Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jian Weng 0001
@article{DBLP:journals/iotj/LiYWCLCJ24, author = {Tao Li and Anjia Yang and Jian Weng and Min{-}Rong Chen and Xizhao Luo and Xiaohu Chen and Changkun Jiang}, title = {Enabling Secure and Flexible Streaming Media With Blockchain Incentive}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {1966--1980}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3305048}, doi = {10.1109/JIOT.2023.3305048}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiYWCLCJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenLYWCLL24, author = {Yuan Chen and Jia{-}Nan Liu and Anjia Yang and Jian Weng and Min{-}Rong Chen and Zilin Liu and Ming Li}, title = {{PACDAM:} Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {8}, pages = {13424--13436}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3337859}, doi = {10.1109/JIOT.2023.3337859}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ChenLYWCLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhaoWXLW24, author = {Feixiang Zhao and Jian Weng and Wenli Xie and Ming Li and Jiasi Weng}, title = {HRA-secure attribute-based threshold proxy re-encryption from lattices}, journal = {Inf. Sci.}, volume = {655}, pages = {119900}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2023.119900}, doi = {10.1016/J.INS.2023.119900}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhaoWXLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/ChenDLLWLT24, author = {Xin Chen and Xiaoling Deng and Yubin Lan and Yongbing Long and Jian Weng and Zhiquan Liu and Qi Tian}, title = {Explanatory Object Part Aggregation for Zero-Shot Learning}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {46}, number = {2}, pages = {851--868}, year = {2024}, url = {https://doi.org/10.1109/TPAMI.2023.3325533}, doi = {10.1109/TPAMI.2023.3325533}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pami/ChenDLLWLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/XiaGZXWX24, author = {Zhihua Xia and Qi Gu and Wenhao Zhou and Lizhi Xiong and Jian Weng and Naixue Xiong}, title = {{STR:} Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy}, journal = {{IEEE} Trans. Computers}, volume = {73}, number = {2}, pages = {340--352}, year = {2024}, url = {https://doi.org/10.1109/TC.2021.3073171}, doi = {10.1109/TC.2021.3073171}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/XiaGZXWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcsv/LinYLWW24, author = {Shuyuan Lin and Anjia Yang and Taotao Lai and Jian Weng and Hanzi Wang}, title = {Multi-Motion Segmentation via Co-Attention-Induced Heterogeneous Model Fitting}, journal = {{IEEE} Trans. Circuits Syst. Video Technol.}, volume = {34}, number = {3}, pages = {1786--1798}, year = {2024}, url = {https://doi.org/10.1109/TCSVT.2023.3298319}, doi = {10.1109/TCSVT.2023.3298319}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcsv/LinYLWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DongWLLLCY24, author = {Caiqin Dong and Jian Weng and Ming Li and Jia{-}Nan Liu and Zhiquan Liu and Yudan Cheng and Shui Yu}, title = {Privacy-Preserving and Byzantine-Robust Federated Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {889--904}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264697}, doi = {10.1109/TDSC.2023.3264697}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DongWLLLCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YangWTLWZY24, author = {Yaxi Yang and Jian Weng and Yao Tong and Jia{-}Nan Liu and Zhenghao Wu and Leo Yu Zhang and Anjia Yang}, title = {PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {961--974}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3266292}, doi = {10.1109/TDSC.2023.3266292}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YangWTLWZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WengYDHWW24, author = {Jia{-}Si Weng and Shenglong Yao and Yuefeng Du and Junjie Huang and Jian Weng and Cong Wang}, title = {Proof of Unlearning: Definitions and Instantiation}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {3309--3323}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2024.3358993}, doi = {10.1109/TIFS.2024.3358993}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WengYDHWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhangLWL24, author = {Yinyan Zhang and Shuai Li and Jian Weng and Bolin Liao}, title = {{GNN} Model for Time-Varying Matrix Inversion With Robust Finite-Time Convergence}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {1}, pages = {559--569}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2022.3175899}, doi = {10.1109/TNNLS.2022.3175899}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ZhangLWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhangLJLTLWT24, author = {Jia Zhang and Yidong Lin and Min Jiang and Shaozi Li and Yong Tang and Jinyi Long and Jian Weng and Kay Chen Tan}, title = {Fast Multilabel Feature Selection via Global Relevance and Redundancy Optimization}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {35}, number = {4}, pages = {5721--5734}, year = {2024}, url = {https://doi.org/10.1109/TNNLS.2022.3208956}, doi = {10.1109/TNNLS.2022.3208956}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/ZhangLJLTLWT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tr/CaoWL24, author = {Kun Cao and Jian Weng and Keqin Li}, title = {Reliability-Driven End-End-Edge Collaboration for Energy Minimization in Large-Scale Cyber-Physical Systems}, journal = {{IEEE} Trans. Reliab.}, volume = {73}, number = {1}, pages = {230--244}, year = {2024}, url = {https://doi.org/10.1109/TR.2023.3297124}, doi = {10.1109/TR.2023.3297124}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tr/CaoWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-15430, author = {Shuren Qi and Yushu Zhang and Chao Wang and Zhihua Xia and Jian Weng and Xiaochun Cao}, title = {Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales}, journal = {CoRR}, volume = {abs/2402.15430}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.15430}, doi = {10.48550/ARXIV.2402.15430}, eprinttype = {arXiv}, eprint = {2402.15430}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-15430.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-00239, author = {Qian Feng and Zhihua Xia and Zhifeng Xu and Jiasi Weng and Jian Weng}, title = {{OPAF:} Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network}, journal = {CoRR}, volume = {abs/2403.00239}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.00239}, doi = {10.48550/ARXIV.2403.00239}, eprinttype = {arXiv}, eprint = {2403.00239}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-00239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuCYWPW24, author = {Tianrun Yu and Chi Cheng and Zilong Yang and Yingchen Wang and Yanbin Pan and Jian Weng}, title = {Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2024}, url = {https://eprint.iacr.org/2024/070}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YuCYWPW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongYCHW24, author = {Ling Song and Qianqian Yang and Yincen Chen and Lei Hu and Jian Weng}, title = {Probabilistic Extensions: {A} One-Step Framework for Finding Rectangle Attacks and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2024}, url = {https://eprint.iacr.org/2024/344}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SongYCHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/FengLLZWWH23, author = {Qihua Feng and Peiya Li and Zhixun Lu and Zhibo Zhou and Yongdong Wu and Jian Weng and Feiran Huang}, title = {{DHAN:} Encrypted {JPEG} image retrieval via {DCT} histograms-based attention networks}, journal = {Appl. Soft Comput.}, volume = {133}, pages = {109935}, year = {2023}, url = {https://doi.org/10.1016/j.asoc.2022.109935}, doi = {10.1016/J.ASOC.2022.109935}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/FengLLZWWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/XieWTLYZ23, author = {Wenli Xie and Jian Weng and Yao Tong and Xiaojian Liang and Lisha Yao and Feixiang Zhao}, title = {Lattice-based autonomous path proxy re-encryption in the standard model}, journal = {Sci. China Inf. Sci.}, volume = {66}, number = {10}, year = {2023}, url = {https://doi.org/10.1007/s11432-022-3612-6}, doi = {10.1007/S11432-022-3612-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/XieWTLYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/JiangXG0Z23, author = {Chengxi Jiang and Shijie Xu and Guanggang Geng and Jian Weng and Xinchang Zhang}, title = {Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification}, journal = {Clust. Comput.}, volume = {26}, number = {3}, pages = {1785--1800}, year = {2023}, url = {https://doi.org/10.1007/s10586-022-03709-w}, doi = {10.1007/S10586-022-03709-W}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cluster/JiangXG0Z23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZGWLZ23, author = {Jia{-}Cheng Huang and Guo{-}Qiang Zeng and Guang{-}Gang Geng and Jian Weng and Kang{-}Di Lu and Yu Zhang}, title = {Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems}, journal = {Comput. Secur.}, volume = {132}, pages = {103310}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103310}, doi = {10.1016/J.COSE.2023.103310}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangZGWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaoWPC23, author = {Jinzheng Cao and Jian Weng and Yanbin Pan and Qingfeng Cheng}, title = {Generalized attack on {ECDSA:} known bits in arbitrary positions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3803--3823}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01269-7}, doi = {10.1007/S10623-023-01269-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CaoWPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/LiHCWCL23, author = {Long Li and Jianbo Huang and Liang Chang and Jian Weng and Jia Chen and Jingjing Li}, title = {{DPPS:} {A} novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services}, journal = {Frontiers Comput. Sci.}, volume = {17}, number = {5}, pages = {175814}, year = {2023}, url = {https://doi.org/10.1007/s11704-022-2155-9}, doi = {10.1007/S11704-022-2155-9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/LiHCWCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ipr/GeFXTWL23, author = {Sulong Ge and Jianwei Fei and Zhihua Xia and Yao Tong and Jian Weng and Jia{-}Nan Liu}, title = {A screen-shooting resilient document image watermarking scheme using deep neural network}, journal = {{IET} Image Process.}, volume = {17}, number = {2}, pages = {323--336}, year = {2023}, url = {https://doi.org/10.1049/ipr2.12653}, doi = {10.1049/IPR2.12653}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ipr/GeFXTWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YaoWYLWJH23, author = {Lisha Yao and Jian Weng and Anjia Yang and Xiaojian Liang and Zhenghao Wu and Zike Jiang and Lin Hou}, title = {Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing}, journal = {Inf. Sci.}, volume = {624}, pages = {777--795}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2022.12.035}, doi = {10.1016/J.INS.2022.12.035}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/YaoWYLWJH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangLZWG23, author = {Yinyan Zhang and Shuai Li and Xuefeng Zhou and Jian Weng and Guanggang Geng}, title = {Single-state distributed \emph{k}-winners-take-all neural network model}, journal = {Inf. Sci.}, volume = {647}, pages = {119528}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.119528}, doi = {10.1016/J.INS.2023.119528}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ZhangLZWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/Li0W0LTWD23, author = {Yuxian Li and Jian Weng and Wei Wu and Ming Li and Yingjiu Li and Haoxin Tu and Yongdong Wu and Robert H. Deng}, title = {{PRI:} PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability}, journal = {J. Parallel Distributed Comput.}, volume = {180}, pages = {104721}, year = {2023}, url = {https://doi.org/10.1016/j.jpdc.2023.104721}, doi = {10.1016/J.JPDC.2023.104721}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/Li0W0LTWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/GeXFTWL23, author = {Sulong Ge and Zhihua Xia and Jianwei Fei and Yao Tong and Jian Weng and Ming Li}, title = {A robust document image watermarking scheme using deep neural network}, journal = {Multim. Tools Appl.}, volume = {82}, number = {25}, pages = {38589--38612}, year = {2023}, url = {https://doi.org/10.1007/s11042-023-15048-y}, doi = {10.1007/S11042-023-15048-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/GeXFTWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pr/WangCDFHCDYW23, author = {Eric Ke Wang and Zicong Chen and Xilin Dang and Xuan Fan and Xuming Han and Chien{-}Ming Chen and Weiping Ding and Siu{-}Ming Yiu and Jian Weng}, title = {Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation}, journal = {Pattern Recognit.}, volume = {143}, pages = {109745}, year = {2023}, url = {https://doi.org/10.1016/j.patcog.2023.109745}, doi = {10.1016/J.PATCOG.2023.109745}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pr/WangCDFHCDYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spic/LiFHWL23, author = {Guofeng Li and Bingwen Feng and Mingjin He and Jian Weng and Wei Lu}, title = {High-capacity coverless image steganographic scheme based on image synthesis}, journal = {Signal Process. Image Commun.}, volume = {111}, pages = {116894}, year = {2023}, url = {https://doi.org/10.1016/j.image.2022.116894}, doi = {10.1016/J.IMAGE.2022.116894}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spic/LiFHWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/ZhangDDGWY23, author = {Chunkai Zhang and Quanjian Dai and Zilin Du and Wensheng Gan and Jian Weng and Philip S. Yu}, title = {{TUSQ:} Targeted High-Utility Sequence Querying}, journal = {{IEEE} Trans. Big Data}, volume = {9}, number = {2}, pages = {512--527}, year = {2023}, url = {https://doi.org/10.1109/TBDATA.2022.3175428}, doi = {10.1109/TBDATA.2022.3175428}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/ZhangDDGWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YangTWYZZL23, author = {Yaxi Yang and Yao Tong and Jian Weng and Yufeng Yi and Yandong Zheng and Leo Yu Zhang and Rongxing Lu}, title = {PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {2379--2391}, year = {2023}, url = {https://doi.org/10.1109/TCC.2022.3205700}, doi = {10.1109/TCC.2022.3205700}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YangTWYZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YuTXLW23, author = {Peipeng Yu and Jian Tang and Zhihua Xia and Zhetao Li and Jian Weng}, title = {A Privacy-Preserving {JPEG} Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {2885--2896}, year = {2023}, url = {https://doi.org/10.1109/TCC.2022.3233421}, doi = {10.1109/TCC.2022.3233421}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YuTXLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/LiuLLTMW23, author = {Jiao Liu and Xinghua Li and Ximeng Liu and Jiawei Tang and Siqi Ma and Jian Weng}, title = {A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {4}, pages = {3381--3395}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3287552}, doi = {10.1109/TCC.2023.3287552}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/LiuLLTMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LiLHGW23, author = {Yiming Li and Shengli Liu and Shuai Han and Dawu Gu and Jian Weng}, title = {Simulatable verifiable random function from the {LWE} assumption}, journal = {Theor. Comput. Sci.}, volume = {957}, pages = {113826}, year = {2023}, url = {https://doi.org/10.1016/j.tcs.2023.113826}, doi = {10.1016/J.TCS.2023.113826}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/LiLHGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/Zhang0023, author = {Yinyan Zhang and Shuai Li and Jian Weng}, title = {Distributed k-Winners-Take-All Network: An Optimization Perspective}, journal = {{IEEE} Trans. Cybern.}, volume = {53}, number = {8}, pages = {5069--5081}, year = {2023}, url = {https://doi.org/10.1109/TCYB.2022.3170236}, doi = {10.1109/TCYB.2022.3170236}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/Zhang0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DongWLYLYM23, author = {Caiqin Dong and Jian Weng and Jia{-}Nan Liu and Anjia Yang and Zhiquan Liu and Yaxi Yang and Jianfeng Ma}, title = {Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1243--1257}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3152498}, doi = {10.1109/TDSC.2022.3152498}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DongWLYLYM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WuWWWWLL23, author = {Yongdong Wu and Jian Weng and Zhengxia Wang and Kaimin Wei and Jinming Wen and Junzuo Lai and Xin Li}, title = {Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1744--1755}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3162623}, doi = {10.1109/TDSC.2022.3162623}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WuWWWWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaLDLWWP23, author = {Chuan Ma and Jun Li and Ming Ding and Bo Liu and Kang Wei and Jian Weng and H. Vincent Poor}, title = {{RDP-GAN:} {A} R{\'{e}}nyi-Differential Privacy Based Generative Adversarial Network}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4838--4852}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3233580}, doi = {10.1109/TDSC.2022.3233580}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaLDLWWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WengWTYLL23, author = {Jiasi Weng and Jian Weng and Gui Tang and Anjia Yang and Ming Li and Jia{-}Nan Liu}, title = {pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2218--2233}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3262932}, doi = {10.1109/TIFS.2023.3262932}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WengWTYLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HuW0WLHZ23, author = {Hongshuang Hu and Yongdong Wu and Jian Weng and Kaimin Wei and Zhiquan Liu and Feiran Huang and Yinyan Zhang}, title = {Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {3991--4005}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3290495}, doi = {10.1109/TIFS.2023.3290495}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HuW0WLHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuYSHDW23, author = {Xueqiao Liu and Guomin Yang and Willy Susilo and Kai He and Robert H. Deng and Jian Weng}, title = {Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {4929--4943}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3301734}, doi = {10.1109/TIFS.2023.3301734}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuYSHDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WuLWYW23, author = {Axin Wu and Weiqi Luo and Jian Weng and Anjia Yang and Jinghang Wen}, title = {Fuzzy Identity-Based Matchmaking Encryption and Its Application}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5592--5607}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3310663}, doi = {10.1109/TIFS.2023.3310663}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WuLWYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/LiuZXFYW23, author = {Xiang Liu and Xueli Zhao and Zhihua Xia and Qian Feng and Peipeng Yu and Jian Weng}, title = {Secure Outsourced {SIFT:} Accurate and Efficient Privacy-Preserving Image {SIFT} Feature Extraction}, journal = {{IEEE} Trans. Image Process.}, volume = {32}, pages = {4635--4648}, year = {2023}, url = {https://doi.org/10.1109/TIP.2023.3295741}, doi = {10.1109/TIP.2023.3295741}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/LiuZXFYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/HuangGWY23, author = {Gengsen Huang and Wensheng Gan and Jian Weng and Philip S. Yu}, title = {US-Rule: Discovering Utility-driven Sequential Rules}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {17}, number = {1}, pages = {10:1--10:22}, year = {2023}, url = {https://doi.org/10.1145/3532613}, doi = {10.1145/3532613}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkdd/HuangGWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/TongLMLWD23, author = {Qiuyun Tong and Xinghua Li and Yinbin Miao and Ximeng Liu and Jian Weng and Robert H. Deng}, title = {Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {5}, pages = {5159--5172}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3152168}, doi = {10.1109/TKDE.2022.3152168}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/TongLMLWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/TongMWLCD23, author = {Qiuyun Tong and Yinbin Miao and Jian Weng and Ximeng Liu and Kim{-}Kwang Raymond Choo and Robert H. Deng}, title = {Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {5}, pages = {5386--5399}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2022.3152033}, doi = {10.1109/TKDE.2022.3152033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/TongMWLCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/RenLMDWMM23, author = {Yanbing Ren and Xinghua Li and Yinbin Miao and Robert H. Deng and Jian Weng and Siqi Ma and Jianfeng Ma}, title = {DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {22}, number = {6}, pages = {3287--3302}, year = {2023}, url = {https://doi.org/10.1109/TMC.2022.3141398}, doi = {10.1109/TMC.2022.3141398}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/RenLMDWMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ShiSYWHLZ23, author = {Min Shi and Jialin Shen and Qingming Yi and Jian Weng and Zunkai Huang and Aiwen Luo and Yicong Zhou}, title = {LMFFNet: {A} Well-Balanced Lightweight Network for Fast and Accurate Semantic Segmentation}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {34}, number = {6}, pages = {3205--3219}, year = {2023}, url = {https://doi.org/10.1109/TNNLS.2022.3176493}, doi = {10.1109/TNNLS.2022.3176493}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/ShiSYWHLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ChenWDLLT23, author = {Xin Chen and Jian Weng and Xiaoling Deng and Weiqi Luo and Yubin Lan and Qi Tian}, title = {Feature Distillation in Deep Attention Network Against Adversarial Examples}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {34}, number = {7}, pages = {3691--3705}, year = {2023}, url = {https://doi.org/10.1109/TNNLS.2021.3113342}, doi = {10.1109/TNNLS.2021.3113342}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/ChenWDLLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ZhangZW23, author = {Yinyan Zhang and Jilian Zhang and Jian Weng}, title = {Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {34}, number = {12}, pages = {10919--10929}, year = {2023}, url = {https://doi.org/10.1109/TNNLS.2022.3171715}, doi = {10.1109/TNNLS.2022.3171715}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ZhangZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/LiTZMMWMC23, author = {Xinghua Li and Qiuyun Tong and Jinwei Zhao and Yinbin Miao and Siqi Ma and Jian Weng and Jianfeng Ma and Kim{-}Kwang Raymond Choo}, title = {{VRFMS:} Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {1}, pages = {698--710}, year = {2023}, url = {https://doi.org/10.1109/TSC.2021.3140092}, doi = {10.1109/TSC.2021.3140092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/LiTZMMWMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ChenYWTHL23, author = {Xiaohu Chen and Anjia Yang and Jian Weng and Yao Tong and Cheng Huang and Tao Li}, title = {A Blockchain-Based Copyright Protection Scheme With Proactive Defense}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {4}, pages = {2316--2329}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3246476}, doi = {10.1109/TSC.2023.3246476}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ChenYWTHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/SunLWLL23, author = {Heng Sun and Weiyun Luo and Jian Weng and Zhiquan Liu and Ming Li}, title = {ECQV-GDH-Based Group Key Exchange Protocol for {CAN} Bus}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {10}, pages = {12857--12872}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3277875}, doi = {10.1109/TVT.2023.3277875}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/SunLWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhangLWMLWD23, author = {Zhan Zhang and Xinghua Li and Yunwei Wang and Yinbin Miao and Ximeng Liu and Jian Weng and Robert H. Deng}, title = {{TAGKA:} Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for {UANET}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {11}, pages = {14987--15001}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3287487}, doi = {10.1109/TVT.2023.3287487}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/ZhangLWMLWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/LiYWTP23, author = {Tao Li and Anjia Yang and Jian Weng and Yao Tong and Qingfu Pei}, title = {Concurrent and efficient IoT data trading based on probabilistic micropayments}, journal = {Wirel. Networks}, volume = {29}, number = {2}, pages = {607--622}, year = {2023}, url = {https://doi.org/10.1007/s11276-022-03161-z}, doi = {10.1007/S11276-022-03161-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/winet/LiYWTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YangWYDZZ23, author = {Yaxi Yang and Jian Weng and Yufeng Yi and Changyu Dong and Leo Yu Zhang and Jianying Zhou}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Predicate Private Set Intersection with Linear Complexity}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13906}, pages = {143--166}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33491-7\_6}, doi = {10.1007/978-3-031-33491-7\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/YangWYDZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ZengLHZWLWW23, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Linru Zhang and Xiangning Wang and Kwok{-}Yan Lam and Huaxiong Wang and Jian Weng}, editor = {Jian Guo and Ron Steinfeld}, title = {Non-interactive Zero-Knowledge Functional Proofs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14442}, pages = {236--268}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8733-7\_8}, doi = {10.1007/978-981-99-8733-7\_8}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ZengLHZWLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuLWQYW23, author = {Yi Liu and Junzuo Lai and Qi Wang and Xianrui Qin and Anjia Yang and Jian Weng}, editor = {Jian Guo and Ron Steinfeld}, title = {Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14438}, pages = {272--301}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-8721-4\_9}, doi = {10.1007/978-981-99-8721-4\_9}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuLWQYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiZHYMW23, author = {Junzuo Lai and Gongxian Zeng and Zhengan Huang and Siu Ming Yiu and Xin Mu and Jian Weng}, editor = {Carmit Hazay and Martijn Stam}, title = {Asymmetric Group Message Franking: Definitions and Constructions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14008}, pages = {67--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30589-4\_3}, doi = {10.1007/978-3-031-30589-4\_3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiZHYMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/Dong0L0TYCH23, author = {Caiqin Dong and Jian Weng and Jia{-}Nan Liu and Yue Zhang and Yao Tong and Anjia Yang and Yudan Cheng and Shun Hu}, title = {Fusion: Efficient and Secure Inference Resilient to Malicious Servers}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/fusion-efficient-and-secure-inference-resilient-to-malicious-servers/}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/Dong0L0TYCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/LiuLG0HZT0023, author = {Zitao Liu and Qiongqiong Liu and Teng Guo and Jiahao Chen and Shuyan Huang and Xiangyu Zhao and Jiliang Tang and Weiqi Luo and Jian Weng}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {{XES3G5M:} {A} Knowledge Tracing Benchmark Dataset with Auxiliary Information}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/67fc628f17c2ad53621fb961c6bafcaf-Abstract-Datasets\_and\_Benchmarks.html}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/LiuLG0HZT0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/HuangLZ0023, author = {Shuyan Huang and Zitao Liu and Xiangyu Zhao and Weiqi Luo and Jian Weng}, editor = {Hsin{-}Hsi Chen and Wei{-}Jou (Edward) Duh and Hen{-}Hsen Huang and Makoto P. Kato and Josiane Mothe and Barbara Poblete}, title = {Towards Robust Knowledge Tracing Models via k-Sparse Attention}, booktitle = {Proceedings of the 46th International {ACM} {SIGIR} Conference on Research and Development in Information Retrieval, {SIGIR} 2023, Taipei, Taiwan, July 23-27, 2023}, pages = {2441--2445}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3539618.3592073}, doi = {10.1145/3539618.3592073}, timestamp = {Tue, 30 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigir/HuangLZ0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vr/MaiHFTWG23, author = {Zijun Mai and Yidang He and Jiana Feng and Huawei Tu and Jian Weng and Boyu Gao}, title = {Behavioral Authentication with Head-Tilt Based Locomotion for Metaverse}, booktitle = {{IEEE} Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, {VR} Workshops 2023, Shanghai, China, March 25-29, 2023}, pages = {949--950}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/VRW58643.2023.00317}, doi = {10.1109/VRW58643.2023.00317}, timestamp = {Wed, 17 May 2023 10:03:34 +0200}, biburl = {https://dblp.org/rec/conf/vr/MaiHFTWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/0001L0H00023, author = {Zitao Liu and Qiongqiong Liu and Jiahao Chen and Shuyan Huang and Boyu Gao and Weiqi Luo and Jian Weng}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Enhancing Deep Knowledge Tracing with Auxiliary Tasks}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {4178--4187}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583866}, doi = {10.1145/3543507.3583866}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/0001L0H00023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-07942, author = {Zitao Liu and Qiongqiong Liu and Jiahao Chen and Shuyan Huang and Boyu Gao and Weiqi Luo and Jian Weng}, title = {Enhancing Deep Knowledge Tracing with Auxiliary Tasks}, journal = {CoRR}, volume = {abs/2302.07942}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.07942}, doi = {10.48550/ARXIV.2302.07942}, eprinttype = {arXiv}, eprint = {2302.07942}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-07942.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-12150, author = {Xiaoguo Li and Bowen Zhao and Guomin Yang and Tao Xiang and Jian Weng and Robert H. Deng}, title = {A Survey of Secure Computation Using Trusted Execution Environments}, journal = {CoRR}, volume = {abs/2302.12150}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.12150}, doi = {10.48550/ARXIV.2302.12150}, eprinttype = {arXiv}, eprint = {2302.12150}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-12150.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-09435, author = {Tao Wang and Yushu Zhang and Shuren Qi and Ruoyu Zhao and Zhihua Xia and Jian Weng}, title = {Security and Privacy on Generative Data in {AIGC:} {A} Survey}, journal = {CoRR}, volume = {abs/2309.09435}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.09435}, doi = {10.48550/ARXIV.2309.09435}, eprinttype = {arXiv}, eprint = {2309.09435}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-09435.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-11039, author = {Shiying Zhang and Jun Li and Long Shi and Ming Ding and Dinh C. Nguyen and Wuzheng Tan and Jian Weng and Zhu Han}, title = {Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems}, journal = {CoRR}, volume = {abs/2309.11039}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.11039}, doi = {10.48550/ARXIV.2309.11039}, eprinttype = {arXiv}, eprint = {2309.11039}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-11039.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiZHYMW23, author = {Junzuo Lai and Gongxian Zeng and Zhengan Huang and Siu Ming Yiu and Xin Mu and Jian Weng}, title = {Asymmetric Group Message Franking: Definitions {\&} Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {332}, year = {2023}, url = {https://eprint.iacr.org/2023/332}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiZHYMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLWQYW23, author = {Yi Liu and Junzuo Lai and Qi Wang and Xianrui Qin and Anjia Yang and Jian Weng}, title = {Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1392}, year = {2023}, url = {https://eprint.iacr.org/2023/1392}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLWQYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZengLHZWLWW23, author = {Gongxian Zeng and Junzuo Lai and Zhengan Huang and Linru Zhang and Xiangning Wang and Kwok{-}Yan Lam and Huaxiong Wang and Jian Weng}, title = {Non-Interactive Zero-Knowledge Functional Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1759}, year = {2023}, url = {https://eprint.iacr.org/2023/1759}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZengLHZWLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/LiuH022, author = {Wei Liu and Lein Harn and Jian Weng}, title = {Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs)}, journal = {{IET} Commun.}, volume = {16}, number = {1}, pages = {58--66}, year = {2022}, url = {https://doi.org/10.1049/cmu2.12312}, doi = {10.1049/CMU2.12312}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-com/LiuH022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuWGMHSC22, author = {Zhiquan Liu and Jian Weng and Jingjing Guo and Jianfeng Ma and Feiran Huang and Heng Sun and Yudan Cheng}, title = {{PPTM:} {A} Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {8}, pages = {5943--5956}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3060751}, doi = {10.1109/JIOT.2021.3060751}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiuWGMHSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiWLLO22, author = {Ming Li and Jian Weng and Jia{-}Nan Liu and Xiaodong Lin and Charlie Obimbo}, title = {Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {9}, pages = {7009--7024}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3116957}, doi = {10.1109/JIOT.2021.3116957}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiWLLO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/SongMWCLD22, author = {Lin Song and Yinbin Miao and Jian Weng and Kim{-}Kwang Raymond Choo and Ximeng Liu and Robert H. Deng}, title = {Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {15}, pages = {13598--13611}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3142933}, doi = {10.1109/JIOT.2022.3142933}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/SongMWCLD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoCLTW22, author = {Kun Cao and Yangguang Cui and Zhiquan Liu and Wuzheng Tan and Jian Weng}, title = {Edge Intelligent Joint Optimization for Lifetime and Latency in Large-Scale Cyber-Physical Systems}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {22}, pages = {22267--22279}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3102421}, doi = {10.1109/JIOT.2021.3102421}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/CaoCLTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenYTWWL22, author = {Xiaohu Chen and Anjia Yang and Yao Tong and Jian Weng and Jiasi Weng and Tao Li}, title = {A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in {VANET}}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {22}, pages = {23130--23141}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3184991}, doi = {10.1109/JIOT.2022.3184991}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ChenYTWWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/XieWZ22, author = {Congge Xie and Jian Weng and Dehua Zhou}, title = {Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance}, journal = {Inf. Sci.}, volume = {594}, pages = {249--263}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.02.027}, doi = {10.1016/J.INS.2022.02.027}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/XieWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiuWZHH22, author = {Wei Liu and Jian Weng and Bingsheng Zhang and Kai He and Junjie Huang}, title = {Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages}, journal = {Inf. Sci.}, volume = {613}, pages = {324--343}, year = {2022}, url = {https://doi.org/10.1016/j.ins.2022.09.026}, doi = {10.1016/J.INS.2022.09.026}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LiuWZHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/LiWLWWLH22, author = {Yuxian Li and Jian Weng and Ming Li and Wei Wu and Jiasi Weng and Jia{-}Nan Liu and Shun Hu}, title = {ZeroCross: {A} sidechain-based privacy-preserving Cross-chain solution for Monero}, journal = {J. Parallel Distributed Comput.}, volume = {169}, pages = {301--316}, year = {2022}, url = {https://doi.org/10.1016/j.jpdc.2022.07.008}, doi = {10.1016/J.JPDC.2022.07.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jpdc/LiWLWWLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YangDLWWZR22, author = {Yang Yang and Robert H. Deng and Ximeng Liu and Yongdong Wu and Jian Weng and Xianghan Zheng and Chunming Rong}, title = {Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {3}, pages = {2020--2037}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2999940}, doi = {10.1109/TCC.2020.2999940}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YangDLWWZR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/ZhangLW22, author = {Yinyan Zhang and Shuai Li and Jian Weng}, title = {Distributed Estimation of Algebraic Connectivity}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {5}, pages = {3047--3056}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3022653}, doi = {10.1109/TCYB.2020.3022653}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/ZhangLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/LuCZHWZ22, author = {Wei Lu and Junjia Chen and Junhong Zhang and Jiwu Huang and Jian Weng and Yicong Zhou}, title = {Secure Halftone Image Steganography Based on Feature Space and Layer Embedding}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {6}, pages = {5001--5014}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3026047}, doi = {10.1109/TCYB.2020.3026047}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/LuCZHWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/ZhangLW22a, author = {Yinyan Zhang and Shuai Li and Jian Weng}, title = {Learning and Near-Optimal Control of Underactuated Surface Vessels With Periodic Disturbances}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {8}, pages = {7453--7463}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3041368}, doi = {10.1109/TCYB.2020.3041368}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/ZhangLW22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChenLHWZ22, author = {Bing Chen and Wei Lu and Jiwu Huang and Jian Weng and Yicong Zhou}, title = {Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {978--991}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3011923}, doi = {10.1109/TDSC.2020.3011923}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChenLHWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuLWYWLL22, author = {Jia{-}Nan Liu and Xizhao Luo and Jian Weng and Anjia Yang and Xu An Wang and Ming Li and Xiaodong Lin}, title = {Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1518--1531}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3027579}, doi = {10.1109/TDSC.2020.3027579}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuLWYWLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WengWCHW22, author = {Jiasi Weng and Jian Weng and Chengjun Cai and Hongwei Huang and Cong Wang}, title = {Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3149--3167}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3085988}, doi = {10.1109/TDSC.2021.3085988}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WengWCHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HuangLZWZY22, author = {Hongwei Huang and Weiqi Luo and Guoqiang Zeng and Jian Weng and Yue Zhang and Anjia Yang}, title = {{DAMIA:} Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3183--3199}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3088480}, doi = {10.1109/TDSC.2021.3088480}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HuangLZWZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShaoWZWLWLY22, author = {Zhijian Shao and Jian Weng and Yue Zhang and Yongdong Wu and Ming Li and Jiasi Weng and Weiqi Luo and Shui Yu}, title = {Peripheral-Free Device Pairing by Randomly Switching Power}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {6}, pages = {4240--4254}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3125231}, doi = {10.1109/TDSC.2021.3125231}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ShaoWZWLWLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuFXZW22, author = {Peipeng Yu and Jianwei Fei and Zhihua Xia and Zhili Zhou and Jian Weng}, title = {Improving Generalization by Commonality Learning in Face Forgery Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {547--558}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3146781}, doi = {10.1109/TIFS.2022.3146781}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuFXZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RenLMLWCD22, author = {Yanbing Ren and Xinghua Li and Yinbin Miao and Bin Luo and Jian Weng and Kim{-}Kwang Raymond Choo and Robert H. Deng}, title = {Towards Privacy-Preserving Spatial Distribution Crowdsensing: {A} Game Theoretic Approach}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {804--818}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3152409}, doi = {10.1109/TIFS.2022.3152409}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/RenLMLWCD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/XuGJLW22, author = {Shi{-}Jie Xu and Guang{-}Gang Geng and Xiao{-}Bo Jin and Dongjie Liu and Jian Weng}, title = {Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2166--2181}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3179955}, doi = {10.1109/TIFS.2022.3179955}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/XuGJLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhangLMLWMW22, author = {Xiaohan Zhang and Xinghua Li and Yinbin Miao and Xizhao Luo and Yunwei Wang and Siqi Ma and Jian Weng}, title = {A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {7}, pages = {4456--4465}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3123312}, doi = {10.1109/TII.2021.3123312}, timestamp = {Sat, 20 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/ZhangLMLWMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/YangWYHS22, author = {Anjia Yang and Jian Weng and Kan Yang and Cheng Huang and Xuemin Shen}, title = {Delegating Authentication to Edge: {A} Decentralized Authentication Architecture for Vehicular Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {2}, pages = {1284--1298}, year = {2022}, url = {https://doi.org/10.1109/TITS.2020.3024000}, doi = {10.1109/TITS.2020.3024000}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/YangWYHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangLZLW22, author = {Yunwei Wang and Xinghua Li and Xiaohan Zhang and Ximeng Liu and Jian Weng}, title = {{ARPLR:} An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {9}, pages = {16558--16575}, year = {2022}, url = {https://doi.org/10.1109/TITS.2021.3134686}, doi = {10.1109/TITS.2021.3134686}, timestamp = {Sat, 20 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WangLZLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/TongMCWLCD22, author = {Qiuyun Tong and Yinbin Miao and Lei Chen and Jian Weng and Ximeng Liu and Kim{-}Kwang Raymond Choo and Robert H. Deng}, title = {{VFIRM:} Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {6}, pages = {3606--3619}, year = {2022}, url = {https://doi.org/10.1109/TSC.2021.3083512}, doi = {10.1109/TSC.2021.3083512}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/TongMCWLCD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/SunSWL22, author = {Heng Sun and Mengsi Sun and Jian Weng and Zhiquan Liu}, title = {Analysis of {ID} Sequences Similarity Using {DTW} in Intrusion Detection for {CAN} Bus}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {10}, pages = {10426--10441}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3185111}, doi = {10.1109/TVT.2022.3185111}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/SunSWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiZLWSYL22, author = {Yongbiao Li and Dehua Zhou and Yanling Li and Jian Weng and Meng Sun and Ye Yang and Ming Li}, title = {Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {71}, number = {12}, pages = {12530--12542}, year = {2022}, url = {https://doi.org/10.1109/TVT.2022.3199407}, doi = {10.1109/TVT.2022.3199407}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LiZLWSYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/CaoCW22, author = {Jinzheng Cao and Qingfeng Cheng and Jian Weng}, editor = {Lejla Batina and Joan Daemen}, title = {{EHNP} Strikes Back: Analyzing {SM2} Implementations}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13503}, pages = {576--600}, publisher = {Springer Nature Switzerland}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17433-9\_25}, doi = {10.1007/978-3-031-17433-9\_25}, timestamp = {Sun, 10 Dec 2023 00:28:26 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/CaoCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenLWW22, author = {Jie Chen and Yu Li and Jinming Wen and Jian Weng}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Identity-Based Matchmaking Encryption from Standard Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {394--422}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_14}, doi = {10.1007/978-3-031-22969-5\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenLWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SongZYSZHW22, author = {Ling Song and Nana Zhang and Qianqian Yang and Danping Shi and Jiahao Zhao and Lei Hu and Jian Weng}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for Key Recovery}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13791}, pages = {410--440}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22963-3\_14}, doi = {10.1007/978-3-031-22963-3\_14}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/SongZYSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HuangLHLW22, author = {Zhengan Huang and Junzuo Lai and Shuai Han and Lin Lyu and Jian Weng}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Anonymous Public Key Encryption Under Corruptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13793}, pages = {423--453}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22969-5\_15}, doi = {10.1007/978-3-031-22969-5\_15}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HuangLHLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cvpr/FeiDYSX022, author = {Jianwei Fei and Yunshu Dai and Peipeng Yu and Tianrun Shen and Zhihua Xia and Jian Weng}, title = {Learning Second Order Local Anomaly for General Face Forgery Detection}, booktitle = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition, {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022}, pages = {20238--20248}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CVPR52688.2022.01963}, doi = {10.1109/CVPR52688.2022.01963}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cvpr/FeiDYSX022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-09186, author = {Jiasi Weng and Jian Weng and Gui Tang and Anjia Yang and Ming Li and Jia{-}Nan Liu}, title = {pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing}, journal = {CoRR}, volume = {abs/2201.09186}, year = {2022}, url = {https://arxiv.org/abs/2201.09186}, eprinttype = {arXiv}, eprint = {2201.09186}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-09186.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-13067, author = {Sulong Ge and Zhihua Xia and Jianwei Fei and Xingming Sun and Jian Weng}, title = {A Robust Document Image Watermarking Scheme using Deep Neural Network}, journal = {CoRR}, volume = {abs/2202.13067}, year = {2022}, url = {https://arxiv.org/abs/2202.13067}, eprinttype = {arXiv}, eprint = {2202.13067}, timestamp = {Wed, 02 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-13067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-05198, author = {Sulong Ge and Zhihua Xia and Yao Tong and Jian Weng and Jia{-}Nan Liu}, title = {A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network}, journal = {CoRR}, volume = {abs/2203.05198}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.05198}, doi = {10.48550/ARXIV.2203.05198}, eprinttype = {arXiv}, eprint = {2203.05198}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-05198.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-03040, author = {Caiqin Dong and Jian Weng and Yao Tong and Jia{-}Nan Liu and Anjia Yang and Yudan Cheng and Shun Hu}, title = {Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients}, journal = {CoRR}, volume = {abs/2205.03040}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.03040}, doi = {10.48550/ARXIV.2205.03040}, eprinttype = {arXiv}, eprint = {2205.03040}, timestamp = {Wed, 11 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-03040.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-12587, author = {Yong Xu and Zhihua Xia and Zichi Wang and Xinpeng Zhang and Jian Weng}, title = {Deniable Steganography}, journal = {CoRR}, volume = {abs/2205.12587}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.12587}, doi = {10.48550/ARXIV.2205.12587}, eprinttype = {arXiv}, eprint = {2205.12587}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-12587.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-04728, author = {Wensheng Gan and Gengsen Huang and Jian Weng and Tianlong Gu and Philip S. Yu}, title = {Towards Target Sequential Rules}, journal = {CoRR}, volume = {abs/2206.04728}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.04728}, doi = {10.48550/ARXIV.2206.04728}, eprinttype = {arXiv}, eprint = {2206.04728}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-04728.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-15490, author = {Jianwei Fei and Yunshu Dai and Peipeng Yu and Tianrun Shen and Zhihua Xia and Jian Weng}, title = {Learning Second Order Local Anomaly for General Face Forgery Detection}, journal = {CoRR}, volume = {abs/2209.15490}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.15490}, doi = {10.48550/ARXIV.2209.15490}, eprinttype = {arXiv}, eprint = {2209.15490}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-15490.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-11334, author = {Jiasi Weng and Shenglong Yao and Yuefeng Du and Junjie Huang and Jian Weng and Cong Wang}, title = {Proof of Unlearning: Definitions and Instantiation}, journal = {CoRR}, volume = {abs/2210.11334}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.11334}, doi = {10.48550/ARXIV.2210.11334}, eprinttype = {arXiv}, eprint = {2210.11334}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-11334.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WuWLYLJ22, author = {Axin Wu and Jian Weng and Weiqi Luo and Anjia Yang and Jia{-}Nan Liu and Zike Jiang}, title = {Cross-Domain Identity-based Matchmaking Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2022}, url = {https://eprint.iacr.org/2022/085}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WuWLYLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuYWLZL22, author = {Zilin Liu and Anjia Yang and Jian Weng and Tao Li and Huang Zeng and Xiaojian Liang}, title = {{GMHL:} Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2022}, url = {https://eprint.iacr.org/2022/115}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiuYWLZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YaoWW22, author = {Lisha Yao and Jian Weng and Bimei Wang}, title = {Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {637}, year = {2022}, url = {https://eprint.iacr.org/2022/637}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YaoWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SongZYSZHW22, author = {Ling Song and Nana Zhang and Qianqian Yang and Danping Shi and Jiahao Zhao and Lei Hu and Jian Weng}, title = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for Key Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2022}, url = {https://eprint.iacr.org/2022/723}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SongZYSZHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangL00022, author = {Zhengan Huang and Junzuo Lai and Shuai Han and Lin Lyu and Jian Weng}, title = {Anonymous Public Key Encryption under Corruptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2022}, url = {https://eprint.iacr.org/2022/1176}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuangL00022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenLW022, author = {Jie Chen and Yu Li and Jinming Wen and Jian Weng}, title = {Identity-Based Matchmaking Encryption from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1246}, year = {2022}, url = {https://eprint.iacr.org/2022/1246}, timestamp = {Wed, 31 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChenLW022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CuiLGW21, author = {Nan Cui and Shengli Liu and Dawu Gu and Jian Weng}, title = {Robustly reusable fuzzy extractor with imperfect randomness}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {1017--1059}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00843-1}, doi = {10.1007/S10623-021-00843-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CuiLGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/LiuMWHWWL21, author = {Zhiquan Liu and Jianfeng Ma and Jian Weng and Feiran Huang and Yongdong Wu and Linfeng Wei and Yuxian Li}, title = {{LPPTE:} {A} lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications}, journal = {Inf. Fusion}, volume = {73}, pages = {144--156}, year = {2021}, url = {https://doi.org/10.1016/j.inffus.2021.03.003}, doi = {10.1016/J.INFFUS.2021.03.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/LiuMWHWWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/LiZZDHWM021, author = {Hailiang Li and Bin Zhang and Yu Zhang and Xilin Dang and Yuwei Han and Linfeng Wei and Yijun Mao and Jian Weng}, title = {A defense method based on attention mechanism against traffic sign adversarial samples}, journal = {Inf. Fusion}, volume = {76}, pages = {55--65}, year = {2021}, url = {https://doi.org/10.1016/j.inffus.2021.05.005}, doi = {10.1016/J.INFFUS.2021.05.005}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inffus/LiZZDHWM021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuHWCMGW21, author = {Zhiquan Liu and Feiran Huang and Jian Weng and Kun Cao and Yinbin Miao and Jingjing Guo and Yongdong Wu}, title = {{BTMPP:} Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {7}, pages = {5386--5407}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3037098}, doi = {10.1109/JIOT.2020.3037098}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiuHWCMGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangBHHLWMM21, author = {Anjia Yang and Dutliff Boshoff and Qiao Hu and Gerhard P. Hancke and Xizhao Luo and Jian Weng and Keith Mayes and Konstantinos Markantonakis}, title = {Privacy-Preserving Group Authentication for {RFID} Tags Using Bit-Collision Patterns}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {14}, pages = {11607--11620}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3059047}, doi = {10.1109/JIOT.2021.3059047}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YangBHHLWMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/Dai0Y0D21, author = {Yingling Dai and Jian Weng and Anjia Yang and Shui Yu and Robert H. Deng}, title = {A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {15}, number = {8}, pages = {2827--2848}, year = {2021}, url = {https://doi.org/10.3837/tiis.2021.08.007}, doi = {10.3837/TIIS.2021.08.007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/Dai0Y0D21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/CaoWCLWT21, author = {Kun Cao and Tongquan Wei and Mingsong Chen and Keqin Li and Jian Weng and Wuzheng Tan}, title = {Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems}, journal = {Softw. Pract. Exp.}, volume = {51}, number = {11}, pages = {2225--2237}, year = {2021}, url = {https://doi.org/10.1002/spe.2942}, doi = {10.1002/SPE.2942}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/spe/CaoWCLWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/YangXWZW21, author = {Anjia Yang and Jia Xu and Jian Weng and Jianying Zhou and Duncan S. Wong}, title = {Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {9}, number = {1}, pages = {212--225}, year = {2021}, url = {https://doi.org/10.1109/TCC.2018.2851256}, doi = {10.1109/TCC.2018.2851256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/YangXWZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaiWYW21, author = {Chengjun Cai and Jian Weng and Xingliang Yuan and Cong Wang}, title = {Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {131--144}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2877332}, doi = {10.1109/TDSC.2018.2877332}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaiWYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/00250WHY00D21, author = {Yue Zhang and Jian Weng and Jiasi Weng and Lin Hou and Anjia Yang and Ming Li and Yang Xiang and Robert H. Deng}, title = {Looking Back! Using Early Versions of Android Apps as Attack Vectors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {652--666}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2914202}, doi = {10.1109/TDSC.2019.2914202}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/00250WHY00D21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/OuQLWJ21, author = {Lu Ou and Zheng Qin and Shaolin Liao and Jian Weng and Xiaohua Jia}, title = {An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {4}, pages = {1528--1540}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3031223}, doi = {10.1109/TDSC.2020.3031223}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/OuQLWJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangWLL21, author = {Tao Wang and Jian Weng and Jay Ligatti and Yao Liu}, title = {Far Proximity Identification in Wireless Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2403--2418}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2950925}, doi = {10.1109/TDSC.2019.2950925}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangWLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WengWZLZL21, author = {Jiasi Weng and Jian Weng and Jilian Zhang and Ming Li and Yue Zhang and Weiqi Luo}, title = {DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2438--2455}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2952332}, doi = {10.1109/TDSC.2019.2952332}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/WengWZLZL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HeLWW21, author = {Hongliang He and Xizhao Luo and Jian Weng and Kaimin Wei}, title = {Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing {CSI}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3401--3411}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3080499}, doi = {10.1109/TIFS.2021.3080499}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HeLWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YangGWWPD21, author = {Yang Yang and Zhangshuang Guan and Zhiguo Wan and Jian Weng and HweeHwa Pang and Robert H. Deng}, title = {PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {4705--4720}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3108494}, doi = {10.1109/TIFS.2021.3108494}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YangGWWPD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/LuZLWLW21, author = {Kang{-}Di Lu and Guo{-}Qiang Zeng and Xizhao Luo and Jian Weng and Weiqi Luo and Yongdong Wu}, title = {Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {11}, pages = {7618--7627}, year = {2021}, url = {https://doi.org/10.1109/TII.2021.3053304}, doi = {10.1109/TII.2021.3053304}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/LuZLWLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tip/ChenLWLLT21, author = {Xin Chen and Xizhao Luo and Jian Weng and Weiqi Luo and Huiting Li and Qi Tian}, title = {Multi-View Gait Image Generation for Cross-View Gait Recognition}, journal = {{IEEE} Trans. Image Process.}, volume = {30}, pages = {3041--3055}, year = {2021}, url = {https://doi.org/10.1109/TIP.2021.3055936}, doi = {10.1109/TIP.2021.3055936}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tip/ChenLWLLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ChenWLX21, author = {Hao Chen and Jian Weng and Weiqi Luo and Liqing Xu}, title = {Long Optimal and Small-Defect {LRC} Codes With Unbounded Minimum Distances}, journal = {{IEEE} Trans. Inf. Theory}, volume = {67}, number = {5}, pages = {2786--2792}, year = {2021}, url = {https://doi.org/10.1109/TIT.2021.3052749}, doi = {10.1109/TIT.2021.3052749}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/ChenWLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/HuangXW21, author = {Feiran Huang and Jie Xu and Jian Weng}, title = {Multi-Task Travel Route Planning With a Flexible Deep Learning Framework}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {7}, pages = {3907--3918}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.2987645}, doi = {10.1109/TITS.2020.2987645}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/HuangXW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/Li0M0ZCG21, author = {Hailiang Li and Jian Weng and Yijun Mao and Yonghua Wang and Yiju Zhan and Qingling Cai and Wanrong Gu}, title = {Adaptive Dropout Method Based on Biological Principles}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {32}, number = {9}, pages = {4267--4276}, year = {2021}, url = {https://doi.org/10.1109/TNNLS.2021.3070895}, doi = {10.1109/TNNLS.2021.3070895}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnn/Li0M0ZCG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/XiaWTXW21, author = {Zhihua Xia and Lan Wang and Jian Tang and Neal N. Xiong and Jian Weng}, title = {A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {1}, pages = {318--330}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3038218}, doi = {10.1109/TNSE.2020.3038218}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/XiaWTXW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/LiRYZLWL21, author = {Xinghua Li and Yanbing Ren and Laurence T. Yang and Ning Zhang and Bin Luo and Jian Weng and Ximeng Liu}, title = {Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {3}, pages = {2073--2086}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3011607}, doi = {10.1109/TNSE.2020.3011607}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/LiRYZLWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ChenCZW21, author = {Jin{-}Hua Chen and Min{-}Rong Chen and Guo{-}Qiang Zeng and Jian Weng}, title = {{BDFL:} {A} Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {9}, pages = {8639--8652}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3102121}, doi = {10.1109/TVT.2021.3102121}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ChenCZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/SunCWLG21, author = {Heng Sun and Miaomiao Chen and Jian Weng and Zhiquan Liu and Guanggang Geng}, title = {Anomaly Detection for In-Vehicle Network Using {CNN-LSTM} With Attention Mechanism}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {10}, pages = {10880--10893}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3106940}, doi = {10.1109/TVT.2021.3106940}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/SunCWLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/MengWMCSWL21, author = {Qian Meng and Jian Weng and Yinbin Miao and Kefei Chen and Zhonghua Shen and Fuqun Wang and Zhijun Li}, title = {Verifiable Spatial Range Query Over Encrypted Cloud Data in {VANET}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {12}, pages = {12342--12357}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3120089}, doi = {10.1109/TVT.2021.3120089}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/MengWMCSWL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LaiYHW21, author = {Junzuo Lai and Rupeng Yang and Zhengan Huang and Jian Weng}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {456--482}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_16}, doi = {10.1007/978-3-030-92075-3\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LaiYHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NingHPYL0D21, author = {Jianting Ning and Xinyi Huang and Geong Sen Poh and Jiaming Yuan and Yingjiu Li and Jian Weng and Robert H. Deng}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {{LEAP:} Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2307--2320}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484540}, doi = {10.1145/3460120.3484540}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NingHPYL0D21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ShenWGW21, author = {Yaobin Shen and Lei Wang and Dawu Gu and Jian Weng}, editor = {Tal Malkin and Chris Peikert}, title = {Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {309--336}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_11}, doi = {10.1007/978-3-030-84252-9\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/ShenWGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiangWYYJW21, author = {Xiaojian Liang and Jian Weng and Anjia Yang and Lisha Yao and Zike Jiang and Zhenghao Wu}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under {LWE}}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12973}, pages = {147--168}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88428-4\_8}, doi = {10.1007/978-3-030-88428-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LiangWYYJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WuWYYLJW21, author = {Zhenghao Wu and Jian Weng and Anjia Yang and Lisha Yao and Xiaojian Liang and Zike Jiang and Jinghang Wen}, editor = {Debin Gao and Qi Li and Xiaohong Guan and Xiaofeng Liao}, title = {Efficient and Fully Secure Lattice-Based {IBE} with Equality Test}, booktitle = {Information and Communications Security - 23rd International Conference, {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12919}, pages = {301--318}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88052-1\_18}, doi = {10.1007/978-3-030-88052-1\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/WuWYYLJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/Weng0HC021, author = {Jiasi Weng and Jian Weng and Hongwei Huang and Chengjun Cai and Cong Wang}, title = {FedServing: {A} Federated Prediction Serving Framework Based on Incentive Mechanism}, booktitle = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOM42981.2021.9488807}, doi = {10.1109/INFOCOM42981.2021.9488807}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/Weng0HC021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-16615, author = {Chunkai Zhang and Zilin Du and Quanjian Dai and Wensheng Gan and Jian Weng and Philip S. Yu}, title = {{TUSQ:} Targeted High-Utility Sequence Querying}, journal = {CoRR}, volume = {abs/2103.16615}, year = {2021}, url = {https://arxiv.org/abs/2103.16615}, eprinttype = {arXiv}, eprint = {2103.16615}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-16615.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-00247, author = {Chunkai Zhang and Quanjian Dai and Zilin Du and Wensheng Gan and Jian Weng and Philip S. Yu}, title = {Utility-driven Mining of Contiguous Sequences}, journal = {CoRR}, volume = {abs/2111.00247}, year = {2021}, url = {https://arxiv.org/abs/2111.00247}, eprinttype = {arXiv}, eprint = {2111.00247}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-00247.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-15020, author = {Gengsen Huang and Wensheng Gan and Jian Weng and Philip S. Yu}, title = {US-Rule: Discovering Utility-driven Sequential Rules}, journal = {CoRR}, volume = {abs/2111.15020}, year = {2021}, url = {https://arxiv.org/abs/2111.15020}, eprinttype = {arXiv}, eprint = {2111.15020}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-15020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiangWYYJW21, author = {Xiaojian Liang and Jian Weng and Anjia Yang and Lisha Yao and Zike Jiang and Zhenghao Wu}, title = {Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2021}, url = {https://eprint.iacr.org/2021/613}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiangWYYJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWLWWLD21, author = {Ming Li and Jian Weng and Yi Li and Yongdong Wu and Jiasi Weng and Dingcheng Li and Robert H. Deng}, title = {IvyCross: {A} Trustworthy and Privacy-preserving Framework for Blockchain Interoperability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1244}, year = {2021}, url = {https://eprint.iacr.org/2021/1244}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/LiWLWWLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiYHW21, author = {Junzuo Lai and Rupeng Yang and Zhengan Huang and Jian Weng}, title = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1268}, year = {2021}, url = {https://eprint.iacr.org/2021/1268}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiYHW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/XieWLH20, author = {Congge Xie and Jian Weng and Wei Lu and Lin Hou}, title = {General construction of revocable identity-based fully homomorphic signature}, journal = {Sci. China Inf. Sci.}, volume = {63}, number = {3}, year = {2020}, url = {https://doi.org/10.1007/s11432-018-9706-0}, doi = {10.1007/S11432-018-9706-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/XieWLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/YangWHY20, author = {Wenjie Yang and Jian Weng and Xinyi Huang and Anjia Yang}, title = {A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive {KGC} Attacks}, journal = {Comput. J.}, volume = {63}, number = {8}, pages = {1139--1147}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz122}, doi = {10.1093/COMJNL/BXZ122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/YangWHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhengXDCCWI20, author = {Zibin Zheng and Shaoan Xie and Hong{-}Ning Dai and Weili Chen and Xiangping Chen and Jian Weng and Muhammad Imran}, title = {An overview on smart contracts: Challenges, advances and platforms}, journal = {Future Gener. Comput. Syst.}, volume = {105}, pages = {475--491}, year = {2020}, url = {https://doi.org/10.1016/j.future.2019.12.019}, doi = {10.1016/J.FUTURE.2019.12.019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ZhengXDCCWI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WangWZ20a, author = {Ruili Wang and Jian Weng and Xiaofeng Zhu}, title = {Deep understanding of big multimedia data}, journal = {Neurocomputing}, volume = {391}, pages = {189--190}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2019.03.072}, doi = {10.1016/J.NEUCOM.2019.03.072}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/WangWZ20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiuWMGFJW20, author = {Zhiquan Liu and Jian Weng and Jianfeng Ma and Jingjing Guo and Bingwen Feng and Zhongyuan Jiang and Kaimin Wei}, title = {{TCEMD:} {A} Trust Cascading-Based Emergency Message Dissemination Model in VANETs}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {5}, pages = {4028--4048}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2957520}, doi = {10.1109/JIOT.2019.2957520}, timestamp = {Fri, 28 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiuWMGFJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiZRMLWMH20, author = {Xinghua Li and Huijuan Zhang and Yanbing Ren and Siqi Ma and Bin Luo and Jian Weng and Jianfeng Ma and Xiaoming Huang}, title = {{PAPU:} Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {12}, pages = {11789--11802}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.3001381}, doi = {10.1109/JIOT.2020.3001381}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiZRMLWMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChenCWLW20, author = {Huangke Chen and Ran Cheng and Jinming Wen and Haifeng Li and Jian Weng}, title = {Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations}, journal = {Inf. Sci.}, volume = {509}, pages = {457--469}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2018.10.007}, doi = {10.1016/J.INS.2018.10.007}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChenCWLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CuiDQW20, author = {Hui Cui and Robert H. Deng and Baodong Qin and Jian Weng}, title = {Key regeneration-free ciphertext-policy attribute-based encryption and its application}, journal = {Inf. Sci.}, volume = {517}, pages = {217--229}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.12.025}, doi = {10.1016/J.INS.2019.12.025}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/CuiDQW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/XieWWH20, author = {Congge Xie and Jian Weng and Jiasi Weng and Lin Hou}, title = {Scalable revocable identity-based signature over lattices in the standard model}, journal = {Inf. Sci.}, volume = {518}, pages = {29--38}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.01.008}, doi = {10.1016/J.INS.2020.01.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/XieWWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qre/WangXW20, author = {Chaonan Wang and Liudong Xing and Jian Weng}, title = {A new combinatorial model for deterministic competing failure analysis}, journal = {Qual. Reliab. Eng. Int.}, volume = {36}, number = {5}, pages = {1475--1493}, year = {2020}, url = {https://doi.org/10.1002/qre.2639}, doi = {10.1002/QRE.2639}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qre/WangXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XieWW20, author = {Congge Xie and Jian Weng and Jinming Wen}, title = {Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {1743421:1--1743421:11}, year = {2020}, url = {https://doi.org/10.1155/2020/1743421}, doi = {10.1155/2020/1743421}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XieWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeGWWLY20, author = {Kai He and Jun Guo and Jian Weng and Jiasi Weng and Joseph K. Liu and Xun Yi}, title = {Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1207--1217}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864186}, doi = {10.1109/TDSC.2018.2864186}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/HeGWWLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangZWWSR20, author = {Leo Yu Zhang and Yifeng Zheng and Jian Weng and Cong Wang and Zihao Shan and Kui Ren}, title = {You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {6}, pages = {1218--1231}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2864748}, doi = {10.1109/TDSC.2018.2864748}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangZWWSR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangCWM20, author = {Xu An Wang and Kim{-}Kwang Raymond Choo and Jian Weng and Jianfeng Ma}, title = {Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources"}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {1586--1588}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2936971}, doi = {10.1109/TIFS.2019.2936971}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/WangCWM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ChenHWX20, author = {Hao Chen and Xianmang He and Jian Weng and Liqing Xu}, title = {New Constructions of Subspace Codes Using Subsets of {MRD} Codes in Several Blocks}, journal = {{IEEE} Trans. Inf. Theory}, volume = {66}, number = {9}, pages = {5317--5321}, year = {2020}, url = {https://doi.org/10.1109/TIT.2020.2975776}, doi = {10.1109/TIT.2020.2975776}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ChenHWX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ChenWLLWXT20, author = {Xin Chen and Jian Weng and Weiqi Luo and Wei Lu and Huimin Wu and Jiaming Xu and Qi Tian}, title = {Sample Balancing for Deep Learning-Based Visual Recognition}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {31}, number = {10}, pages = {3962--3976}, year = {2020}, url = {https://doi.org/10.1109/TNNLS.2019.2947789}, doi = {10.1109/TNNLS.2019.2947789}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ChenWLLWXT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/HuangWWL20, author = {Feiran Huang and Kaimin Wei and Jian Weng and Zhoujun Li}, title = {Attention-Based Modality-Gated Networks for Image-Text Sentiment Analysis}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {16}, number = {3}, pages = {79:1--79:19}, year = {2020}, url = {https://doi.org/10.1145/3388861}, doi = {10.1145/3388861}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tomccap/HuangWWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/YangLDW20, author = {Yang Yang and Ximeng Liu and Robert H. Deng and Jian Weng}, title = {Flexible Wildcard Searchable Encryption System}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {13}, number = {3}, pages = {464--477}, year = {2020}, url = {https://doi.org/10.1109/TSC.2017.2714669}, doi = {10.1109/TSC.2017.2714669}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/YangLDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/LiuWYCL20, author = {Jia{-}Nan Liu and Jian Weng and Anjia Yang and Yizhao Chen and Xiaodong Lin}, title = {Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid}, journal = {{IEEE} Trans. Smart Grid}, volume = {11}, number = {1}, pages = {247--257}, year = {2020}, url = {https://doi.org/10.1109/TSG.2019.2920836}, doi = {10.1109/TSG.2019.2920836}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/LiuWYCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/LyuWWL20, author = {Shanxiang Lyu and Jinming Wen and Jian Weng and Cong Ling}, title = {On Low-Complexity Lattice Reduction Algorithms for Large-Scale {MIMO} Detection: The Blessing of Sequential Reduction}, journal = {{IEEE} Trans. Signal Process.}, volume = {68}, pages = {257--269}, year = {2020}, url = {https://doi.org/10.1109/TSP.2019.2959194}, doi = {10.1109/TSP.2019.2959194}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsp/LyuWWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LuoLWGM20, author = {Bin Luo and Xinghua Li and Jian Weng and Jingjing Guo and Jianfeng Ma}, title = {Blockchain Enabled Trust-Based Location Privacy Protection Scheme in {VANET}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {2}, pages = {2034--2048}, year = {2020}, url = {https://doi.org/10.1109/TVT.2019.2957744}, doi = {10.1109/TVT.2019.2957744}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LuoLWGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LuZLWZL20, author = {Kang{-}Di Lu and Guo{-}Qiang Zeng and Xizhao Luo and Jian Weng and Yue Zhang and Ming Li}, title = {An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {5}, pages = {4689--4699}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.2983565}, doi = {10.1109/TVT.2020.2983565}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LuZLWZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ChenWHZML20, author = {Dunjin Chen and Jian Weng and Feiran Huang and Jian Zhou and Yijun Mao and Xiaodong Liu}, title = {Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {10}, pages = {10642--10655}, year = {2020}, url = {https://doi.org/10.1109/TVT.2020.3019581}, doi = {10.1109/TVT.2020.3019581}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/ChenWHZML20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/LiuLG020, author = {Xiangyu Liu and Shengli Liu and Dawu Gu and Jian Weng}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {785--814}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_27}, doi = {10.1007/978-3-030-64834-3\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/LiuLG020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NingHPXLWD20, author = {Jianting Ning and Xinyi Huang and Geong Sen Poh and Shengmin Xu and Jia{-}Ch'ng Loh and Jian Weng and Robert H. Deng}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Pine: Enabling Privacy-Preserving Deep Packet Inspection on {TLS} with Rule-Hiding and Fast Connection Establishment}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {3--22}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_1}, doi = {10.1007/978-3-030-58951-6\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/NingHPXLWD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/00250LPF20, author = {Yue Zhang and Jian Weng and Zhen Ling and Bryan Pearson and Xinwen Fu}, title = {{BLESS:} {A} {BLE} Application Security Scanning Framework}, booktitle = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020, Toronto, ON, Canada, July 6-9, 2020}, pages = {636--645}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/INFOCOM41043.2020.9155473}, doi = {10.1109/INFOCOM41043.2020.9155473}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/00250LPF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/00250DJLF20, author = {Yue Zhang and Jian Weng and Rajib Dey and Yier Jin and Zhiqiang Lin and Xinwen Fu}, editor = {Srdjan Capkun and Franziska Roesner}, title = {Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {37--54}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-yue}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/00250DJLF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vr/LuGL020, author = {Yujun Lu and Boyu Gao and Jinyi Long and Jian Weng}, title = {Hand Motion with Eyes-free Interaction for Authentication in Virtual Reality}, booktitle = {2020 {IEEE} Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, {VR} Workshops, Atlanta, GA, USA, March 22-26, 2020}, pages = {715--716}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VRW50115.2020.00208}, doi = {10.1109/VRW50115.2020.00208}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vr/LuGL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-09624, author = {Jiasi Weng and Jian Weng and Yue Zhang and Ming Li and Zhaodi Wen}, title = {SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles}, journal = {CoRR}, volume = {abs/2001.09624}, year = {2020}, url = {https://arxiv.org/abs/2001.09624}, eprinttype = {arXiv}, eprint = {2001.09624}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-09624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-11288, author = {Zhijian Shao and Jian Weng and Yue Zhang and Yongdong Wu and Ming Li and Jiasi Weng and Weiqi Luo and Shui Yu}, title = {Peripheral-free Device Pairing by Randomly Switching Power}, journal = {CoRR}, volume = {abs/2002.11288}, year = {2020}, url = {https://arxiv.org/abs/2002.11288}, eprinttype = {arXiv}, eprint = {2002.11288}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-11288.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-08016, author = {Hongwei Huang and Weiqi Luo and Guoqiang Zeng and Jian Weng and Yue Zhang and Anjia Yang}, title = {{DAMIA:} Leveraging Domain Adaptation as a Defense against Membership Inference Attacks}, journal = {CoRR}, volume = {abs/2005.08016}, year = {2020}, url = {https://arxiv.org/abs/2005.08016}, eprinttype = {arXiv}, eprint = {2005.08016}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-08016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-11688, author = {Yang Yang and Robert H. Deng and Ximeng Liu and Yongdong Wu and Jian Weng and Xianghan Zheng and Chunming Rong}, title = {Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata}, journal = {CoRR}, volume = {abs/2005.11688}, year = {2020}, url = {https://arxiv.org/abs/2005.11688}, eprinttype = {arXiv}, eprint = {2005.11688}, timestamp = {Thu, 28 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-11688.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-02056, author = {Chuan Ma and Jun Li and Ming Ding and Bo Liu and Kang Wei and Jian Weng and H. Vincent Poor}, title = {{RDP-GAN:} {A} R{\'{e}}nyi-Differential Privacy based Generative Adversarial Network}, journal = {CoRR}, volume = {abs/2007.02056}, year = {2020}, url = {https://arxiv.org/abs/2007.02056}, eprinttype = {arXiv}, eprint = {2007.02056}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-02056.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2007-12416, author = {Qi Gu and Zhihua Xia and Xingming Sun and Jian Weng}, title = {{MSPPIR:} Multi-source privacy-preserving image retrieval in cloud computing}, journal = {CoRR}, volume = {abs/2007.12416}, year = {2020}, url = {https://arxiv.org/abs/2007.12416}, eprinttype = {arXiv}, eprint = {2007.12416}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2007-12416.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-09944, author = {Huimin Lao and Hao Chen and Jian Weng and Xiaoqing Tan}, title = {Parameter-controlled inserting constructions of constant dimension subspace codes}, journal = {CoRR}, volume = {abs/2008.09944}, year = {2020}, url = {https://arxiv.org/abs/2008.09944}, eprinttype = {arXiv}, eprint = {2008.09944}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-09944.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-05356, author = {Lizhi Xiong and Wenhao Zhou and Zhihua Xia and Qi Gu and Jian Weng}, title = {Efficient Privacy-Preserving Computation Based on Additive Secret Sharing}, journal = {CoRR}, volume = {abs/2009.05356}, year = {2020}, url = {https://arxiv.org/abs/2009.05356}, eprinttype = {arXiv}, eprint = {2009.05356}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-05356.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-06893, author = {Zhihua Xia and Qi Gu and Lizhi Xiong and Wenhao Zhou and Jian Weng}, title = {Privacy-Preserving Image Retrieval Based on Additive Secret Sharing}, journal = {CoRR}, volume = {abs/2009.06893}, year = {2020}, url = {https://arxiv.org/abs/2009.06893}, eprinttype = {arXiv}, eprint = {2009.06893}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-06893.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-13153, author = {Zhihua Xia and Qi Gu and Wenhao Zhou and Lizhi Xiong and Jian Weng}, title = {Secure Computation on Additive Shares}, journal = {CoRR}, volume = {abs/2009.13153}, year = {2020}, url = {https://arxiv.org/abs/2009.13153}, eprinttype = {arXiv}, eprint = {2009.13153}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-13153.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-06458, author = {Jiasi Weng and Jian Weng and Chengjun Cai and Hongwei Huang and Cong Wang}, title = {Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS}, journal = {CoRR}, volume = {abs/2011.06458}, year = {2020}, url = {https://arxiv.org/abs/2011.06458}, eprinttype = {arXiv}, eprint = {2011.06458}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-06458.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-10566, author = {Jiasi Weng and Jian Weng and Hongwei Huang and Chengjun Cai and Cong Wang}, title = {FedServing: {A} Federated Prediction Serving Framework Based on Incentive Mechanism}, journal = {CoRR}, volume = {abs/2012.10566}, year = {2020}, url = {https://arxiv.org/abs/2012.10566}, eprinttype = {arXiv}, eprint = {2012.10566}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-10566.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0049WLLO20, author = {Ming Li and Jian Weng and Jia{-}Nan Liu and Xiaodong Lin and Charlie Obimbo}, title = {{BB-VDF:} Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2020}, url = {https://eprint.iacr.org/2020/011}, timestamp = {Thu, 23 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0049WLLO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FangUWYZ20, author = {Junbin Fang and Dominique Unruh and Jian Weng and Jun Yan and Dehua Zhou}, title = {How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {621}, year = {2020}, url = {https://eprint.iacr.org/2020/621}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FangUWYZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiuLGW20, author = {Xiangyu Liu and Shengli Liu and Dawu Gu and Jian Weng}, title = {Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2020}, url = {https://eprint.iacr.org/2020/1088}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiuLGW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShenWW20, author = {Yaobin Shen and Lei Wang and Jian Weng}, title = {Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1523}, year = {2020}, url = {https://eprint.iacr.org/2020/1523}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShenWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/YangHLCWLC19, author = {Yang Yang and Xindi Huang and Ximeng Liu and Hongju Cheng and Jian Weng and Xiangyang Luo and Victor Chang}, title = {A Comprehensive Survey on Secure Outsourced Computation and Its Applications}, journal = {{IEEE} Access}, volume = {7}, pages = {159426--159465}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2949782}, doi = {10.1109/ACCESS.2019.2949782}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/YangHLCWLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenZLW19, author = {Min{-}Rong Chen and Guo{-}Qiang Zeng and Kang{-}Di Lu and Jian Weng}, title = {A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and {LSTM}}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {4}, pages = {6997--7010}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2913176}, doi = {10.1109/JIOT.2019.2913176}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ChenZLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangWMY19, author = {Xu An Wang and Jian Weng and Jianfeng Ma and Xiaoyuan Yang}, title = {Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification}, journal = {Inf. Sci.}, volume = {488}, pages = {13--18}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.03.002}, doi = {10.1016/J.INS.2019.03.002}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangWMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangLZWYCT19, author = {Xiaoqian Zhang and Weiqi Luo and Guoqiang Zeng and Jian Weng and Yaxi Yang and Min{-}Rong Chen and Xiaoqing Tan}, title = {A hybrid universal blind quantum computation}, journal = {Inf. Sci.}, volume = {498}, pages = {135--143}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.05.057}, doi = {10.1016/J.INS.2019.05.057}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangLZWYCT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AnadaYKWS19, author = {Hiroaki Anada and Takanori Yasuda and Junpei Kawamoto and Jian Weng and Kouichi Sakurai}, title = {{RSA} public keys with inside structure: Proofs of key generation and identities for web-of-trust}, journal = {J. Inf. Secur. Appl.}, volume = {45}, pages = {10--19}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2018.12.006}, doi = {10.1016/J.JISA.2018.12.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AnadaYKWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/DengLWZ19, author = {Xuelian Deng and Yuqing Li and Jian Weng and Jilian Zhang}, title = {Feature selection for text classification: {A} review}, journal = {Multim. Tools Appl.}, volume = {78}, number = {3}, pages = {3797--3816}, year = {2019}, url = {https://doi.org/10.1007/s11042-018-6083-5}, doi = {10.1007/S11042-018-6083-5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/DengLWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/swevo/ZengXCW19, author = {Guo{-}Qiang Zeng and Xiao{-}Qing Xie and Min{-}Rong Chen and Jian Weng}, title = {Adaptive population extremal optimization-based {PID} neural network for multivariable nonlinear control systems}, journal = {Swarm Evol. Comput.}, volume = {44}, pages = {320--334}, year = {2019}, url = {https://doi.org/10.1016/j.swevo.2018.04.008}, doi = {10.1016/J.SWEVO.2018.04.008}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/swevo/ZengXCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WenWFGL19, author = {Jinming Wen and Jian Weng and Yi Fang and Haris Gacanin and Weiqi Luo}, title = {Novel Properties of Successive Minima and Their Applications to 5G Tactile Internet}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {5}, pages = {3068--3076}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2895089}, doi = {10.1109/TII.2019.2895089}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/WenWFGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YanZWWH019, author = {Haode Yan and Zhengchun Zhou and Jian Weng and Jinming Wen and Tor Helleseth and Qi Wang}, title = {Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {10}, pages = {6819--6826}, year = {2019}, url = {https://doi.org/10.1109/TIT.2019.2910070}, doi = {10.1109/TIT.2019.2910070}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/YanZWWH019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LiWYLZHLXD19, author = {Ming Li and Jian Weng and Anjia Yang and Wei Lu and Yue Zhang and Lin Hou and Jia{-}Nan Liu and Yang Xiang and Robert H. Deng}, title = {CrowdBC: {A} Blockchain-Based Decentralized Framework for Crowdsourcing}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {30}, number = {6}, pages = {1251--1266}, year = {2019}, url = {https://doi.org/10.1109/TPDS.2018.2881735}, doi = {10.1109/TPDS.2018.2881735}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/LiWYLZHLXD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/MiaoMLWLL19, author = {Yinbin Miao and Jianfeng Ma and Ximeng Liu and Jian Weng and Hongwei Li and Hui Li}, title = {Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {12}, number = {5}, pages = {772--785}, year = {2019}, url = {https://doi.org/10.1109/TSC.2018.2823309}, doi = {10.1109/TSC.2018.2823309}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/MiaoMLWLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/WuCWWLQL19, author = {Yongdong Wu and Binbin Chen and Jian Weng and Zhuo Wei and Xin Li and Bo Qiu and Niekie Liu}, title = {False Load Attack to Smart Meters by Synchronously Switching Power Circuits}, journal = {{IEEE} Trans. Smart Grid}, volume = {10}, number = {3}, pages = {2641--2649}, year = {2019}, url = {https://doi.org/10.1109/TSG.2018.2806896}, doi = {10.1109/TSG.2018.2806896}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/WuCWWLQL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WengWZLL19, author = {Jia{-}Si Weng and Jian Weng and Yue Zhang and Weiqi Luo and Weiming Lan}, title = {{BENBI:} Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based {VANET}}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {1}, pages = {822--831}, year = {2019}, url = {https://doi.org/10.1109/TVT.2018.2880238}, doi = {10.1109/TVT.2018.2880238}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/WengWZLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/YangWCNLS19, author = {Anjia Yang and Jian Weng and Nan Cheng and Jianbing Ni and Xiaodong Lin and Xuemin Shen}, title = {DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {5}, pages = {4834--4845}, year = {2019}, url = {https://doi.org/10.1109/TVT.2019.2905522}, doi = {10.1109/TVT.2019.2905522}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/YangWCNLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WenWTRZ19, author = {Jinming Wen and Jian Weng and Chao Tong and Chao Ren and Zhengchun Zhou}, title = {Sparse Signal Recovery With Minimization of 1-Norm Minus 2-Norm}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {7}, pages = {6847--6854}, year = {2019}, url = {https://doi.org/10.1109/TVT.2019.2919612}, doi = {10.1109/TVT.2019.2919612}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WenWTRZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiWYLL19, author = {Ming Li and Jian Weng and Anjia Yang and Jia{-}Nan Liu and Xiaodong Lin}, title = {Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {11}, pages = {11248--11259}, year = {2019}, url = {https://doi.org/10.1109/TVT.2019.2940148}, doi = {10.1109/TVT.2019.2940148}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LiWYLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/0001ZWGL19, author = {Yu Yu and Jiang Zhang and Jian Weng and Chun Guo and Xiangxue Li}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Collision Resistant Hashing from Sub-exponential Learning Parity with Noise}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {3--24}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_1}, doi = {10.1007/978-3-030-34621-8\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/0001ZWGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/WuWQWQD19, author = {Yongdong Wu and Jian Weng and Bo Qiu and Zhuo Wei and Fan Qian and Robert H. Deng}, title = {Random Delay Attack and Its Applications on Load Frequency Control of Power Systems}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937611}, doi = {10.1109/DSC47296.2019.8937611}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/desec/WuWQWQD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/WenCW19, author = {Jinming Wen and Xiao{-}Wen Chang and Jian Weng}, title = {Improved Upper Bounds on the Hermite and {KZ} Constants}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {1742--1746}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849452}, doi = {10.1109/ISIT.2019.8849452}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isit/WenCW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/ZhangCDGWZ19, author = {Li Zhang and Jiongyi Chen and Wenrui Diao and Shanqing Guo and Jian Weng and Kehuan Zhang}, title = {CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {151--164}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/zhang-li}, timestamp = {Wed, 10 Feb 2021 22:02:04 +0100}, biburl = {https://dblp.org/rec/conf/raid/ZhangCDGWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019, author = {Wenrui Diao and Yue Zhang and Li Zhang and Zhou Li and Fenghao Xu and Xiaorui Pan and Xiangyu Liu and Jian Weng and Kehuan Zhang and XiaoFeng Wang}, title = {Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android}, booktitle = {22nd International Symposium on Research in Attacks, Intrusions and Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September 23-25, 2019}, pages = {261--275}, publisher = {{USENIX} Association}, year = {2019}, url = {https://www.usenix.org/conference/raid2019/presentation/diao}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-09395, author = {Jinming Wen and Xiao{-}Wen Chang and Jian Weng}, title = {Improved Upper Bounds on the Hermite and {KZ} Constants}, journal = {CoRR}, volume = {abs/1904.09395}, year = {2019}, url = {http://arxiv.org/abs/1904.09395}, eprinttype = {arXiv}, eprint = {1904.09395}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-09395.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-04342, author = {Jiasi Weng and Jian Weng and Jia{-}Nan Liu and Yue Zhang}, title = {Secure Software-Defined Networking Based on Blockchain}, journal = {CoRR}, volume = {abs/1906.04342}, year = {2019}, url = {http://arxiv.org/abs/1906.04342}, eprinttype = {arXiv}, eprint = {1906.04342}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-04342.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-03804, author = {Hao Chen and Xianmang He and Jian Weng and Liqing Xu}, title = {New Constructions of Subspace Codes Using Subsets of {MRD} codes in Several Blocks}, journal = {CoRR}, volume = {abs/1908.03804}, year = {2019}, url = {http://arxiv.org/abs/1908.03804}, eprinttype = {arXiv}, eprint = {1908.03804}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-03804.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-10497, author = {Yue Zhang and Jian Weng and Rajib Dey and Yier Jin and Zhiqiang Lin and Xinwen Fu}, title = {On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode}, journal = {CoRR}, volume = {abs/1908.10497}, year = {2019}, url = {http://arxiv.org/abs/1908.10497}, eprinttype = {arXiv}, eprint = {1908.10497}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-10497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-03367, author = {Yue Zhang and Jian Weng and Jiasi Weng and Ming Li and Weiqi Luo}, title = {Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications}, journal = {CoRR}, volume = {abs/1909.03367}, year = {2019}, url = {http://arxiv.org/abs/1909.03367}, eprinttype = {arXiv}, eprint = {1909.03367}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-03367.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-07267, author = {Hao Chen and Jian Weng and Weiqi Luo}, title = {Long Optimal or Small-Defect {LRC} Codes with Unbounded Minimum Distances}, journal = {CoRR}, volume = {abs/1910.07267}, year = {2019}, url = {http://arxiv.org/abs/1910.07267}, eprinttype = {arXiv}, eprint = {1910.07267}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-07267.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-06278, author = {Shanxiang Lyu and Jinming Wen and Jian Weng and Cong Ling}, title = {On Low-complexity Lattice Reduction Algorithms for Large-scale {MIMO} Detection: the Blessing of Sequential Reduction}, journal = {CoRR}, volume = {abs/1912.06278}, year = {2019}, url = {http://arxiv.org/abs/1912.06278}, eprinttype = {arXiv}, eprint = {1912.06278}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-06278.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-10370, author = {Zibin Zheng and Shaoan Xie and Hong{-}Ning Dai and Weili Chen and Xiangping Chen and Jian Weng and Muhammad Imran}, title = {An Overview on Smart Contracts: Challenges, Advances and Platforms}, journal = {CoRR}, volume = {abs/1912.10370}, year = {2019}, url = {http://arxiv.org/abs/1912.10370}, eprinttype = {arXiv}, eprint = {1912.10370}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-10370.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/YangLLWY18, author = {Wenjie Yang and Weiqi Luo and Xizhao Luo and Jian Weng and Anjia Yang}, title = {Fully distributed certificateless threshold signature without random oracles}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {9}, pages = {098101:1--098101:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9244-9}, doi = {10.1007/S11432-017-9244-9}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/YangLLWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/QinW0018, author = {Zhan Qin and Jian Weng and Yong Cui and Kui Ren}, title = {Privacy-Preserving Image Processing in the Cloud}, journal = {{IEEE} Cloud Comput.}, volume = {5}, number = {2}, pages = {48--57}, year = {2018}, url = {https://doi.org/10.1109/MCC.2018.022171667}, doi = {10.1109/MCC.2018.022171667}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cloudcomp/QinW0018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WeiWYYPXW18, author = {Zhuo Wei and Yongdong Wu and Yanjiang Yang and Zheng Yan and Qingqi Pei and Yajuan Xie and Jian Weng}, title = {AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo}, journal = {Comput. Secur.}, volume = {76}, pages = {341--353}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.12.002}, doi = {10.1016/J.COSE.2017.12.002}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WeiWYYPXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YangZWHWY18, author = {Anjia Yang and Yunhui Zhuang and Jian Weng and Gerhard P. Hancke and Duncan S. Wong and Guomin Yang}, title = {Exploring relationship between indistinguishability-based and unpredictability-based {RFID} privacy models}, journal = {Future Gener. Comput. Syst.}, volume = {82}, pages = {315--326}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.12.044}, doi = {10.1016/J.FUTURE.2017.12.044}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YangZWHWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/YangWYXY18, author = {Wenjie Yang and Jian Weng and Anjia Yang and Congge Xie and Yaxi Yang}, title = {Notes on a provably-secure certificate-based encryption against malicious {CA} attacks}, journal = {Inf. Sci.}, volume = {463-464}, pages = {86--91}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.06.049}, doi = {10.1016/J.INS.2018.06.049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/YangWYXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MiaoWLCLL18, author = {Yinbin Miao and Jian Weng and Ximeng Liu and Kim{-}Kwang Raymond Choo and Zhiquan Liu and Hongwei Li}, title = {Enabling verifiable multiple keywords search over encrypted cloud data}, journal = {Inf. Sci.}, volume = {465}, pages = {21--37}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2018.06.066}, doi = {10.1016/J.INS.2018.06.066}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/MiaoWLCLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuWCL18, author = {Huimin Wu and Jian Weng and Xin Chen and Wei Lu}, title = {Feedback weight convolutional neural network for gait recognition}, journal = {J. Vis. Commun. Image Represent.}, volume = {55}, pages = {424--432}, year = {2018}, url = {https://doi.org/10.1016/j.jvcir.2018.06.019}, doi = {10.1016/J.JVCIR.2018.06.019}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jvcir/WuWCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiLWML18, author = {Jixian Li and Wei Lu and Jian Weng and Yijun Mao and Guoqiang Li}, title = {Double {JPEG} compression detection based on block statistics}, journal = {Multim. Tools Appl.}, volume = {77}, number = {24}, pages = {31895--31910}, year = {2018}, url = {https://doi.org/10.1007/s11042-018-6175-2}, doi = {10.1007/S11042-018-6175-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mta/LiLWML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ZhangWLLYLZL18, author = {Jiajie Zhang and Jian Weng and Weiqi Luo and Jia{-}Nan Liu and Anjia Yang and Jiancheng Lin and Zhijun Zhang and Hailiang Li}, title = {{REMT:} {A} Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks}, journal = {{IEEE} Netw.}, volume = {32}, number = {5}, pages = {118--123}, year = {2018}, url = {https://doi.org/10.1109/MNET.2018.1700382}, doi = {10.1109/MNET.2018.1700382}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/ZhangWLLYLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pami/ChenWLX18, author = {Xin Chen and Jian Weng and Wei Lu and Jiaming Xu}, title = {Multi-Gait Recognition Based on Attribute Discovery}, journal = {{IEEE} Trans. Pattern Anal. Mach. Intell.}, volume = {40}, number = {7}, pages = {1697--1710}, year = {2018}, url = {https://doi.org/10.1109/TPAMI.2017.2726061}, doi = {10.1109/TPAMI.2017.2726061}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pami/ChenWLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/prl/WangJLWWDGY18, author = {Ruili Wang and Wanting Ji and Mingzhe Liu and Xun Wang and Jian Weng and Song Deng and Suying Gao and Chang{-}an Yuan}, title = {Review on mining data from multiple data sources}, journal = {Pattern Recognit. Lett.}, volume = {109}, pages = {120--128}, year = {2018}, url = {https://doi.org/10.1016/j.patrec.2018.01.013}, doi = {10.1016/J.PATREC.2018.01.013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/prl/WangJLWWDGY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangWLLTS18, author = {Xiaoqian Zhang and Jian Weng and Xiaochun Li and Weiqi Luo and Xiaoqing Tan and Tingting Song}, title = {Single-server blind quantum computation with quantum circuit model}, journal = {Quantum Inf. Process.}, volume = {17}, number = {6}, pages = {134}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-1901-2}, doi = {10.1007/S11128-018-1901-2}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangWLLTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/WuWY18, author = {Xiaotian Wu and Jian Weng and WeiQi Yan}, title = {Adopting secret sharing for reversible data hiding in encrypted images}, journal = {Signal Process.}, volume = {143}, pages = {269--281}, year = {2018}, url = {https://doi.org/10.1016/j.sigpro.2017.09.017}, doi = {10.1016/J.SIGPRO.2017.09.017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/WuWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/CaoWMWYS18, author = {Yue Cao and Kaimin Wei and Geyong Min and Jian Weng and Xin Yang and Zhili Sun}, title = {A Geographic Multicopy Routing Scheme for DTNs With Heterogeneous Mobility}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {1}, pages = {790--801}, year = {2018}, url = {https://doi.org/10.1109/JSYST.2016.2563519}, doi = {10.1109/JSYST.2016.2563519}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/CaoWMWYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tamd/YangLUFSWL18, author = {Chun Yang and Jinyi Long and Mike A. Urbin and Yanyun Feng and Ge Song and Jian Weng and Zhijun Li}, title = {Real-Time Myocontrol of a Human-Computer Interface by Paretic Muscles After Stroke}, journal = {{IEEE} Trans. Cogn. Dev. Syst.}, volume = {10}, number = {4}, pages = {1126--1132}, year = {2018}, url = {https://doi.org/10.1109/TCDS.2018.2830388}, doi = {10.1109/TCDS.2018.2830388}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tamd/YangLUFSWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/ZhangZWMLX18, author = {Zhijun Zhang and Lunan Zheng and Jian Weng and Yijun Mao and Wei Lu and Lin Xiao}, title = {A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation}, journal = {{IEEE} Trans. Cybern.}, volume = {48}, number = {11}, pages = {3135--3148}, year = {2018}, url = {https://doi.org/10.1109/TCYB.2017.2760883}, doi = {10.1109/TCYB.2017.2760883}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcyb/ZhangZWMLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuCDLW18, author = {Ximeng Liu and Kim{-}Kwang Raymond Choo and Robert H. Deng and Rongxing Lu and Jian Weng}, title = {Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {27--39}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2536601}, doi = {10.1109/TDSC.2016.2536601}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuCDLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/DuWHW18, author = {Minxin Du and Qian Wang and Meiqi He and Jian Weng}, title = {Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2320--2332}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2818651}, doi = {10.1109/TIFS.2018.2818651}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/DuWHW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnn/ChenWLXW18, author = {Xin Chen and Jian Weng and Wei Lu and Jiaming Xu and Jiasi Weng}, title = {Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition}, journal = {{IEEE} Trans. Neural Networks Learn. Syst.}, volume = {29}, number = {9}, pages = {3938--3952}, year = {2018}, url = {https://doi.org/10.1109/TNNLS.2017.2740318}, doi = {10.1109/TNNLS.2017.2740318}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnn/ChenWLXW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/YuanWWR18, author = {Xingliang Yuan and Jian Weng and Cong Wang and Kui Ren}, title = {Secure Integrated Circuit Design via Hybrid Cloud}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {29}, number = {8}, pages = {1851--1864}, year = {2018}, url = {https://doi.org/10.1109/TPDS.2018.2807844}, doi = {10.1109/TPDS.2018.2807844}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/YuanWWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/WuWWLD18, author = {Yongdong Wu and Zhuo Wei and Jian Weng and Xin Li and Robert H. Deng}, title = {Resonance Attacks on Load Frequency Control of Smart Grids}, journal = {{IEEE} Trans. Smart Grid}, volume = {9}, number = {5}, pages = {4490--4502}, year = {2018}, url = {https://doi.org/10.1109/TSG.2017.2661307}, doi = {10.1109/TSG.2017.2661307}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsg/WuWWLD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/WuWWD18, author = {Yongdong Wu and Zhuo Wei and Jian Weng and Robert H. Deng}, title = {Position Manipulation Attacks to Balise-Based Train Automatic Stop Control}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {67}, number = {6}, pages = {5287--5301}, year = {2018}, url = {https://doi.org/10.1109/TVT.2018.2802444}, doi = {10.1109/TVT.2018.2802444}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/WuWWD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/HuHCWL18, author = {Shuang Hu and Lin Hou and Gongliang Chen and Jian Weng and Jianhua Li}, editor = {Henning Schulzrinne and Pan Li}, title = {Reputation-based Distributed Knowledge Sharing System in Blockchain}, booktitle = {Proceedings of the 15th {EAI} International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2018, 5-7 November 2018, New York City, NY, {USA}}, pages = {476--481}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3286978.3286981}, doi = {10.1145/3286978.3286981}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/HuHCWL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tase/2018, editor = {Jun Pang and Chenyi Zhang and Jifeng He and Jian Weng}, title = {2018 International Symposium on Theoretical Aspects of Software Engineering, {TASE} 2018, Guangzhou, China, August 29-31, 2018}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://ieeexplore.ieee.org/xpl/conhome/8558619/proceeding}, isbn = {978-1-5386-7305-8}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tase/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengWLZL18, author = {Jiasi Weng and Jian Weng and Ming Li and Yue Zhang and Weiqi Luo}, title = {DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2018}, url = {https://eprint.iacr.org/2018/679}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WengWLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WeiYWWD17, author = {Zhuo Wei and Yanjiang Yang and Yongdong Wu and Jian Weng and Robert H. Deng}, title = {HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive}, journal = {{IEEE} Access}, volume = {5}, pages = {16314--16323}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2737957}, doi = {10.1109/ACCESS.2017.2737957}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WeiYWWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WeiLWZZY17, author = {Linfeng Wei and Weiqi Luo and Jian Weng and Yanjun Zhong and Xiaoqian Zhang and Zheng Yan}, title = {Machine Learning-Based Malicious Application Detection of Android}, journal = {{IEEE} Access}, volume = {5}, pages = {25591--25601}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2771470}, doi = {10.1109/ACCESS.2017.2771470}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WeiLWZZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eaai/YangLLW17, author = {Fan Yang and Jingwei Li and Wei Lu and Jian Weng}, title = {Copy-move forgery detection based on hybrid features}, journal = {Eng. Appl. Artif. Intell.}, volume = {59}, pages = {73--83}, year = {2017}, url = {https://doi.org/10.1016/j.engappai.2016.12.022}, doi = {10.1016/J.ENGAPPAI.2016.12.022}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eaai/YangLLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/FengWLP17, author = {Bingwen Feng and Jian Weng and Wei Lu and Bei Pei}, title = {Steganalysis of content-adaptive binary image data hiding}, journal = {J. Vis. Commun. Image Represent.}, volume = {46}, pages = {119--127}, year = {2017}, url = {https://doi.org/10.1016/j.jvcir.2017.01.008}, doi = {10.1016/J.JVCIR.2017.01.008}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/FengWLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mva/ChenXW17, author = {Xin Chen and Jiaming Xu and Jian Weng}, title = {Multi-gait recognition using hypergraph partition}, journal = {Mach. Vis. Appl.}, volume = {28}, number = {1-2}, pages = {117--127}, year = {2017}, url = {https://doi.org/10.1007/s00138-016-0810-6}, doi = {10.1007/S00138-016-0810-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mva/ChenXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ZhuZQWR17, author = {Liehuang Zhu and Zijian Zhang and Zhan Qin and Jian Weng and Kui Ren}, title = {Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids}, journal = {{IEEE} Netw.}, volume = {31}, number = {1}, pages = {59--63}, year = {2017}, url = {https://doi.org/10.1109/MNET.2016.1500292NM}, doi = {10.1109/MNET.2016.1500292NM}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/ZhuZQWR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/HeWMY17, author = {Kai He and Jian Weng and Yijun Mao and Huaqiang Yuan}, title = {Anonymous identity-based broadcast encryption technology for smart city information system}, journal = {Pers. Ubiquitous Comput.}, volume = {21}, number = {5}, pages = {841--853}, year = {2017}, url = {https://doi.org/10.1007/s00779-017-1053-x}, doi = {10.1007/S00779-017-1053-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/puc/HeWMY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ZhangWTL17, author = {Xiaoqian Zhang and Jian Weng and Xiaoqing Tan and Weiqi Luo}, title = {Indistinguishability of pure orthogonal product states by {LOCC}}, journal = {Quantum Inf. Process.}, volume = {16}, number = {7}, pages = {168}, year = {2017}, url = {https://doi.org/10.1007/s11128-017-1616-9}, doi = {10.1007/S11128-017-1616-9}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ZhangWTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangWLY17, author = {Wenjie Yang and Jian Weng and Weiqi Luo and Anjia Yang}, title = {Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive {KGC}}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {5704865:1--5704865:8}, year = {2017}, url = {https://doi.org/10.1155/2017/5704865}, doi = {10.1155/2017/5704865}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangWLY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/0001WHS17, author = {Zhe Liu and Jian Weng and Zhi Hu and Hwajeong Seo}, title = {Efficient Elliptic Curve Cryptography for Embedded Devices}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {16}, number = {2}, pages = {53:1--53:18}, year = {2017}, url = {https://doi.org/10.1145/2967103}, doi = {10.1145/2967103}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tecs/0001WHS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FuHRWW17, author = {Zhangjie Fu and Fengxiao Huang and Kui Ren and Jian Weng and Cong Wang}, title = {Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1874--1884}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2692728}, doi = {10.1109/TIFS.2017.2692728}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/FuHRWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WuWTLD17, author = {Yongdong Wu and Jian Weng and Zhe Tang and Xin Li and Robert H. Deng}, title = {Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {18}, number = {4}, pages = {814--823}, year = {2017}, url = {https://doi.org/10.1109/TITS.2016.2590579}, doi = {10.1109/TITS.2016.2590579}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/WuWTLD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ZhanLZYWLG017, author = {Zhi{-}Hui Zhan and Xiao Fang Liu and Huaxiang Zhang and Zhengtao Yu and Jian Weng and Yun Li and Tianlong Gu and Jun Zhang}, title = {Cloudde: {A} Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud Version}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {28}, number = {3}, pages = {704--716}, year = {2017}, url = {https://doi.org/10.1109/TPDS.2016.2597826}, doi = {10.1109/TPDS.2016.2597826}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/ZhanLZYWLG017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/ZhangQZWR17, author = {Zijian Zhang and Zhan Qin and Liehuang Zhu and Jian Weng and Kui Ren}, title = {Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise}, journal = {{IEEE} Trans. Smart Grid}, volume = {8}, number = {2}, pages = {619--626}, year = {2017}, url = {https://doi.org/10.1109/TSG.2016.2585963}, doi = {10.1109/TSG.2016.2585963}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/ZhangQZWR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LeiHSJWLW17, author = {Lingguang Lei and Yi He and Kun Sun and Jiwu Jing and Yuewu Wang and Qi Li and Jian Weng}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Vulnerable Implicit Service: {A} Revisit}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1051--1063}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133975}, doi = {10.1145/3133956.3133975}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LeiHSJWLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/ZhengLAW17, author = {Qingji Zheng and Qi Li and Aytac Azgin and Jian Weng}, title = {Data verification in information-centric networking with efficient revocable certificateless signature}, booktitle = {2017 {IEEE} Conference on Communications and Network Security, {CNS} 2017, Las Vegas, NV, USA, October 9-11, 2017}, pages = {1--9}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/CNS.2017.8228650}, doi = {10.1109/CNS.2017.8228650}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/ZhengLAW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/SunXQPWG17, author = {Yuxia Sun and Yunlong Xie and Zhi Qiu and Yuchang Pan and Jian Weng and Song Guo}, title = {Detecting Android Malware Based on Extreme Learning Machine}, booktitle = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA, November 6-10, 2017}, pages = {47--53}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.24}, doi = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/SunXQPWG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/YuanLFW17, author = {Yafei Yuan and Wei Lu and Bingwen Feng and Jian Weng}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Steganalysis with {CNN} Using Multi-channels Filtered Residuals}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10602}, pages = {110--120}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68505-2\_10}, doi = {10.1007/978-3-319-68505-2\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/YuanLFW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ChenRPWWWSM17, author = {Si Chen and Kui Ren and Sixu Piao and Cong Wang and Qian Wang and Jian Weng and Lu Su and Aziz Mohaisen}, editor = {Kisung Lee and Ling Liu}, title = {You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {183--195}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.133}, doi = {10.1109/ICDCS.2017.133}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ChenRPWWWSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangWZ17, author = {Wenjie Yang and Jian Weng and Futai Zhang}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {New Certificateless Public Key Encryption Secure Against Malicious {KGC} Attacks in the Standard Model}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {236--247}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_21}, doi = {10.1007/978-3-319-89500-0\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YangWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LuoYWY17, author = {Song Luo and Lu Yan and Jian Weng and Zheng Yang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {New Proof for {BKP} {IBE} Scheme and Improvement in the {MIMC} Setting}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {136--155}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_8}, doi = {10.1007/978-3-319-72359-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/LuoYWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WeiYYWWD17, author = {Zhuo Wei and Yanjiang Yang and Rehana Yasmin and Yongdong Wu and Jian Weng and Robert H. Deng}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {638--647}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_39}, doi = {10.1007/978-3-319-72359-4\_39}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WeiYYWWD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/FengWL17, author = {Bingwen Feng and Jian Weng and Wei Lu}, editor = {Christian Kraetzer and Yun{-}Qing Shi and Jana Dittmann and Hyoung Joong Kim}, title = {Improved Algorithms for Robust Histogram Shape-Based Image Watermarking}, booktitle = {Digital Forensics and Watermarking - 16th International Workshop, {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10431}, pages = {275--289}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64185-0\_21}, doi = {10.1007/978-3-319-64185-0\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/FengWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0021GW17, author = {Jie Chen and Junqing Gong and Jian Weng}, editor = {Serge Fehr}, title = {Tightly Secure {IBE} Under Constant-Size Master Public Key}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {207--231}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_9}, doi = {10.1007/978-3-662-54365-8\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/0021GW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2016, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59608-2}, doi = {10.1007/978-3-319-59608-2}, isbn = {978-3-319-59607-5}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiWYL17, author = {Ming Li and Jian Weng and Anjia Yang and Wei Lu}, title = {CrowdBC: {A} Blockchain-based Decentralized Framework for Crowdsourcing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {444}, year = {2017}, url = {http://eprint.iacr.org/2017/444}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiWYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001ZWGL17, author = {Yu Yu and Jiang Zhang and Jian Weng and Chun Guo and Xiangxue Li}, title = {Collision Resistant Hashing from Learning Parity with Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1260}, year = {2017}, url = {http://eprint.iacr.org/2017/1260}, timestamp = {Thu, 04 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0001ZWGL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiuHWZC16, author = {Sha Liu and Shun Hu and Jian Weng and Shuhua Zhu and Zhiyan Chen}, title = {A novel asymmetric three-party based authentication scheme in wearable devices environment}, journal = {J. Netw. Comput. Appl.}, volume = {60}, pages = {144--154}, year = {2016}, url = {https://doi.org/10.1016/j.jnca.2015.10.001}, doi = {10.1016/J.JNCA.2015.10.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/LiuHWZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/ZhangLW16, author = {Qingbo Zhang and Wei Lu and Jian Weng}, title = {Joint image splicing detection in {DCT} and Contourlet transform domain}, journal = {J. Vis. Commun. Image Represent.}, volume = {40}, pages = {449--458}, year = {2016}, url = {https://doi.org/10.1016/j.jvcir.2016.07.013}, doi = {10.1016/J.JVCIR.2016.07.013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/ZhangLW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jvcir/WuCW16, author = {Xiaotian Wu and Bing Chen and Jian Weng}, title = {Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer}, journal = {J. Vis. Commun. Image Represent.}, volume = {41}, pages = {58--64}, year = {2016}, url = {https://doi.org/10.1016/j.jvcir.2016.09.005}, doi = {10.1016/J.JVCIR.2016.09.005}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jvcir/WuCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/YangZLWZC16, author = {Yanjiang Yang and Haiyan Zhu and Haibing Lu and Jian Weng and Youcheng Zhang and Kim{-}Kwang Raymond Choo}, title = {Cloud based data sharing with fine-grained proxy re-encryption}, journal = {Pervasive Mob. Comput.}, volume = {28}, pages = {122--134}, year = {2016}, url = {https://doi.org/10.1016/j.pmcj.2015.06.017}, doi = {10.1016/J.PMCJ.2015.06.017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/YangZLWZC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/LiuW0YFJ16, author = {Zheli Liu and Jian Weng and Jin Li and Jun Yang and Chuan Fu and Chunfu Jia}, title = {Cloud-based electronic health record system supporting fuzzy keyword search}, journal = {Soft Comput.}, volume = {20}, number = {8}, pages = {3243--3255}, year = {2016}, url = {https://doi.org/10.1007/s00500-015-1699-0}, doi = {10.1007/S00500-015-1699-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/soco/LiuW0YFJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/00010WML16, author = {Xiaofeng Chen and Jin Li and Jian Weng and Jianfeng Ma and Wenjing Lou}, title = {Verifiable Computation over Large Database with Incremental Updates}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {10}, pages = {3184--3195}, year = {2016}, url = {https://doi.org/10.1109/TC.2015.2512870}, doi = {10.1109/TC.2015.2512870}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/00010WML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HeWDL16, author = {Kai He and Jian Weng and Robert H. Deng and Joseph K. Liu}, title = {On the security of two identity-based conditional proxy re-encryption schemes}, journal = {Theor. Comput. Sci.}, volume = {652}, pages = {18--27}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.08.023}, doi = {10.1016/J.TCS.2016.08.023}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/HeWDL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MaoLMCW16, author = {Xianping Mao and Junzuo Lai and Qixiang Mei and Kefei Chen and Jian Weng}, title = {Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {5}, pages = {533--546}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2423669}, doi = {10.1109/TDSC.2015.2423669}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuDCW16, author = {Ximeng Liu and Robert H. Deng and Kim{-}Kwang Raymond Choo and Jian Weng}, title = {An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2401--2414}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2573770}, doi = {10.1109/TIFS.2016.2573770}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LiuDCW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/QinRYW16, author = {Zhan Qin and Kui Ren and Ting Yu and Jian Weng}, title = {DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud}, journal = {{IEEE} Trans. Multim.}, volume = {18}, number = {5}, pages = {929--939}, year = {2016}, url = {https://doi.org/10.1109/TMM.2016.2535729}, doi = {10.1109/TMM.2016.2535729}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/QinRYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/YuanWWWR16, author = {Xingliang Yuan and Xinyu Wang and Cong Wang and Jian Weng and Kui Ren}, title = {Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing}, journal = {{IEEE} Trans. Multim.}, volume = {18}, number = {10}, pages = {2002--2014}, year = {2016}, url = {https://doi.org/10.1109/TMM.2016.2602758}, doi = {10.1109/TMM.2016.2602758}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmm/YuanWWWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HeWAMD16, author = {Kai He and Jian Weng and Man Ho Au and Yijun Mao and Robert H. Deng}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {207--222}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_13}, doi = {10.1007/978-3-319-40367-0\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/HeWAMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/TangCGWWR16, author = {Heyi Tang and Yong Cui and Chaowen Guan and Jianping Wu and Jian Weng and Kui Ren}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {59--70}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897846}, doi = {10.1145/2897845.2897846}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/TangCGWWR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangLLWZZ16, author = {Yanjiang Yang and Haibing Lu and Joseph K. Liu and Jian Weng and Youcheng Zhang and Jianying Zhou}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {141--151}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897854}, doi = {10.1145/2897845.2897854}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YangLLWZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HeWLLLD16, author = {Kai He and Jian Weng and Jia{-}Nan Liu and Joseph K. Liu and Wei Liu and Robert H. Deng}, editor = {Xiaofeng Chen and XiaoFeng Wang and Xinyi Huang}, title = {Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security}, booktitle = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016}, pages = {247--255}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897845.2897879}, doi = {10.1145/2897845.2897879}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HeWLLLD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/CaiWL16, author = {Chengjun Cai and Jian Weng and Jia{-}Nan Liu}, title = {Mobile Authentication System Based on National Regulation and {NFC} Technology}, booktitle = {{IEEE} First International Conference on Data Science in Cyberspace, {DSC} 2016, Changsha, China, June 13-16, 2016}, pages = {590--595}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DSC.2016.116}, doi = {10.1109/DSC.2016.116}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsc/CaiWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdw/FengWLP16, author = {Bingwen Feng and Jian Weng and Wei Lu and Bei Pei}, editor = {Yun{-}Qing Shi and Hyoung{-}Joong Kim and Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and Feng Liu}, title = {Multiple Watermarking Using Multilevel Quantization Index Modulation}, booktitle = {Digital Forensics and Watermarking - 15th International Workshop, {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10082}, pages = {312--326}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53465-7\_23}, doi = {10.1007/978-3-319-53465-7\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwdw/FengWLP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HeWLZL16, author = {Kai He and Jian Weng and Joseph K. Liu and Wanlei Zhou and Jia{-}Nan Liu}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {65--79}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_5}, doi = {10.1007/978-3-319-46298-1\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/HeWLZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/LaiDMSW16, author = {Junzuo Lai and Robert H. Deng and Changshe Ma and Kouichi Sakurai and Jian Weng}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {CCA-Secure Keyed-Fully Homomorphic Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {70--98}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_4}, doi = {10.1007/978-3-662-49384-7\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/WuQWW16, author = {Yongdong Wu and Bo Qiu and Zhuo Wei and Jian Weng}, title = {Secure Subway Train-to-Train Communications via {GSM-R} Communication Systems}, booktitle = {{IEEE} 83rd Vehicular Technology Conference, {VTC} Spring 2016, Nanjing, China, May 15-18, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/VTCSpring.2016.7504465}, doi = {10.1109/VTCSPRING.2016.7504465}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vtc/WuQWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CaoWMWYS16, author = {Yue Cao and Kaimin Wei and Geyong Min and Jian Weng and Xin Yang and Zhili Sun}, title = {A Geographic Multi-Copy Routing Scheme for DTNs With Heterogeneous Mobility}, journal = {CoRR}, volume = {abs/1601.03555}, year = {2016}, url = {http://arxiv.org/abs/1601.03555}, eprinttype = {arXiv}, eprint = {1601.03555}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CaoWMWYS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WeiDWSOX15, author = {Kaimin Wei and Mianxiong Dong and Jian Weng and Guangzhou Shi and Kaoru Ota and Ke Xu}, title = {Congestion-aware message forwarding in delay tolerant networks: a community perspective}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {18}, pages = {5722--5734}, year = {2015}, url = {https://doi.org/10.1002/cpe.3647}, doi = {10.1002/CPE.3647}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/WeiDWSOX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/LiXW15, author = {Jin Li and Fatos Xhafa and Jian Weng}, title = {Emerging services and technologies in wireless networks}, journal = {J. High Speed Networks}, volume = {21}, number = {2}, pages = {81--82}, year = {2015}, url = {https://doi.org/10.3233/JHS-150511}, doi = {10.3233/JHS-150511}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/LiXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiQYWZ15, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Yuan Zhou}, title = {Signcryption KEM/tag-KEM, revisited}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3067--3082}, year = {2015}, url = {https://doi.org/10.1002/sec.1232}, doi = {10.1002/SEC.1232}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiQYWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaoLCWM15, author = {Xianping Mao and Junzuo Lai and Kefei Chen and Jian Weng and Qixiang Mei}, title = {Efficient revocable identity-based encryption from multilinear maps}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {3511--3522}, year = {2015}, url = {https://doi.org/10.1002/sec.1274}, doi = {10.1002/SEC.1274}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YuLW15, author = {Yu Yu and Xiangxue Li and Jian Weng}, title = {Pseudorandom generators from regular one-way functions: New constructions with improved parameters}, journal = {Theor. Comput. Sci.}, volume = {569}, pages = {58--69}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2014.12.013}, doi = {10.1016/J.TCS.2014.12.013}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/YuLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/WengZDLYS15, author = {Jian Weng and Yunlei Zhao and Robert H. Deng and Shengli Liu and Yanjiang Yang and Kouichi Sakurai}, title = {A note on the security of {KHL} scheme}, journal = {Theor. Comput. Sci.}, volume = {602}, pages = {1--6}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.07.051}, doi = {10.1016/J.TCS.2015.07.051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/WengZDLYS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/YuGLW15, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {209--229}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_11}, doi = {10.1007/978-3-662-48000-7\_11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/YuGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/YanWLQ15, author = {Jun Yan and Jian Weng and Dongdai Lin and Yujuan Quan}, editor = {Khaled M. Elbassioni and Kazuhisa Makino}, title = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract)}, booktitle = {Algorithms and Computation - 26th International Symposium, {ISAAC} 2015, Nagoya, Japan, December 9-11, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9472}, pages = {555--565}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48971-0\_47}, doi = {10.1007/978-3-662-48971-0\_47}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isaac/YanWLQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/YuGLW15, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {7--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_2}, doi = {10.1007/978-3-662-46494-6\_2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/YuGLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiDLWZ15, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao}, title = {Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2015}, url = {http://eprint.iacr.org/2015/297}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiDLWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhouWGDCC14, author = {Dehua Zhou and Jian Weng and Chaowen Guan and Robert H. Deng and Min{-}Rong Chen and Kefei Chen}, title = {Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext}, journal = {Sci. China Inf. Sci.}, volume = {57}, number = {7}, pages = {1--5}, year = {2014}, url = {https://doi.org/10.1007/s11432-013-4983-6}, doi = {10.1007/S11432-013-4983-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhouWGDCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GuanWDCZ14, author = {Chaowen Guan and Jian Weng and Robert H. Deng and Min{-}Rong Chen and Dehua Zhou}, title = {Unforgeability of an improved certificateless signature scheme in the standard model}, journal = {{IET} Inf. Secur.}, volume = {8}, number = {5}, pages = {273--276}, year = {2014}, url = {https://doi.org/10.1049/iet-ifs.2013.0062}, doi = {10.1049/IET-IFS.2013.0062}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/GuanWDCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LaiLDWGY14, author = {Junzuo Lai and Yingjiu Li and Robert H. Deng and Jian Weng and Chaowen Guan and Qiang Yan}, title = {Towards semantically secure outsourcing of association rule mining on categorical data}, journal = {Inf. Sci.}, volume = {267}, pages = {267--286}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.01.040}, doi = {10.1016/J.INS.2014.01.040}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/LaiLDWGY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiQYWW14, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Ziping Wang}, title = {Robust password changing and DoS resilience for human-centric password authentication}, journal = {Secur. Commun. Networks}, volume = {7}, number = {10}, pages = {1552--1559}, year = {2014}, url = {https://doi.org/10.1002/sec.768}, doi = {10.1002/SEC.768}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiQYWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LaiDLW14, author = {Junzuo Lai and Robert H. Deng and Yingjiu Li and Jian Weng}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {239--248}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590334}, doi = {10.1145/2590296.2590334}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LaiDLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiYLQZW14, author = {Xiangxue Li and Yu Yu and Qiang Li and Haifeng Qian and Yuan Zhou and Jian Weng}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Arranging the Layout of Alphanumeric Buttons-the Role of Passwords}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1457--1459}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662368}, doi = {10.1145/2660267.2662368}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiYLQZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiYLQZW14a, author = {Xiangxue Li and Yu Yu and Qiang Li and Haifeng Qian and Yuan Zhou and Jian Weng}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1460--1462}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662379}, doi = {10.1145/2660267.2662379}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiYLQZW14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/0001LWML14, author = {Xiaofeng Chen and Jin Li and Jian Weng and Jianfeng Ma and Wenjing Lou}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Verifiable Computation over Large Database with Incremental Updates}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {148--162}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_9}, doi = {10.1007/978-3-319-11203-9\_9}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/0001LWML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LaiDPW14, author = {Junzuo Lai and Robert H. Deng and HweeHwa Pang and Jian Weng}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Verifiable Computation on Outsourced Encrypted Data}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {273--291}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_16}, doi = {10.1007/978-3-319-11203-9\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/LaiDPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ShiLLDW14, author = {Jie Shi and Junzuo Lai and Yingjiu Li and Robert H. Deng and Jian Weng}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Authorized Keyword Search on Encrypted Data}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {419--435}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_24}, doi = {10.1007/978-3-319-11203-9\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ShiLLDW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiDLWZ14, author = {Junzuo Lai and Robert H. Deng and Shengli Liu and Jian Weng and Yunlei Zhao}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {77--92}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_5}, doi = {10.1007/978-3-642-55220-5\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiDLWZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/AnadaKWS14, author = {Hiroaki Anada and Junpei Kawamoto and Jian Weng and Kouichi Sakurai}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Identity-Embedding Method for Decentralized Public-Key Infrastructure}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {1--14}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_1}, doi = {10.1007/978-3-319-27998-5\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/AnadaKWS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YangLWZS14, author = {Yanjiang Yang and Haibing Lu and Jian Weng and Youcheng Zhang and Kouichi Sakurai}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Fine-Grained Conditional Proxy Re-Encryption and Application}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {206--222}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_15}, doi = {10.1007/978-3-319-12475-9\_15}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/YangLWZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuGLW14, author = {Yu Yu and Dawu Gu and Xiangxue Li and Jian Weng}, title = {(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2014}, url = {http://eprint.iacr.org/2014/393}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuGLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LinQWY14, author = {Dongdai Lin and Yujuan Quan and Jian Weng and Jun Yan}, title = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2014}, url = {http://eprint.iacr.org/2014/791}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LinQWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LiQWY13, author = {Xiangxue Li and Haifeng Qian and Jian Weng and Yu Yu}, title = {Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model}, journal = {Math. Comput. Model.}, volume = {57}, number = {3-4}, pages = {503--511}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.06.030}, doi = {10.1016/J.MCM.2012.06.030}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LiQWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LaiDGW13, author = {Junzuo Lai and Robert H. Deng and Chaowen Guan and Jian Weng}, title = {Attribute-Based Encryption With Verifiable Outsourced Decryption}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {8}, number = {8}, pages = {1343--1354}, year = {2013}, url = {https://doi.org/10.1109/TIFS.2013.2271848}, doi = {10.1109/TIFS.2013.2271848}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/LaiDGW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LiQYZW13, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Yuan Zhou and Jian Weng}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Constructing Practical Signcryption {KEM} from Standard Assumptions without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {186--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_12}, doi = {10.1007/978-3-642-38980-1\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/LiQYZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YuLW13, author = {Yu Yu and Xiangxue Li and Jian Weng}, editor = {Kazue Sako and Palash Sarkar}, title = {Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {261--279}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_14}, doi = {10.1007/978-3-642-42045-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/YuLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiuSWZZ13, author = {Shengli Liu and Kouichi Sakurai and Jian Weng and Fangguo Zhang and Yunlei Zhao}, editor = {Dongdai Lin and Shouhuai Xu and Moti Yung}, title = {Security Model and Analysis of FHMQV, Revisited}, booktitle = {Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8567}, pages = {255--269}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-12087-4\_16}, doi = {10.1007/978-3-319-12087-4\_16}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/LiuSWZZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LiuWZ13, author = {Shengli Liu and Jian Weng and Yunlei Zhao}, editor = {Ed Dawson}, title = {Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {84--100}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_6}, doi = {10.1007/978-3-642-36095-4\_6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/LiuWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/LaiDZW13, author = {Junzuo Lai and Robert H. Deng and Yunlei Zhao and Jian Weng}, editor = {Ed Dawson}, title = {Accountable Authority Identity-Based Encryption with Public Traceability}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {326--342}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_21}, doi = {10.1007/978-3-642-36095-4\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/LaiDZW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/ShiFWZ13, author = {Jie Shi and Ge Fu and Jian Weng and Hong Zhu}, title = {Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {385--392}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.72}, doi = {10.1109/EIDWT.2013.72}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/ShiFWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiQYWZ13, author = {Xiangxue Li and Haifeng Qian and Yu Yu and Jian Weng and Yuan Zhou}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {167--184}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_13}, doi = {10.1007/978-3-319-02726-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/LiQYWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/YangDLWZ13, author = {Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng and Jianying Zhou}, editor = {Yvo Desmedt}, title = {Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {238--247}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_17}, doi = {10.1007/978-3-319-27659-5\_17}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/YangDLWZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/LaiDYW13, author = {Junzuo Lai and Robert H. Deng and Yanjiang Yang and Jian Weng}, editor = {Zhenfu Cao and Fangguo Zhang}, title = {Adaptable Ciphertext-Policy Attribute-Based Encryption}, booktitle = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference, Beijing, China, November 22-24, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8365}, pages = {199--214}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04873-4\_12}, doi = {10.1007/978-3-319-04873-4\_12}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pairing/LaiDYW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rfidsec/2013a, editor = {Changshe Ma and Jian Weng}, title = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013}, series = {Cryptology and Information Security Series}, volume = {11}, publisher = {{IOS} Press}, year = {2013}, isbn = {978-1-61499-327-8}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/2013a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangDLW13, author = {Yanjiang Yang and Xuhua Ding and Haibing Lu and Jian Weng}, title = {Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {207}, year = {2013}, url = {http://eprint.iacr.org/2013/207}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangDLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/ChowMW12, author = {Sherman S. M. Chow and Changshe Ma and Jian Weng}, title = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms}, journal = {Algorithmica}, volume = {64}, number = {2}, pages = {246--266}, year = {2012}, url = {https://doi.org/10.1007/s00453-011-9593-3}, doi = {10.1007/S00453-011-9593-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/algorithmica/ChowMW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HanaokaKKMWZZ12, author = {Goichiro Hanaoka and Yutaka Kawai and Noboru Kunihiro and Takahiro Matsuda and Jian Weng and Rui Zhang and Yunlei Zhao}, editor = {Orr Dunkelman}, title = {Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {349--364}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_22}, doi = {10.1007/978-3-642-27954-6\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/HanaokaKKMWZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YangLWDZ12, author = {Yanjiang Yang and Haibing Lu and Jian Weng and Xuhua Ding and Jianying Zhou}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {A Generic Approach for Providing Revocation Support in Secret Handshake}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {276--284}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_24}, doi = {10.1007/978-3-642-34129-8\_24}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/YangLWDZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/WangWYY11, author = {Xu An Wang and Jian Weng and Xiaoyuan Yang and Yanjiang Yang}, title = {Cryptanalysis of an identity based broadcast encryption scheme without random oracles}, journal = {Inf. Process. Lett.}, volume = {111}, number = {10}, pages = {461--464}, year = {2011}, url = {https://doi.org/10.1016/j.ipl.2011.02.007}, doi = {10.1016/J.IPL.2011.02.007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/WangWYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WengYDCL11, author = {Jian Weng and Guoxiang Yao and Robert H. Deng and Min{-}Rong Chen and Xiangxue Li}, title = {Cryptanalysis of a certificateless signcryption scheme in the standard model}, journal = {Inf. Sci.}, volume = {181}, number = {3}, pages = {661--667}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2010.09.037}, doi = {10.1016/J.INS.2010.09.037}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WengYDCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WanWLLL11, author = {Zhong{-}Mei Wan and Jian Weng and Xuejia Lai and Shengli Liu and Jiguo Li}, title = {On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption}, journal = {J. Inf. Sci. Eng.}, volume = {27}, number = {1}, pages = {243--259}, year = {2011}, url = {http://www.iis.sinica.edu.tw/page/jise/2011/201101\_16.html}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WanWLLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WangWYZ11, author = {Xu An Wang and Jian Weng and Xiaoyuan Yang and Minqing Zhang}, title = {Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme}, journal = {J. Syst. Softw.}, volume = {84}, number = {2}, pages = {219--225}, year = {2011}, url = {https://doi.org/10.1016/j.jss.2010.09.021}, doi = {10.1016/J.JSS.2010.09.021}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/WangWYZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/YangLW11, author = {Yanjiang Yang and Haibing Lu and Jian Weng}, editor = {Costas Lambrinoudakis and Panagiotis Rizomiliotis and Tomasz Wiktor Wlodarczyk}, title = {Multi-User Private Keyword Search for Cloud Computing}, booktitle = {{IEEE} 3rd International Conference on Cloud Computing Technology and Science, CloudCom 2011, Athens, Greece, November 29 - December 1, 2011}, pages = {264--271}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/CloudCom.2011.43}, doi = {10.1109/CLOUDCOM.2011.43}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cloudcom/YangLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/WengWHL11, author = {Zhiwei Weng and Jian Weng and Kai He and Yingkai Li}, editor = {De{-}Shuang Huang and Yong Gan and Phalguni Gupta and M. Michael Gromiha}, title = {New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability}, booktitle = {Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence - 7th International Conference, {ICIC} 2011, Zhengzhou, China, August 11-14, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6839}, pages = {170--176}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25944-9\_22}, doi = {10.1007/978-3-642-25944-9\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icic/WengWHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/WengZH11, author = {Jian Weng and Yunlei Zhao and Goichiro Hanaoka}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {On the Security of a Bidirectional Proxy Re-encryption Scheme from {PKC} 2010}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {284--295}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_18}, doi = {10.1007/978-3-642-19379-8\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/WengZH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ispec/2011, editor = {Feng Bao and Jian Weng}, title = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0}, doi = {10.1007/978-3-642-21031-0}, isbn = {978-3-642-21030-3}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengZ11, author = {Jian Weng and Yunlei Zhao}, title = {Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {208}, year = {2011}, url = {http://eprint.iacr.org/2011/208}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WengCYDCB10, author = {Jian Weng and Min{-}Rong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao}, title = {CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {593--606}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0047-3}, doi = {10.1007/S11432-010-0047-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WengCYDCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaWLD10, author = {Changshe Ma and Jian Weng and Yingjiu Li and Robert H. Deng}, title = {Efficient discrete logarithm based multi-signature scheme in the plain public key model}, journal = {Des. Codes Cryptogr.}, volume = {54}, number = {2}, pages = {121--133}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9313-z}, doi = {10.1007/S10623-009-9313-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MaWLD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WengCCD10, author = {Jian Weng and Min{-}Rong Chen and Kefei Chen and Robert H. Deng}, title = {Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {4}, pages = {854--856}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.854}, doi = {10.1587/TRANSFUN.E93.A.854}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WengCCD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WengDLC10, author = {Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen}, title = {Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings}, journal = {Inf. Sci.}, volume = {180}, number = {24}, pages = {5077--5089}, year = {2010}, url = {https://doi.org/10.1016/j.ins.2010.08.017}, doi = {10.1016/J.INS.2010.08.017}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WengDLC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/WanWL10, author = {Zhong{-}Mei Wan and Jian Weng and Jiguo Li}, title = {Security Mediated Certificateless Signatures Without Pairing}, journal = {J. Comput.}, volume = {5}, number = {12}, pages = {1862--1869}, year = {2010}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=136\&\#38;id=2323}, doi = {10.4304/JCP.5.12.1862-1869}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/WanWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ChowWYD10, author = {Sherman S. M. Chow and Jian Weng and Yanjiang Yang and Robert H. Deng}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Efficient Unidirectional Proxy Re-Encryption}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {316--332}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_19}, doi = {10.1007/978-3-642-12678-9\_19}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/ChowWYD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/ChowMW10, author = {Sherman S. M. Chow and Changshe Ma and Jian Weng}, editor = {My T. Thai and Sartaj Sahni}, title = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms}, booktitle = {Computing and Combinatorics, 16th Annual International Conference, {COCOON} 2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6196}, pages = {520--529}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14031-0\_55}, doi = {10.1007/978-3-642-14031-0\_55}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cocoon/ChowMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HanaokaW10, author = {Goichiro Hanaoka and Jian Weng}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Generic Constructions of Parallel Key-Insulated Encryption}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {36--53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_3}, doi = {10.1007/978-3-642-15317-4\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/HanaokaW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengCYDCB10, author = {Jian Weng and Min{-}Rong Chen and Yanjiang Yang and Robert H. Deng and Kefei Chen and Feng Bao}, title = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2010}, url = {http://eprint.iacr.org/2010/265}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengCYDCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengZ10, author = {Jian Weng and Yunlei Zhao}, title = {On the Security of a Bidirectional Proxy Re-Encryption Scheme from {PKC} 2010}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2010}, url = {http://eprint.iacr.org/2010/319}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaW10, author = {Goichiro Hanaoka and Jian Weng}, title = {Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {468}, year = {2010}, url = {http://eprint.iacr.org/2010/468}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChuWCZD09, author = {Cheng{-}Kang Chu and Jian Weng and Sherman S. M. Chow and Jianying Zhou and Robert H. Deng}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Conditional Proxy Broadcast Re-Encryption}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {327--342}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_23}, doi = {10.1007/978-3-642-02620-1\_23}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/ChuWCZD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YangZWB09, author = {Yanjiang Yang and Jianying Zhou and Jian Weng and Feng Bao}, title = {A New Approach for Anonymous Password Authentication}, booktitle = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC} 2009, Honolulu, Hawaii, USA, 7-11 December 2009}, pages = {199--208}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ACSAC.2009.26}, doi = {10.1109/ACSAC.2009.26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YangZWB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WengDDCL09, author = {Jian Weng and Robert H. Deng and Xuhua Ding and Cheng{-}Kang Chu and Junzuo Lai}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Conditional proxy re-encryption secure against chosen-ciphertext attack}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {322--332}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533100}, doi = {10.1145/1533057.1533100}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WengDDCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YangWZQ09, author = {Yanjiang Yang and Jian Weng and Jianying Zhou and Ying Qiu}, editor = {Feng Bao and Moti Yung and Dongdai Lin and Jiwu Jing}, title = {Optionally Identifiable Private Handshakes}, booktitle = {Information Security and Cryptology - 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6151}, pages = {164--178}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-16342-5\_13}, doi = {10.1007/978-3-642-16342-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/YangWZQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WengYTDB09, author = {Jian Weng and Yanjiang Yang and Qiang Tang and Robert H. Deng and Feng Bao}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {151--166}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_13}, doi = {10.1007/978-3-642-04474-8\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/WengYTDB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lcn/YangBW09, author = {Yanjiang Yang and Feng Bao and Jian Weng}, title = {Private handshakes with optional accountability}, booktitle = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN} 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings}, pages = {245--248}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/LCN.2009.5355079}, doi = {10.1109/LCN.2009.5355079}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lcn/YangBW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YangLWZB09, author = {Yanjiang Yang and Yingjiu Li and Jian Weng and Jianying Zhou and Feng Bao}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Self-enforcing Private Inference Control}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {260--274}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_21}, doi = {10.1007/978-3-642-04642-1\_21}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/YangLWZB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowWYD09, author = {Sherman S. M. Chow and Jian Weng and Yanjiang Yang and Robert H. Deng}, title = {Efficient Unidirectional Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2009}, url = {http://eprint.iacr.org/2009/189}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChowWYD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/WengLCL08, author = {Jian Weng and Shengli Liu and Kefei Chen and Xiangxue Li}, title = {Identity-Based Parallel Key-Insulated Signature: Framework and Construction}, journal = {J. Res. Pract. Inf. Technol.}, volume = {40}, number = {1}, pages = {55--68}, year = {2008}, url = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.1.55.pdf}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/WengLCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WengLCL08, author = {Jian Weng and Xiangxue Li and Kefei Chen and Shengli Liu}, title = {Identity-Based Parallel Key-Insulated Signature Without Random Oracles}, journal = {J. Inf. Sci. Eng.}, volume = {24}, number = {4}, pages = {1143--1157}, year = {2008}, url = {http://www.iis.sinica.edu.tw/page/jise/2008/200807\_09.html}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WengLCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/DengWLC08, author = {Robert H. Deng and Jian Weng and Shengli Liu and Kefei Chen}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {Chosen-Ciphertext Secure Proxy Re-encryption without Pairings}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {1--17}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_1}, doi = {10.1007/978-3-540-89641-8\_1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/DengWLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WengLCZQ08, author = {Jian Weng and Shengli Liu and Kefei Chen and Dong Zheng and Weidong Qiu}, editor = {Tal Malkin}, title = {Identity-Based Threshold Key-Insulated Encryption without Random Oracles}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {203--220}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_13}, doi = {10.1007/978-3-540-79263-5\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/WengLCZQ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WengDLCLW08, author = {Jian Weng and Robert H. Deng and Shengli Liu and Kefei Chen and Junzuo Lai and Xu An Wang}, title = {Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {509}, year = {2008}, url = {http://eprint.iacr.org/2008/509}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WengDLCLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/WengLC07, author = {Jian Weng and Shengli Liu and Kefei Chen}, title = {Pirate decoder for the broadcast encryption schemes from Crypto 2005}, journal = {Sci. China Ser. {F} Inf. Sci.}, volume = {50}, number = {3}, pages = {318--323}, year = {2007}, url = {https://doi.org/10.1007/s11432-007-0031-8}, doi = {10.1007/S11432-007-0031-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/WengLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaWZ07, author = {Changshe Ma and Jian Weng and Dong Zheng}, title = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2007}, url = {http://eprint.iacr.org/2007/019}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WengLCM06, author = {Jian Weng and Shengli Liu and Kefei Chen and Changshe Ma}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Identity-Based Key-Insulated Signature Without Random Oracles}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {470--480}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_50}, doi = {10.1007/978-3-540-74377-4\_50}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/WengLCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/WengLCL06, author = {Jian Weng and Shengli Liu and Kefei Chen and Xiangxue Li}, editor = {Helger Lipmaa and Moti Yung and Dongdai Lin}, title = {Identity-Based Key-Insulated Signature with Secure Key-Updates}, booktitle = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4318}, pages = {13--26}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11937807\_2}, doi = {10.1007/11937807\_2}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/WengLCL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/WengLCM06, author = {Jian Weng and Shengli Liu and Kefei Chen and Changshe Ma}, editor = {Rana Barua and Tanja Lange}, title = {Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {409--423}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_29}, doi = {10.1007/11941378\_29}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/WengLCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.