
IEEE Access, 2018

Steganography Security: Principle and Practice.
IEEE Access, 2018

Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

Generative Steganography Based on GANs.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Reversible Data Hiding for Video.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

The CP-ABE with Full Verifiability Outsourced Decryption and White-Box Traceability.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
A game-theoretic method for designing distortion function in spatial steganography.
Multim. Tools Appl., 2017

Faster Bootstrapping with Multiple Addends.
IACR Cryptol. ePrint Arch., 2017

On the best linear approximation of addition modulo 2 n.
Cryptogr. Commun., 2017

On the Security of a Cloud Data Storage Auditing Protocol IPAD.
Proceedings of the Advances in Internetworking, 2017

Key Encapsulation Mechanism from Multilinear Maps.
Proceedings of the Advances in Internetworking, 2017

An Efficient and Secure Outsourcing Algorithm for Bilinear Pairing Computation.
Proceedings of the Advances in Internetworking, 2017

2016
Unidirectional IBPRE scheme from lattice for cloud computation.
J. Ambient Intell. Humaniz. Comput., 2016

Efficient fully homomorphic encryption with circularly secure key switching process.
Int. J. High Perform. Comput. Netw., 2016

Research on generating good key sequence based on chaos.
Int. J. High Perform. Comput. Netw., 2016

On the k-error linear complexity of generalised cyclotomic sequences.
Int. J. High Perform. Comput. Netw., 2016

Location Privacy Preserving Scheme Based on Attribute Encryption.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

Some Practical Properties of AP14.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits.
Proceedings of the Social Computing, 2016

2015
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015

New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mob. Inf. Syst., 2015

How to build a faster private information retrieval protocol?
J. Ambient Intell. Humaniz. Comput., 2015

A new proxy re-encryption scheme for protecting critical information systems.
J. Ambient Intell. Humaniz. Comput., 2015

Protecting data in cloud environment with attribute-based encryption.
Int. J. Grid Util. Comput., 2015

CCA-secure publicly verifiable public key encryption scheme without pairings.
Int. J. Grid Util. Comput., 2015

Extend FHEW to General Case.
IACR Cryptol. ePrint Arch., 2015

The Revocable Attribute Based Encryption Scheme for Social Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

New Compact CCA Secure Elgamal Scheme in the Random Oracle Model.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

The New Attribute-Based Generalized Signcryption Scheme.
Proceedings of the Intelligent Computation in Big Data Era, 2015

2014
Impossible differential cryptanalysis on cipher E2.
Concurr. Comput. Pract. Exp., 2014

2013
DDos Attack against Proxy in PRE and PRS.
J. Softw., 2013

Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions.
J. Comput., 2013

CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
J. Comput., 2013

Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes.
J. Comput., 2013

Hybrid Proxy Re-encryption Between IBE And CBE.
J. Comput., 2013

Identity Based Proxy Re-encryption From BB1 IBE.
J. Comput., 2013

Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.
J. Comput., 2013

On the security of two multi-use CCA-secure proxy re-encryption schemes.
Int. J. Intell. Inf. Database Syst., 2013

Multi-bit homomorphic encryption based on learning with errors over rings.
IACR Cryptol. ePrint Arch., 2013

An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.
Comput. Math. Appl., 2013

Secure Cloud File System with Attribute Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

RLWE-Based Homomorphic Encryption and Private Information Retrieval.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Attribute-Based Encryption with Non-monotonic Access Structures.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Public Verifiable Key Encapsulation Mechanism under Factoring.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Attribute-Based Signcryption Scheme with Non-monotonic Access Structure.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Further observation on proxy re-encryption with keyword search.
J. Syst. Softw., 2012

Cryptanalysis of a Fuzzy Identity Based Encryption Scheme in the Standard Model.
Informatica, 2012

New Identity Based Encryption And Its Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2012

Impossible Differential Cryptanalysis on Tweaked E2.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011

Proxy encryption based secure multicast in wireless mesh networks.
J. Netw. Comput. Appl., 2011

Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme.
IACR Cryptol. ePrint Arch., 2011

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
Fundam. Informaticae, 2011

2010
Provable Secure Generalized Signcryption.
J. Comput., 2010

Cryptanalysis of Two Efficient HIBE Schemes in the Standard Model.
IACR Cryptol. ePrint Arch., 2010

On the Insecurity of an Identity Based Proxy Re-encryption Scheme.
Fundam. Informaticae, 2010

Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys.
Proceedings of the Second International Workshop on Database Technology and Applications, 2010

Proxy Re-encryption from CLE to CBE.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Proxy Re-encryption Scheme from IBE to CBE.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

A New Self-Updating Hash Chain Structure Scheme.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Audio Digital Signature Algorithm with Tamper Detection.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Universal Steganalysis to Images with WBMC Model.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A High-efficiency Data Distribution Algorithm in Distributed Storage.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

A Provably Secure Certificateless Blind Signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

An Authenticating Algorithm with Multi-compression Compatible in DCT Domain.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

On Security Notions for Verifiably Encrypted Signature.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Proxy Re-encryption Scheme Based on SK Identity Based Encryption.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

On DDos Attack against Proxy in Proxy Re-encryption and Proxy Re-signature.
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009

2008
On the Role of PKG for Proxy Re-encryption in Identity Based Setting.
IACR Cryptol. ePrint Arch., 2008

On Security Notions for Verifiable Encrypted Signature.
IACR Cryptol. ePrint Arch., 2008

Evolutionary Algorithm Based Immune Intrusion Analysis Engine.
Proceedings of the Fourth International Conference on Natural Computation, 2008

New ECDSA-Verifiable Multi-receiver Generalization Signcryption.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

Further Observations on Certificateless Public Key Encryption.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Provable Secure Generalized Signcryption.
IACR Cryptol. ePrint Arch., 2007

A New Multi-class SVM Algorithm Based on One-Class SVM.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Dynamic Group Signature with Forward Security and Its Application.
Proceedings of the Grid and Cooperative Computing, 2007

BSADF: Blind Signature Based Anonymous Digital Fingerprint.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
ECGSC: Elliptic Curve based Generalized Signcryption Scheme.
IACR Cryptol. ePrint Arch., 2006

ECGSC: Elliptic Curve Based Generalized Signcryption.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

2004
New multi-signature and proxy multi-signature schemes from the Weil pairings.
Proceedings of the 3rd International Conference on Information Security, 2004

Signcryption based on elliptic curve and its multi-party schemes.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...