BibTeX records: Jian Weng 0001

download as .bib file

@article{DBLP:journals/iotj/LiYWCLCJ24,
  author       = {Tao Li and
                  Anjia Yang and
                  Jian Weng and
                  Min{-}Rong Chen and
                  Xizhao Luo and
                  Xiaohu Chen and
                  Changkun Jiang},
  title        = {Enabling Secure and Flexible Streaming Media With Blockchain Incentive},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {2},
  pages        = {1966--1980},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3305048},
  doi          = {10.1109/JIOT.2023.3305048},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiYWCLCJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenLYWCLL24,
  author       = {Yuan Chen and
                  Jia{-}Nan Liu and
                  Anjia Yang and
                  Jian Weng and
                  Min{-}Rong Chen and
                  Zilin Liu and
                  Ming Li},
  title        = {{PACDAM:} Privacy-Preserving and Adaptive Cross-Chain Digital Asset
                  Marketplace},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {8},
  pages        = {13424--13436},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3337859},
  doi          = {10.1109/JIOT.2023.3337859},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenLYWCLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhaoWXLW24,
  author       = {Feixiang Zhao and
                  Jian Weng and
                  Wenli Xie and
                  Ming Li and
                  Jiasi Weng},
  title        = {HRA-secure attribute-based threshold proxy re-encryption from lattices},
  journal      = {Inf. Sci.},
  volume       = {655},
  pages        = {119900},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2023.119900},
  doi          = {10.1016/J.INS.2023.119900},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhaoWXLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/ChenDLLWLT24,
  author       = {Xin Chen and
                  Xiaoling Deng and
                  Yubin Lan and
                  Yongbing Long and
                  Jian Weng and
                  Zhiquan Liu and
                  Qi Tian},
  title        = {Explanatory Object Part Aggregation for Zero-Shot Learning},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {46},
  number       = {2},
  pages        = {851--868},
  year         = {2024},
  url          = {https://doi.org/10.1109/TPAMI.2023.3325533},
  doi          = {10.1109/TPAMI.2023.3325533},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pami/ChenDLLWLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/XiaGZXWX24,
  author       = {Zhihua Xia and
                  Qi Gu and
                  Wenhao Zhou and
                  Lizhi Xiong and
                  Jian Weng and
                  Naixue Xiong},
  title        = {{STR:} Secure Computation on Additive Shares Using the Share-Transform-Reveal
                  Strategy},
  journal      = {{IEEE} Trans. Computers},
  volume       = {73},
  number       = {2},
  pages        = {340--352},
  year         = {2024},
  url          = {https://doi.org/10.1109/TC.2021.3073171},
  doi          = {10.1109/TC.2021.3073171},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/XiaGZXWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcsv/LinYLWW24,
  author       = {Shuyuan Lin and
                  Anjia Yang and
                  Taotao Lai and
                  Jian Weng and
                  Hanzi Wang},
  title        = {Multi-Motion Segmentation via Co-Attention-Induced Heterogeneous Model
                  Fitting},
  journal      = {{IEEE} Trans. Circuits Syst. Video Technol.},
  volume       = {34},
  number       = {3},
  pages        = {1786--1798},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSVT.2023.3298319},
  doi          = {10.1109/TCSVT.2023.3298319},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcsv/LinYLWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongWLLLCY24,
  author       = {Caiqin Dong and
                  Jian Weng and
                  Ming Li and
                  Jia{-}Nan Liu and
                  Zhiquan Liu and
                  Yudan Cheng and
                  Shui Yu},
  title        = {Privacy-Preserving and Byzantine-Robust Federated Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {889--904},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264697},
  doi          = {10.1109/TDSC.2023.3264697},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DongWLLLCY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YangWTLWZY24,
  author       = {Yaxi Yang and
                  Jian Weng and
                  Yao Tong and
                  Jia{-}Nan Liu and
                  Zhenghao Wu and
                  Leo Yu Zhang and
                  Anjia Yang},
  title        = {PriGenX: Privacy-Preserving Query With Anonymous Access Control for
                  Genomic Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {961--974},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3266292},
  doi          = {10.1109/TDSC.2023.3266292},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YangWTLWZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WengYDHWW24,
  author       = {Jia{-}Si Weng and
                  Shenglong Yao and
                  Yuefeng Du and
                  Junjie Huang and
                  Jian Weng and
                  Cong Wang},
  title        = {Proof of Unlearning: Definitions and Instantiation},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {3309--3323},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2024.3358993},
  doi          = {10.1109/TIFS.2024.3358993},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WengYDHWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhangLWL24,
  author       = {Yinyan Zhang and
                  Shuai Li and
                  Jian Weng and
                  Bolin Liao},
  title        = {{GNN} Model for Time-Varying Matrix Inversion With Robust Finite-Time
                  Convergence},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {1},
  pages        = {559--569},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3175899},
  doi          = {10.1109/TNNLS.2022.3175899},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhangLWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhangLJLTLWT24,
  author       = {Jia Zhang and
                  Yidong Lin and
                  Min Jiang and
                  Shaozi Li and
                  Yong Tang and
                  Jinyi Long and
                  Jian Weng and
                  Kay Chen Tan},
  title        = {Fast Multilabel Feature Selection via Global Relevance and Redundancy
                  Optimization},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {35},
  number       = {4},
  pages        = {5721--5734},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNNLS.2022.3208956},
  doi          = {10.1109/TNNLS.2022.3208956},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhangLJLTLWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/CaoWL24,
  author       = {Kun Cao and
                  Jian Weng and
                  Keqin Li},
  title        = {Reliability-Driven End-End-Edge Collaboration for Energy Minimization
                  in Large-Scale Cyber-Physical Systems},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {73},
  number       = {1},
  pages        = {230--244},
  year         = {2024},
  url          = {https://doi.org/10.1109/TR.2023.3297124},
  doi          = {10.1109/TR.2023.3297124},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/CaoWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-15430,
  author       = {Shuren Qi and
                  Yushu Zhang and
                  Chao Wang and
                  Zhihua Xia and
                  Jian Weng and
                  Xiaochun Cao},
  title        = {Hierarchical Invariance for Robust and Interpretable Vision Tasks
                  at Larger Scales},
  journal      = {CoRR},
  volume       = {abs/2402.15430},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.15430},
  doi          = {10.48550/ARXIV.2402.15430},
  eprinttype    = {arXiv},
  eprint       = {2402.15430},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-15430.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-00239,
  author       = {Qian Feng and
                  Zhihua Xia and
                  Zhifeng Xu and
                  Jiasi Weng and
                  Jian Weng},
  title        = {{OPAF:} Optimized Secure Two-Party Computation Protocols for Nonlinear
                  Activation Functions in Recurrent Neural Network},
  journal      = {CoRR},
  volume       = {abs/2403.00239},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.00239},
  doi          = {10.48550/ARXIV.2403.00239},
  eprinttype    = {arXiv},
  eprint       = {2403.00239},
  timestamp    = {Thu, 11 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-00239.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuCYWPW24,
  author       = {Tianrun Yu and
                  Chi Cheng and
                  Zilong Yang and
                  Yingchen Wang and
                  Yanbin Pan and
                  Jian Weng},
  title        = {Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis
                  of Number Theoretic Transform in Lattice-Based KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/070},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YuCYWPW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongYCHW24,
  author       = {Ling Song and
                  Qianqian Yang and
                  Yincen Chen and
                  Lei Hu and
                  Jian Weng},
  title        = {Probabilistic Extensions: {A} One-Step Framework for Finding Rectangle
                  Attacks and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/344},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SongYCHW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/asc/FengLLZWWH23,
  author       = {Qihua Feng and
                  Peiya Li and
                  Zhixun Lu and
                  Zhibo Zhou and
                  Yongdong Wu and
                  Jian Weng and
                  Feiran Huang},
  title        = {{DHAN:} Encrypted {JPEG} image retrieval via {DCT} histograms-based
                  attention networks},
  journal      = {Appl. Soft Comput.},
  volume       = {133},
  pages        = {109935},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.asoc.2022.109935},
  doi          = {10.1016/J.ASOC.2022.109935},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/FengLLZWWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/XieWTLYZ23,
  author       = {Wenli Xie and
                  Jian Weng and
                  Yao Tong and
                  Xiaojian Liang and
                  Lisha Yao and
                  Feixiang Zhao},
  title        = {Lattice-based autonomous path proxy re-encryption in the standard
                  model},
  journal      = {Sci. China Inf. Sci.},
  volume       = {66},
  number       = {10},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11432-022-3612-6},
  doi          = {10.1007/S11432-022-3612-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/XieWTLYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/JiangXG0Z23,
  author       = {Chengxi Jiang and
                  Shijie Xu and
                  Guanggang Geng and
                  Jian Weng and
                  Xinchang Zhang},
  title        = {Seq2Path: a sequence-to-path-based flow feature fusion approach for
                  encrypted traffic classification},
  journal      = {Clust. Comput.},
  volume       = {26},
  number       = {3},
  pages        = {1785--1800},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10586-022-03709-w},
  doi          = {10.1007/S10586-022-03709-W},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cluster/JiangXG0Z23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZGWLZ23,
  author       = {Jia{-}Cheng Huang and
                  Guo{-}Qiang Zeng and
                  Guang{-}Gang Geng and
                  Jian Weng and
                  Kang{-}Di Lu and
                  Yu Zhang},
  title        = {Differential evolution-based convolutional neural networks: An automatic
                  architecture design method for intrusion detection in industrial control
                  systems},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103310},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103310},
  doi          = {10.1016/J.COSE.2023.103310},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZGWLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaoWPC23,
  author       = {Jinzheng Cao and
                  Jian Weng and
                  Yanbin Pan and
                  Qingfeng Cheng},
  title        = {Generalized attack on {ECDSA:} known bits in arbitrary positions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3803--3823},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01269-7},
  doi          = {10.1007/S10623-023-01269-7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CaoWPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/LiHCWCL23,
  author       = {Long Li and
                  Jianbo Huang and
                  Liang Chang and
                  Jian Weng and
                  Jia Chen and
                  Jingjing Li},
  title        = {{DPPS:} {A} novel dual privacy-preserving scheme for enhancing query
                  privacy in continuous location-based services},
  journal      = {Frontiers Comput. Sci.},
  volume       = {17},
  number       = {5},
  pages        = {175814},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11704-022-2155-9},
  doi          = {10.1007/S11704-022-2155-9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/LiHCWCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ipr/GeFXTWL23,
  author       = {Sulong Ge and
                  Jianwei Fei and
                  Zhihua Xia and
                  Yao Tong and
                  Jian Weng and
                  Jia{-}Nan Liu},
  title        = {A screen-shooting resilient document image watermarking scheme using
                  deep neural network},
  journal      = {{IET} Image Process.},
  volume       = {17},
  number       = {2},
  pages        = {323--336},
  year         = {2023},
  url          = {https://doi.org/10.1049/ipr2.12653},
  doi          = {10.1049/IPR2.12653},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ipr/GeFXTWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YaoWYLWJH23,
  author       = {Lisha Yao and
                  Jian Weng and
                  Anjia Yang and
                  Xiaojian Liang and
                  Zhenghao Wu and
                  Zike Jiang and
                  Lin Hou},
  title        = {Scalable CCA-secure public-key authenticated encryption with keyword
                  search from ideal lattices in cloud computing},
  journal      = {Inf. Sci.},
  volume       = {624},
  pages        = {777--795},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2022.12.035},
  doi          = {10.1016/J.INS.2022.12.035},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/YaoWYLWJH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangLZWG23,
  author       = {Yinyan Zhang and
                  Shuai Li and
                  Xuefeng Zhou and
                  Jian Weng and
                  Guanggang Geng},
  title        = {Single-state distributed \emph{k}-winners-take-all neural network
                  model},
  journal      = {Inf. Sci.},
  volume       = {647},
  pages        = {119528},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119528},
  doi          = {10.1016/J.INS.2023.119528},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangLZWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/Li0W0LTWD23,
  author       = {Yuxian Li and
                  Jian Weng and
                  Wei Wu and
                  Ming Li and
                  Yingjiu Li and
                  Haoxin Tu and
                  Yongdong Wu and
                  Robert H. Deng},
  title        = {{PRI:} PCH-based privacy-preserving with reusability and interoperability
                  for enhancing blockchain scalability},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {180},
  pages        = {104721},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jpdc.2023.104721},
  doi          = {10.1016/J.JPDC.2023.104721},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/Li0W0LTWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/GeXFTWL23,
  author       = {Sulong Ge and
                  Zhihua Xia and
                  Jianwei Fei and
                  Yao Tong and
                  Jian Weng and
                  Ming Li},
  title        = {A robust document image watermarking scheme using deep neural network},
  journal      = {Multim. Tools Appl.},
  volume       = {82},
  number       = {25},
  pages        = {38589--38612},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11042-023-15048-y},
  doi          = {10.1007/S11042-023-15048-Y},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/GeXFTWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pr/WangCDFHCDYW23,
  author       = {Eric Ke Wang and
                  Zicong Chen and
                  Xilin Dang and
                  Xuan Fan and
                  Xuming Han and
                  Chien{-}Ming Chen and
                  Weiping Ding and
                  Siu{-}Ming Yiu and
                  Jian Weng},
  title        = {Uncovering Hidden Vulnerabilities in Convolutional Neural Networks
                  through Graph-based Adversarial Robustness Evaluation},
  journal      = {Pattern Recognit.},
  volume       = {143},
  pages        = {109745},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.patcog.2023.109745},
  doi          = {10.1016/J.PATCOG.2023.109745},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pr/WangCDFHCDYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spic/LiFHWL23,
  author       = {Guofeng Li and
                  Bingwen Feng and
                  Mingjin He and
                  Jian Weng and
                  Wei Lu},
  title        = {High-capacity coverless image steganographic scheme based on image
                  synthesis},
  journal      = {Signal Process. Image Commun.},
  volume       = {111},
  pages        = {116894},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.image.2022.116894},
  doi          = {10.1016/J.IMAGE.2022.116894},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spic/LiFHWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tbd/ZhangDDGWY23,
  author       = {Chunkai Zhang and
                  Quanjian Dai and
                  Zilin Du and
                  Wensheng Gan and
                  Jian Weng and
                  Philip S. Yu},
  title        = {{TUSQ:} Targeted High-Utility Sequence Querying},
  journal      = {{IEEE} Trans. Big Data},
  volume       = {9},
  number       = {2},
  pages        = {512--527},
  year         = {2023},
  url          = {https://doi.org/10.1109/TBDATA.2022.3175428},
  doi          = {10.1109/TBDATA.2022.3175428},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tbd/ZhangDDGWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YangTWYZZL23,
  author       = {Yaxi Yang and
                  Yao Tong and
                  Jian Weng and
                  Yufeng Yi and
                  Yandong Zheng and
                  Leo Yu Zhang and
                  Rongxing Lu},
  title        = {PriRanGe: Privacy-Preserving Range-Constrained Intersection Query
                  Over Genomic Data},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {2379--2391},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2022.3205700},
  doi          = {10.1109/TCC.2022.3205700},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YangTWYZZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YuTXLW23,
  author       = {Peipeng Yu and
                  Jian Tang and
                  Zhihua Xia and
                  Zhetao Li and
                  Jian Weng},
  title        = {A Privacy-Preserving {JPEG} Image Retrieval Scheme Using the Local
                  Markov Feature and Bag-of-Words Model in Cloud Computing},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {2885--2896},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2022.3233421},
  doi          = {10.1109/TCC.2022.3233421},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YuTXLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/LiuLLTMW23,
  author       = {Jiao Liu and
                  Xinghua Li and
                  Ximeng Liu and
                  Jiawei Tang and
                  Siqi Ma and
                  Jian Weng},
  title        = {A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based
                  Neural Combinatorial Optimization Network},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {4},
  pages        = {3381--3395},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3287552},
  doi          = {10.1109/TCC.2023.3287552},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/LiuLLTMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/LiLHGW23,
  author       = {Yiming Li and
                  Shengli Liu and
                  Shuai Han and
                  Dawu Gu and
                  Jian Weng},
  title        = {Simulatable verifiable random function from the {LWE} assumption},
  journal      = {Theor. Comput. Sci.},
  volume       = {957},
  pages        = {113826},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.tcs.2023.113826},
  doi          = {10.1016/J.TCS.2023.113826},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/LiLHGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/Zhang0023,
  author       = {Yinyan Zhang and
                  Shuai Li and
                  Jian Weng},
  title        = {Distributed k-Winners-Take-All Network: An Optimization Perspective},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {53},
  number       = {8},
  pages        = {5069--5081},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCYB.2022.3170236},
  doi          = {10.1109/TCYB.2022.3170236},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/Zhang0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongWLYLYM23,
  author       = {Caiqin Dong and
                  Jian Weng and
                  Jia{-}Nan Liu and
                  Anjia Yang and
                  Zhiquan Liu and
                  Yaxi Yang and
                  Jianfeng Ma},
  title        = {Maliciously Secure and Efficient Large-Scale Genome-Wide Association
                  Study With Multi-Party Computation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1243--1257},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3152498},
  doi          = {10.1109/TDSC.2022.3152498},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DongWLYLYM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWWWWLL23,
  author       = {Yongdong Wu and
                  Jian Weng and
                  Zhengxia Wang and
                  Kaimin Wei and
                  Jinming Wen and
                  Junzuo Lai and
                  Xin Li},
  title        = {Attacks and Countermeasures on Privacy-Preserving Biometric Authentication
                  Schemes},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1744--1755},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3162623},
  doi          = {10.1109/TDSC.2022.3162623},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuWWWWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaLDLWWP23,
  author       = {Chuan Ma and
                  Jun Li and
                  Ming Ding and
                  Bo Liu and
                  Kang Wei and
                  Jian Weng and
                  H. Vincent Poor},
  title        = {{RDP-GAN:} {A} R{\'{e}}nyi-Differential Privacy Based Generative
                  Adversarial Network},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4838--4852},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3233580},
  doi          = {10.1109/TDSC.2022.3233580},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaLDLWWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WengWTYLL23,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Gui Tang and
                  Anjia Yang and
                  Ming Li and
                  Jia{-}Nan Liu},
  title        = {pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network
                  Testing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2218--2233},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3262932},
  doi          = {10.1109/TIFS.2023.3262932},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WengWTYLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HuW0WLHZ23,
  author       = {Hongshuang Hu and
                  Yongdong Wu and
                  Jian Weng and
                  Kaimin Wei and
                  Zhiquan Liu and
                  Feiran Huang and
                  Yinyan Zhang},
  title        = {Attacks on Acceleration-Based Secure Device Pairing With Automatic
                  Visual Tracking},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {3991--4005},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3290495},
  doi          = {10.1109/TIFS.2023.3290495},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HuW0WLHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuYSHDW23,
  author       = {Xueqiao Liu and
                  Guomin Yang and
                  Willy Susilo and
                  Kai He and
                  Robert H. Deng and
                  Jian Weng},
  title        = {Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {4929--4943},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3301734},
  doi          = {10.1109/TIFS.2023.3301734},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuYSHDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuLWYW23,
  author       = {Axin Wu and
                  Weiqi Luo and
                  Jian Weng and
                  Anjia Yang and
                  Jinghang Wen},
  title        = {Fuzzy Identity-Based Matchmaking Encryption and Its Application},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5592--5607},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3310663},
  doi          = {10.1109/TIFS.2023.3310663},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WuLWYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/LiuZXFYW23,
  author       = {Xiang Liu and
                  Xueli Zhao and
                  Zhihua Xia and
                  Qian Feng and
                  Peipeng Yu and
                  Jian Weng},
  title        = {Secure Outsourced {SIFT:} Accurate and Efficient Privacy-Preserving
                  Image {SIFT} Feature Extraction},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {32},
  pages        = {4635--4648},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIP.2023.3295741},
  doi          = {10.1109/TIP.2023.3295741},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/LiuZXFYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkdd/HuangGWY23,
  author       = {Gengsen Huang and
                  Wensheng Gan and
                  Jian Weng and
                  Philip S. Yu},
  title        = {US-Rule: Discovering Utility-driven Sequential Rules},
  journal      = {{ACM} Trans. Knowl. Discov. Data},
  volume       = {17},
  number       = {1},
  pages        = {10:1--10:22},
  year         = {2023},
  url          = {https://doi.org/10.1145/3532613},
  doi          = {10.1145/3532613},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkdd/HuangGWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/TongLMLWD23,
  author       = {Qiuyun Tong and
                  Xinghua Li and
                  Yinbin Miao and
                  Ximeng Liu and
                  Jian Weng and
                  Robert H. Deng},
  title        = {Privacy-Preserving Boolean Range Query With Temporal Access Control
                  in Mobile Computing},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {5},
  pages        = {5159--5172},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2022.3152168},
  doi          = {10.1109/TKDE.2022.3152168},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/TongLMLWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/TongMWLCD23,
  author       = {Qiuyun Tong and
                  Yinbin Miao and
                  Jian Weng and
                  Ximeng Liu and
                  Kim{-}Kwang Raymond Choo and
                  Robert H. Deng},
  title        = {Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive
                  Security},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {5},
  pages        = {5386--5399},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2022.3152033},
  doi          = {10.1109/TKDE.2022.3152033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/TongMWLCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/RenLMDWMM23,
  author       = {Yanbing Ren and
                  Xinghua Li and
                  Yinbin Miao and
                  Robert H. Deng and
                  Jian Weng and
                  Siqi Ma and
                  Jianfeng Ma},
  title        = {DistPreserv: Maintaining User Distribution for Privacy-Preserving
                  Location-Based Services},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {22},
  number       = {6},
  pages        = {3287--3302},
  year         = {2023},
  url          = {https://doi.org/10.1109/TMC.2022.3141398},
  doi          = {10.1109/TMC.2022.3141398},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/RenLMDWMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ShiSYWHLZ23,
  author       = {Min Shi and
                  Jialin Shen and
                  Qingming Yi and
                  Jian Weng and
                  Zunkai Huang and
                  Aiwen Luo and
                  Yicong Zhou},
  title        = {LMFFNet: {A} Well-Balanced Lightweight Network for Fast and Accurate
                  Semantic Segmentation},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {34},
  number       = {6},
  pages        = {3205--3219},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNNLS.2022.3176493},
  doi          = {10.1109/TNNLS.2022.3176493},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/ShiSYWHLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ChenWDLLT23,
  author       = {Xin Chen and
                  Jian Weng and
                  Xiaoling Deng and
                  Weiqi Luo and
                  Yubin Lan and
                  Qi Tian},
  title        = {Feature Distillation in Deep Attention Network Against Adversarial
                  Examples},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {34},
  number       = {7},
  pages        = {3691--3705},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNNLS.2021.3113342},
  doi          = {10.1109/TNNLS.2021.3113342},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/ChenWDLLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ZhangZW23,
  author       = {Yinyan Zhang and
                  Jilian Zhang and
                  Jian Weng},
  title        = {Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient
                  Neural Network Approach},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {34},
  number       = {12},
  pages        = {10919--10929},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNNLS.2022.3171715},
  doi          = {10.1109/TNNLS.2022.3171715},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ZhangZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/LiTZMMWMC23,
  author       = {Xinghua Li and
                  Qiuyun Tong and
                  Jinwei Zhao and
                  Yinbin Miao and
                  Siqi Ma and
                  Jian Weng and
                  Jianfeng Ma and
                  Kim{-}Kwang Raymond Choo},
  title        = {{VRFMS:} Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted
                  Data},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {698--710},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2021.3140092},
  doi          = {10.1109/TSC.2021.3140092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/LiTZMMWMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ChenYWTHL23,
  author       = {Xiaohu Chen and
                  Anjia Yang and
                  Jian Weng and
                  Yao Tong and
                  Cheng Huang and
                  Tao Li},
  title        = {A Blockchain-Based Copyright Protection Scheme With Proactive Defense},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {2316--2329},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3246476},
  doi          = {10.1109/TSC.2023.3246476},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ChenYWTHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SunLWLL23,
  author       = {Heng Sun and
                  Weiyun Luo and
                  Jian Weng and
                  Zhiquan Liu and
                  Ming Li},
  title        = {ECQV-GDH-Based Group Key Exchange Protocol for {CAN} Bus},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {10},
  pages        = {12857--12872},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3277875},
  doi          = {10.1109/TVT.2023.3277875},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/SunLWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhangLWMLWD23,
  author       = {Zhan Zhang and
                  Xinghua Li and
                  Yunwei Wang and
                  Yinbin Miao and
                  Ximeng Liu and
                  Jian Weng and
                  Robert H. Deng},
  title        = {{TAGKA:} Threshold Authenticated Group Key Agreement Protocol Against
                  Member Disconnect for {UANET}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {11},
  pages        = {14987--15001},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3287487},
  doi          = {10.1109/TVT.2023.3287487},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhangLWMLWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/LiYWTP23,
  author       = {Tao Li and
                  Anjia Yang and
                  Jian Weng and
                  Yao Tong and
                  Qingfu Pei},
  title        = {Concurrent and efficient IoT data trading based on probabilistic micropayments},
  journal      = {Wirel. Networks},
  volume       = {29},
  number       = {2},
  pages        = {607--622},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11276-022-03161-z},
  doi          = {10.1007/S11276-022-03161-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/winet/LiYWTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YangWYDZZ23,
  author       = {Yaxi Yang and
                  Jian Weng and
                  Yufeng Yi and
                  Changyu Dong and
                  Leo Yu Zhang and
                  Jianying Zhou},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Predicate Private Set Intersection with Linear Complexity},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13906},
  pages        = {143--166},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33491-7\_6},
  doi          = {10.1007/978-3-031-33491-7\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/YangWYDZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ZengLHZWLWW23,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Linru Zhang and
                  Xiangning Wang and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang and
                  Jian Weng},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Non-interactive Zero-Knowledge Functional Proofs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14442},
  pages        = {236--268},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8733-7\_8},
  doi          = {10.1007/978-981-99-8733-7\_8},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ZengLHZWLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuLWQYW23,
  author       = {Yi Liu and
                  Junzuo Lai and
                  Qi Wang and
                  Xianrui Qin and
                  Anjia Yang and
                  Jian Weng},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Robust Publicly Verifiable Covert Security: Limited Information Leakage
                  and Guaranteed Correctness with Low Overhead},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14438},
  pages        = {272--301},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8721-4\_9},
  doi          = {10.1007/978-981-99-8721-4\_9},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuLWQYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiZHYMW23,
  author       = {Junzuo Lai and
                  Gongxian Zeng and
                  Zhengan Huang and
                  Siu Ming Yiu and
                  Xin Mu and
                  Jian Weng},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Asymmetric Group Message Franking: Definitions and Constructions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14008},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30589-4\_3},
  doi          = {10.1007/978-3-031-30589-4\_3},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiZHYMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/Dong0L0TYCH23,
  author       = {Caiqin Dong and
                  Jian Weng and
                  Jia{-}Nan Liu and
                  Yue Zhang and
                  Yao Tong and
                  Anjia Yang and
                  Yudan Cheng and
                  Shun Hu},
  title        = {Fusion: Efficient and Secure Inference Resilient to Malicious Servers},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/fusion-efficient-and-secure-inference-resilient-to-malicious-servers/},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/Dong0L0TYCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/LiuLG0HZT0023,
  author       = {Zitao Liu and
                  Qiongqiong Liu and
                  Teng Guo and
                  Jiahao Chen and
                  Shuyan Huang and
                  Xiangyu Zhao and
                  Jiliang Tang and
                  Weiqi Luo and
                  Jian Weng},
  editor       = {Alice Oh and
                  Tristan Naumann and
                  Amir Globerson and
                  Kate Saenko and
                  Moritz Hardt and
                  Sergey Levine},
  title        = {{XES3G5M:} {A} Knowledge Tracing Benchmark Dataset with Auxiliary
                  Information},
  booktitle    = {Advances in Neural Information Processing Systems 36: Annual Conference
                  on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans,
                  LA, USA, December 10 - 16, 2023},
  year         = {2023},
  url          = {http://papers.nips.cc/paper\_files/paper/2023/hash/67fc628f17c2ad53621fb961c6bafcaf-Abstract-Datasets\_and\_Benchmarks.html},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nips/LiuLG0HZT0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigir/HuangLZ0023,
  author       = {Shuyan Huang and
                  Zitao Liu and
                  Xiangyu Zhao and
                  Weiqi Luo and
                  Jian Weng},
  editor       = {Hsin{-}Hsi Chen and
                  Wei{-}Jou (Edward) Duh and
                  Hen{-}Hsen Huang and
                  Makoto P. Kato and
                  Josiane Mothe and
                  Barbara Poblete},
  title        = {Towards Robust Knowledge Tracing Models via k-Sparse Attention},
  booktitle    = {Proceedings of the 46th International {ACM} {SIGIR} Conference on
                  Research and Development in Information Retrieval, {SIGIR} 2023, Taipei,
                  Taiwan, July 23-27, 2023},
  pages        = {2441--2445},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3539618.3592073},
  doi          = {10.1145/3539618.3592073},
  timestamp    = {Tue, 30 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigir/HuangLZ0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vr/MaiHFTWG23,
  author       = {Zijun Mai and
                  Yidang He and
                  Jiana Feng and
                  Huawei Tu and
                  Jian Weng and
                  Boyu Gao},
  title        = {Behavioral Authentication with Head-Tilt Based Locomotion for Metaverse},
  booktitle    = {{IEEE} Conference on Virtual Reality and 3D User Interfaces Abstracts
                  and Workshops, {VR} Workshops 2023, Shanghai, China, March 25-29,
                  2023},
  pages        = {949--950},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/VRW58643.2023.00317},
  doi          = {10.1109/VRW58643.2023.00317},
  timestamp    = {Wed, 17 May 2023 10:03:34 +0200},
  biburl       = {https://dblp.org/rec/conf/vr/MaiHFTWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/0001L0H00023,
  author       = {Zitao Liu and
                  Qiongqiong Liu and
                  Jiahao Chen and
                  Shuyan Huang and
                  Boyu Gao and
                  Weiqi Luo and
                  Jian Weng},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Enhancing Deep Knowledge Tracing with Auxiliary Tasks},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {4178--4187},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583866},
  doi          = {10.1145/3543507.3583866},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/0001L0H00023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-07942,
  author       = {Zitao Liu and
                  Qiongqiong Liu and
                  Jiahao Chen and
                  Shuyan Huang and
                  Boyu Gao and
                  Weiqi Luo and
                  Jian Weng},
  title        = {Enhancing Deep Knowledge Tracing with Auxiliary Tasks},
  journal      = {CoRR},
  volume       = {abs/2302.07942},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.07942},
  doi          = {10.48550/ARXIV.2302.07942},
  eprinttype    = {arXiv},
  eprint       = {2302.07942},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-07942.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-12150,
  author       = {Xiaoguo Li and
                  Bowen Zhao and
                  Guomin Yang and
                  Tao Xiang and
                  Jian Weng and
                  Robert H. Deng},
  title        = {A Survey of Secure Computation Using Trusted Execution Environments},
  journal      = {CoRR},
  volume       = {abs/2302.12150},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.12150},
  doi          = {10.48550/ARXIV.2302.12150},
  eprinttype    = {arXiv},
  eprint       = {2302.12150},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-12150.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-09435,
  author       = {Tao Wang and
                  Yushu Zhang and
                  Shuren Qi and
                  Ruoyu Zhao and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Security and Privacy on Generative Data in {AIGC:} {A} Survey},
  journal      = {CoRR},
  volume       = {abs/2309.09435},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.09435},
  doi          = {10.48550/ARXIV.2309.09435},
  eprinttype    = {arXiv},
  eprint       = {2309.09435},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-09435.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-11039,
  author       = {Shiying Zhang and
                  Jun Li and
                  Long Shi and
                  Ming Ding and
                  Dinh C. Nguyen and
                  Wuzheng Tan and
                  Jian Weng and
                  Zhu Han},
  title        = {Federated Learning in Intelligent Transportation Systems: Recent Applications
                  and Open Problems},
  journal      = {CoRR},
  volume       = {abs/2309.11039},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.11039},
  doi          = {10.48550/ARXIV.2309.11039},
  eprinttype    = {arXiv},
  eprint       = {2309.11039},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-11039.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiZHYMW23,
  author       = {Junzuo Lai and
                  Gongxian Zeng and
                  Zhengan Huang and
                  Siu Ming Yiu and
                  Xin Mu and
                  Jian Weng},
  title        = {Asymmetric Group Message Franking: Definitions {\&} Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {332},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/332},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiZHYMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLWQYW23,
  author       = {Yi Liu and
                  Junzuo Lai and
                  Qi Wang and
                  Xianrui Qin and
                  Anjia Yang and
                  Jian Weng},
  title        = {Robust Publicly Verifiable Covert Security: Limited Information Leakage
                  and Guaranteed Correctness with Low Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1392},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1392},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLWQYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZengLHZWLWW23,
  author       = {Gongxian Zeng and
                  Junzuo Lai and
                  Zhengan Huang and
                  Linru Zhang and
                  Xiangning Wang and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang and
                  Jian Weng},
  title        = {Non-Interactive Zero-Knowledge Functional Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1759},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1759},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZengLHZWLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/LiuH022,
  author       = {Wei Liu and
                  Lein Harn and
                  Jian Weng},
  title        = {Lightweight key establishment with the assistance of mutually connected
                  sensors in wireless sensor networks (WSNs)},
  journal      = {{IET} Commun.},
  volume       = {16},
  number       = {1},
  pages        = {58--66},
  year         = {2022},
  url          = {https://doi.org/10.1049/cmu2.12312},
  doi          = {10.1049/CMU2.12312},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-com/LiuH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuWGMHSC22,
  author       = {Zhiquan Liu and
                  Jian Weng and
                  Jingjing Guo and
                  Jianfeng Ma and
                  Feiran Huang and
                  Heng Sun and
                  Yudan Cheng},
  title        = {{PPTM:} {A} Privacy-Preserving Trust Management Scheme for Emergency
                  Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {8},
  pages        = {5943--5956},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3060751},
  doi          = {10.1109/JIOT.2021.3060751},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuWGMHSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiWLLO22,
  author       = {Ming Li and
                  Jian Weng and
                  Jia{-}Nan Liu and
                  Xiaodong Lin and
                  Charlie Obimbo},
  title        = {Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable,
                  Privacy-Preserving, and Secure Realization},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {9},
  pages        = {7009--7024},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3116957},
  doi          = {10.1109/JIOT.2021.3116957},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiWLLO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/SongMWCLD22,
  author       = {Lin Song and
                  Yinbin Miao and
                  Jian Weng and
                  Kim{-}Kwang Raymond Choo and
                  Ximeng Liu and
                  Robert H. Deng},
  title        = {Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted
                  Internet of Things},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {15},
  pages        = {13598--13611},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3142933},
  doi          = {10.1109/JIOT.2022.3142933},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/SongMWCLD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/CaoCLTW22,
  author       = {Kun Cao and
                  Yangguang Cui and
                  Zhiquan Liu and
                  Wuzheng Tan and
                  Jian Weng},
  title        = {Edge Intelligent Joint Optimization for Lifetime and Latency in Large-Scale
                  Cyber-Physical Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {22},
  pages        = {22267--22279},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3102421},
  doi          = {10.1109/JIOT.2021.3102421},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/CaoCLTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenYTWWL22,
  author       = {Xiaohu Chen and
                  Anjia Yang and
                  Yao Tong and
                  Jian Weng and
                  Jiasi Weng and
                  Tao Li},
  title        = {A Multisignature-Based Secure and OBU-Friendly Emergency Reporting
                  Scheme in {VANET}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {22},
  pages        = {23130--23141},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2022.3184991},
  doi          = {10.1109/JIOT.2022.3184991},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenYTWWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XieWZ22,
  author       = {Congge Xie and
                  Jian Weng and
                  Dehua Zhou},
  title        = {Revocable identity-based fully homomorphic signature scheme with signing
                  key exposure resistance},
  journal      = {Inf. Sci.},
  volume       = {594},
  pages        = {249--263},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.02.027},
  doi          = {10.1016/J.INS.2022.02.027},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/XieWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiuWZHH22,
  author       = {Wei Liu and
                  Jian Weng and
                  Bingsheng Zhang and
                  Kai He and
                  Junjie Huang},
  title        = {Improvements on Non-Interactive Zero-Knowledge Proof Systems Related
                  to Quadratic Residuosity Languages},
  journal      = {Inf. Sci.},
  volume       = {613},
  pages        = {324--343},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.ins.2022.09.026},
  doi          = {10.1016/J.INS.2022.09.026},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LiuWZHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/LiWLWWLH22,
  author       = {Yuxian Li and
                  Jian Weng and
                  Ming Li and
                  Wei Wu and
                  Jiasi Weng and
                  Jia{-}Nan Liu and
                  Shun Hu},
  title        = {ZeroCross: {A} sidechain-based privacy-preserving Cross-chain solution
                  for Monero},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {169},
  pages        = {301--316},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jpdc.2022.07.008},
  doi          = {10.1016/J.JPDC.2022.07.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/LiWLWWLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YangDLWWZR22,
  author       = {Yang Yang and
                  Robert H. Deng and
                  Ximeng Liu and
                  Yongdong Wu and
                  Jian Weng and
                  Xianghan Zheng and
                  Chunming Rong},
  title        = {Privacy-Preserving Medical Treatment System Through Nondeterministic
                  Finite Automata},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {10},
  number       = {3},
  pages        = {2020--2037},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCC.2020.2999940},
  doi          = {10.1109/TCC.2020.2999940},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YangDLWWZR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ZhangLW22,
  author       = {Yinyan Zhang and
                  Shuai Li and
                  Jian Weng},
  title        = {Distributed Estimation of Algebraic Connectivity},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {5},
  pages        = {3047--3056},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3022653},
  doi          = {10.1109/TCYB.2020.3022653},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/ZhangLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/LuCZHWZ22,
  author       = {Wei Lu and
                  Junjia Chen and
                  Junhong Zhang and
                  Jiwu Huang and
                  Jian Weng and
                  Yicong Zhou},
  title        = {Secure Halftone Image Steganography Based on Feature Space and Layer
                  Embedding},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {6},
  pages        = {5001--5014},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3026047},
  doi          = {10.1109/TCYB.2020.3026047},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/LuCZHWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ZhangLW22a,
  author       = {Yinyan Zhang and
                  Shuai Li and
                  Jian Weng},
  title        = {Learning and Near-Optimal Control of Underactuated Surface Vessels
                  With Periodic Disturbances},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {8},
  pages        = {7453--7463},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3041368},
  doi          = {10.1109/TCYB.2020.3041368},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/ZhangLW22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChenLHWZ22,
  author       = {Bing Chen and
                  Wei Lu and
                  Jiwu Huang and
                  Jian Weng and
                  Yicong Zhou},
  title        = {Secret Sharing Based Reversible Data Hiding in Encrypted Images With
                  Multiple Data-Hiders},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {978--991},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3011923},
  doi          = {10.1109/TDSC.2020.3011923},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChenLHWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuLWYWLL22,
  author       = {Jia{-}Nan Liu and
                  Xizhao Luo and
                  Jian Weng and
                  Anjia Yang and
                  Xu An Wang and
                  Ming Li and
                  Xiaodong Lin},
  title        = {Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1518--1531},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3027579},
  doi          = {10.1109/TDSC.2020.3027579},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuLWYWLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WengWCHW22,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Chengjun Cai and
                  Hongwei Huang and
                  Cong Wang},
  title        = {Golden Grain: Building a Secure and Decentralized Model Marketplace
                  for MLaaS},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3149--3167},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3085988},
  doi          = {10.1109/TDSC.2021.3085988},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WengWCHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HuangLZWZY22,
  author       = {Hongwei Huang and
                  Weiqi Luo and
                  Guoqiang Zeng and
                  Jian Weng and
                  Yue Zhang and
                  Anjia Yang},
  title        = {{DAMIA:} Leveraging Domain Adaptation as a Defense Against Membership
                  Inference Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3183--3199},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3088480},
  doi          = {10.1109/TDSC.2021.3088480},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HuangLZWZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShaoWZWLWLY22,
  author       = {Zhijian Shao and
                  Jian Weng and
                  Yue Zhang and
                  Yongdong Wu and
                  Ming Li and
                  Jiasi Weng and
                  Weiqi Luo and
                  Shui Yu},
  title        = {Peripheral-Free Device Pairing by Randomly Switching Power},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {6},
  pages        = {4240--4254},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3125231},
  doi          = {10.1109/TDSC.2021.3125231},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShaoWZWLWLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuFXZW22,
  author       = {Peipeng Yu and
                  Jianwei Fei and
                  Zhihua Xia and
                  Zhili Zhou and
                  Jian Weng},
  title        = {Improving Generalization by Commonality Learning in Face Forgery Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {547--558},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3146781},
  doi          = {10.1109/TIFS.2022.3146781},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuFXZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RenLMLWCD22,
  author       = {Yanbing Ren and
                  Xinghua Li and
                  Yinbin Miao and
                  Bin Luo and
                  Jian Weng and
                  Kim{-}Kwang Raymond Choo and
                  Robert H. Deng},
  title        = {Towards Privacy-Preserving Spatial Distribution Crowdsensing: {A}
                  Game Theoretic Approach},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {804--818},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3152409},
  doi          = {10.1109/TIFS.2022.3152409},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/RenLMLWCD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuGJLW22,
  author       = {Shi{-}Jie Xu and
                  Guang{-}Gang Geng and
                  Xiao{-}Bo Jin and
                  Dongjie Liu and
                  Jian Weng},
  title        = {Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature
                  Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2166--2181},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3179955},
  doi          = {10.1109/TIFS.2022.3179955},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuGJLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/ZhangLMLWMW22,
  author       = {Xiaohan Zhang and
                  Xinghua Li and
                  Yinbin Miao and
                  Xizhao Luo and
                  Yunwei Wang and
                  Siqi Ma and
                  Jian Weng},
  title        = {A Data Trading Scheme With Efficient Data Usage Control for Industrial
                  IoT},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {7},
  pages        = {4456--4465},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3123312},
  doi          = {10.1109/TII.2021.3123312},
  timestamp    = {Sat, 20 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/ZhangLMLWMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/YangWYHS22,
  author       = {Anjia Yang and
                  Jian Weng and
                  Kan Yang and
                  Cheng Huang and
                  Xuemin Shen},
  title        = {Delegating Authentication to Edge: {A} Decentralized Authentication
                  Architecture for Vehicular Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {2},
  pages        = {1284--1298},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2020.3024000},
  doi          = {10.1109/TITS.2020.3024000},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/YangWYHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangLZLW22,
  author       = {Yunwei Wang and
                  Xinghua Li and
                  Xiaohan Zhang and
                  Ximeng Liu and
                  Jian Weng},
  title        = {{ARPLR:} An All-Round and Highly Privacy-Preserving Location-Based
                  Routing Scheme for VANETs},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {23},
  number       = {9},
  pages        = {16558--16575},
  year         = {2022},
  url          = {https://doi.org/10.1109/TITS.2021.3134686},
  doi          = {10.1109/TITS.2021.3134686},
  timestamp    = {Sat, 20 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WangLZLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/TongMCWLCD22,
  author       = {Qiuyun Tong and
                  Yinbin Miao and
                  Lei Chen and
                  Jian Weng and
                  Ximeng Liu and
                  Kim{-}Kwang Raymond Choo and
                  Robert H. Deng},
  title        = {{VFIRM:} Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner
                  Multi-User Settings},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {3606--3619},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2021.3083512},
  doi          = {10.1109/TSC.2021.3083512},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/TongMCWLCD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SunSWL22,
  author       = {Heng Sun and
                  Mengsi Sun and
                  Jian Weng and
                  Zhiquan Liu},
  title        = {Analysis of {ID} Sequences Similarity Using {DTW} in Intrusion Detection
                  for {CAN} Bus},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {10},
  pages        = {10426--10441},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3185111},
  doi          = {10.1109/TVT.2022.3185111},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/SunSWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LiZLWSYL22,
  author       = {Yongbiao Li and
                  Dehua Zhou and
                  Yanling Li and
                  Jian Weng and
                  Meng Sun and
                  Ye Yang and
                  Ming Li},
  title        = {Privacy-Preserving and Real-Time Detection of Vehicular Congestion
                  Using Multilayer Perceptron Approach for Internet of Vehicles},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {71},
  number       = {12},
  pages        = {12530--12542},
  year         = {2022},
  url          = {https://doi.org/10.1109/TVT.2022.3199407},
  doi          = {10.1109/TVT.2022.3199407},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/LiZLWSYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/CaoCW22,
  author       = {Jinzheng Cao and
                  Qingfeng Cheng and
                  Jian Weng},
  editor       = {Lejla Batina and
                  Joan Daemen},
  title        = {{EHNP} Strikes Back: Analyzing {SM2} Implementations},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2022: 13th International Conference
                  on Cryptology in Africa, {AFRICACRYPT} 2022, Fes, Morocco, July 18-20,
                  2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13503},
  pages        = {576--600},
  publisher    = {Springer Nature Switzerland},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17433-9\_25},
  doi          = {10.1007/978-3-031-17433-9\_25},
  timestamp    = {Sun, 10 Dec 2023 00:28:26 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/CaoCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenLWW22,
  author       = {Jie Chen and
                  Yu Li and
                  Jinming Wen and
                  Jian Weng},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Identity-Based Matchmaking Encryption from Standard Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {394--422},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_14},
  doi          = {10.1007/978-3-031-22969-5\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenLWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SongZYSZHW22,
  author       = {Ling Song and
                  Nana Zhang and
                  Qianqian Yang and
                  Danping Shi and
                  Jiahao Zhao and
                  Lei Hu and
                  Jian Weng},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for
                  Key Recovery},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13791},
  pages        = {410--440},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22963-3\_14},
  doi          = {10.1007/978-3-031-22963-3\_14},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SongZYSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HuangLHLW22,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Shuai Han and
                  Lin Lyu and
                  Jian Weng},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Anonymous Public Key Encryption Under Corruptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13793},
  pages        = {423--453},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22969-5\_15},
  doi          = {10.1007/978-3-031-22969-5\_15},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HuangLHLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cvpr/FeiDYSX022,
  author       = {Jianwei Fei and
                  Yunshu Dai and
                  Peipeng Yu and
                  Tianrun Shen and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Learning Second Order Local Anomaly for General Face Forgery Detection},
  booktitle    = {{IEEE/CVF} Conference on Computer Vision and Pattern Recognition,
                  {CVPR} 2022, New Orleans, LA, USA, June 18-24, 2022},
  pages        = {20238--20248},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CVPR52688.2022.01963},
  doi          = {10.1109/CVPR52688.2022.01963},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cvpr/FeiDYSX022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-09186,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Gui Tang and
                  Anjia Yang and
                  Ming Li and
                  Jia{-}Nan Liu},
  title        = {pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network
                  Testing},
  journal      = {CoRR},
  volume       = {abs/2201.09186},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.09186},
  eprinttype    = {arXiv},
  eprint       = {2201.09186},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-09186.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-13067,
  author       = {Sulong Ge and
                  Zhihua Xia and
                  Jianwei Fei and
                  Xingming Sun and
                  Jian Weng},
  title        = {A Robust Document Image Watermarking Scheme using Deep Neural Network},
  journal      = {CoRR},
  volume       = {abs/2202.13067},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.13067},
  eprinttype    = {arXiv},
  eprint       = {2202.13067},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-13067.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-05198,
  author       = {Sulong Ge and
                  Zhihua Xia and
                  Yao Tong and
                  Jian Weng and
                  Jia{-}Nan Liu},
  title        = {A Screen-Shooting Resilient Document Image Watermarking Scheme using
                  Deep Neural Network},
  journal      = {CoRR},
  volume       = {abs/2203.05198},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.05198},
  doi          = {10.48550/ARXIV.2203.05198},
  eprinttype    = {arXiv},
  eprint       = {2203.05198},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-05198.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-03040,
  author       = {Caiqin Dong and
                  Jian Weng and
                  Yao Tong and
                  Jia{-}Nan Liu and
                  Anjia Yang and
                  Yudan Cheng and
                  Shun Hu},
  title        = {Fusion: Efficient and Secure Inference Resilient to Malicious Server
                  and Curious Clients},
  journal      = {CoRR},
  volume       = {abs/2205.03040},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.03040},
  doi          = {10.48550/ARXIV.2205.03040},
  eprinttype    = {arXiv},
  eprint       = {2205.03040},
  timestamp    = {Wed, 11 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-03040.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-12587,
  author       = {Yong Xu and
                  Zhihua Xia and
                  Zichi Wang and
                  Xinpeng Zhang and
                  Jian Weng},
  title        = {Deniable Steganography},
  journal      = {CoRR},
  volume       = {abs/2205.12587},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.12587},
  doi          = {10.48550/ARXIV.2205.12587},
  eprinttype    = {arXiv},
  eprint       = {2205.12587},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-12587.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2206-04728,
  author       = {Wensheng Gan and
                  Gengsen Huang and
                  Jian Weng and
                  Tianlong Gu and
                  Philip S. Yu},
  title        = {Towards Target Sequential Rules},
  journal      = {CoRR},
  volume       = {abs/2206.04728},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2206.04728},
  doi          = {10.48550/ARXIV.2206.04728},
  eprinttype    = {arXiv},
  eprint       = {2206.04728},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2206-04728.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-15490,
  author       = {Jianwei Fei and
                  Yunshu Dai and
                  Peipeng Yu and
                  Tianrun Shen and
                  Zhihua Xia and
                  Jian Weng},
  title        = {Learning Second Order Local Anomaly for General Face Forgery Detection},
  journal      = {CoRR},
  volume       = {abs/2209.15490},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.15490},
  doi          = {10.48550/ARXIV.2209.15490},
  eprinttype    = {arXiv},
  eprint       = {2209.15490},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-15490.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-11334,
  author       = {Jiasi Weng and
                  Shenglong Yao and
                  Yuefeng Du and
                  Junjie Huang and
                  Jian Weng and
                  Cong Wang},
  title        = {Proof of Unlearning: Definitions and Instantiation},
  journal      = {CoRR},
  volume       = {abs/2210.11334},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.11334},
  doi          = {10.48550/ARXIV.2210.11334},
  eprinttype    = {arXiv},
  eprint       = {2210.11334},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-11334.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWLYLJ22,
  author       = {Axin Wu and
                  Jian Weng and
                  Weiqi Luo and
                  Anjia Yang and
                  Jia{-}Nan Liu and
                  Zike Jiang},
  title        = {Cross-Domain Identity-based Matchmaking Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {85},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/085},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWLYLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuYWLZL22,
  author       = {Zilin Liu and
                  Anjia Yang and
                  Jian Weng and
                  Tao Li and
                  Huang Zeng and
                  Xiaojian Liang},
  title        = {{GMHL:} Generalized Multi-Hop Locks for Privacy-Preserving Payment
                  Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {115},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/115},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuYWLZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YaoWW22,
  author       = {Lisha Yao and
                  Jian Weng and
                  Bimei Wang},
  title        = {Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {637},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/637},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YaoWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SongZYSZHW22,
  author       = {Ling Song and
                  Nana Zhang and
                  Qianqian Yang and
                  Danping Shi and
                  Jiahao Zhao and
                  Lei Hu and
                  Jian Weng},
  title        = {Optimizing Rectangle Attacks: {A} Unified and Generic Framework for
                  Key Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {723},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/723},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SongZYSZHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangL00022,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Shuai Han and
                  Lin Lyu and
                  Jian Weng},
  title        = {Anonymous Public Key Encryption under Corruptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1176},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1176},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangL00022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenLW022,
  author       = {Jie Chen and
                  Yu Li and
                  Jinming Wen and
                  Jian Weng},
  title        = {Identity-Based Matchmaking Encryption from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1246},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1246},
  timestamp    = {Wed, 31 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenLW022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CuiLGW21,
  author       = {Nan Cui and
                  Shengli Liu and
                  Dawu Gu and
                  Jian Weng},
  title        = {Robustly reusable fuzzy extractor with imperfect randomness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {1017--1059},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00843-1},
  doi          = {10.1007/S10623-021-00843-1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CuiLGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/LiuMWHWWL21,
  author       = {Zhiquan Liu and
                  Jianfeng Ma and
                  Jian Weng and
                  Feiran Huang and
                  Yongdong Wu and
                  Linfeng Wei and
                  Yuxian Li},
  title        = {{LPPTE:} {A} lightweight privacy-preserving trust evaluation scheme
                  for facilitating distributed data fusion in cooperative vehicular
                  safety applications},
  journal      = {Inf. Fusion},
  volume       = {73},
  pages        = {144--156},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.inffus.2021.03.003},
  doi          = {10.1016/J.INFFUS.2021.03.003},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/LiuMWHWWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inffus/LiZZDHWM021,
  author       = {Hailiang Li and
                  Bin Zhang and
                  Yu Zhang and
                  Xilin Dang and
                  Yuwei Han and
                  Linfeng Wei and
                  Yijun Mao and
                  Jian Weng},
  title        = {A defense method based on attention mechanism against traffic sign
                  adversarial samples},
  journal      = {Inf. Fusion},
  volume       = {76},
  pages        = {55--65},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.inffus.2021.05.005},
  doi          = {10.1016/J.INFFUS.2021.05.005},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inffus/LiZZDHWM021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuHWCMGW21,
  author       = {Zhiquan Liu and
                  Feiran Huang and
                  Jian Weng and
                  Kun Cao and
                  Yinbin Miao and
                  Jingjing Guo and
                  Yongdong Wu},
  title        = {{BTMPP:} Balancing Trust Management and Privacy Preservation for Emergency
                  Message Dissemination in Vehicular Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {7},
  pages        = {5386--5407},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2020.3037098},
  doi          = {10.1109/JIOT.2020.3037098},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuHWCMGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YangBHHLWMM21,
  author       = {Anjia Yang and
                  Dutliff Boshoff and
                  Qiao Hu and
                  Gerhard P. Hancke and
                  Xizhao Luo and
                  Jian Weng and
                  Keith Mayes and
                  Konstantinos Markantonakis},
  title        = {Privacy-Preserving Group Authentication for {RFID} Tags Using Bit-Collision
                  Patterns},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {14},
  pages        = {11607--11620},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3059047},
  doi          = {10.1109/JIOT.2021.3059047},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YangBHHLWMM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/Dai0Y0D21,
  author       = {Yingling Dai and
                  Jian Weng and
                  Anjia Yang and
                  Shui Yu and
                  Robert H. Deng},
  title        = {A Lightweight and Privacy-Preserving Answer Collection Scheme for
                  Mobile Crowdsourcing},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {15},
  number       = {8},
  pages        = {2827--2848},
  year         = {2021},
  url          = {https://doi.org/10.3837/tiis.2021.08.007},
  doi          = {10.3837/TIIS.2021.08.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/Dai0Y0D21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/CaoWCLWT21,
  author       = {Kun Cao and
                  Tongquan Wei and
                  Mingsong Chen and
                  Keqin Li and
                  Jian Weng and
                  Wuzheng Tan},
  title        = {Exploring reliable edge-cloud computing for service latency optimization
                  in sustainable cyber-physical systems},
  journal      = {Softw. Pract. Exp.},
  volume       = {51},
  number       = {11},
  pages        = {2225--2237},
  year         = {2021},
  url          = {https://doi.org/10.1002/spe.2942},
  doi          = {10.1002/SPE.2942},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/spe/CaoWCLWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/YangXWZW21,
  author       = {Anjia Yang and
                  Jia Xu and
                  Jian Weng and
                  Jianying Zhou and
                  Duncan S. Wong},
  title        = {Lightweight and Privacy-Preserving Delegatable Proofs of Storage with
                  Data Dynamics in Cloud Storage},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {9},
  number       = {1},
  pages        = {212--225},
  year         = {2021},
  url          = {https://doi.org/10.1109/TCC.2018.2851256},
  doi          = {10.1109/TCC.2018.2851256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/YangXWZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/CaiWYW21,
  author       = {Chengjun Cai and
                  Jian Weng and
                  Xingliang Yuan and
                  Cong Wang},
  title        = {Enabling Reliable Keyword Search in Encrypted Decentralized Storage
                  with Fairness},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {131--144},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2877332},
  doi          = {10.1109/TDSC.2018.2877332},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/CaiWYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/00250WHY00D21,
  author       = {Yue Zhang and
                  Jian Weng and
                  Jiasi Weng and
                  Lin Hou and
                  Anjia Yang and
                  Ming Li and
                  Yang Xiang and
                  Robert H. Deng},
  title        = {Looking Back! Using Early Versions of Android Apps as Attack Vectors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {652--666},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2914202},
  doi          = {10.1109/TDSC.2019.2914202},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/00250WHY00D21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/OuQLWJ21,
  author       = {Lu Ou and
                  Zheng Qin and
                  Shaolin Liao and
                  Jian Weng and
                  Xiaohua Jia},
  title        = {An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {4},
  pages        = {1528--1540},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.3031223},
  doi          = {10.1109/TDSC.2020.3031223},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/OuQLWJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangWLL21,
  author       = {Tao Wang and
                  Jian Weng and
                  Jay Ligatti and
                  Yao Liu},
  title        = {Far Proximity Identification in Wireless Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2403--2418},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2950925},
  doi          = {10.1109/TDSC.2019.2950925},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangWLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WengWZLZL21,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Jilian Zhang and
                  Ming Li and
                  Yue Zhang and
                  Weiqi Luo},
  title        = {DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based
                  Incentive},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2438--2455},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2952332},
  doi          = {10.1109/TDSC.2019.2952332},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WengWZLZL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HeLWW21,
  author       = {Hongliang He and
                  Xizhao Luo and
                  Jian Weng and
                  Kaimin Wei},
  title        = {Secure Transmission in Multiple Access Wiretap Channel: Cooperative
                  Jamming Without Sharing {CSI}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {3401--3411},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3080499},
  doi          = {10.1109/TIFS.2021.3080499},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HeLWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YangGWWPD21,
  author       = {Yang Yang and
                  Zhangshuang Guan and
                  Zhiguo Wan and
                  Jian Weng and
                  HweeHwa Pang and
                  Robert H. Deng},
  title        = {PriScore: Blockchain-Based Self-Tallying Election System Supporting
                  Score Voting},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {4705--4720},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3108494},
  doi          = {10.1109/TIFS.2021.3108494},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YangGWWPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/LuZLWLW21,
  author       = {Kang{-}Di Lu and
                  Guo{-}Qiang Zeng and
                  Xizhao Luo and
                  Jian Weng and
                  Weiqi Luo and
                  Yongdong Wu},
  title        = {Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial
                  Automation and Control System},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {17},
  number       = {11},
  pages        = {7618--7627},
  year         = {2021},
  url          = {https://doi.org/10.1109/TII.2021.3053304},
  doi          = {10.1109/TII.2021.3053304},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/LuZLWLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tip/ChenLWLLT21,
  author       = {Xin Chen and
                  Xizhao Luo and
                  Jian Weng and
                  Weiqi Luo and
                  Huiting Li and
                  Qi Tian},
  title        = {Multi-View Gait Image Generation for Cross-View Gait Recognition},
  journal      = {{IEEE} Trans. Image Process.},
  volume       = {30},
  pages        = {3041--3055},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIP.2021.3055936},
  doi          = {10.1109/TIP.2021.3055936},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tip/ChenLWLLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ChenWLX21,
  author       = {Hao Chen and
                  Jian Weng and
                  Weiqi Luo and
                  Liqing Xu},
  title        = {Long Optimal and Small-Defect {LRC} Codes With Unbounded Minimum Distances},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {67},
  number       = {5},
  pages        = {2786--2792},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIT.2021.3052749},
  doi          = {10.1109/TIT.2021.3052749},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/ChenWLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/HuangXW21,
  author       = {Feiran Huang and
                  Jie Xu and
                  Jian Weng},
  title        = {Multi-Task Travel Route Planning With a Flexible Deep Learning Framework},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {7},
  pages        = {3907--3918},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.2987645},
  doi          = {10.1109/TITS.2020.2987645},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/HuangXW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/Li0M0ZCG21,
  author       = {Hailiang Li and
                  Jian Weng and
                  Yijun Mao and
                  Yonghua Wang and
                  Yiju Zhan and
                  Qingling Cai and
                  Wanrong Gu},
  title        = {Adaptive Dropout Method Based on Biological Principles},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {32},
  number       = {9},
  pages        = {4267--4276},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNNLS.2021.3070895},
  doi          = {10.1109/TNNLS.2021.3070895},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnn/Li0M0ZCG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/XiaWTXW21,
  author       = {Zhihua Xia and
                  Lan Wang and
                  Jian Tang and
                  Neal N. Xiong and
                  Jian Weng},
  title        = {A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary
                  Pattern in Cloud Computing},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {1},
  pages        = {318--330},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3038218},
  doi          = {10.1109/TNSE.2020.3038218},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/XiaWTXW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/LiRYZLWL21,
  author       = {Xinghua Li and
                  Yanbing Ren and
                  Laurence T. Yang and
                  Ning Zhang and
                  Bin Luo and
                  Jian Weng and
                  Ximeng Liu},
  title        = {Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based
                  Services in Internet of Vehicles},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {3},
  pages        = {2073--2086},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3011607},
  doi          = {10.1109/TNSE.2020.3011607},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/LiRYZLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ChenCZW21,
  author       = {Jin{-}Hua Chen and
                  Min{-}Rong Chen and
                  Guo{-}Qiang Zeng and
                  Jian Weng},
  title        = {{BDFL:} {A} Byzantine-Fault-Tolerance Decentralized Federated Learning
                  Method for Autonomous Vehicle},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {9},
  pages        = {8639--8652},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3102121},
  doi          = {10.1109/TVT.2021.3102121},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ChenCZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SunCWLG21,
  author       = {Heng Sun and
                  Miaomiao Chen and
                  Jian Weng and
                  Zhiquan Liu and
                  Guanggang Geng},
  title        = {Anomaly Detection for In-Vehicle Network Using {CNN-LSTM} With Attention
                  Mechanism},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {10},
  pages        = {10880--10893},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3106940},
  doi          = {10.1109/TVT.2021.3106940},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/SunCWLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/MengWMCSWL21,
  author       = {Qian Meng and
                  Jian Weng and
                  Yinbin Miao and
                  Kefei Chen and
                  Zhonghua Shen and
                  Fuqun Wang and
                  Zhijun Li},
  title        = {Verifiable Spatial Range Query Over Encrypted Cloud Data in {VANET}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {12},
  pages        = {12342--12357},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3120089},
  doi          = {10.1109/TVT.2021.3120089},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/MengWMCSWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LaiYHW21,
  author       = {Junzuo Lai and
                  Rupeng Yang and
                  Zhengan Huang and
                  Jian Weng},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {456--482},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_16},
  doi          = {10.1007/978-3-030-92075-3\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LaiYHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NingHPYL0D21,
  author       = {Jianting Ning and
                  Xinyi Huang and
                  Geong Sen Poh and
                  Jiaming Yuan and
                  Yingjiu Li and
                  Jian Weng and
                  Robert H. Deng},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {{LEAP:} Leakage-Abuse Attack on Efficiently Deployable, Efficiently
                  Searchable Encryption with Partially Known Dataset},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2307--2320},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484540},
  doi          = {10.1145/3460120.3484540},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NingHPYL0D21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ShenWGW21,
  author       = {Yaobin Shen and
                  Lei Wang and
                  Dawu Gu and
                  Jian Weng},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the
                  Multi-user Setting},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {309--336},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_11},
  doi          = {10.1007/978-3-030-84252-9\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ShenWGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiangWYYJW21,
  author       = {Xiaojian Liang and
                  Jian Weng and
                  Anjia Yang and
                  Lisha Yao and
                  Zike Jiang and
                  Zhenghao Wu},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Attribute-Based Conditional Proxy Re-encryption in the Standard Model
                  Under {LWE}},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12973},
  pages        = {147--168},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_8},
  doi          = {10.1007/978-3-030-88428-4\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LiangWYYJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WuWYYLJW21,
  author       = {Zhenghao Wu and
                  Jian Weng and
                  Anjia Yang and
                  Lisha Yao and
                  Xiaojian Liang and
                  Zike Jiang and
                  Jinghang Wen},
  editor       = {Debin Gao and
                  Qi Li and
                  Xiaohong Guan and
                  Xiaofeng Liao},
  title        = {Efficient and Fully Secure Lattice-Based {IBE} with Equality Test},
  booktitle    = {Information and Communications Security - 23rd International Conference,
                  {ICICS} 2021, Chongqing, China, November 19-21, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12919},
  pages        = {301--318},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88052-1\_18},
  doi          = {10.1007/978-3-030-88052-1\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/WuWYYLJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/Weng0HC021,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Hongwei Huang and
                  Chengjun Cai and
                  Cong Wang},
  title        = {FedServing: {A} Federated Prediction Serving Framework Based on Incentive
                  Mechanism},
  booktitle    = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021,
                  Vancouver, BC, Canada, May 10-13, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/INFOCOM42981.2021.9488807},
  doi          = {10.1109/INFOCOM42981.2021.9488807},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/Weng0HC021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-16615,
  author       = {Chunkai Zhang and
                  Zilin Du and
                  Quanjian Dai and
                  Wensheng Gan and
                  Jian Weng and
                  Philip S. Yu},
  title        = {{TUSQ:} Targeted High-Utility Sequence Querying},
  journal      = {CoRR},
  volume       = {abs/2103.16615},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.16615},
  eprinttype    = {arXiv},
  eprint       = {2103.16615},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-16615.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-00247,
  author       = {Chunkai Zhang and
                  Quanjian Dai and
                  Zilin Du and
                  Wensheng Gan and
                  Jian Weng and
                  Philip S. Yu},
  title        = {Utility-driven Mining of Contiguous Sequences},
  journal      = {CoRR},
  volume       = {abs/2111.00247},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.00247},
  eprinttype    = {arXiv},
  eprint       = {2111.00247},
  timestamp    = {Fri, 05 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-00247.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-15020,
  author       = {Gengsen Huang and
                  Wensheng Gan and
                  Jian Weng and
                  Philip S. Yu},
  title        = {US-Rule: Discovering Utility-driven Sequential Rules},
  journal      = {CoRR},
  volume       = {abs/2111.15020},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.15020},
  eprinttype    = {arXiv},
  eprint       = {2111.15020},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-15020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiangWYYJW21,
  author       = {Xiaojian Liang and
                  Jian Weng and
                  Anjia Yang and
                  Lisha Yao and
                  Zike Jiang and
                  Zhenghao Wu},
  title        = {Attribute-Based Conditional Proxy Re-Encryption in the Standard Model
                  under {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/613},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiangWYYJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWLWWLD21,
  author       = {Ming Li and
                  Jian Weng and
                  Yi Li and
                  Yongdong Wu and
                  Jiasi Weng and
                  Dingcheng Li and
                  Robert H. Deng},
  title        = {IvyCross: {A} Trustworthy and Privacy-preserving Framework for Blockchain
                  Interoperability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1244},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1244},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWLWWLD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiYHW21,
  author       = {Junzuo Lai and
                  Rupeng Yang and
                  Zhengan Huang and
                  Jian Weng},
  title        = {Simulation-Based Bi-Selective Opening Security for Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1268},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1268},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiYHW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/XieWLH20,
  author       = {Congge Xie and
                  Jian Weng and
                  Wei Lu and
                  Lin Hou},
  title        = {General construction of revocable identity-based fully homomorphic
                  signature},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-018-9706-0},
  doi          = {10.1007/S11432-018-9706-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/XieWLH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/YangWHY20,
  author       = {Wenjie Yang and
                  Jian Weng and
                  Xinyi Huang and
                  Anjia Yang},
  title        = {A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive
                  {KGC} Attacks},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {8},
  pages        = {1139--1147},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz122},
  doi          = {10.1093/COMJNL/BXZ122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/YangWHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhengXDCCWI20,
  author       = {Zibin Zheng and
                  Shaoan Xie and
                  Hong{-}Ning Dai and
                  Weili Chen and
                  Xiangping Chen and
                  Jian Weng and
                  Muhammad Imran},
  title        = {An overview on smart contracts: Challenges, advances and platforms},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {105},
  pages        = {475--491},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2019.12.019},
  doi          = {10.1016/J.FUTURE.2019.12.019},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhengXDCCWI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/WangWZ20a,
  author       = {Ruili Wang and
                  Jian Weng and
                  Xiaofeng Zhu},
  title        = {Deep understanding of big multimedia data},
  journal      = {Neurocomputing},
  volume       = {391},
  pages        = {189--190},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.neucom.2019.03.072},
  doi          = {10.1016/J.NEUCOM.2019.03.072},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/WangWZ20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiuWMGFJW20,
  author       = {Zhiquan Liu and
                  Jian Weng and
                  Jianfeng Ma and
                  Jingjing Guo and
                  Bingwen Feng and
                  Zhongyuan Jiang and
                  Kaimin Wei},
  title        = {{TCEMD:} {A} Trust Cascading-Based Emergency Message Dissemination
                  Model in VANETs},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {5},
  pages        = {4028--4048},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2957520},
  doi          = {10.1109/JIOT.2019.2957520},
  timestamp    = {Fri, 28 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiuWMGFJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiZRMLWMH20,
  author       = {Xinghua Li and
                  Huijuan Zhang and
                  Yanbing Ren and
                  Siqi Ma and
                  Bin Luo and
                  Jian Weng and
                  Jianfeng Ma and
                  Xiaoming Huang},
  title        = {{PAPU:} Pseudonym Swap With Provable Unlinkability Based on Differential
                  Privacy in VANETs},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {12},
  pages        = {11789--11802},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.3001381},
  doi          = {10.1109/JIOT.2020.3001381},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiZRMLWMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChenCWLW20,
  author       = {Huangke Chen and
                  Ran Cheng and
                  Jinming Wen and
                  Haifeng Li and
                  Jian Weng},
  title        = {Solving large-scale many-objective optimization problems by covariance
                  matrix adaptation evolution strategy with scalable small subpopulations},
  journal      = {Inf. Sci.},
  volume       = {509},
  pages        = {457--469},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2018.10.007},
  doi          = {10.1016/J.INS.2018.10.007},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenCWLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/CuiDQW20,
  author       = {Hui Cui and
                  Robert H. Deng and
                  Baodong Qin and
                  Jian Weng},
  title        = {Key regeneration-free ciphertext-policy attribute-based encryption
                  and its application},
  journal      = {Inf. Sci.},
  volume       = {517},
  pages        = {217--229},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.12.025},
  doi          = {10.1016/J.INS.2019.12.025},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/CuiDQW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/XieWWH20,
  author       = {Congge Xie and
                  Jian Weng and
                  Jiasi Weng and
                  Lin Hou},
  title        = {Scalable revocable identity-based signature over lattices in the standard
                  model},
  journal      = {Inf. Sci.},
  volume       = {518},
  pages        = {29--38},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.01.008},
  doi          = {10.1016/J.INS.2020.01.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/XieWWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qre/WangXW20,
  author       = {Chaonan Wang and
                  Liudong Xing and
                  Jian Weng},
  title        = {A new combinatorial model for deterministic competing failure analysis},
  journal      = {Qual. Reliab. Eng. Int.},
  volume       = {36},
  number       = {5},
  pages        = {1475--1493},
  year         = {2020},
  url          = {https://doi.org/10.1002/qre.2639},
  doi          = {10.1002/QRE.2639},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qre/WangXW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XieWW20,
  author       = {Congge Xie and
                  Jian Weng and
                  Jinming Wen},
  title        = {Scalable Revocable Identity-Based Signature Scheme with Signing Key
                  Exposure Resistance from Lattices},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {1743421:1--1743421:11},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/1743421},
  doi          = {10.1155/2020/1743421},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XieWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeGWWLY20,
  author       = {Kai He and
                  Jun Guo and
                  Jian Weng and
                  Jiasi Weng and
                  Joseph K. Liu and
                  Xun Yi},
  title        = {Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted
                  Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1207--1217},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2864186},
  doi          = {10.1109/TDSC.2018.2864186},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeGWWLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangZWWSR20,
  author       = {Leo Yu Zhang and
                  Yifeng Zheng and
                  Jian Weng and
                  Cong Wang and
                  Zihao Shan and
                  Kui Ren},
  title        = {You Can Access but You Cannot Leak: Defending Against Illegal Content
                  Redistribution in Encrypted Cloud Media Center},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {6},
  pages        = {1218--1231},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2018.2864748},
  doi          = {10.1109/TDSC.2018.2864748},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangZWWSR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangCWM20,
  author       = {Xu An Wang and
                  Kim{-}Kwang Raymond Choo and
                  Jian Weng and
                  Jianfeng Ma},
  title        = {Comments on "Publicly Verifiable Computation of Polynomials Over
                  Outsourced Data With Multiple Sources"},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {1586--1588},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2936971},
  doi          = {10.1109/TIFS.2019.2936971},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WangCWM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ChenHWX20,
  author       = {Hao Chen and
                  Xianmang He and
                  Jian Weng and
                  Liqing Xu},
  title        = {New Constructions of Subspace Codes Using Subsets of {MRD} Codes in
                  Several Blocks},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {66},
  number       = {9},
  pages        = {5317--5321},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIT.2020.2975776},
  doi          = {10.1109/TIT.2020.2975776},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ChenHWX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ChenWLLWXT20,
  author       = {Xin Chen and
                  Jian Weng and
                  Weiqi Luo and
                  Wei Lu and
                  Huimin Wu and
                  Jiaming Xu and
                  Qi Tian},
  title        = {Sample Balancing for Deep Learning-Based Visual Recognition},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {31},
  number       = {10},
  pages        = {3962--3976},
  year         = {2020},
  url          = {https://doi.org/10.1109/TNNLS.2019.2947789},
  doi          = {10.1109/TNNLS.2019.2947789},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ChenWLLWXT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/HuangWWL20,
  author       = {Feiran Huang and
                  Kaimin Wei and
                  Jian Weng and
                  Zhoujun Li},
  title        = {Attention-Based Modality-Gated Networks for Image-Text Sentiment Analysis},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {16},
  number       = {3},
  pages        = {79:1--79:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3388861},
  doi          = {10.1145/3388861},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tomccap/HuangWWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YangLDW20,
  author       = {Yang Yang and
                  Ximeng Liu and
                  Robert H. Deng and
                  Jian Weng},
  title        = {Flexible Wildcard Searchable Encryption System},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {464--477},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSC.2017.2714669},
  doi          = {10.1109/TSC.2017.2714669},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/YangLDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/LiuWYCL20,
  author       = {Jia{-}Nan Liu and
                  Jian Weng and
                  Anjia Yang and
                  Yizhao Chen and
                  Xiaodong Lin},
  title        = {Enabling Efficient and Privacy-Preserving Aggregation Communication
                  and Function Query for Fog Computing-Based Smart Grid},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {11},
  number       = {1},
  pages        = {247--257},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSG.2019.2920836},
  doi          = {10.1109/TSG.2019.2920836},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/LiuWYCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/LyuWWL20,
  author       = {Shanxiang Lyu and
                  Jinming Wen and
                  Jian Weng and
                  Cong Ling},
  title        = {On Low-Complexity Lattice Reduction Algorithms for Large-Scale {MIMO}
                  Detection: The Blessing of Sequential Reduction},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {68},
  pages        = {257--269},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSP.2019.2959194},
  doi          = {10.1109/TSP.2019.2959194},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/LyuWWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LuoLWGM20,
  author       = {Bin Luo and
                  Xinghua Li and
                  Jian Weng and
                  Jingjing Guo and
                  Jianfeng Ma},
  title        = {Blockchain Enabled Trust-Based Location Privacy Protection Scheme
                  in {VANET}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {2},
  pages        = {2034--2048},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2019.2957744},
  doi          = {10.1109/TVT.2019.2957744},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/LuoLWGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LuZLWZL20,
  author       = {Kang{-}Di Lu and
                  Guo{-}Qiang Zeng and
                  Xizhao Luo and
                  Jian Weng and
                  Yue Zhang and
                  Ming Li},
  title        = {An Adaptive Resilient Load Frequency Controller for Smart Grids With
                  DoS Attacks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {5},
  pages        = {4689--4699},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2983565},
  doi          = {10.1109/TVT.2020.2983565},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/LuZLWZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ChenWHZML20,
  author       = {Dunjin Chen and
                  Jian Weng and
                  Feiran Huang and
                  Jian Zhou and
                  Yijun Mao and
                  Xiaodong Liu},
  title        = {Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime
                  Localization and Mapping},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {10},
  pages        = {10642--10655},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.3019581},
  doi          = {10.1109/TVT.2020.3019581},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/ChenWHZML20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/LiuLG020,
  author       = {Xiangyu Liu and
                  Shengli Liu and
                  Dawu Gu and
                  Jian Weng},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Two-Pass Authenticated Key Exchange with Explicit Authentication and
                  Tight Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {785--814},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_27},
  doi          = {10.1007/978-3-030-64834-3\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/LiuLG020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NingHPXLWD20,
  author       = {Jianting Ning and
                  Xinyi Huang and
                  Geong Sen Poh and
                  Shengmin Xu and
                  Jia{-}Ch'ng Loh and
                  Jian Weng and
                  Robert H. Deng},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Pine: Enabling Privacy-Preserving Deep Packet Inspection on {TLS}
                  with Rule-Hiding and Fast Connection Establishment},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_1},
  doi          = {10.1007/978-3-030-58951-6\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/NingHPXLWD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/00250LPF20,
  author       = {Yue Zhang and
                  Jian Weng and
                  Zhen Ling and
                  Bryan Pearson and
                  Xinwen Fu},
  title        = {{BLESS:} {A} {BLE} Application Security Scanning Framework},
  booktitle    = {39th {IEEE} Conference on Computer Communications, {INFOCOM} 2020,
                  Toronto, ON, Canada, July 6-9, 2020},
  pages        = {636--645},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/INFOCOM41043.2020.9155473},
  doi          = {10.1109/INFOCOM41043.2020.9155473},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/00250LPF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/00250DJLF20,
  author       = {Yue Zhang and
                  Jian Weng and
                  Rajib Dey and
                  Yier Jin and
                  Zhiqiang Lin and
                  Xinwen Fu},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {37--54},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/zhang-yue},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/00250DJLF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vr/LuGL020,
  author       = {Yujun Lu and
                  Boyu Gao and
                  Jinyi Long and
                  Jian Weng},
  title        = {Hand Motion with Eyes-free Interaction for Authentication in Virtual
                  Reality},
  booktitle    = {2020 {IEEE} Conference on Virtual Reality and 3D User Interfaces Abstracts
                  and Workshops, {VR} Workshops, Atlanta, GA, USA, March 22-26, 2020},
  pages        = {715--716},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VRW50115.2020.00208},
  doi          = {10.1109/VRW50115.2020.00208},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vr/LuGL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-09624,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Yue Zhang and
                  Ming Li and
                  Zhaodi Wen},
  title        = {SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning
                  for Autonomous Vehicles},
  journal      = {CoRR},
  volume       = {abs/2001.09624},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.09624},
  eprinttype    = {arXiv},
  eprint       = {2001.09624},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-09624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-11288,
  author       = {Zhijian Shao and
                  Jian Weng and
                  Yue Zhang and
                  Yongdong Wu and
                  Ming Li and
                  Jiasi Weng and
                  Weiqi Luo and
                  Shui Yu},
  title        = {Peripheral-free Device Pairing by Randomly Switching Power},
  journal      = {CoRR},
  volume       = {abs/2002.11288},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.11288},
  eprinttype    = {arXiv},
  eprint       = {2002.11288},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-11288.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-08016,
  author       = {Hongwei Huang and
                  Weiqi Luo and
                  Guoqiang Zeng and
                  Jian Weng and
                  Yue Zhang and
                  Anjia Yang},
  title        = {{DAMIA:} Leveraging Domain Adaptation as a Defense against Membership
                  Inference Attacks},
  journal      = {CoRR},
  volume       = {abs/2005.08016},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.08016},
  eprinttype    = {arXiv},
  eprint       = {2005.08016},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-08016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-11688,
  author       = {Yang Yang and
                  Robert H. Deng and
                  Ximeng Liu and
                  Yongdong Wu and
                  Jian Weng and
                  Xianghan Zheng and
                  Chunming Rong},
  title        = {Privacy-preserving Medical Treatment System through Nondeterministic
                  Finite Automata},
  journal      = {CoRR},
  volume       = {abs/2005.11688},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.11688},
  eprinttype    = {arXiv},
  eprint       = {2005.11688},
  timestamp    = {Thu, 28 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-11688.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-02056,
  author       = {Chuan Ma and
                  Jun Li and
                  Ming Ding and
                  Bo Liu and
                  Kang Wei and
                  Jian Weng and
                  H. Vincent Poor},
  title        = {{RDP-GAN:} {A} R{\'{e}}nyi-Differential Privacy based Generative
                  Adversarial Network},
  journal      = {CoRR},
  volume       = {abs/2007.02056},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.02056},
  eprinttype    = {arXiv},
  eprint       = {2007.02056},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-02056.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-12416,
  author       = {Qi Gu and
                  Zhihua Xia and
                  Xingming Sun and
                  Jian Weng},
  title        = {{MSPPIR:} Multi-source privacy-preserving image retrieval in cloud
                  computing},
  journal      = {CoRR},
  volume       = {abs/2007.12416},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.12416},
  eprinttype    = {arXiv},
  eprint       = {2007.12416},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-12416.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-09944,
  author       = {Huimin Lao and
                  Hao Chen and
                  Jian Weng and
                  Xiaoqing Tan},
  title        = {Parameter-controlled inserting constructions of constant dimension
                  subspace codes},
  journal      = {CoRR},
  volume       = {abs/2008.09944},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.09944},
  eprinttype    = {arXiv},
  eprint       = {2008.09944},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-09944.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-05356,
  author       = {Lizhi Xiong and
                  Wenhao Zhou and
                  Zhihua Xia and
                  Qi Gu and
                  Jian Weng},
  title        = {Efficient Privacy-Preserving Computation Based on Additive Secret
                  Sharing},
  journal      = {CoRR},
  volume       = {abs/2009.05356},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.05356},
  eprinttype    = {arXiv},
  eprint       = {2009.05356},
  timestamp    = {Thu, 17 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-05356.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-06893,
  author       = {Zhihua Xia and
                  Qi Gu and
                  Lizhi Xiong and
                  Wenhao Zhou and
                  Jian Weng},
  title        = {Privacy-Preserving Image Retrieval Based on Additive Secret Sharing},
  journal      = {CoRR},
  volume       = {abs/2009.06893},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.06893},
  eprinttype    = {arXiv},
  eprint       = {2009.06893},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-06893.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2009-13153,
  author       = {Zhihua Xia and
                  Qi Gu and
                  Wenhao Zhou and
                  Lizhi Xiong and
                  Jian Weng},
  title        = {Secure Computation on Additive Shares},
  journal      = {CoRR},
  volume       = {abs/2009.13153},
  year         = {2020},
  url          = {https://arxiv.org/abs/2009.13153},
  eprinttype    = {arXiv},
  eprint       = {2009.13153},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2009-13153.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-06458,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Chengjun Cai and
                  Hongwei Huang and
                  Cong Wang},
  title        = {Golden Grain: Building a Secure and Decentralized Model Marketplace
                  for MLaaS},
  journal      = {CoRR},
  volume       = {abs/2011.06458},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.06458},
  eprinttype    = {arXiv},
  eprint       = {2011.06458},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-06458.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-10566,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Hongwei Huang and
                  Chengjun Cai and
                  Cong Wang},
  title        = {FedServing: {A} Federated Prediction Serving Framework Based on Incentive
                  Mechanism},
  journal      = {CoRR},
  volume       = {abs/2012.10566},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.10566},
  eprinttype    = {arXiv},
  eprint       = {2012.10566},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-10566.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0049WLLO20,
  author       = {Ming Li and
                  Jian Weng and
                  Jia{-}Nan Liu and
                  Xiaodong Lin and
                  Charlie Obimbo},
  title        = {{BB-VDF:} Enabling Accountability and Fine-grained Access Control
                  for Vehicular Digital Forensics through Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/011},
  timestamp    = {Thu, 23 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0049WLLO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FangUWYZ20,
  author       = {Junbin Fang and
                  Dominique Unruh and
                  Jian Weng and
                  Jun Yan and
                  Dehua Zhou},
  title        = {How to Base Security on the Perfect/Statistical Binding Property of
                  Quantum Bit Commitment?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/621},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FangUWYZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiuLGW20,
  author       = {Xiangyu Liu and
                  Shengli Liu and
                  Dawu Gu and
                  Jian Weng},
  title        = {Two-Pass Authenticated Key Exchange with Explicit Authentication and
                  Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1088},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiuLGW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShenWW20,
  author       = {Yaobin Shen and
                  Lei Wang and
                  Jian Weng},
  title        = {Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the
                  Multi-User Setting},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1523},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1523},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShenWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangHLCWLC19,
  author       = {Yang Yang and
                  Xindi Huang and
                  Ximeng Liu and
                  Hongju Cheng and
                  Jian Weng and
                  Xiangyang Luo and
                  Victor Chang},
  title        = {A Comprehensive Survey on Secure Outsourced Computation and Its Applications},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {159426--159465},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2949782},
  doi          = {10.1109/ACCESS.2019.2949782},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/YangHLCWLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenZLW19,
  author       = {Min{-}Rong Chen and
                  Guo{-}Qiang Zeng and
                  Kang{-}Di Lu and
                  Jian Weng},
  title        = {A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed
                  Prediction Based on ELM, ENN, and {LSTM}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {4},
  pages        = {6997--7010},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2913176},
  doi          = {10.1109/JIOT.2019.2913176},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenZLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangWMY19,
  author       = {Xu An Wang and
                  Jian Weng and
                  Jianfeng Ma and
                  Xiaoyuan Yang},
  title        = {Cryptanalysis of a public authentication protocol for outsourced databases
                  with multi-user modification},
  journal      = {Inf. Sci.},
  volume       = {488},
  pages        = {13--18},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.03.002},
  doi          = {10.1016/J.INS.2019.03.002},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangWMY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangLZWYCT19,
  author       = {Xiaoqian Zhang and
                  Weiqi Luo and
                  Guoqiang Zeng and
                  Jian Weng and
                  Yaxi Yang and
                  Min{-}Rong Chen and
                  Xiaoqing Tan},
  title        = {A hybrid universal blind quantum computation},
  journal      = {Inf. Sci.},
  volume       = {498},
  pages        = {135--143},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2019.05.057},
  doi          = {10.1016/J.INS.2019.05.057},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangLZWYCT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/AnadaYKWS19,
  author       = {Hiroaki Anada and
                  Takanori Yasuda and
                  Junpei Kawamoto and
                  Jian Weng and
                  Kouichi Sakurai},
  title        = {{RSA} public keys with inside structure: Proofs of key generation
                  and identities for web-of-trust},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {45},
  pages        = {10--19},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2018.12.006},
  doi          = {10.1016/J.JISA.2018.12.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/AnadaYKWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/DengLWZ19,
  author       = {Xuelian Deng and
                  Yuqing Li and
                  Jian Weng and
                  Jilian Zhang},
  title        = {Feature selection for text classification: {A} review},
  journal      = {Multim. Tools Appl.},
  volume       = {78},
  number       = {3},
  pages        = {3797--3816},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11042-018-6083-5},
  doi          = {10.1007/S11042-018-6083-5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/DengLWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/swevo/ZengXCW19,
  author       = {Guo{-}Qiang Zeng and
                  Xiao{-}Qing Xie and
                  Min{-}Rong Chen and
                  Jian Weng},
  title        = {Adaptive population extremal optimization-based {PID} neural network
                  for multivariable nonlinear control systems},
  journal      = {Swarm Evol. Comput.},
  volume       = {44},
  pages        = {320--334},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.swevo.2018.04.008},
  doi          = {10.1016/J.SWEVO.2018.04.008},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/swevo/ZengXCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WenWFGL19,
  author       = {Jinming Wen and
                  Jian Weng and
                  Yi Fang and
                  Haris Gacanin and
                  Weiqi Luo},
  title        = {Novel Properties of Successive Minima and Their Applications to 5G
                  Tactile Internet},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {15},
  number       = {5},
  pages        = {3068--3076},
  year         = {2019},
  url          = {https://doi.org/10.1109/TII.2019.2895089},
  doi          = {10.1109/TII.2019.2895089},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/WenWFGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YanZWWH019,
  author       = {Haode Yan and
                  Zhengchun Zhou and
                  Jian Weng and
                  Jinming Wen and
                  Tor Helleseth and
                  Qi Wang},
  title        = {Differential Spectrum of Kasami Power Permutations Over Odd Characteristic
                  Finite Fields},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {10},
  pages        = {6819--6826},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2019.2910070},
  doi          = {10.1109/TIT.2019.2910070},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/YanZWWH019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LiWYLZHLXD19,
  author       = {Ming Li and
                  Jian Weng and
                  Anjia Yang and
                  Wei Lu and
                  Yue Zhang and
                  Lin Hou and
                  Jia{-}Nan Liu and
                  Yang Xiang and
                  Robert H. Deng},
  title        = {CrowdBC: {A} Blockchain-Based Decentralized Framework for Crowdsourcing},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {30},
  number       = {6},
  pages        = {1251--1266},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPDS.2018.2881735},
  doi          = {10.1109/TPDS.2018.2881735},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/LiWYLZHLXD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/MiaoMLWLL19,
  author       = {Yinbin Miao and
                  Jianfeng Ma and
                  Ximeng Liu and
                  Jian Weng and
                  Hongwei Li and
                  Hui Li},
  title        = {Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {12},
  number       = {5},
  pages        = {772--785},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSC.2018.2823309},
  doi          = {10.1109/TSC.2018.2823309},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/MiaoMLWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WuCWWLQL19,
  author       = {Yongdong Wu and
                  Binbin Chen and
                  Jian Weng and
                  Zhuo Wei and
                  Xin Li and
                  Bo Qiu and
                  Niekie Liu},
  title        = {False Load Attack to Smart Meters by Synchronously Switching Power
                  Circuits},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {10},
  number       = {3},
  pages        = {2641--2649},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSG.2018.2806896},
  doi          = {10.1109/TSG.2018.2806896},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/WuCWWLQL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WengWZLL19,
  author       = {Jia{-}Si Weng and
                  Jian Weng and
                  Yue Zhang and
                  Weiqi Luo and
                  Weiming Lan},
  title        = {{BENBI:} Scalable and Dynamic Access Control on the Northbound Interface
                  of SDN-Based {VANET}},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {1},
  pages        = {822--831},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2018.2880238},
  doi          = {10.1109/TVT.2018.2880238},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/WengWZLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/YangWCNLS19,
  author       = {Anjia Yang and
                  Jian Weng and
                  Nan Cheng and
                  Jianbing Ni and
                  Xiaodong Lin and
                  Xuemin Shen},
  title        = {DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {5},
  pages        = {4834--4845},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2019.2905522},
  doi          = {10.1109/TVT.2019.2905522},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/YangWCNLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WenWTRZ19,
  author       = {Jinming Wen and
                  Jian Weng and
                  Chao Tong and
                  Chao Ren and
                  Zhengchun Zhou},
  title        = {Sparse Signal Recovery With Minimization of 1-Norm Minus 2-Norm},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {7},
  pages        = {6847--6854},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2019.2919612},
  doi          = {10.1109/TVT.2019.2919612},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WenWTRZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LiWYLL19,
  author       = {Ming Li and
                  Jian Weng and
                  Anjia Yang and
                  Jia{-}Nan Liu and
                  Xiaodong Lin},
  title        = {Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular
                  Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {11},
  pages        = {11248--11259},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2019.2940148},
  doi          = {10.1109/TVT.2019.2940148},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/LiWYLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/0001ZWGL19,
  author       = {Yu Yu and
                  Jiang Zhang and
                  Jian Weng and
                  Chun Guo and
                  Xiangxue Li},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Collision Resistant Hashing from Sub-exponential Learning Parity with
                  Noise},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_1},
  doi          = {10.1007/978-3-030-34621-8\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/0001ZWGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/WuWQWQD19,
  author       = {Yongdong Wu and
                  Jian Weng and
                  Bo Qiu and
                  Zhuo Wei and
                  Fan Qian and
                  Robert H. Deng},
  title        = {Random Delay Attack and Its Applications on Load Frequency Control
                  of Power Systems},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937611},
  doi          = {10.1109/DSC47296.2019.8937611},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/WuWQWQD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/WenCW19,
  author       = {Jinming Wen and
                  Xiao{-}Wen Chang and
                  Jian Weng},
  title        = {Improved Upper Bounds on the Hermite and {KZ} Constants},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {1742--1746},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849452},
  doi          = {10.1109/ISIT.2019.8849452},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isit/WenCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/ZhangCDGWZ19,
  author       = {Li Zhang and
                  Jiongyi Chen and
                  Wenrui Diao and
                  Shanqing Guo and
                  Jian Weng and
                  Kehuan Zhang},
  title        = {CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {151--164},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/zhang-li},
  timestamp    = {Wed, 10 Feb 2021 22:02:04 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/ZhangCDGWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/DiaoZZ0XPLWZ019,
  author       = {Wenrui Diao and
                  Yue Zhang and
                  Li Zhang and
                  Zhou Li and
                  Fenghao Xu and
                  Xiaorui Pan and
                  Xiangyu Liu and
                  Jian Weng and
                  Kehuan Zhang and
                  XiaoFeng Wang},
  title        = {Kindness is a Risky Business: On the Usage of the Accessibility APIs
                  in Android},
  booktitle    = {22nd International Symposium on Research in Attacks, Intrusions and
                  Defenses, {RAID} 2019, Chaoyang District, Beijing, China, September
                  23-25, 2019},
  pages        = {261--275},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/raid2019/presentation/diao},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/raid/DiaoZZ0XPLWZ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-09395,
  author       = {Jinming Wen and
                  Xiao{-}Wen Chang and
                  Jian Weng},
  title        = {Improved Upper Bounds on the Hermite and {KZ} Constants},
  journal      = {CoRR},
  volume       = {abs/1904.09395},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.09395},
  eprinttype    = {arXiv},
  eprint       = {1904.09395},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-09395.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-04342,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Jia{-}Nan Liu and
                  Yue Zhang},
  title        = {Secure Software-Defined Networking Based on Blockchain},
  journal      = {CoRR},
  volume       = {abs/1906.04342},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.04342},
  eprinttype    = {arXiv},
  eprint       = {1906.04342},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-04342.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-03804,
  author       = {Hao Chen and
                  Xianmang He and
                  Jian Weng and
                  Liqing Xu},
  title        = {New Constructions of Subspace Codes Using Subsets of {MRD} codes in
                  Several Blocks},
  journal      = {CoRR},
  volume       = {abs/1908.03804},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.03804},
  eprinttype    = {arXiv},
  eprint       = {1908.03804},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-03804.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1908-10497,
  author       = {Yue Zhang and
                  Jian Weng and
                  Rajib Dey and
                  Yier Jin and
                  Zhiqiang Lin and
                  Xinwen Fu},
  title        = {On the (In)security of Bluetooth Low Energy One-Way Secure Connections
                  Only Mode},
  journal      = {CoRR},
  volume       = {abs/1908.10497},
  year         = {2019},
  url          = {http://arxiv.org/abs/1908.10497},
  eprinttype    = {arXiv},
  eprint       = {1908.10497},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1908-10497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-03367,
  author       = {Yue Zhang and
                  Jian Weng and
                  Jiasi Weng and
                  Ming Li and
                  Weiqi Luo},
  title        = {Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based
                  Applications},
  journal      = {CoRR},
  volume       = {abs/1909.03367},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.03367},
  eprinttype    = {arXiv},
  eprint       = {1909.03367},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-03367.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-07267,
  author       = {Hao Chen and
                  Jian Weng and
                  Weiqi Luo},
  title        = {Long Optimal or Small-Defect {LRC} Codes with Unbounded Minimum Distances},
  journal      = {CoRR},
  volume       = {abs/1910.07267},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.07267},
  eprinttype    = {arXiv},
  eprint       = {1910.07267},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-07267.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-06278,
  author       = {Shanxiang Lyu and
                  Jinming Wen and
                  Jian Weng and
                  Cong Ling},
  title        = {On Low-complexity Lattice Reduction Algorithms for Large-scale {MIMO}
                  Detection: the Blessing of Sequential Reduction},
  journal      = {CoRR},
  volume       = {abs/1912.06278},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.06278},
  eprinttype    = {arXiv},
  eprint       = {1912.06278},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-06278.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-10370,
  author       = {Zibin Zheng and
                  Shaoan Xie and
                  Hong{-}Ning Dai and
                  Weili Chen and
                  Xiangping Chen and
                  Jian Weng and
                  Muhammad Imran},
  title        = {An Overview on Smart Contracts: Challenges, Advances and Platforms},
  journal      = {CoRR},
  volume       = {abs/1912.10370},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.10370},
  eprinttype    = {arXiv},
  eprint       = {1912.10370},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-10370.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/YangLLWY18,
  author       = {Wenjie Yang and
                  Weiqi Luo and
                  Xizhao Luo and
                  Jian Weng and
                  Anjia Yang},
  title        = {Fully distributed certificateless threshold signature without random
                  oracles},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {9},
  pages        = {098101:1--098101:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9244-9},
  doi          = {10.1007/S11432-017-9244-9},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/YangLLWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cloudcomp/QinW0018,
  author       = {Zhan Qin and
                  Jian Weng and
                  Yong Cui and
                  Kui Ren},
  title        = {Privacy-Preserving Image Processing in the Cloud},
  journal      = {{IEEE} Cloud Comput.},
  volume       = {5},
  number       = {2},
  pages        = {48--57},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCC.2018.022171667},
  doi          = {10.1109/MCC.2018.022171667},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cloudcomp/QinW0018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WeiWYYPXW18,
  author       = {Zhuo Wei and
                  Yongdong Wu and
                  Yanjiang Yang and
                  Zheng Yan and
                  Qingqi Pei and
                  Yajuan Xie and
                  Jian Weng},
  title        = {AutoPrivacy: Automatic privacy protection and tagging suggestion for
                  mobile social photo},
  journal      = {Comput. Secur.},
  volume       = {76},
  pages        = {341--353},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.12.002},
  doi          = {10.1016/J.COSE.2017.12.002},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WeiWYYPXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YangZWHWY18,
  author       = {Anjia Yang and
                  Yunhui Zhuang and
                  Jian Weng and
                  Gerhard P. Hancke and
                  Duncan S. Wong and
                  Guomin Yang},
  title        = {Exploring relationship between indistinguishability-based and unpredictability-based
                  {RFID} privacy models},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {82},
  pages        = {315--326},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.12.044},
  doi          = {10.1016/J.FUTURE.2017.12.044},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YangZWHWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YangWYXY18,
  author       = {Wenjie Yang and
                  Jian Weng and
                  Anjia Yang and
                  Congge Xie and
                  Yaxi Yang},
  title        = {Notes on a provably-secure certificate-based encryption against malicious
                  {CA} attacks},
  journal      = {Inf. Sci.},
  volume       = {463-464},
  pages        = {86--91},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.06.049},
  doi          = {10.1016/J.INS.2018.06.049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YangWYXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MiaoWLCLL18,
  author       = {Yinbin Miao and
                  Jian Weng and
                  Ximeng Liu and
                  Kim{-}Kwang Raymond Choo and
                  Zhiquan Liu and
                  Hongwei Li},
  title        = {Enabling verifiable multiple keywords search over encrypted cloud
                  data},
  journal      = {Inf. Sci.},
  volume       = {465},
  pages        = {21--37},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2018.06.066},
  doi          = {10.1016/J.INS.2018.06.066},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/MiaoWLCLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuWCL18,
  author       = {Huimin Wu and
                  Jian Weng and
                  Xin Chen and
                  Wei Lu},
  title        = {Feedback weight convolutional neural network for gait recognition},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {55},
  pages        = {424--432},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jvcir.2018.06.019},
  doi          = {10.1016/J.JVCIR.2018.06.019},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuWCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiLWML18,
  author       = {Jixian Li and
                  Wei Lu and
                  Jian Weng and
                  Yijun Mao and
                  Guoqiang Li},
  title        = {Double {JPEG} compression detection based on block statistics},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {24},
  pages        = {31895--31910},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-018-6175-2},
  doi          = {10.1007/S11042-018-6175-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mta/LiLWML18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ZhangWLLYLZL18,
  author       = {Jiajie Zhang and
                  Jian Weng and
                  Weiqi Luo and
                  Jia{-}Nan Liu and
                  Anjia Yang and
                  Jiancheng Lin and
                  Zhijun Zhang and
                  Hailiang Li},
  title        = {{REMT:} {A} Real-Time End-to-End Media Data Transmission Mechanism
                  in UAV-Aided Networks},
  journal      = {{IEEE} Netw.},
  volume       = {32},
  number       = {5},
  pages        = {118--123},
  year         = {2018},
  url          = {https://doi.org/10.1109/MNET.2018.1700382},
  doi          = {10.1109/MNET.2018.1700382},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/ZhangWLLYLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pami/ChenWLX18,
  author       = {Xin Chen and
                  Jian Weng and
                  Wei Lu and
                  Jiaming Xu},
  title        = {Multi-Gait Recognition Based on Attribute Discovery},
  journal      = {{IEEE} Trans. Pattern Anal. Mach. Intell.},
  volume       = {40},
  number       = {7},
  pages        = {1697--1710},
  year         = {2018},
  url          = {https://doi.org/10.1109/TPAMI.2017.2726061},
  doi          = {10.1109/TPAMI.2017.2726061},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pami/ChenWLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/prl/WangJLWWDGY18,
  author       = {Ruili Wang and
                  Wanting Ji and
                  Mingzhe Liu and
                  Xun Wang and
                  Jian Weng and
                  Song Deng and
                  Suying Gao and
                  Chang{-}an Yuan},
  title        = {Review on mining data from multiple data sources},
  journal      = {Pattern Recognit. Lett.},
  volume       = {109},
  pages        = {120--128},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.patrec.2018.01.013},
  doi          = {10.1016/J.PATREC.2018.01.013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/prl/WangJLWWDGY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangWLLTS18,
  author       = {Xiaoqian Zhang and
                  Jian Weng and
                  Xiaochun Li and
                  Weiqi Luo and
                  Xiaoqing Tan and
                  Tingting Song},
  title        = {Single-server blind quantum computation with quantum circuit model},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {6},
  pages        = {134},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-1901-2},
  doi          = {10.1007/S11128-018-1901-2},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangWLLTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/WuWY18,
  author       = {Xiaotian Wu and
                  Jian Weng and
                  WeiQi Yan},
  title        = {Adopting secret sharing for reversible data hiding in encrypted images},
  journal      = {Signal Process.},
  volume       = {143},
  pages        = {269--281},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.sigpro.2017.09.017},
  doi          = {10.1016/J.SIGPRO.2017.09.017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/WuWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/CaoWMWYS18,
  author       = {Yue Cao and
                  Kaimin Wei and
                  Geyong Min and
                  Jian Weng and
                  Xin Yang and
                  Zhili Sun},
  title        = {A Geographic Multicopy Routing Scheme for DTNs With Heterogeneous
                  Mobility},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {1},
  pages        = {790--801},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSYST.2016.2563519},
  doi          = {10.1109/JSYST.2016.2563519},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/CaoWMWYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tamd/YangLUFSWL18,
  author       = {Chun Yang and
                  Jinyi Long and
                  Mike A. Urbin and
                  Yanyun Feng and
                  Ge Song and
                  Jian Weng and
                  Zhijun Li},
  title        = {Real-Time Myocontrol of a Human-Computer Interface by Paretic Muscles
                  After Stroke},
  journal      = {{IEEE} Trans. Cogn. Dev. Syst.},
  volume       = {10},
  number       = {4},
  pages        = {1126--1132},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCDS.2018.2830388},
  doi          = {10.1109/TCDS.2018.2830388},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tamd/YangLUFSWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/ZhangZWMLX18,
  author       = {Zhijun Zhang and
                  Lunan Zheng and
                  Jian Weng and
                  Yijun Mao and
                  Wei Lu and
                  Lin Xiao},
  title        = {A New Varying-Parameter Recurrent Neural-Network for Online Solution
                  of Time-Varying Sylvester Equation},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {48},
  number       = {11},
  pages        = {3135--3148},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCYB.2017.2760883},
  doi          = {10.1109/TCYB.2017.2760883},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcyb/ZhangZWMLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuCDLW18,
  author       = {Ximeng Liu and
                  Kim{-}Kwang Raymond Choo and
                  Robert H. Deng and
                  Rongxing Lu and
                  Jian Weng},
  title        = {Efficient and Privacy-Preserving Outsourced Calculation of Rational
                  Numbers},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {27--39},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2536601},
  doi          = {10.1109/TDSC.2016.2536601},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuCDLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/DuWHW18,
  author       = {Minxin Du and
                  Qian Wang and
                  Meiqi He and
                  Jian Weng},
  title        = {Privacy-Preserving Indexing and Query Processing for Secure Dynamic
                  Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2320--2332},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2818651},
  doi          = {10.1109/TIFS.2018.2818651},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/DuWHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnn/ChenWLXW18,
  author       = {Xin Chen and
                  Jian Weng and
                  Wei Lu and
                  Jiaming Xu and
                  Jiasi Weng},
  title        = {Deep Manifold Learning Combined With Convolutional Neural Networks
                  for Action Recognition},
  journal      = {{IEEE} Trans. Neural Networks Learn. Syst.},
  volume       = {29},
  number       = {9},
  pages        = {3938--3952},
  year         = {2018},
  url          = {https://doi.org/10.1109/TNNLS.2017.2740318},
  doi          = {10.1109/TNNLS.2017.2740318},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnn/ChenWLXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/YuanWWR18,
  author       = {Xingliang Yuan and
                  Jian Weng and
                  Cong Wang and
                  Kui Ren},
  title        = {Secure Integrated Circuit Design via Hybrid Cloud},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {29},
  number       = {8},
  pages        = {1851--1864},
  year         = {2018},
  url          = {https://doi.org/10.1109/TPDS.2018.2807844},
  doi          = {10.1109/TPDS.2018.2807844},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/YuanWWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/WuWWLD18,
  author       = {Yongdong Wu and
                  Zhuo Wei and
                  Jian Weng and
                  Xin Li and
                  Robert H. Deng},
  title        = {Resonance Attacks on Load Frequency Control of Smart Grids},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {9},
  number       = {5},
  pages        = {4490--4502},
  year         = {2018},
  url          = {https://doi.org/10.1109/TSG.2017.2661307},
  doi          = {10.1109/TSG.2017.2661307},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsg/WuWWLD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/WuWWD18,
  author       = {Yongdong Wu and
                  Zhuo Wei and
                  Jian Weng and
                  Robert H. Deng},
  title        = {Position Manipulation Attacks to Balise-Based Train Automatic Stop
                  Control},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {67},
  number       = {6},
  pages        = {5287--5301},
  year         = {2018},
  url          = {https://doi.org/10.1109/TVT.2018.2802444},
  doi          = {10.1109/TVT.2018.2802444},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/WuWWD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/HuHCWL18,
  author       = {Shuang Hu and
                  Lin Hou and
                  Gongliang Chen and
                  Jian Weng and
                  Jianhua Li},
  editor       = {Henning Schulzrinne and
                  Pan Li},
  title        = {Reputation-based Distributed Knowledge Sharing System in Blockchain},
  booktitle    = {Proceedings of the 15th {EAI} International Conference on Mobile and
                  Ubiquitous Systems: Computing, Networking and Services, MobiQuitous
                  2018, 5-7 November 2018, New York City, NY, {USA}},
  pages        = {476--481},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3286978.3286981},
  doi          = {10.1145/3286978.3286981},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/HuHCWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tase/2018,
  editor       = {Jun Pang and
                  Chenyi Zhang and
                  Jifeng He and
                  Jian Weng},
  title        = {2018 International Symposium on Theoretical Aspects of Software Engineering,
                  {TASE} 2018, Guangzhou, China, August 29-31, 2018},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/8558619/proceeding},
  isbn         = {978-1-5386-7305-8},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tase/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengWLZL18,
  author       = {Jiasi Weng and
                  Jian Weng and
                  Ming Li and
                  Yue Zhang and
                  Weiqi Luo},
  title        = {DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based
                  Incentive},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/679},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WengWLZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WeiYWWD17,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Yongdong Wu and
                  Jian Weng and
                  Robert H. Deng},
  title        = {HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for
                  Automotive},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {16314--16323},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2737957},
  doi          = {10.1109/ACCESS.2017.2737957},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WeiYWWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WeiLWZZY17,
  author       = {Linfeng Wei and
                  Weiqi Luo and
                  Jian Weng and
                  Yanjun Zhong and
                  Xiaoqian Zhang and
                  Zheng Yan},
  title        = {Machine Learning-Based Malicious Application Detection of Android},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {25591--25601},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2771470},
  doi          = {10.1109/ACCESS.2017.2771470},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WeiLWZZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/YangLLW17,
  author       = {Fan Yang and
                  Jingwei Li and
                  Wei Lu and
                  Jian Weng},
  title        = {Copy-move forgery detection based on hybrid features},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {59},
  pages        = {73--83},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.engappai.2016.12.022},
  doi          = {10.1016/J.ENGAPPAI.2016.12.022},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eaai/YangLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/FengWLP17,
  author       = {Bingwen Feng and
                  Jian Weng and
                  Wei Lu and
                  Bei Pei},
  title        = {Steganalysis of content-adaptive binary image data hiding},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {46},
  pages        = {119--127},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jvcir.2017.01.008},
  doi          = {10.1016/J.JVCIR.2017.01.008},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/FengWLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mva/ChenXW17,
  author       = {Xin Chen and
                  Jiaming Xu and
                  Jian Weng},
  title        = {Multi-gait recognition using hypergraph partition},
  journal      = {Mach. Vis. Appl.},
  volume       = {28},
  number       = {1-2},
  pages        = {117--127},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00138-016-0810-6},
  doi          = {10.1007/S00138-016-0810-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mva/ChenXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ZhuZQWR17,
  author       = {Liehuang Zhu and
                  Zijian Zhang and
                  Zhan Qin and
                  Jian Weng and
                  Kui Ren},
  title        = {Privacy Protection Using a Rechargeable Battery for Energy Consumption
                  in Smart Grids},
  journal      = {{IEEE} Netw.},
  volume       = {31},
  number       = {1},
  pages        = {59--63},
  year         = {2017},
  url          = {https://doi.org/10.1109/MNET.2016.1500292NM},
  doi          = {10.1109/MNET.2016.1500292NM},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/ZhuZQWR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/puc/HeWMY17,
  author       = {Kai He and
                  Jian Weng and
                  Yijun Mao and
                  Huaqiang Yuan},
  title        = {Anonymous identity-based broadcast encryption technology for smart
                  city information system},
  journal      = {Pers. Ubiquitous Comput.},
  volume       = {21},
  number       = {5},
  pages        = {841--853},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00779-017-1053-x},
  doi          = {10.1007/S00779-017-1053-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/puc/HeWMY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ZhangWTL17,
  author       = {Xiaoqian Zhang and
                  Jian Weng and
                  Xiaoqing Tan and
                  Weiqi Luo},
  title        = {Indistinguishability of pure orthogonal product states by {LOCC}},
  journal      = {Quantum Inf. Process.},
  volume       = {16},
  number       = {7},
  pages        = {168},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11128-017-1616-9},
  doi          = {10.1007/S11128-017-1616-9},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ZhangWTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangWLY17,
  author       = {Wenjie Yang and
                  Jian Weng and
                  Weiqi Luo and
                  Anjia Yang},
  title        = {Strongly Unforgeable Certificateless Signature Resisting Attacks from
                  Malicious-But-Passive {KGC}},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {5704865:1--5704865:8},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/5704865},
  doi          = {10.1155/2017/5704865},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangWLY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/0001WHS17,
  author       = {Zhe Liu and
                  Jian Weng and
                  Zhi Hu and
                  Hwajeong Seo},
  title        = {Efficient Elliptic Curve Cryptography for Embedded Devices},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {16},
  number       = {2},
  pages        = {53:1--53:18},
  year         = {2017},
  url          = {https://doi.org/10.1145/2967103},
  doi          = {10.1145/2967103},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tecs/0001WHS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FuHRWW17,
  author       = {Zhangjie Fu and
                  Fengxiao Huang and
                  Kui Ren and
                  Jian Weng and
                  Cong Wang},
  title        = {Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs
                  Over Encrypted Outsourced Data},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1874--1884},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2692728},
  doi          = {10.1109/TIFS.2017.2692728},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/FuHRWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WuWTLD17,
  author       = {Yongdong Wu and
                  Jian Weng and
                  Zhe Tang and
                  Xin Li and
                  Robert H. Deng},
  title        = {Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train
                  Control Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {18},
  number       = {4},
  pages        = {814--823},
  year         = {2017},
  url          = {https://doi.org/10.1109/TITS.2016.2590579},
  doi          = {10.1109/TITS.2016.2590579},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/WuWTLD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ZhanLZYWLG017,
  author       = {Zhi{-}Hui Zhan and
                  Xiao Fang Liu and
                  Huaxiang Zhang and
                  Zhengtao Yu and
                  Jian Weng and
                  Yun Li and
                  Tianlong Gu and
                  Jun Zhang},
  title        = {Cloudde: {A} Heterogeneous Differential Evolution Algorithm and Its
                  Distributed Cloud Version},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {28},
  number       = {3},
  pages        = {704--716},
  year         = {2017},
  url          = {https://doi.org/10.1109/TPDS.2016.2597826},
  doi          = {10.1109/TPDS.2016.2597826},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/ZhanLZYWLG017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ZhangQZWR17,
  author       = {Zijian Zhang and
                  Zhan Qin and
                  Liehuang Zhu and
                  Jian Weng and
                  Kui Ren},
  title        = {Cost-Friendly Differential Privacy for Smart Meters: Exploiting the
                  Dual Roles of the Noise},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {8},
  number       = {2},
  pages        = {619--626},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSG.2016.2585963},
  doi          = {10.1109/TSG.2016.2585963},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/ZhangQZWR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeiHSJWLW17,
  author       = {Lingguang Lei and
                  Yi He and
                  Kun Sun and
                  Jiwu Jing and
                  Yuewu Wang and
                  Qi Li and
                  Jian Weng},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Vulnerable Implicit Service: {A} Revisit},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1051--1063},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133975},
  doi          = {10.1145/3133956.3133975},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LeiHSJWLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/ZhengLAW17,
  author       = {Qingji Zheng and
                  Qi Li and
                  Aytac Azgin and
                  Jian Weng},
  title        = {Data verification in information-centric networking with efficient
                  revocable certificateless signature},
  booktitle    = {2017 {IEEE} Conference on Communications and Network Security, {CNS}
                  2017, Las Vegas, NV, USA, October 9-11, 2017},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/CNS.2017.8228650},
  doi          = {10.1109/CNS.2017.8228650},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/ZhengLAW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/SunXQPWG17,
  author       = {Yuxia Sun and
                  Yunlong Xie and
                  Zhi Qiu and
                  Yuchang Pan and
                  Jian Weng and
                  Song Guo},
  title        = {Detecting Android Malware Based on Extreme Learning Machine},
  booktitle    = {15th {IEEE} Intl Conf on Dependable, Autonomic and Secure Computing,
                  15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf
                  on Big Data Intelligence and Computing and Cyber Science and Technology
                  Congress, DASC/PiCom/DataCom/CyberSciTech 2017, Orlando, FL, USA,
                  November 6-10, 2017},
  pages        = {47--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.24},
  doi          = {10.1109/DASC-PICOM-DATACOM-CYBERSCITEC.2017.24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/SunXQPWG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/YuanLFW17,
  author       = {Yafei Yuan and
                  Wei Lu and
                  Bingwen Feng and
                  Jian Weng},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Steganalysis with {CNN} Using Multi-channels Filtered Residuals},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10602},
  pages        = {110--120},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68505-2\_10},
  doi          = {10.1007/978-3-319-68505-2\_10},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/YuanLFW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ChenRPWWWSM17,
  author       = {Si Chen and
                  Kui Ren and
                  Sixu Piao and
                  Cong Wang and
                  Qian Wang and
                  Jian Weng and
                  Lu Su and
                  Aziz Mohaisen},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {You Can Hear But You Cannot Steal: Defending Against Voice Impersonation
                  Attacks on Smartphones},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {183--195},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.133},
  doi          = {10.1109/ICDCS.2017.133},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ChenRPWWWSM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangWZ17,
  author       = {Wenjie Yang and
                  Jian Weng and
                  Futai Zhang},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {New Certificateless Public Key Encryption Secure Against Malicious
                  {KGC} Attacks in the Standard Model},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {236--247},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_21},
  doi          = {10.1007/978-3-319-89500-0\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YangWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LuoYWY17,
  author       = {Song Luo and
                  Lu Yan and
                  Jian Weng and
                  Zheng Yang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {New Proof for {BKP} {IBE} Scheme and Improvement in the {MIMC} Setting},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {136--155},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_8},
  doi          = {10.1007/978-3-319-72359-4\_8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/LuoYWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WeiYYWWD17,
  author       = {Zhuo Wei and
                  Yanjiang Yang and
                  Rehana Yasmin and
                  Yongdong Wu and
                  Jian Weng and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving
                  (Short Paper)},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {638--647},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_39},
  doi          = {10.1007/978-3-319-72359-4\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WeiYYWWD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengWL17,
  author       = {Bingwen Feng and
                  Jian Weng and
                  Wei Lu},
  editor       = {Christian Kraetzer and
                  Yun{-}Qing Shi and
                  Jana Dittmann and
                  Hyoung Joong Kim},
  title        = {Improved Algorithms for Robust Histogram Shape-Based Image Watermarking},
  booktitle    = {Digital Forensics and Watermarking - 16th International Workshop,
                  {IWDW} 2017, Magdeburg, Germany, August 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10431},
  pages        = {275--289},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64185-0\_21},
  doi          = {10.1007/978-3-319-64185-0\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0021GW17,
  author       = {Jie Chen and
                  Junqing Gong and
                  Jian Weng},
  editor       = {Serge Fehr},
  title        = {Tightly Secure {IBE} Under Constant-Size Master Public Key},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {207--231},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_9},
  doi          = {10.1007/978-3-662-54365-8\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/0021GW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2016,
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59608-2},
  doi          = {10.1007/978-3-319-59608-2},
  isbn         = {978-3-319-59607-5},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiWYL17,
  author       = {Ming Li and
                  Jian Weng and
                  Anjia Yang and
                  Wei Lu},
  title        = {CrowdBC: {A} Blockchain-based Decentralized Framework for Crowdsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {444},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/444},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiWYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001ZWGL17,
  author       = {Yu Yu and
                  Jiang Zhang and
                  Jian Weng and
                  Chun Guo and
                  Xiangxue Li},
  title        = {Collision Resistant Hashing from Learning Parity with Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1260},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1260},
  timestamp    = {Thu, 04 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0001ZWGL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiuHWZC16,
  author       = {Sha Liu and
                  Shun Hu and
                  Jian Weng and
                  Shuhua Zhu and
                  Zhiyan Chen},
  title        = {A novel asymmetric three-party based authentication scheme in wearable
                  devices environment},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {60},
  pages        = {144--154},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jnca.2015.10.001},
  doi          = {10.1016/J.JNCA.2015.10.001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/LiuHWZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/ZhangLW16,
  author       = {Qingbo Zhang and
                  Wei Lu and
                  Jian Weng},
  title        = {Joint image splicing detection in {DCT} and Contourlet transform domain},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {40},
  pages        = {449--458},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jvcir.2016.07.013},
  doi          = {10.1016/J.JVCIR.2016.07.013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/ZhangLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jvcir/WuCW16,
  author       = {Xiaotian Wu and
                  Bing Chen and
                  Jian Weng},
  title        = {Reversible data hiding for encrypted signals by homomorphic encryption
                  and signal energy transfer},
  journal      = {J. Vis. Commun. Image Represent.},
  volume       = {41},
  pages        = {58--64},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jvcir.2016.09.005},
  doi          = {10.1016/J.JVCIR.2016.09.005},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jvcir/WuCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/YangZLWZC16,
  author       = {Yanjiang Yang and
                  Haiyan Zhu and
                  Haibing Lu and
                  Jian Weng and
                  Youcheng Zhang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cloud based data sharing with fine-grained proxy re-encryption},
  journal      = {Pervasive Mob. Comput.},
  volume       = {28},
  pages        = {122--134},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.pmcj.2015.06.017},
  doi          = {10.1016/J.PMCJ.2015.06.017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/YangZLWZC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/LiuW0YFJ16,
  author       = {Zheli Liu and
                  Jian Weng and
                  Jin Li and
                  Jun Yang and
                  Chuan Fu and
                  Chunfu Jia},
  title        = {Cloud-based electronic health record system supporting fuzzy keyword
                  search},
  journal      = {Soft Comput.},
  volume       = {20},
  number       = {8},
  pages        = {3243--3255},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00500-015-1699-0},
  doi          = {10.1007/S00500-015-1699-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/soco/LiuW0YFJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/00010WML16,
  author       = {Xiaofeng Chen and
                  Jin Li and
                  Jian Weng and
                  Jianfeng Ma and
                  Wenjing Lou},
  title        = {Verifiable Computation over Large Database with Incremental Updates},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {10},
  pages        = {3184--3195},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2015.2512870},
  doi          = {10.1109/TC.2015.2512870},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/00010WML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HeWDL16,
  author       = {Kai He and
                  Jian Weng and
                  Robert H. Deng and
                  Joseph K. Liu},
  title        = {On the security of two identity-based conditional proxy re-encryption
                  schemes},
  journal      = {Theor. Comput. Sci.},
  volume       = {652},
  pages        = {18--27},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.08.023},
  doi          = {10.1016/J.TCS.2016.08.023},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/HeWDL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MaoLMCW16,
  author       = {Xianping Mao and
                  Junzuo Lai and
                  Qixiang Mei and
                  Kefei Chen and
                  Jian Weng},
  title        = {Generic and Efficient Constructions of Attribute-Based Encryption
                  with Verifiable Outsourced Decryption},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {5},
  pages        = {533--546},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2015.2423669},
  doi          = {10.1109/TDSC.2015.2423669},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/MaoLMCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuDCW16,
  author       = {Ximeng Liu and
                  Robert H. Deng and
                  Kim{-}Kwang Raymond Choo and
                  Jian Weng},
  title        = {An Efficient Privacy-Preserving Outsourced Calculation Toolkit With
                  Multiple Keys},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2401--2414},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2573770},
  doi          = {10.1109/TIFS.2016.2573770},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuDCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/QinRYW16,
  author       = {Zhan Qin and
                  Kui Ren and
                  Ting Yu and
                  Jian Weng},
  title        = {DPcode: Privacy-Preserving Frequent Visual Patterns Publication on
                  Cloud},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {18},
  number       = {5},
  pages        = {929--939},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMM.2016.2535729},
  doi          = {10.1109/TMM.2016.2535729},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/QinRYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/YuanWWWR16,
  author       = {Xingliang Yuan and
                  Xinyu Wang and
                  Cong Wang and
                  Jian Weng and
                  Kui Ren},
  title        = {Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring
                  via Compressive Sensing},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {18},
  number       = {10},
  pages        = {2002--2014},
  year         = {2016},
  url          = {https://doi.org/10.1109/TMM.2016.2602758},
  doi          = {10.1109/TMM.2016.2602758},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmm/YuanWWWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HeWAMD16,
  author       = {Kai He and
                  Jian Weng and
                  Man Ho Au and
                  Yijun Mao and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext
                  Security},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_13},
  doi          = {10.1007/978-3-319-40367-0\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HeWAMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TangCGWWR16,
  author       = {Heyi Tang and
                  Yong Cui and
                  Chaowen Guan and
                  Jianping Wu and
                  Jian Weng and
                  Kui Ren},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Enabling Ciphertext Deduplication for Secure Cloud Storage and Access
                  Control},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {59--70},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897846},
  doi          = {10.1145/2897845.2897846},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TangCGWWR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLLWZZ16,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Joseph K. Liu and
                  Jian Weng and
                  Youcheng Zhang and
                  Jianying Zhou},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Credential Wrapping: From Anonymous Password Authentication to Anonymous
                  Biometric Authentication},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {141--151},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897854},
  doi          = {10.1145/2897845.2897854},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YangLLWZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HeWLLLD16,
  author       = {Kai He and
                  Jian Weng and
                  Jia{-}Nan Liu and
                  Joseph K. Liu and
                  Wei Liu and
                  Robert H. Deng},
  editor       = {Xiaofeng Chen and
                  XiaoFeng Wang and
                  Xinyi Huang},
  title        = {Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext
                  Security},
  booktitle    = {Proceedings of the 11th {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2016, Xi'an, China, May 30 - June 3, 2016},
  pages        = {247--255},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897845.2897879},
  doi          = {10.1145/2897845.2897879},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HeWLLLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/CaiWL16,
  author       = {Chengjun Cai and
                  Jian Weng and
                  Jia{-}Nan Liu},
  title        = {Mobile Authentication System Based on National Regulation and {NFC}
                  Technology},
  booktitle    = {{IEEE} First International Conference on Data Science in Cyberspace,
                  {DSC} 2016, Changsha, China, June 13-16, 2016},
  pages        = {590--595},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DSC.2016.116},
  doi          = {10.1109/DSC.2016.116},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsc/CaiWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdw/FengWLP16,
  author       = {Bingwen Feng and
                  Jian Weng and
                  Wei Lu and
                  Bei Pei},
  editor       = {Yun{-}Qing Shi and
                  Hyoung{-}Joong Kim and
                  Fernando P{\'{e}}rez{-}Gonz{\'{a}}lez and
                  Feng Liu},
  title        = {Multiple Watermarking Using Multilevel Quantization Index Modulation},
  booktitle    = {Digital Forensics and Watermarking - 15th International Workshop,
                  {IWDW} 2016, Beijing, China, September 17-19, 2016, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10082},
  pages        = {312--326},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53465-7\_23},
  doi          = {10.1007/978-3-319-53465-7\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwdw/FengWLP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HeWLZL16,
  author       = {Kai He and
                  Jian Weng and
                  Joseph K. Liu and
                  Wanlei Zhou and
                  Jia{-}Nan Liu},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Efficient Fine-Grained Access Control for Secure Personal Health Records
                  in Cloud Computing},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {65--79},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_5},
  doi          = {10.1007/978-3-319-46298-1\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/HeWLZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/LaiDMSW16,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Changshe Ma and
                  Kouichi Sakurai and
                  Jian Weng},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {CCA-Secure Keyed-Fully Homomorphic Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {70--98},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_4},
  doi          = {10.1007/978-3-662-49384-7\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/LaiDMSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/WuQWW16,
  author       = {Yongdong Wu and
                  Bo Qiu and
                  Zhuo Wei and
                  Jian Weng},
  title        = {Secure Subway Train-to-Train Communications via {GSM-R} Communication
                  Systems},
  booktitle    = {{IEEE} 83rd Vehicular Technology Conference, {VTC} Spring 2016, Nanjing,
                  China, May 15-18, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/VTCSpring.2016.7504465},
  doi          = {10.1109/VTCSPRING.2016.7504465},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/WuQWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CaoWMWYS16,
  author       = {Yue Cao and
                  Kaimin Wei and
                  Geyong Min and
                  Jian Weng and
                  Xin Yang and
                  Zhili Sun},
  title        = {A Geographic Multi-Copy Routing Scheme for DTNs With Heterogeneous
                  Mobility},
  journal      = {CoRR},
  volume       = {abs/1601.03555},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.03555},
  eprinttype    = {arXiv},
  eprint       = {1601.03555},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CaoWMWYS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WeiDWSOX15,
  author       = {Kaimin Wei and
                  Mianxiong Dong and
                  Jian Weng and
                  Guangzhou Shi and
                  Kaoru Ota and
                  Ke Xu},
  title        = {Congestion-aware message forwarding in delay tolerant networks: a
                  community perspective},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {27},
  number       = {18},
  pages        = {5722--5734},
  year         = {2015},
  url          = {https://doi.org/10.1002/cpe.3647},
  doi          = {10.1002/CPE.3647},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/WeiDWSOX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/LiXW15,
  author       = {Jin Li and
                  Fatos Xhafa and
                  Jian Weng},
  title        = {Emerging services and technologies in wireless networks},
  journal      = {J. High Speed Networks},
  volume       = {21},
  number       = {2},
  pages        = {81--82},
  year         = {2015},
  url          = {https://doi.org/10.3233/JHS-150511},
  doi          = {10.3233/JHS-150511},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jhsn/LiXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiQYWZ15,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Jian Weng and
                  Yuan Zhou},
  title        = {Signcryption KEM/tag-KEM, revisited},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {17},
  pages        = {3067--3082},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1232},
  doi          = {10.1002/SEC.1232},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiQYWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaoLCWM15,
  author       = {Xianping Mao and
                  Junzuo Lai and
                  Kefei Chen and
                  Jian Weng and
                  Qixiang Mei},
  title        = {Efficient revocable identity-based encryption from multilinear maps},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {3511--3522},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1274},
  doi          = {10.1002/SEC.1274},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaoLCWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YuLW15,
  author       = {Yu Yu and
                  Xiangxue Li and
                  Jian Weng},
  title        = {Pseudorandom generators from regular one-way functions: New constructions
                  with improved parameters},
  journal      = {Theor. Comput. Sci.},
  volume       = {569},
  pages        = {58--69},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2014.12.013},
  doi          = {10.1016/J.TCS.2014.12.013},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/YuLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/WengZDLYS15,
  author       = {Jian Weng and
                  Yunlei Zhao and
                  Robert H. Deng and
                  Shengli Liu and
                  Yanjiang Yang and
                  Kouichi Sakurai},
  title        = {A note on the security of {KHL} scheme},
  journal      = {Theor. Comput. Sci.},
  volume       = {602},
  pages        = {1--6},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.tcs.2015.07.051},
  doi          = {10.1016/J.TCS.2015.07.051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/WengZDLYS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/YuGLW15,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way
                  Functions and Beyond},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {209--229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_11},
  doi          = {10.1007/978-3-662-48000-7\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/YuGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/YanWLQ15,
  author       = {Jun Yan and
                  Jian Weng and
                  Dongdai Lin and
                  Yujuan Quan},
  editor       = {Khaled M. Elbassioni and
                  Kazuhisa Makino},
  title        = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge
                  Proof (Extended Abstract)},
  booktitle    = {Algorithms and Computation - 26th International Symposium, {ISAAC}
                  2015, Nagoya, Japan, December 9-11, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9472},
  pages        = {555--565},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48971-0\_47},
  doi          = {10.1007/978-3-662-48971-0\_47},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isaac/YanWLQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/YuGLW15,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs
                  from a Broader Class of One-Way Functions},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {7--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_2},
  doi          = {10.1007/978-3-662-46494-6\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/YuGLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiDLWZ15,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu and
                  Jian Weng and
                  Yunlei Zhao},
  title        = {Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext
                  Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {297},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/297},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiDLWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/ZhouWGDCC14,
  author       = {Dehua Zhou and
                  Jian Weng and
                  Chaowen Guan and
                  Robert H. Deng and
                  Min{-}Rong Chen and
                  Kefei Chen},
  title        = {Cryptanalysis of a signcryption scheme with fast online signing and
                  short signcryptext},
  journal      = {Sci. China Inf. Sci.},
  volume       = {57},
  number       = {7},
  pages        = {1--5},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11432-013-4983-6},
  doi          = {10.1007/S11432-013-4983-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/ZhouWGDCC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GuanWDCZ14,
  author       = {Chaowen Guan and
                  Jian Weng and
                  Robert H. Deng and
                  Min{-}Rong Chen and
                  Dehua Zhou},
  title        = {Unforgeability of an improved certificateless signature scheme in
                  the standard model},
  journal      = {{IET} Inf. Secur.},
  volume       = {8},
  number       = {5},
  pages        = {273--276},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0062},
  doi          = {10.1049/IET-IFS.2013.0062},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GuanWDCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LaiLDWGY14,
  author       = {Junzuo Lai and
                  Yingjiu Li and
                  Robert H. Deng and
                  Jian Weng and
                  Chaowen Guan and
                  Qiang Yan},
  title        = {Towards semantically secure outsourcing of association rule mining
                  on categorical data},
  journal      = {Inf. Sci.},
  volume       = {267},
  pages        = {267--286},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.01.040},
  doi          = {10.1016/J.INS.2014.01.040},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/LaiLDWGY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiQYWW14,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Jian Weng and
                  Ziping Wang},
  title        = {Robust password changing and DoS resilience for human-centric password
                  authentication},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {10},
  pages        = {1552--1559},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.768},
  doi          = {10.1002/SEC.768},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiQYWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LaiDLW14,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yingjiu Li and
                  Jian Weng},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Fully secure key-policy attribute-based encryption with constant-size
                  ciphertexts and fast decryption},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {239--248},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590334},
  doi          = {10.1145/2590296.2590334},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LaiDLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiYLQZW14,
  author       = {Xiangxue Li and
                  Yu Yu and
                  Qiang Li and
                  Haifeng Qian and
                  Yuan Zhou and
                  Jian Weng},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Arranging the Layout of Alphanumeric Buttons-the Role of
                  Passwords},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1457--1459},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662368},
  doi          = {10.1145/2660267.2662368},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiYLQZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiYLQZW14a,
  author       = {Xiangxue Li and
                  Yu Yu and
                  Qiang Li and
                  Haifeng Qian and
                  Yuan Zhou and
                  Jian Weng},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Using Chinese Characters for Authentication-Algorithmic
                  Framework and Empirical Results},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1460--1462},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662379},
  doi          = {10.1145/2660267.2662379},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiYLQZW14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/0001LWML14,
  author       = {Xiaofeng Chen and
                  Jin Li and
                  Jian Weng and
                  Jianfeng Ma and
                  Wenjing Lou},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Verifiable Computation over Large Database with Incremental Updates},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {148--162},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_9},
  doi          = {10.1007/978-3-319-11203-9\_9},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/0001LWML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LaiDPW14,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  HweeHwa Pang and
                  Jian Weng},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Verifiable Computation on Outsourced Encrypted Data},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {273--291},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_16},
  doi          = {10.1007/978-3-319-11203-9\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/LaiDPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ShiLLDW14,
  author       = {Jie Shi and
                  Junzuo Lai and
                  Yingjiu Li and
                  Robert H. Deng and
                  Jian Weng},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Authorized Keyword Search on Encrypted Data},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {419--435},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_24},
  doi          = {10.1007/978-3-319-11203-9\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ShiLLDW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiDLWZ14,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Shengli Liu and
                  Jian Weng and
                  Yunlei Zhao},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext
                  Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_5},
  doi          = {10.1007/978-3-642-55220-5\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiDLWZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/AnadaKWS14,
  author       = {Hiroaki Anada and
                  Junpei Kawamoto and
                  Jian Weng and
                  Kouichi Sakurai},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Identity-Embedding Method for Decentralized Public-Key Infrastructure},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_1},
  doi          = {10.1007/978-3-319-27998-5\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/intrust/AnadaKWS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangLWZS14,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Jian Weng and
                  Youcheng Zhang and
                  Kouichi Sakurai},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Fine-Grained Conditional Proxy Re-Encryption and Application},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {206--222},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_15},
  doi          = {10.1007/978-3-319-12475-9\_15},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/YangLWZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuGLW14,
  author       = {Yu Yu and
                  Dawu Gu and
                  Xiangxue Li and
                  Jian Weng},
  title        = {(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular
                  One-way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/393},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuGLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LinQWY14,
  author       = {Dongdai Lin and
                  Yujuan Quan and
                  Jian Weng and
                  Jun Yan},
  title        = {Quantum Bit Commitment with Application in Quantum Zero-Knowledge
                  Proof},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {791},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/791},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LinQWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiQWY13,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Jian Weng and
                  Yu Yu},
  title        = {Fully secure identity-based signcryption scheme with shorter signcryptext
                  in the standard model},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {3-4},
  pages        = {503--511},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.06.030},
  doi          = {10.1016/J.MCM.2012.06.030},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiQWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LaiDGW13,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Chaowen Guan and
                  Jian Weng},
  title        = {Attribute-Based Encryption With Verifiable Outsourced Decryption},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {8},
  pages        = {1343--1354},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2271848},
  doi          = {10.1109/TIFS.2013.2271848},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/LaiDGW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LiQYZW13,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Yuan Zhou and
                  Jian Weng},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Constructing Practical Signcryption {KEM} from Standard Assumptions
                  without Random Oracles},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {186--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_12},
  doi          = {10.1007/978-3-642-38980-1\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/LiQYZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YuLW13,
  author       = {Yu Yu and
                  Xiangxue Li and
                  Jian Weng},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Pseudorandom Generators from Regular One-Way Functions: New Constructions
                  with Improved Parameters},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_14},
  doi          = {10.1007/978-3-642-42045-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YuLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiuSWZZ13,
  author       = {Shengli Liu and
                  Kouichi Sakurai and
                  Jian Weng and
                  Fangguo Zhang and
                  Yunlei Zhao},
  editor       = {Dongdai Lin and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Security Model and Analysis of FHMQV, Revisited},
  booktitle    = {Information Security and Cryptology - 9th International Conference,
                  Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8567},
  pages        = {255--269},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-12087-4\_16},
  doi          = {10.1007/978-3-319-12087-4\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/LiuSWZZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LiuWZ13,
  author       = {Shengli Liu and
                  Jian Weng and
                  Yunlei Zhao},
  editor       = {Ed Dawson},
  title        = {Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen
                  Ciphertext Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {84--100},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_6},
  doi          = {10.1007/978-3-642-36095-4\_6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LiuWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/LaiDZW13,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yunlei Zhao and
                  Jian Weng},
  editor       = {Ed Dawson},
  title        = {Accountable Authority Identity-Based Encryption with Public Traceability},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {326--342},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_21},
  doi          = {10.1007/978-3-642-36095-4\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/LaiDZW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/ShiFWZ13,
  author       = {Jie Shi and
                  Ge Fu and
                  Jian Weng and
                  Hong Zhu},
  title        = {Analyzing and Controlling Information Inference of Fine-Grained Access
                  Control Policies in Relational Databases},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {385--392},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.72},
  doi          = {10.1109/EIDWT.2013.72},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/ShiFWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiQYWZ13,
  author       = {Xiangxue Li and
                  Haifeng Qian and
                  Yu Yu and
                  Jian Weng and
                  Yuan Zhou},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Direct Construction of Signcryption Tag-KEM from Standard Assumptions
                  in the Standard Model},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {167--184},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_13},
  doi          = {10.1007/978-3-319-02726-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/LiQYWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/YangDLWZ13,
  author       = {Yanjiang Yang and
                  Xuhua Ding and
                  Haibing Lu and
                  Jian Weng and
                  Jianying Zhou},
  editor       = {Yvo Desmedt},
  title        = {Self-blindable Credential: Towards Anonymous Entity Authentication
                  Upon Resource Constrained Devices},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {238--247},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_17},
  doi          = {10.1007/978-3-319-27659-5\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/YangDLWZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/LaiDYW13,
  author       = {Junzuo Lai and
                  Robert H. Deng and
                  Yanjiang Yang and
                  Jian Weng},
  editor       = {Zhenfu Cao and
                  Fangguo Zhang},
  title        = {Adaptable Ciphertext-Policy Attribute-Based Encryption},
  booktitle    = {Pairing-Based Cryptography - Pairing 2013 - 6th International Conference,
                  Beijing, China, November 22-24, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8365},
  pages        = {199--214},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04873-4\_12},
  doi          = {10.1007/978-3-319-04873-4\_12},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pairing/LaiDYW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2013a,
  editor       = {Changshe Ma and
                  Jian Weng},
  title        = {Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop
                  Proceedings, Guangzhou, China, November 27, 2013},
  series       = {Cryptology and Information Security Series},
  volume       = {11},
  publisher    = {{IOS} Press},
  year         = {2013},
  isbn         = {978-1-61499-327-8},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/2013a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangDLW13,
  author       = {Yanjiang Yang and
                  Xuhua Ding and
                  Haibing Lu and
                  Jian Weng},
  title        = {Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {207},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/207},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangDLW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/ChowMW12,
  author       = {Sherman S. M. Chow and
                  Changshe Ma and
                  Jian Weng},
  title        = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms},
  journal      = {Algorithmica},
  volume       = {64},
  number       = {2},
  pages        = {246--266},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00453-011-9593-3},
  doi          = {10.1007/S00453-011-9593-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/algorithmica/ChowMW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HanaokaKKMWZZ12,
  author       = {Goichiro Hanaoka and
                  Yutaka Kawai and
                  Noboru Kunihiro and
                  Takahiro Matsuda and
                  Jian Weng and
                  Rui Zhang and
                  Yunlei Zhao},
  editor       = {Orr Dunkelman},
  title        = {Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_22},
  doi          = {10.1007/978-3-642-27954-6\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HanaokaKKMWZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangLWDZ12,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Jian Weng and
                  Xuhua Ding and
                  Jianying Zhou},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {A Generic Approach for Providing Revocation Support in Secret Handshake},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {276--284},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_24},
  doi          = {10.1007/978-3-642-34129-8\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/YangLWDZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/WangWYY11,
  author       = {Xu An Wang and
                  Jian Weng and
                  Xiaoyuan Yang and
                  Yanjiang Yang},
  title        = {Cryptanalysis of an identity based broadcast encryption scheme without
                  random oracles},
  journal      = {Inf. Process. Lett.},
  volume       = {111},
  number       = {10},
  pages        = {461--464},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ipl.2011.02.007},
  doi          = {10.1016/J.IPL.2011.02.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/WangWYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WengYDCL11,
  author       = {Jian Weng and
                  Guoxiang Yao and
                  Robert H. Deng and
                  Min{-}Rong Chen and
                  Xiangxue Li},
  title        = {Cryptanalysis of a certificateless signcryption scheme in the standard
                  model},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {3},
  pages        = {661--667},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2010.09.037},
  doi          = {10.1016/J.INS.2010.09.037},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WengYDCL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WanWLLL11,
  author       = {Zhong{-}Mei Wan and
                  Jian Weng and
                  Xuejia Lai and
                  Shengli Liu and
                  Jiguo Li},
  title        = {On the Relation between Identity-Based Proxy Re-Encryption and Mediated
                  Identity-Based Encryption},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {27},
  number       = {1},
  pages        = {243--259},
  year         = {2011},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2011/201101\_16.html},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WanWLLL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WangWYZ11,
  author       = {Xu An Wang and
                  Jian Weng and
                  Xiaoyuan Yang and
                  Minqing Zhang},
  title        = {Cryptanalysis of an (hierarchical) identity based parallel key-insulated
                  encryption scheme},
  journal      = {J. Syst. Softw.},
  volume       = {84},
  number       = {2},
  pages        = {219--225},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.jss.2010.09.021},
  doi          = {10.1016/J.JSS.2010.09.021},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/WangWYZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/YangLW11,
  author       = {Yanjiang Yang and
                  Haibing Lu and
                  Jian Weng},
  editor       = {Costas Lambrinoudakis and
                  Panagiotis Rizomiliotis and
                  Tomasz Wiktor Wlodarczyk},
  title        = {Multi-User Private Keyword Search for Cloud Computing},
  booktitle    = {{IEEE} 3rd International Conference on Cloud Computing Technology
                  and Science, CloudCom 2011, Athens, Greece, November 29 - December
                  1, 2011},
  pages        = {264--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/CloudCom.2011.43},
  doi          = {10.1109/CLOUDCOM.2011.43},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/YangLW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/WengWHL11,
  author       = {Zhiwei Weng and
                  Jian Weng and
                  Kai He and
                  Yingkai Li},
  editor       = {De{-}Shuang Huang and
                  Yong Gan and
                  Phalguni Gupta and
                  M. Michael Gromiha},
  title        = {New Chosen Ciphertext Secure Public Key Encryption in the Standard
                  Model with Public Verifiability},
  booktitle    = {Advanced Intelligent Computing Theories and Applications. With Aspects
                  of Artificial Intelligence - 7th International Conference, {ICIC}
                  2011, Zhengzhou, China, August 11-14, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6839},
  pages        = {170--176},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25944-9\_22},
  doi          = {10.1007/978-3-642-25944-9\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icic/WengWHL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/WengZH11,
  author       = {Jian Weng and
                  Yunlei Zhao and
                  Goichiro Hanaoka},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {On the Security of a Bidirectional Proxy Re-encryption Scheme from
                  {PKC} 2010},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {284--295},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_18},
  doi          = {10.1007/978-3-642-19379-8\_18},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/WengZH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ispec/2011,
  editor       = {Feng Bao and
                  Jian Weng},
  title        = {Information Security Practice and Experience - 7th International Conference,
                  {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6672},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21031-0},
  doi          = {10.1007/978-3-642-21031-0},
  isbn         = {978-3-642-21030-3},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengZ11,
  author       = {Jian Weng and
                  Yunlei Zhao},
  title        = {Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated
                  Trust in Proxy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/208},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WengCYDCB10,
  author       = {Jian Weng and
                  Min{-}Rong Chen and
                  Yanjiang Yang and
                  Robert H. Deng and
                  Kefei Chen and
                  Feng Bao},
  title        = {CCA-secure unidirectional proxy re-encryption in the adaptive corruption
                  model without random oracles},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {3},
  pages        = {593--606},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-0047-3},
  doi          = {10.1007/S11432-010-0047-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WengCYDCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaWLD10,
  author       = {Changshe Ma and
                  Jian Weng and
                  Yingjiu Li and
                  Robert H. Deng},
  title        = {Efficient discrete logarithm based multi-signature scheme in the plain
                  public key model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {54},
  number       = {2},
  pages        = {121--133},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9313-z},
  doi          = {10.1007/S10623-009-9313-Z},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MaWLD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WengCCD10,
  author       = {Jian Weng and
                  Min{-}Rong Chen and
                  Kefei Chen and
                  Robert H. Deng},
  title        = {Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {4},
  pages        = {854--856},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.854},
  doi          = {10.1587/TRANSFUN.E93.A.854},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WengCCD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WengDLC10,
  author       = {Jian Weng and
                  Robert H. Deng and
                  Shengli Liu and
                  Kefei Chen},
  title        = {Chosen-ciphertext secure bidirectional proxy re-encryption schemes
                  without pairings},
  journal      = {Inf. Sci.},
  volume       = {180},
  number       = {24},
  pages        = {5077--5089},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.ins.2010.08.017},
  doi          = {10.1016/J.INS.2010.08.017},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WengDLC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/WanWL10,
  author       = {Zhong{-}Mei Wan and
                  Jian Weng and
                  Jiguo Li},
  title        = {Security Mediated Certificateless Signatures Without Pairing},
  journal      = {J. Comput.},
  volume       = {5},
  number       = {12},
  pages        = {1862--1869},
  year         = {2010},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=136\&\#38;id=2323},
  doi          = {10.4304/JCP.5.12.1862-1869},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/WanWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ChowWYD10,
  author       = {Sherman S. M. Chow and
                  Jian Weng and
                  Yanjiang Yang and
                  Robert H. Deng},
  editor       = {Daniel J. Bernstein and
                  Tanja Lange},
  title        = {Efficient Unidirectional Proxy Re-Encryption},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference
                  on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6055},
  pages        = {316--332},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12678-9\_19},
  doi          = {10.1007/978-3-642-12678-9\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ChowWYD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/ChowMW10,
  author       = {Sherman S. M. Chow and
                  Changshe Ma and
                  Jian Weng},
  editor       = {My T. Thai and
                  Sartaj Sahni},
  title        = {Zero-Knowledge Argument for Simultaneous Discrete Logarithms},
  booktitle    = {Computing and Combinatorics, 16th Annual International Conference,
                  {COCOON} 2010, Nha Trang, Vietnam, July 19-21, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6196},
  pages        = {520--529},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14031-0\_55},
  doi          = {10.1007/978-3-642-14031-0\_55},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cocoon/ChowMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HanaokaW10,
  author       = {Goichiro Hanaoka and
                  Jian Weng},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Generic Constructions of Parallel Key-Insulated Encryption},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {36--53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_3},
  doi          = {10.1007/978-3-642-15317-4\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/HanaokaW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengCYDCB10,
  author       = {Jian Weng and
                  Min{-}Rong Chen and
                  Yanjiang Yang and
                  Robert H. Deng and
                  Kefei Chen and
                  Feng Bao},
  title        = {CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption
                  Model without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/265},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengCYDCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengZ10,
  author       = {Jian Weng and
                  Yunlei Zhao},
  title        = {On the Security of a Bidirectional Proxy Re-Encryption Scheme from
                  {PKC} 2010},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/319},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaW10,
  author       = {Goichiro Hanaoka and
                  Jian Weng},
  title        = {Generic Constructions of Parallel Key-Insulated Encryption: Stronger
                  Security Model and Novel Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {468},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/468},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChuWCZD09,
  author       = {Cheng{-}Kang Chu and
                  Jian Weng and
                  Sherman S. M. Chow and
                  Jianying Zhou and
                  Robert H. Deng},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Conditional Proxy Broadcast Re-Encryption},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_23},
  doi          = {10.1007/978-3-642-02620-1\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChuWCZD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YangZWB09,
  author       = {Yanjiang Yang and
                  Jianying Zhou and
                  Jian Weng and
                  Feng Bao},
  title        = {A New Approach for Anonymous Password Authentication},
  booktitle    = {Twenty-Fifth Annual Computer Security Applications Conference, {ACSAC}
                  2009, Honolulu, Hawaii, USA, 7-11 December 2009},
  pages        = {199--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ACSAC.2009.26},
  doi          = {10.1109/ACSAC.2009.26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YangZWB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WengDDCL09,
  author       = {Jian Weng and
                  Robert H. Deng and
                  Xuhua Ding and
                  Cheng{-}Kang Chu and
                  Junzuo Lai},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Conditional proxy re-encryption secure against chosen-ciphertext attack},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {322--332},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533100},
  doi          = {10.1145/1533057.1533100},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WengDDCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YangWZQ09,
  author       = {Yanjiang Yang and
                  Jian Weng and
                  Jianying Zhou and
                  Ying Qiu},
  editor       = {Feng Bao and
                  Moti Yung and
                  Dongdai Lin and
                  Jiwu Jing},
  title        = {Optionally Identifiable Private Handshakes},
  booktitle    = {Information Security and Cryptology - 5th International Conference,
                  Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6151},
  pages        = {164--178},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-16342-5\_13},
  doi          = {10.1007/978-3-642-16342-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/YangWZQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WengYTDB09,
  author       = {Jian Weng and
                  Yanjiang Yang and
                  Qiang Tang and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_13},
  doi          = {10.1007/978-3-642-04474-8\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WengYTDB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/YangBW09,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Jian Weng},
  title        = {Private handshakes with optional accountability},
  booktitle    = {The 34th Annual {IEEE} Conference on Local Computer Networks, {LCN}
                  2009, 20-23 October 2009, Zurich, Switzerland, Proceedings},
  pages        = {245--248},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/LCN.2009.5355079},
  doi          = {10.1109/LCN.2009.5355079},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/YangBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangLWZB09,
  author       = {Yanjiang Yang and
                  Yingjiu Li and
                  Jian Weng and
                  Jianying Zhou and
                  Feng Bao},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Self-enforcing Private Inference Control},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {260--274},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_21},
  doi          = {10.1007/978-3-642-04642-1\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/YangLWZB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChowWYD09,
  author       = {Sherman S. M. Chow and
                  Jian Weng and
                  Yanjiang Yang and
                  Robert H. Deng},
  title        = {Efficient Unidirectional Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/189},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChowWYD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/WengLCL08,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Xiangxue Li},
  title        = {Identity-Based Parallel Key-Insulated Signature: Framework and Construction},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {40},
  number       = {1},
  pages        = {55--68},
  year         = {2008},
  url          = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.1.55.pdf},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/WengLCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WengLCL08,
  author       = {Jian Weng and
                  Xiangxue Li and
                  Kefei Chen and
                  Shengli Liu},
  title        = {Identity-Based Parallel Key-Insulated Signature Without Random Oracles},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {24},
  number       = {4},
  pages        = {1143--1157},
  year         = {2008},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2008/200807\_09.html},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WengLCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/DengWLC08,
  author       = {Robert H. Deng and
                  Jian Weng and
                  Shengli Liu and
                  Kefei Chen},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {Chosen-Ciphertext Secure Proxy Re-encryption without Pairings},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_1},
  doi          = {10.1007/978-3-540-89641-8\_1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/DengWLC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WengLCZQ08,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Dong Zheng and
                  Weidong Qiu},
  editor       = {Tal Malkin},
  title        = {Identity-Based Threshold Key-Insulated Encryption without Random Oracles},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {203--220},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_13},
  doi          = {10.1007/978-3-540-79263-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WengLCZQ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WengDLCLW08,
  author       = {Jian Weng and
                  Robert H. Deng and
                  Shengli Liu and
                  Kefei Chen and
                  Junzuo Lai and
                  Xu An Wang},
  title        = {Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {509},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/509},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WengDLCLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/WengLC07,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen},
  title        = {Pirate decoder for the broadcast encryption schemes from Crypto 2005},
  journal      = {Sci. China Ser. {F} Inf. Sci.},
  volume       = {50},
  number       = {3},
  pages        = {318--323},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11432-007-0031-8},
  doi          = {10.1007/S11432-007-0031-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/WengLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaWZ07,
  author       = {Changshe Ma and
                  Jian Weng and
                  Dong Zheng},
  title        = {Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/019},
  timestamp    = {Wed, 13 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WengLCM06,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Changshe Ma},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {Identity-Based Key-Insulated Signature Without Random Oracles},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {470--480},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_50},
  doi          = {10.1007/978-3-540-74377-4\_50},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WengLCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/WengLCL06,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Xiangxue Li},
  editor       = {Helger Lipmaa and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Identity-Based Key-Insulated Signature with Secure Key-Updates},
  booktitle    = {Information Security and Cryptology, Second {SKLOIS} Conference, Inscrypt
                  2006, Beijing, China, November 29 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4318},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11937807\_2},
  doi          = {10.1007/11937807\_2},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/WengLCL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/WengLCM06,
  author       = {Jian Weng and
                  Shengli Liu and
                  Kefei Chen and
                  Changshe Ma},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Identity-Based Parallel Key-Insulated Encryption Without Random Oracles:
                  Security Notions and Construction},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {409--423},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_29},
  doi          = {10.1007/11941378\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/WengLCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics