Xiaoyuan Yang
Orcid: 0000-0003-4095-3837Affiliations:
- Engineering University of Chinese Armed Police Force (CAPF), Xi'an, China
According to our database1,
Xiaoyuan Yang
authored at least 143 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SFPDA: Secure Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme for Smart Grid Without TA.
IEEE Internet Things J., November, 2024
IET Image Process., September, 2024
MDA-FLH: Multidimensional Data Aggregation Scheme With Fine-Grained Linear Homomorphism for Smart Grid.
IEEE Internet Things J., January, 2024
Comput. Stand. Interfaces, January, 2024
A structure-preserving linearly homomorphic signature scheme with designated combiner.
PeerJ Comput. Sci., 2024
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing.
J. King Saud Univ. Comput. Inf. Sci., 2024
IET Image Process., 2024
CoRR, 2024
IEEE Access, 2024
2023
Multi-key homomorphic encryption with tightened RGSW ciphertexts without relinearization for ciphertexts product.
J. King Saud Univ. Comput. Inf. Sci., December, 2023
Investigation on principles for cost assignment in motion vector-based video steganography.
J. Inf. Secur. Appl., March, 2023
Attacks and Improvement of Unlinkability of Biometric Template Protection Scheme Based on Bloom Filters.
IEEE Trans. Cloud Comput., 2023
Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing.
IEEE Trans. Cloud Comput., 2023
SM2-Based Offline/Online Efficient Data Integrity Verification Scheme for Multiple Application Scenarios.
Sensors, 2023
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction.
IACR Cryptol. ePrint Arch., 2023
A One-dimensional HEVC video steganalysis method using the Optimality of Predicted Motion Vectors.
CoRR, 2023
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid.
IEEE Access, 2023
Construction of a Fully Homomorphic Encryption Scheme with Shorter Ciphertext and Its Implementation on the CUDA Platform.
Proceedings of the Advances in Internet, Data & Web Technologies, 2023
2022
A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem.
IEEE Trans. Circuits Syst. Video Technol., 2022
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning.
Pervasive Mob. Comput., 2022
Identity-based threshold proxy re-encryption scheme from lattices and its applications.
Frontiers Inf. Technol. Electron. Eng., 2022
Efficient certificateless public integrity auditing of cloud data with designated verifier for batch audit.
J. King Saud Univ. Comput. Inf. Sci., 2022
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability.
J. Ambient Intell. Humaniz. Comput., 2022
Proceedings of the International Conference on Networking and Network Applications, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Secur. Commun. Networks, 2021
Secur. Commun. Networks, 2021
Efficient multi-key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations.
IET Inf. Secur., 2021
IACR Cryptol. ePrint Arch., 2021
Research on Adaptive Video Steganography Algorithm for Clustering and Dispersing DCT Coefficient Difference Histogram.
Proceedings of the Theoretical Computer Science, 2021
2020
Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain.
IEEE Trans. Circuits Syst. Video Technol., 2020
Privacy-Preserving Public Cloud Audit Scheme Supporting Dynamic Data for Unmanned Aerial Vehicles.
IEEE Access, 2020
IEEE Access, 2020
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure.
Proceedings of the Security and Privacy in Digital Economy, 2020
2019
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition.
Secur. Commun. Networks, 2019
A New Group Location Privacy-Preserving Method Based on Distributed Architecture in LBS.
Secur. Commun. Networks, 2019
Two-dimensional histogram modification based reversible data hiding using motion vector for H.264.
Multim. Tools Appl., 2019
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification.
Inf. Sci., 2019
Int. J. Found. Comput. Sci., 2019
A compressive sensing-based adaptable secure data collection scheme for distributed wireless sensor networks.
Int. J. Distributed Sens. Networks, 2019
CoRR, 2019
Efficient Multi-Key FHE With Short Extended Ciphertexts and Directed Decryption Protocol.
IEEE Access, 2019
2018
Secure Testing for Genetic Diseases on Encrypted Genomes with Homomorphic Encryption Scheme.
Secur. Commun. Networks, 2018
Reversible data hiding in encrypted images with high capacity by bitplane operations and adaptive embedding.
Multim. Tools Appl., 2018
J. Vis. Commun. Image Represent., 2018
A new class of quaternary generalized cyclotomic sequences of order 2d and length 2pm with high linear complexity.
Int. J. Wavelets Multiresolution Inf. Process., 2018
Functional encryption with efficient verifiable outsourced decryption for secure data access control in social network.
Int. J. High Perform. Syst. Archit., 2018
IACR Cryptol. ePrint Arch., 2018
Two round multiparty computation via Multi-key fully homomorphic encryption with faster homomorphic evaluations.
IACR Cryptol. ePrint Arch., 2018
Improved outsourced private set intersection protocol based on polynomial interpolation.
Concurr. Comput. Pract. Exp., 2018
Concurr. Comput. Pract. Exp., 2018
Comput. Sci. Inf. Syst., 2018
Improved Provable Data Transfer from Provable Data Possession and Deletion in Cloud Storage.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Multim. Tools Appl., 2017
Proceedings of the Advances in Internetworking, 2017
Proceedings of the Advances in Internetworking, 2017
Proceedings of the Advances in Internetworking, 2017
2016
J. Ambient Intell. Humaniz. Comput., 2016
Int. J. High Perform. Comput. Netw., 2016
Int. J. High Perform. Comput. Netw., 2016
Int. J. High Perform. Comput. Netw., 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Outsourcing the Unsigncryption of Compact Attribute-Based Signcryption for General Circuits.
Proceedings of the Social Computing, 2016
2015
Security Analysis of Two Identity Based Proxy Re-encryption Schemes in Multi-user Networks.
Trans. Comput. Collect. Intell., 2015
New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication.
Mob. Inf. Syst., 2015
J. Ambient Intell. Humaniz. Comput., 2015
J. Ambient Intell. Humaniz. Comput., 2015
Int. J. Grid Util. Comput., 2015
Int. J. Grid Util. Comput., 2015
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015
Proceedings of the Intelligent Computation in Big Data Era, 2015
2014
Concurr. Comput. Pract. Exp., 2014
2013
J. Comput., 2013
CCA Secure Publicly Verifiable Public Key Encryption Without Pairings Nor Random Oracle and Its Applications.
J. Comput., 2013
J. Comput., 2013
Int. J. Intell. Inf. Database Syst., 2013
IACR Cryptol. ePrint Arch., 2013
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption.
Comput. Math. Appl., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Efficient Predicate Encryption Supporting Construction of Fine-Grained Searchable Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
2012
J. Syst. Softw., 2012
Informatica, 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
2011
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme.
J. Syst. Softw., 2011
J. Netw. Comput. Appl., 2011
Cryptanalysis of an identity based broadcast encryption scheme without random oracles.
Inf. Process. Lett., 2011
IACR Cryptol. ePrint Arch., 2011
Fundam. Informaticae, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Fundam. Informaticae, 2010
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
Proceedings of the Second International Workshop on Database Technology and Applications, 2010
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010
2009
Proceedings of the First International Workshop on Database Technology and Applications, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Ninth IEEE International Conference on Computer and Information Technology, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Fourth International Conference on Natural Computation, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007
Proceedings of the Grid and Cooperative Computing, 2007
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006
2004
Proceedings of the 3rd International Conference on Information Security, 2004
Proceedings of the 3rd International Conference on Information Security, 2004