default search action
Jian Weng 0001
Person information
- affiliation: Jinan University, College of Information Science and Technology, Guangzhou, China
- affiliation (2008 - 2010): Singapore Management University, Singapore
- affiliation (PhD 2008): Shanghai Jiao Tong University, China
Other persons with the same name
- Jian Weng
- Jian Weng 0002 — University of California, Los Angeles, CA, USA
- Jian Weng 0003 — Zhejiang University, Hangzhou, China
- Jian Weng 0004 — Tsinghua University, Beijing, China
- Jian Weng 0005 — Xilinx, Beijing, China
- Jian Weng 0006 — Xiamen Univerisity, Xiamen City, Fujian, China
- Jian Weng 0007 — Shandong University, China
- Jian Weng 0008 — Wuhan University of Technology, School of Mechanical and Electronic Engineering, Hubei Digital Manufacturing Key Laboratory, China
- Jian Weng 0009 — Shenzhen University, College of Computer Science and Software Engineering, China
- Jian Weng 0010 — Beihang University, Beijing, China
- Jian Weng 0011 — Lanzhou Jiaotong University, China
- Jian Weng 0012 — AMD, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j247]Lisha Yao, Lin Hou, Jian Weng, Feixiang Zhao:
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices. Sci. China Inf. Sci. 67(1) (2024) - [j246]Jinzheng Cao, Qingfeng Cheng, Jian Weng:
Optimizing c-sum BKW and Faster Quantum Variant for LWE. IACR Commun. Cryptol. 1(3): 7 (2024) - [j245]Jun-Min Shao, Guo-Qiang Zeng, Kang-Di Lu, Guang-Gang Geng, Jian Weng:
Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search. Comput. Secur. 143: 103910 (2024) - [j244]Yu Zhang, Guo-Qiang Zeng, Min-Rong Chen, Guang-Gang Geng, Jian Weng, Kang-Di Lu:
DoFA: Adversarial examples detection for SAR images by dual-objective feature attribution. Expert Syst. Appl. 255: 124705 (2024) - [j243]Wuzheng Tan, Shenglong Du, Jian Weng:
Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks. Future Internet 16(6): 205 (2024) - [j242]Shuyuan Lin, Feiran Huang, Taotao Lai, Jianhuang Lai, Hanzi Wang, Jian Weng:
Robust Heterogeneous Model Fitting for Multi-source Image Correspondences. Int. J. Comput. Vis. 132(8): 2907-2928 (2024) - [j241]Jiawei Wang, Boyu Gao, Huawei Tu, Hai-Ning Liang, Zitao Liu, Weiqi Luo, Jian Weng:
Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality. Int. J. Hum. Comput. Interact. 40(17): 4608-4626 (2024) - [j240]Qian Feng, Shenglong Du, Wuzheng Tan, Jian Weng:
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Inf. 15(9): 554 (2024) - [j239]Tao Li, Anjia Yang, Jian Weng, Min-Rong Chen, Xizhao Luo, Xiaohu Chen, Changkun Jiang:
Enabling Secure and Flexible Streaming Media With Blockchain Incentive. IEEE Internet Things J. 11(2): 1966-1980 (2024) - [j238]Yuan Chen, Jia-Nan Liu, Anjia Yang, Jian Weng, Min-Rong Chen, Zilin Liu, Ming Li:
PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace. IEEE Internet Things J. 11(8): 13424-13436 (2024) - [j237]Yijian Zhong, Wuzheng Tan, Zhifeng Xu, Shixin Chen, Jia-Si Weng, Jian Weng:
WVFL: Weighted Verifiable Secure Aggregation in Federated Learning. IEEE Internet Things J. 11(11): 19926-19936 (2024) - [j236]Heng Sun, Weilin Huang, Jian Weng, Zhiquan Liu, Weihua Tan, Zaobo He, Mingyang Chen, Biaobang Wu, Long Li, Xinyuan Peng:
CCID-CAN: Cross-Chain Intrusion Detection on CAN Bus for Autonomous Vehicles. IEEE Internet Things J. 11(15): 26146-26159 (2024) - [j235]Qinggan Fu, Yin Lv, Zhiquan Liu, Yingying Li, Ling Song, Jian Weng:
Preimage Attacks on Xoodyak and Gaston Based on Algebraic Strategies. IEEE Internet Things J. 11(19): 31368-31384 (2024) - [j234]Yinuo Chen, Wuzheng Tan, Yijian Zhong, Yulin Kang, Anjia Yang, Jian Weng:
Byzantine-Robust and Privacy-Preserving Federated Learning With Irregular Participants. IEEE Internet Things J. 11(21): 35193-35205 (2024) - [j233]Feixiang Zhao, Jian Weng, Wenli Xie, Ming Li, Jiasi Weng:
HRA-secure attribute-based threshold proxy re-encryption from lattices. Inf. Sci. 655: 119900 (2024) - [j232]Fenghua Zhang, Bingwen Feng, Zhihua Xia, Jian Weng, Wei Lu, Bing Chen:
Conditional image hiding network based on style transfer. Inf. Sci. 662: 120225 (2024) - [j231]Zhi Li, Chaozhuo Li, Zhoujun Li, Jian Weng, Feiran Huang, Zhibo Zhou:
PPMGS: An efficient and effective solution for distributed privacy-preserving semi-supervised learning. Inf. Sci. 678: 120934 (2024) - [j230]Yuanmeng Zhao, Jian Weng, Jia-Nan Liu, Mei Cai:
Enabling privacy-preserving medication analysis in distributed EHR systems. J. Inf. Secur. Appl. 82: 103749 (2024) - [j229]Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. J. Cryptol. 37(2): 19 (2024) - [j228]Qingming Yi, Mingfeng Zheng, Min Shi, Jian Weng, Aiwen Luo:
AFANet: A Multibackbone Compatible Feature Fusion Framework for Effective Remote Sensing Object Detection. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j227]Pengcheng Xia, Jun Li, Long Shi, Bin Cao, Wuzheng Tan, Jian Weng, Yang Liu, Zhu Han:
A Reputation-Aided Lightweight Consensus Service Framework for Multi-Chain Metaverse. IEEE Netw. 38(6): 201-210 (2024) - [j226]Xin Chen, Xiaoling Deng, Yubin Lan, Yongbing Long, Jian Weng, Zhiquan Liu, Qi Tian:
Explanatory Object Part Aggregation for Zero-Shot Learning. IEEE Trans. Pattern Anal. Mach. Intell. 46(2): 851-868 (2024) - [j225]Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng, Naixue Xiong:
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy. IEEE Trans. Computers 73(2): 340-352 (2024) - [j224]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 200-223 (2024) - [j223]Shuyuan Lin, Anjia Yang, Taotao Lai, Jian Weng, Hanzi Wang:
Multi-Motion Segmentation via Co-Attention-Induced Heterogeneous Model Fitting. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1786-1798 (2024) - [j222]Qihua Feng, Peiya Li, Zhixun Lu, Chaozhuo Li, Zefan Wang, Zhiquan Liu, Chunhui Duan, Feiran Huang, Jian Weng, Philip S. Yu:
EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7467-7483 (2024) - [j221]Caiqin Dong, Jian Weng, Ming Li, Jia-Nan Liu, Zhiquan Liu, Yudan Cheng, Shui Yu:
Privacy-Preserving and Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(2): 889-904 (2024) - [j220]Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. IEEE Trans. Dependable Secur. Comput. 21(2): 961-974 (2024) - [j219]Shun Hu, Ming Li, Jiasi Weng, Jia-Nan Liu, Jian Weng, Zhi Li:
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting. IEEE Trans. Dependable Secur. Comput. 21(4): 3883-3900 (2024) - [j218]Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. IEEE Trans. Inf. Forensics Secur. 19: 3309-3323 (2024) - [j217]Yushu Zhang, Junhao Ji, Wenying Wen, Youwen Zhu, Zhihua Xia, Jian Weng:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. IEEE Trans. Inf. Forensics Secur. 19: 5046-5059 (2024) - [j216]Xiangli Xiao, Yushu Zhang, Zhongyun Hua, Zhihua Xia, Jian Weng:
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking. IEEE Trans. Inf. Forensics Secur. 19: 5357-5372 (2024) - [j215]Liqing Chen, Jiayi Li, Jiguo Li, Jian Weng:
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query. IEEE Trans. Inf. Forensics Secur. 19: 9910-9923 (2024) - [j214]Guo-Qiang Zeng, Hai-Nan Wei, Kang-Di Lu, Guang-Gang Geng, Jian Weng:
DACO-BD: Data Augmentation Combinatorial Optimization-Based Backdoor Defense in Deep Neural Networks for SAR Image Classification. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - [j213]Shuyuan Lin, Xiao Chen, Guobao Xiao, Hanzi Wang, Feiran Huang, Jian Weng:
Multi-Stage Network With Geometric Semantic Attention for Two-View Correspondence Learning. IEEE Trans. Image Process. 33: 3031-3046 (2024) - [j212]Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han:
Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems. IEEE Trans. Intell. Transp. Syst. 25(5): 3259-3285 (2024) - [j211]Min Shi, Shaowen Lin, Qingming Yi, Jian Weng, Aiwen Luo, Yicong Zhou:
Lightweight Context-Aware Network Using Partial-Channel Transformation for Real-Time Semantic Segmentation. IEEE Trans. Intell. Transp. Syst. 25(7): 7401-7416 (2024) - [j210]Heng Sun, Huibiao Su, Jian Weng, Zhiquan Liu, Ming Li, Yi Liu, Yucheng Zhong, Wenzhen Sun:
MTDCAP: Moving Target Defense-Based CAN Authentication Protocol. IEEE Trans. Intell. Transp. Syst. 25(9): 12800-12817 (2024) - [j209]Haiyan Zhang, Xinghua Li, Mengfan Xu, Ximeng Liu, Tong Wu, Jian Weng, Robert H. Deng:
BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective. IEEE Trans. Knowl. Data Eng. 36(11): 5661-5674 (2024) - [j208]Zhetao Li, Jianhui Wang, Saiqin Long, Jianming Fu, Min Yang, Jian Weng:
A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks. IEEE Trans. Mob. Comput. 23(7): 7739-7752 (2024) - [j207]Eric Ke Wang, Zicong Chen, Mingjia Zhu, Zhetao Li, Jian Weng, Tianlong Gu:
Score-Based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization. IEEE Trans. Medical Imaging 43(10): 3596-3607 (2024) - [j206]Yinyan Zhang, Shuai Li, Jian Weng, Bolin Liao:
GNN Model for Time-Varying Matrix Inversion With Robust Finite-Time Convergence. IEEE Trans. Neural Networks Learn. Syst. 35(1): 559-569 (2024) - [j205]Jia Zhang, Yidong Lin, Min Jiang, Shaozi Li, Yong Tang, Jinyi Long, Jian Weng, Kay Chen Tan:
Fast Multilabel Feature Selection via Global Relevance and Redundancy Optimization. IEEE Trans. Neural Networks Learn. Syst. 35(4): 5721-5734 (2024) - [j204]Kun Cao, Jian Weng, Keqin Li:
Reliability-Driven End-End-Edge Collaboration for Energy Minimization in Large-Scale Cyber-Physical Systems. IEEE Trans. Reliab. 73(1): 230-244 (2024) - [j203]Kun Cao, Jian Weng:
REPFS: Reliability-Ensured Personalized Function Scheduling in Sustainable Serverless Edge Computing. IEEE Trans. Sustain. Comput. 9(3): 494-511 (2024) - [c98]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices. ESORICS (3) 2024: 238-258 - [c97]Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. EUROCRYPT (1) 2024: 339-367 - [c96]Huang Zeng, Anjia Yang, Jian Weng, Min-Rong Chen, Fengjun Xiao, Yi Liu, Ye Yao:
Enabling Privacy-Preserving and Publicly Auditable Federated Learning. ICC 2024: 5178-5183 - [c95]Xueyi Li, Youheng Bai, Teng Guo, Zitao Liu, Yaying Huang, Xiangyu Zhao, Feng Xia, Weiqi Luo, Jian Weng:
Enhancing Length Generalization for Attention Based Knowledge Tracing Models with Linear Biases. IJCAI 2024: 5918-5926 - [c94]Zixuan Yang, Yushu Zhang, Tao Wang, Zhongyun Hua, Zhihua Xia, Jian Weng:
Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils. ACM Multimedia 2024: 7705-7713 - [c93]Tao Wang, Yushu Zhang, Xiangli Xiao, Lin Yuan, Zhihua Xia, Jian Weng:
Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition. ACM Multimedia 2024: 10268-10276 - [c92]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - [i79]Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Jian Weng, Xiaochun Cao:
Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales. CoRR abs/2402.15430 (2024) - [i78]Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng:
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network. CoRR abs/2403.00239 (2024) - [i77]Huang Zeng, Anjia Yang, Jian Weng, Min-Rong Chen, Fengjun Xiao, Yi Liu, Ye Yao:
Enabling Privacy-Preserving and Publicly Auditable Federated Learning. CoRR abs/2405.04029 (2024) - [i76]Shuyan Huang, Zitao Liu, Xiangyu Zhao, Weiqi Luo, Jian Weng:
Towards Robust Knowledge Tracing Models via k-Sparse Attention. CoRR abs/2407.17097 (2024) - [i75]Yijia Chang, Hanrui Jiang, Chao Lin, Xinyi Huang, Jian Weng:
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification. CoRR abs/2410.04397 (2024) - [i74]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Cryptol. ePrint Arch. 2024: 70 (2024) - [i73]Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. IACR Cryptol. ePrint Arch. 2024: 344 (2024) - [i72]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices. IACR Cryptol. ePrint Arch. 2024: 1023 (2024) - [i71]Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, Jian Weng:
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber. IACR Cryptol. ePrint Arch. 2024: 1174 (2024) - [i70]Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. IACR Cryptol. ePrint Arch. 2024: 1197 (2024) - [i69]Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Generic Differential Key Recovery Attacks and Beyond. IACR Cryptol. ePrint Arch. 2024: 1447 (2024) - [i68]Zhengan Huang, Junzuo Lai, Gongxian Zeng, Jian Weng:
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation. IACR Cryptol. ePrint Arch. 2024: 1608 (2024) - [i67]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. IACR Cryptol. ePrint Arch. 2024: 1783 (2024) - 2023
- [j202]Qihua Feng, Peiya Li, Zhixun Lu, Zhibo Zhou, Yongdong Wu, Jian Weng, Feiran Huang:
DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks. Appl. Soft Comput. 133: 109935 (2023) - [j201]Wenli Xie, Jian Weng, Yao Tong, Xiaojian Liang, Lisha Yao, Feixiang Zhao:
Lattice-based autonomous path proxy re-encryption in the standard model. Sci. China Inf. Sci. 66(10) (2023) - [j200]Chengxi Jiang, Shijie Xu, Guanggang Geng, Jian Weng, Xinchang Zhang:
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification. Clust. Comput. 26(3): 1785-1800 (2023) - [j199]Jia-Cheng Huang, Guo-Qiang Zeng, Guang-Gang Geng, Jian Weng, Kang-Di Lu, Yu Zhang:
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems. Comput. Secur. 132: 103310 (2023) - [j198]Jinzheng Cao, Jian Weng, Yanbin Pan, Qingfeng Cheng:
Generalized attack on ECDSA: known bits in arbitrary positions. Des. Codes Cryptogr. 91(11): 3803-3823 (2023) - [j197]Long Li, Jianbo Huang, Liang Chang, Jian Weng, Jia Chen, Jingjing Li:
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services. Frontiers Comput. Sci. 17(5): 175814 (2023) - [j196]Sulong Ge, Jianwei Fei, Zhihua Xia, Yao Tong, Jian Weng, Jia-Nan Liu:
A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Process. 17(2): 323-336 (2023) - [j195]Lisha Yao, Jian Weng, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou:
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing. Inf. Sci. 624: 777-795 (2023) - [j194]Yinyan Zhang, Shuai Li, Xuefeng Zhou, Jian Weng, Guanggang Geng:
Single-state distributed k-winners-take-all neural network model. Inf. Sci. 647: 119528 (2023) - [j193]Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j192]Sulong Ge, Zhihua Xia, Jianwei Fei, Yao Tong, Jian Weng, Ming Li:
A robust document image watermarking scheme using deep neural network. Multim. Tools Appl. 82(25): 38589-38612 (2023) - [j191]Eric Ke Wang, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen, Weiping Ding, Siu-Ming Yiu, Jian Weng:
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. Pattern Recognit. 143: 109745 (2023) - [j190]Guofeng Li, Bingwen Feng, Mingjin He, Jian Weng, Wei Lu:
High-capacity coverless image steganographic scheme based on image synthesis. Signal Process. Image Commun. 111: 116894 (2023) - [j189]Chunkai Zhang, Quanjian Dai, Zilin Du, Wensheng Gan, Jian Weng, Philip S. Yu:
TUSQ: Targeted High-Utility Sequence Querying. IEEE Trans. Big Data 9(2): 512-527 (2023) - [j188]Yaxi Yang, Yao Tong, Jian Weng, Yufeng Yi, Yandong Zheng, Leo Yu Zhang, Rongxing Lu:
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data. IEEE Trans. Cloud Comput. 11(3): 2379-2391 (2023) - [j187]Peipeng Yu, Jian Tang, Zhihua Xia, Zhetao Li, Jian Weng:
A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2885-2896 (2023) - [j186]Jiao Liu, Xinghua Li, Ximeng Liu, Jiawei Tang, Siqi Ma, Jian Weng:
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network. IEEE Trans. Cloud Comput. 11(4): 3381-3395 (2023) - [j185]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, Jian Weng:
Simulatable verifiable random function from the LWE assumption. Theor. Comput. Sci. 957: 113826 (2023) - [j184]Yinyan Zhang, Shuai Li, Jian Weng:
Distributed k-Winners-Take-All Network: An Optimization Perspective. IEEE Trans. Cybern. 53(8): 5069-5081 (2023) - [j183]Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 20(2): 1243-1257 (2023) - [j182]Yongdong Wu, Jian Weng, Zhengxia Wang, Kaimin Wei, Jinming Wen, Junzuo Lai, Xin Li:
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. IEEE Trans. Dependable Secur. Comput. 20(2): 1744-1755 (2023) - [j181]Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor:
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network. IEEE Trans. Dependable Secur. Comput. 20(6): 4838-4852 (2023) - [j180]Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. IEEE Trans. Inf. Forensics Secur. 18: 2218-2233 (2023) - [j179]Hongshuang Hu, Yongdong Wu, Jian Weng, Kaimin Wei, Zhiquan Liu, Feiran Huang, Yinyan Zhang:
Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking. IEEE Trans. Inf. Forensics Secur. 18: 3991-4005 (2023) - [j178]Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j177]Axin Wu, Weiqi Luo, Jian Weng, Anjia Yang, Jinghang Wen:
Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensics Secur. 18: 5592-5607 (2023) - [j176]Xiang Liu, Xueli Zhao, Zhihua Xia, Qian Feng, Peipeng Yu, Jian Weng:
Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction. IEEE Trans. Image Process. 32: 4635-4648 (2023) - [j175]Gengsen Huang, Wensheng Gan, Jian Weng, Philip S. Yu:
US-Rule: Discovering Utility-driven Sequential Rules. ACM Trans. Knowl. Discov. Data 17(1): 10:1-10:22 (2023) - [j174]Qiuyun Tong, Xinghua Li, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing. IEEE Trans. Knowl. Data Eng. 35(5): 5159-5172 (2023) - [j173]Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security. IEEE Trans. Knowl. Data Eng. 35(5): 5386-5399 (2023) - [j172]Yanbing Ren, Xinghua Li, Yinbin Miao, Robert H. Deng, Jian Weng, Siqi Ma, Jianfeng Ma:
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 22(6): 3287-3302 (2023) - [j171]Min Shi, Jialin Shen, Qingming Yi, Jian Weng, Zunkai Huang, Aiwen Luo, Yicong Zhou:
LMFFNet: A Well-Balanced Lightweight Network for Fast and Accurate Semantic Segmentation. IEEE Trans. Neural Networks Learn. Syst. 34(6): 3205-3219 (2023) - [j170]Xin Chen, Jian Weng, Xiaoling Deng, Weiqi Luo, Yubin Lan, Qi Tian:
Feature Distillation in Deep Attention Network Against Adversarial Examples. IEEE Trans. Neural Networks Learn. Syst. 34(7): 3691-3705 (2023) - [j169]Yinyan Zhang, Jilian Zhang, Jian Weng:
Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach. IEEE Trans. Neural Networks Learn. Syst. 34(12): 10919-10929 (2023) - [j168]Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, Kim-Kwang Raymond Choo:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. IEEE Trans. Serv. Comput. 16(1): 698-710 (2023) - [j167]Xiaohu Chen, Anjia Yang, Jian Weng, Yao Tong, Cheng Huang, Tao Li:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. IEEE Trans. Serv. Comput. 16(4): 2316-2329 (2023) - [j166]Heng Sun, Weiyun Luo, Jian Weng, Zhiquan Liu, Ming Li:
ECQV-GDH-Based Group Key Exchange Protocol for CAN Bus. IEEE Trans. Veh. Technol. 72(10): 12857-12872 (2023) - [j165]Zhan Zhang, Xinghua Li, Yunwei Wang, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET. IEEE Trans. Veh. Technol. 72(11): 14987-15001 (2023) - [j164]Tao Li, Anjia Yang, Jian Weng, Yao Tong, Qingfu Pei:
Concurrent and efficient IoT data trading based on probabilistic micropayments. Wirel. Networks 29(2): 607-622 (2023) - [c91]Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. ACNS 2023: 143-166 - [c90]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-interactive Zero-Knowledge Functional Proofs. ASIACRYPT (5) 2023: 236-268 - [c89]Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. ASIACRYPT (1) 2023: 272-301 - [c88]Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions and Constructions. EUROCRYPT (5) 2023: 67-97 - [c87]Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Servers. NDSS 2023 - [c86]Zitao Liu, Qiongqiong Liu, Teng Guo, Jiahao Chen, Shuyan Huang, Xiangyu Zhao, Jiliang Tang, Weiqi Luo, Jian Weng:
XES3G5M: A Knowledge Tracing Benchmark Dataset with Auxiliary Information. NeurIPS 2023 - [c85]Shuyan Huang, Zitao Liu, Xiangyu Zhao, Weiqi Luo, Jian Weng:
Towards Robust Knowledge Tracing Models via k-Sparse Attention. SIGIR 2023: 2441-2445 - [c84]Zijun Mai, Yidang He, Jiana Feng, Huawei Tu, Jian Weng, Boyu Gao:
Behavioral Authentication with Head-Tilt Based Locomotion for Metaverse. VR Workshops 2023: 949-950 - [c83]Zitao Liu, Qiongqiong Liu, Jiahao Chen, Shuyan Huang, Boyu Gao, Weiqi Luo, Jian Weng:
Enhancing Deep Knowledge Tracing with Auxiliary Tasks. WWW 2023: 4178-4187 - [i66]Zitao Liu, Qiongqiong Liu, Jiahao Chen, Shuyan Huang, Boyu Gao, Weiqi Luo, Jian Weng:
Enhancing Deep Knowledge Tracing with Auxiliary Tasks. CoRR abs/2302.07942 (2023) - [i65]Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng:
A Survey of Secure Computation Using Trusted Execution Environments. CoRR abs/2302.12150 (2023) - [i64]Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng:
Security and Privacy on Generative Data in AIGC: A Survey. CoRR abs/2309.09435 (2023) - [i63]Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han:
Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems. CoRR abs/2309.11039 (2023) - [i62]Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions & Constructions. IACR Cryptol. ePrint Arch. 2023: 332 (2023) - [i61]Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. IACR Cryptol. ePrint Arch. 2023: 1392 (2023) - [i60]Gongxian Zeng, Junzuo Lai, Zhengan Huang, Linru Zhang, Xiangning Wang, Kwok-Yan Lam, Huaxiong Wang, Jian Weng:
Non-Interactive Zero-Knowledge Functional Proofs. IACR Cryptol. ePrint Arch. 2023: 1759 (2023) - 2022
- [j163]Wei Liu, Lein Harn, Jian Weng:
Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs). IET Commun. 16(1): 58-66 (2022) - [j162]Zhiquan Liu, Jian Weng, Jingjing Guo, Jianfeng Ma, Feiran Huang, Heng Sun, Yudan Cheng:
PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks. IEEE Internet Things J. 9(8): 5943-5956 (2022) - [j161]Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo:
Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization. IEEE Internet Things J. 9(9): 7009-7024 (2022) - [j160]Lin Song, Yinbin Miao, Jian Weng, Kim-Kwang Raymond Choo, Ximeng Liu, Robert H. Deng:
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 9(15): 13598-13611 (2022) - [j159]Kun Cao, Yangguang Cui, Zhiquan Liu, Wuzheng Tan, Jian Weng:
Edge Intelligent Joint Optimization for Lifetime and Latency in Large-Scale Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22267-22279 (2022) - [j158]Xiaohu Chen, Anjia Yang, Yao Tong, Jian Weng, Jiasi Weng, Tao Li:
A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET. IEEE Internet Things J. 9(22): 23130-23141 (2022) - [j157]Congge Xie, Jian Weng, Dehua Zhou:
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Inf. Sci. 594: 249-263 (2022) - [j156]Wei Liu, Jian Weng, Bingsheng Zhang, Kai He, Junjie Huang:
Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages. Inf. Sci. 613: 324-343 (2022) - [j155]Yuxian Li, Jian Weng, Ming Li, Wei Wu, Jiasi Weng, Jia-Nan Liu, Shun Hu:
ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero. J. Parallel Distributed Comput. 169: 301-316 (2022) - [j154]Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong:
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata. IEEE Trans. Cloud Comput. 10(3): 2020-2037 (2022) - [j153]Yinyan Zhang, Shuai Li, Jian Weng:
Distributed Estimation of Algebraic Connectivity. IEEE Trans. Cybern. 52(5): 3047-3056 (2022) - [j152]Wei Lu, Junjia Chen, Junhong Zhang, Jiwu Huang, Jian Weng, Yicong Zhou:
Secure Halftone Image Steganography Based on Feature Space and Layer Embedding. IEEE Trans. Cybern. 52(6): 5001-5014 (2022) - [j151]Yinyan Zhang, Shuai Li, Jian Weng:
Learning and Near-Optimal Control of Underactuated Surface Vessels With Periodic Disturbances. IEEE Trans. Cybern. 52(8): 7453-7463 (2022) - [j150]Bing Chen, Wei Lu, Jiwu Huang, Jian Weng, Yicong Zhou:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. IEEE Trans. Dependable Secur. Comput. 19(2): 978-991 (2022) - [j149]Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li, Xiaodong Lin:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(3): 1518-1531 (2022) - [j148]Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. IEEE Trans. Dependable Secur. Comput. 19(5): 3149-3167 (2022) - [j147]Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang:
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks. IEEE Trans. Dependable Secur. Comput. 19(5): 3183-3199 (2022) - [j146]Zhijian Shao, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, Shui Yu:
Peripheral-Free Device Pairing by Randomly Switching Power. IEEE Trans. Dependable Secur. Comput. 19(6): 4240-4254 (2022) - [j145]Peipeng Yu, Jianwei Fei, Zhihua Xia, Zhili Zhou, Jian Weng:
Improving Generalization by Commonality Learning in Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 17: 547-558 (2022) - [j144]Yanbing Ren, Xinghua Li, Yinbin Miao, Bin Luo, Jian Weng, Kim-Kwang Raymond Choo, Robert H. Deng:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 17: 804-818 (2022) - [j143]Shi-Jie Xu, Guang-Gang Geng, Xiao-Bo Jin, Dongjie Liu, Jian Weng:
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. IEEE Trans. Inf. Forensics Secur. 17: 2166-2181 (2022) - [j142]Xiaohan Zhang, Xinghua Li, Yinbin Miao, Xizhao Luo, Yunwei Wang, Siqi Ma, Jian Weng:
A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT. IEEE Trans. Ind. Informatics 18(7): 4456-4465 (2022) - [j141]Anjia Yang, Jian Weng, Kan Yang, Cheng Huang, Xuemin Shen:
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(2): 1284-1298 (2022) - [j140]Yunwei Wang, Xinghua Li, Xiaohan Zhang, Ximeng Liu, Jian Weng:
ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs. IEEE Trans. Intell. Transp. Syst. 23(9): 16558-16575 (2022) - [j139]Qiuyun Tong, Yinbin Miao, Lei Chen, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings. IEEE Trans. Serv. Comput. 15(6): 3606-3619 (2022) - [j138]Heng Sun, Mengsi Sun, Jian Weng, Zhiquan Liu:
Analysis of ID Sequences Similarity Using DTW in Intrusion Detection for CAN Bus. IEEE Trans. Veh. Technol. 71(10): 10426-10441 (2022) - [j137]Yongbiao Li, Dehua Zhou, Yanling Li, Jian Weng, Meng Sun, Ye Yang, Ming Li:
Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles. IEEE Trans. Veh. Technol. 71(12): 12530-12542 (2022) - [c82]Jinzheng Cao, Qingfeng Cheng, Jian Weng:
EHNP Strikes Back: Analyzing SM2 Implementations. AFRICACRYPT 2022: 576-600 - [c81]Jie Chen, Yu Li, Jinming Wen, Jian Weng:
Identity-Based Matchmaking Encryption from Standard Assumptions. ASIACRYPT (3) 2022: 394-422 - [c80]Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. ASIACRYPT (1) 2022: 410-440 - [c79]Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption Under Corruptions. ASIACRYPT (3) 2022: 423-453 - [c78]Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng:
Learning Second Order Local Anomaly for General Face Forgery Detection. CVPR 2022: 20238-20248 - [i59]Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. CoRR abs/2201.09186 (2022) - [i58]Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng:
A Robust Document Image Watermarking Scheme using Deep Neural Network. CoRR abs/2202.13067 (2022) - [i57]Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jia-Nan Liu:
A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network. CoRR abs/2203.05198 (2022) - [i56]Caiqin Dong, Jian Weng, Yao Tong, Jia-Nan Liu, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients. CoRR abs/2205.03040 (2022) - [i55]Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng:
Deniable Steganography. CoRR abs/2205.12587 (2022) - [i54]Wensheng Gan, Gengsen Huang, Jian Weng, Tianlong Gu, Philip S. Yu:
Towards Target Sequential Rules. CoRR abs/2206.04728 (2022) - [i53]Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng:
Learning Second Order Local Anomaly for General Face Forgery Detection. CoRR abs/2209.15490 (2022) - [i52]Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. CoRR abs/2210.11334 (2022) - [i51]Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang:
Cross-Domain Identity-based Matchmaking Encryption. IACR Cryptol. ePrint Arch. 2022: 85 (2022) - [i50]Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang:
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks. IACR Cryptol. ePrint Arch. 2022: 115 (2022) - [i49]Lisha Yao, Jian Weng, Bimei Wang:
Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation. IACR Cryptol. ePrint Arch. 2022: 637 (2022) - [i48]Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. IACR Cryptol. ePrint Arch. 2022: 723 (2022) - [i47]Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption under Corruptions. IACR Cryptol. ePrint Arch. 2022: 1176 (2022) - [i46]Jie Chen, Yu Li, Jinming Wen, Jian Weng:
Identity-Based Matchmaking Encryption from Standard Assumptions. IACR Cryptol. ePrint Arch. 2022: 1246 (2022) - 2021
- [j136]Nan Cui, Shengli Liu, Dawu Gu, Jian Weng:
Robustly reusable fuzzy extractor with imperfect randomness. Des. Codes Cryptogr. 89(5): 1017-1059 (2021) - [j135]Zhiquan Liu, Jianfeng Ma, Jian Weng, Feiran Huang, Yongdong Wu, Linfeng Wei, Yuxian Li:
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications. Inf. Fusion 73: 144-156 (2021) - [j134]Hailiang Li, Bin Zhang, Yu Zhang, Xilin Dang, Yuwei Han, Linfeng Wei, Yijun Mao, Jian Weng:
A defense method based on attention mechanism against traffic sign adversarial samples. Inf. Fusion 76: 55-65 (2021) - [j133]Zhiquan Liu, Feiran Huang, Jian Weng, Kun Cao, Yinbin Miao, Jingjing Guo, Yongdong Wu:
BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks. IEEE Internet Things J. 8(7): 5386-5407 (2021) - [j132]Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard P. Hancke, Xizhao Luo, Jian Weng, Keith Mayes, Konstantinos Markantonakis:
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet Things J. 8(14): 11607-11620 (2021) - [j131]Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert H. Deng:
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. KSII Trans. Internet Inf. Syst. 15(8): 2827-2848 (2021) - [j130]Kun Cao, Tongquan Wei, Mingsong Chen, Keqin Li, Jian Weng, Wuzheng Tan:
Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems. Softw. Pract. Exp. 51(11): 2225-2237 (2021) - [j129]Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans. Cloud Comput. 9(1): 212-225 (2021) - [j128]Chengjun Cai, Jian Weng, Xingliang Yuan, Cong Wang:
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness. IEEE Trans. Dependable Secur. Comput. 18(1): 131-144 (2021) - [j127]Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang, Robert H. Deng:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE Trans. Dependable Secur. Comput. 18(2): 652-666 (2021) - [j126]Lu Ou, Zheng Qin, Shaolin Liao, Jian Weng, Xiaohua Jia:
An Optimal Noise Mechanism for Cross-Correlated IoT Data Releasing. IEEE Trans. Dependable Secur. Comput. 18(4): 1528-1540 (2021) - [j125]Tao Wang, Jian Weng, Jay Ligatti, Yao Liu:
Far Proximity Identification in Wireless Systems. IEEE Trans. Dependable Secur. Comput. 18(5): 2403-2418 (2021) - [j124]Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang, Weiqi Luo:
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive. IEEE Trans. Dependable Secur. Comput. 18(5): 2438-2455 (2021) - [j123]Hongliang He, Xizhao Luo, Jian Weng, Kaimin Wei:
Secure Transmission in Multiple Access Wiretap Channel: Cooperative Jamming Without Sharing CSI. IEEE Trans. Inf. Forensics Secur. 16: 3401-3411 (2021) - [j122]Yang Yang, Zhangshuang Guan, Zhiguo Wan, Jian Weng, HweeHwa Pang, Robert H. Deng:
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting. IEEE Trans. Inf. Forensics Secur. 16: 4705-4720 (2021) - [j121]Kang-Di Lu, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo, Yongdong Wu:
Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System. IEEE Trans. Ind. Informatics 17(11): 7618-7627 (2021) - [j120]Xin Chen, Xizhao Luo, Jian Weng, Weiqi Luo, Huiting Li, Qi Tian:
Multi-View Gait Image Generation for Cross-View Gait Recognition. IEEE Trans. Image Process. 30: 3041-3055 (2021) - [j119]Hao Chen, Jian Weng, Weiqi Luo, Liqing Xu:
Long Optimal and Small-Defect LRC Codes With Unbounded Minimum Distances. IEEE Trans. Inf. Theory 67(5): 2786-2792 (2021) - [j118]Feiran Huang, Jie Xu, Jian Weng:
Multi-Task Travel Route Planning With a Flexible Deep Learning Framework. IEEE Trans. Intell. Transp. Syst. 22(7): 3907-3918 (2021) - [j117]Hailiang Li, Jian Weng, Yijun Mao, Yonghua Wang, Yiju Zhan, Qingling Cai, Wanrong Gu:
Adaptive Dropout Method Based on Biological Principles. IEEE Trans. Neural Networks Learn. Syst. 32(9): 4267-4276 (2021) - [j116]Zhihua Xia, Lan Wang, Jian Tang, Neal N. Xiong, Jian Weng:
A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing. IEEE Trans. Netw. Sci. Eng. 8(1): 318-330 (2021) - [j115]Xinghua Li, Yanbing Ren, Laurence T. Yang, Ning Zhang, Bin Luo, Jian Weng, Ximeng Liu:
Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles. IEEE Trans. Netw. Sci. Eng. 8(3): 2073-2086 (2021) - [j114]Jin-Hua Chen, Min-Rong Chen, Guo-Qiang Zeng, Jian Weng:
BDFL: A Byzantine-Fault-Tolerance Decentralized Federated Learning Method for Autonomous Vehicle. IEEE Trans. Veh. Technol. 70(9): 8639-8652 (2021) - [j113]Heng Sun, Miaomiao Chen, Jian Weng, Zhiquan Liu, Guanggang Geng:
Anomaly Detection for In-Vehicle Network Using CNN-LSTM With Attention Mechanism. IEEE Trans. Veh. Technol. 70(10): 10880-10893 (2021) - [j112]Qian Meng, Jian Weng, Yinbin Miao, Kefei Chen, Zhonghua Shen, Fuqun Wang, Zhijun Li:
Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET. IEEE Trans. Veh. Technol. 70(12): 12342-12357 (2021) - [c77]Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng:
Simulation-Based Bi-Selective Opening Security for Public Key Encryption. ASIACRYPT (2) 2021: 456-482 - [c76]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c75]Yaobin Shen, Lei Wang, Dawu Gu, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-user Setting. CRYPTO (3) 2021: 309-336 - [c74]Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu:
Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE. ESORICS (2) 2021: 147-168 - [c73]Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen:
Efficient and Fully Secure Lattice-Based IBE with Equality Test. ICICS (2) 2021: 301-318 - [c72]Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang:
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. INFOCOM 2021: 1-10 - [i45]Chunkai Zhang, Zilin Du, Quanjian Dai, Wensheng Gan, Jian Weng, Philip S. Yu:
TUSQ: Targeted High-Utility Sequence Querying. CoRR abs/2103.16615 (2021) - [i44]Chunkai Zhang, Quanjian Dai, Zilin Du, Wensheng Gan, Jian Weng, Philip S. Yu:
Utility-driven Mining of Contiguous Sequences. CoRR abs/2111.00247 (2021) - [i43]Gengsen Huang, Wensheng Gan, Jian Weng, Philip S. Yu:
US-Rule: Discovering Utility-driven Sequential Rules. CoRR abs/2111.15020 (2021) - [i42]Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu:
Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE. IACR Cryptol. ePrint Arch. 2021: 613 (2021) - [i41]Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Robert H. Deng:
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability. IACR Cryptol. ePrint Arch. 2021: 1244 (2021) - [i40]Junzuo Lai, Rupeng Yang, Zhengan Huang, Jian Weng:
Simulation-Based Bi-Selective Opening Security for Public Key Encryption. IACR Cryptol. ePrint Arch. 2021: 1268 (2021) - 2020
- [j111]Congge Xie, Jian Weng, Wei Lu, Lin Hou:
General construction of revocable identity-based fully homomorphic signature. Sci. China Inf. Sci. 63(3) (2020) - [j110]Wenjie Yang, Jian Weng, Xinyi Huang, Anjia Yang:
A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks. Comput. J. 63(8): 1139-1147 (2020) - [j109]Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, Muhammad Imran:
An overview on smart contracts: Challenges, advances and platforms. Future Gener. Comput. Syst. 105: 475-491 (2020) - [j108]Ruili Wang, Jian Weng, Xiaofeng Zhu:
Deep understanding of big multimedia data. Neurocomputing 391: 189-190 (2020) - [j107]Zhiquan Liu, Jian Weng, Jianfeng Ma, Jingjing Guo, Bingwen Feng, Zhongyuan Jiang, Kaimin Wei:
TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs. IEEE Internet Things J. 7(5): 4028-4048 (2020) - [j106]Xinghua Li, Huijuan Zhang, Yanbing Ren, Siqi Ma, Bin Luo, Jian Weng, Jianfeng Ma, Xiaoming Huang:
PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs. IEEE Internet Things J. 7(12): 11789-11802 (2020) - [j105]Huangke Chen, Ran Cheng, Jinming Wen, Haifeng Li, Jian Weng:
Solving large-scale many-objective optimization problems by covariance matrix adaptation evolution strategy with scalable small subpopulations. Inf. Sci. 509: 457-469 (2020) - [j104]Hui Cui, Robert H. Deng, Baodong Qin, Jian Weng:
Key regeneration-free ciphertext-policy attribute-based encryption and its application. Inf. Sci. 517: 217-229 (2020) - [j103]Congge Xie, Jian Weng, Jiasi Weng, Lin Hou:
Scalable revocable identity-based signature over lattices in the standard model. Inf. Sci. 518: 29-38 (2020) - [j102]Chaonan Wang, Liudong Xing, Jian Weng:
A new combinatorial model for deterministic competing failure analysis. Qual. Reliab. Eng. Int. 36(5): 1475-1493 (2020) - [j101]Congge Xie, Jian Weng, Jinming Wen:
Scalable Revocable Identity-Based Signature Scheme with Signing Key Exposure Resistance from Lattices. Secur. Commun. Networks 2020: 1743421:1-1743421:11 (2020) - [j100]Kai He, Jun Guo, Jian Weng, Jiasi Weng, Joseph K. Liu, Xun Yi:
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Trans. Dependable Secur. Comput. 17(6): 1207-1217 (2020) - [j99]Leo Yu Zhang, Yifeng Zheng, Jian Weng, Cong Wang, Zihao Shan, Kui Ren:
You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center. IEEE Trans. Dependable Secur. Comput. 17(6): 1218-1231 (2020) - [j98]Xu An Wang, Kim-Kwang Raymond Choo, Jian Weng, Jianfeng Ma:
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources". IEEE Trans. Inf. Forensics Secur. 15: 1586-1588 (2020) - [j97]Hao Chen, Xianmang He, Jian Weng, Liqing Xu:
New Constructions of Subspace Codes Using Subsets of MRD Codes in Several Blocks. IEEE Trans. Inf. Theory 66(9): 5317-5321 (2020) - [j96]Xin Chen, Jian Weng, Weiqi Luo, Wei Lu, Huimin Wu, Jiaming Xu, Qi Tian:
Sample Balancing for Deep Learning-Based Visual Recognition. IEEE Trans. Neural Networks Learn. Syst. 31(10): 3962-3976 (2020) - [j95]Feiran Huang, Kaimin Wei, Jian Weng, Zhoujun Li:
Attention-Based Modality-Gated Networks for Image-Text Sentiment Analysis. ACM Trans. Multim. Comput. Commun. Appl. 16(3): 79:1-79:19 (2020) - [j94]Yang Yang, Ximeng Liu, Robert H. Deng, Jian Weng:
Flexible Wildcard Searchable Encryption System. IEEE Trans. Serv. Comput. 13(3): 464-477 (2020) - [j93]Jia-Nan Liu, Jian Weng, Anjia Yang, Yizhao Chen, Xiaodong Lin:
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid. IEEE Trans. Smart Grid 11(1): 247-257 (2020) - [j92]Shanxiang Lyu, Jinming Wen, Jian Weng, Cong Ling:
On Low-Complexity Lattice Reduction Algorithms for Large-Scale MIMO Detection: The Blessing of Sequential Reduction. IEEE Trans. Signal Process. 68: 257-269 (2020) - [j91]Bin Luo, Xinghua Li, Jian Weng, Jingjing Guo, Jianfeng Ma:
Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET. IEEE Trans. Veh. Technol. 69(2): 2034-2048 (2020) - [j90]Kang-Di Lu, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Yue Zhang, Ming Li:
An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks. IEEE Trans. Veh. Technol. 69(5): 4689-4699 (2020) - [j89]Dunjin Chen, Jian Weng, Feiran Huang, Jian Zhou, Yijun Mao, Xiaodong Liu:
Heuristic Monte Carlo Algorithm for Unmanned Ground Vehicles Realtime Localization and Mapping. IEEE Trans. Veh. Technol. 69(10): 10642-10655 (2020) - [c71]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. ASIACRYPT (2) 2020: 785-814 - [c70]Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh, Jian Weng, Robert H. Deng:
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment. ESORICS (1) 2020: 3-22 - [c69]Yue Zhang, Jian Weng, Zhen Ling, Bryan Pearson, Xinwen Fu:
BLESS: A BLE Application Security Scanning Framework. INFOCOM 2020: 636-645 - [c68]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
Breaking Secure Pairing of Bluetooth Low Energy Using Downgrade Attacks. USENIX Security Symposium 2020: 37-54 - [c67]Yujun Lu, Boyu Gao, Jinyi Long, Jian Weng:
Hand Motion with Eyes-free Interaction for Authentication in Virtual Reality. VR Workshops 2020: 715-716 - [i39]Jiasi Weng, Jian Weng, Yue Zhang, Ming Li, Zhaodi Wen:
SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles. CoRR abs/2001.09624 (2020) - [i38]Zhijian Shao, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, Shui Yu:
Peripheral-free Device Pairing by Randomly Switching Power. CoRR abs/2002.11288 (2020) - [i37]Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, Anjia Yang:
DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks. CoRR abs/2005.08016 (2020) - [i36]Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong:
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata. CoRR abs/2005.11688 (2020) - [i35]Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor:
RDP-GAN: A Rényi-Differential Privacy based Generative Adversarial Network. CoRR abs/2007.02056 (2020) - [i34]Qi Gu, Zhihua Xia, Xingming Sun, Jian Weng:
MSPPIR: Multi-source privacy-preserving image retrieval in cloud computing. CoRR abs/2007.12416 (2020) - [i33]Huimin Lao, Hao Chen, Jian Weng, Xiaoqing Tan:
Parameter-controlled inserting constructions of constant dimension subspace codes. CoRR abs/2008.09944 (2020) - [i32]Lizhi Xiong, Wenhao Zhou, Zhihua Xia, Qi Gu, Jian Weng:
Efficient Privacy-Preserving Computation Based on Additive Secret Sharing. CoRR abs/2009.05356 (2020) - [i31]Zhihua Xia, Qi Gu, Lizhi Xiong, Wenhao Zhou, Jian Weng:
Privacy-Preserving Image Retrieval Based on Additive Secret Sharing. CoRR abs/2009.06893 (2020) - [i30]Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng:
Secure Computation on Additive Shares. CoRR abs/2009.13153 (2020) - [i29]Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. CoRR abs/2011.06458 (2020) - [i28]Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang:
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. CoRR abs/2012.10566 (2020) - [i27]Ming Li, Jian Weng, Jia-Nan Liu, Xiaodong Lin, Charlie Obimbo:
BB-VDF: Enabling Accountability and Fine-grained Access Control for Vehicular Digital Forensics through Blockchain. IACR Cryptol. ePrint Arch. 2020: 11 (2020) - [i26]Junbin Fang, Dominique Unruh, Jian Weng, Jun Yan, Dehua Zhou:
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? IACR Cryptol. ePrint Arch. 2020: 621 (2020) - [i25]Xiangyu Liu, Shengli Liu, Dawu Gu, Jian Weng:
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security. IACR Cryptol. ePrint Arch. 2020: 1088 (2020) - [i24]Yaobin Shen, Lei Wang, Jian Weng:
Revisiting the Security of DbHtS MACs: Beyond-Birthday-Bound in the Multi-User Setting. IACR Cryptol. ePrint Arch. 2020: 1523 (2020)
2010 – 2019
- 2019
- [j88]Yang Yang, Xindi Huang, Ximeng Liu, Hongju Cheng, Jian Weng, Xiangyang Luo, Victor Chang:
A Comprehensive Survey on Secure Outsourced Computation and Its Applications. IEEE Access 7: 159426-159465 (2019) - [j87]Min-Rong Chen, Guo-Qiang Zeng, Kang-Di Lu, Jian Weng:
A Two-Layer Nonlinear Combination Method for Short-Term Wind Speed Prediction Based on ELM, ENN, and LSTM. IEEE Internet Things J. 6(4): 6997-7010 (2019) - [j86]Xu An Wang, Jian Weng, Jianfeng Ma, Xiaoyuan Yang:
Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification. Inf. Sci. 488: 13-18 (2019) - [j85]Xiaoqian Zhang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yaxi Yang, Min-Rong Chen, Xiaoqing Tan:
A hybrid universal blind quantum computation. Inf. Sci. 498: 135-143 (2019) - [j84]Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. J. Inf. Secur. Appl. 45: 10-19 (2019) - [j83]Xuelian Deng, Yuqing Li, Jian Weng, Jilian Zhang:
Feature selection for text classification: A review. Multim. Tools Appl. 78(3): 3797-3816 (2019) - [j82]Guo-Qiang Zeng, Xiao-Qing Xie, Min-Rong Chen, Jian Weng:
Adaptive population extremal optimization-based PID neural network for multivariable nonlinear control systems. Swarm Evol. Comput. 44: 320-334 (2019) - [j81]Jinming Wen, Jian Weng, Yi Fang, Haris Gacanin, Weiqi Luo:
Novel Properties of Successive Minima and Their Applications to 5G Tactile Internet. IEEE Trans. Ind. Informatics 15(5): 3068-3076 (2019) - [j80]Haode Yan, Zhengchun Zhou, Jian Weng, Jinming Wen, Tor Helleseth, Qi Wang:
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields. IEEE Trans. Inf. Theory 65(10): 6819-6826 (2019) - [j79]Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Jia-Nan Liu, Yang Xiang, Robert H. Deng:
CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing. IEEE Trans. Parallel Distributed Syst. 30(6): 1251-1266 (2019) - [j78]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Jian Weng, Hongwei Li, Hui Li:
Lightweight Fine-Grained Search Over Encrypted Data in Fog Computing. IEEE Trans. Serv. Comput. 12(5): 772-785 (2019) - [j77]Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, Niekie Liu:
False Load Attack to Smart Meters by Synchronously Switching Power Circuits. IEEE Trans. Smart Grid 10(3): 2641-2649 (2019) - [j76]Jia-Si Weng, Jian Weng, Yue Zhang, Weiqi Luo, Weiming Lan:
BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET. IEEE Trans. Veh. Technol. 68(1): 822-831 (2019) - [j75]Anjia Yang, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin, Xuemin Shen:
DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation. IEEE Trans. Veh. Technol. 68(5): 4834-4845 (2019) - [j74]Jinming Wen, Jian Weng, Chao Tong, Chao Ren, Zhengchun Zhou:
Sparse Signal Recovery With Minimization of 1-Norm Minus 2-Norm. IEEE Trans. Veh. Technol. 68(7): 6847-6854 (2019) - [j73]Ming Li, Jian Weng, Anjia Yang, Jia-Nan Liu, Xiaodong Lin:
Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks. IEEE Trans. Veh. Technol. 68(11): 11248-11259 (2019) - [c66]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Sub-exponential Learning Parity with Noise. ASIACRYPT (2) 2019: 3-24 - [c65]Yongdong Wu, Jian Weng, Bo Qiu, Zhuo Wei, Fan Qian, Robert H. Deng:
Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. DSC 2019: 1-8 - [c64]Jinming Wen, Xiao-Wen Chang, Jian Weng:
Improved Upper Bounds on the Hermite and KZ Constants. ISIT 2019: 1742-1746 - [c63]Li Zhang, Jiongyi Chen, Wenrui Diao, Shanqing Guo, Jian Weng, Kehuan Zhang:
CryptoREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices. RAID 2019: 151-164 - [c62]Wenrui Diao, Yue Zhang, Li Zhang, Zhou Li, Fenghao Xu, Xiaorui Pan, Xiangyu Liu, Jian Weng, Kehuan Zhang, XiaoFeng Wang:
Kindness is a Risky Business: On the Usage of the Accessibility APIs in Android. RAID 2019: 261-275 - [i23]Jinming Wen, Xiao-Wen Chang, Jian Weng:
Improved Upper Bounds on the Hermite and KZ Constants. CoRR abs/1904.09395 (2019) - [i22]Jiasi Weng, Jian Weng, Jia-Nan Liu, Yue Zhang:
Secure Software-Defined Networking Based on Blockchain. CoRR abs/1906.04342 (2019) - [i21]Hao Chen, Xianmang He, Jian Weng, Liqing Xu:
New Constructions of Subspace Codes Using Subsets of MRD codes in Several Blocks. CoRR abs/1908.03804 (2019) - [i20]Yue Zhang, Jian Weng, Rajib Dey, Yier Jin, Zhiqiang Lin, Xinwen Fu:
On the (In)security of Bluetooth Low Energy One-Way Secure Connections Only Mode. CoRR abs/1908.10497 (2019) - [i19]Yue Zhang, Jian Weng, Jiasi Weng, Ming Li, Weiqi Luo:
Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications. CoRR abs/1909.03367 (2019) - [i18]Hao Chen, Jian Weng, Weiqi Luo:
Long Optimal or Small-Defect LRC Codes with Unbounded Minimum Distances. CoRR abs/1910.07267 (2019) - [i17]Shanxiang Lyu, Jinming Wen, Jian Weng, Cong Ling:
On Low-complexity Lattice Reduction Algorithms for Large-scale MIMO Detection: the Blessing of Sequential Reduction. CoRR abs/1912.06278 (2019) - [i16]Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Weili Chen, Xiangping Chen, Jian Weng, Muhammad Imran:
An Overview on Smart Contracts: Challenges, Advances and Platforms. CoRR abs/1912.10370 (2019) - 2018
- [j72]Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, Anjia Yang:
Fully distributed certificateless threshold signature without random oracles. Sci. China Inf. Sci. 61(9): 098101:1-098101:3 (2018) - [j71]Zhan Qin, Jian Weng, Yong Cui, Kui Ren:
Privacy-Preserving Image Processing in the Cloud. IEEE Cloud Comput. 5(2): 48-57 (2018) - [j70]Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, Jian Weng:
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. Comput. Secur. 76: 341-353 (2018) - [j69]Anjia Yang, Yunhui Zhuang, Jian Weng, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang:
Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models. Future Gener. Comput. Syst. 82: 315-326 (2018) - [j68]Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang:
Notes on a provably-secure certificate-based encryption against malicious CA attacks. Inf. Sci. 463-464: 86-91 (2018) - [j67]Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Zhiquan Liu, Hongwei Li:
Enabling verifiable multiple keywords search over encrypted cloud data. Inf. Sci. 465: 21-37 (2018) - [j66]Huimin Wu, Jian Weng, Xin Chen, Wei Lu:
Feedback weight convolutional neural network for gait recognition. J. Vis. Commun. Image Represent. 55: 424-432 (2018) - [j65]Jixian Li, Wei Lu, Jian Weng, Yijun Mao, Guoqiang Li:
Double JPEG compression detection based on block statistics. Multim. Tools Appl. 77(24): 31895-31910 (2018) - [j64]Jiajie Zhang, Jian Weng, Weiqi Luo, Jia-Nan Liu, Anjia Yang, Jiancheng Lin, Zhijun Zhang, Hailiang Li:
REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks. IEEE Netw. 32(5): 118-123 (2018) - [j63]Xin Chen, Jian Weng, Wei Lu, Jiaming Xu:
Multi-Gait Recognition Based on Attribute Discovery. IEEE Trans. Pattern Anal. Mach. Intell. 40(7): 1697-1710 (2018) - [j62]Ruili Wang, Wanting Ji, Mingzhe Liu, Xun Wang, Jian Weng, Song Deng, Suying Gao, Chang-an Yuan:
Review on mining data from multiple data sources. Pattern Recognit. Lett. 109: 120-128 (2018) - [j61]Xiaoqian Zhang, Jian Weng, Xiaochun Li, Weiqi Luo, Xiaoqing Tan, Tingting Song:
Single-server blind quantum computation with quantum circuit model. Quantum Inf. Process. 17(6): 134 (2018) - [j60]Xiaotian Wu, Jian Weng, WeiQi Yan:
Adopting secret sharing for reversible data hiding in encrypted images. Signal Process. 143: 269-281 (2018) - [j59]Yue Cao, Kaimin Wei, Geyong Min, Jian Weng, Xin Yang, Zhili Sun:
A Geographic Multicopy Routing Scheme for DTNs With Heterogeneous Mobility. IEEE Syst. J. 12(1): 790-801 (2018) - [j58]Chun Yang, Jinyi Long, Mike A. Urbin, Yanyun Feng, Ge Song, Jian Weng, Zhijun Li:
Real-Time Myocontrol of a Human-Computer Interface by Paretic Muscles After Stroke. IEEE Trans. Cogn. Dev. Syst. 10(4): 1126-1132 (2018) - [j57]Zhijun Zhang, Lunan Zheng, Jian Weng, Yijun Mao, Wei Lu, Lin Xiao:
A New Varying-Parameter Recurrent Neural-Network for Online Solution of Time-Varying Sylvester Equation. IEEE Trans. Cybern. 48(11): 3135-3148 (2018) - [j56]Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Rongxing Lu, Jian Weng:
Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers. IEEE Trans. Dependable Secur. Comput. 15(1): 27-39 (2018) - [j55]Minxin Du, Qian Wang, Meiqi He, Jian Weng:
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage. IEEE Trans. Inf. Forensics Secur. 13(9): 2320-2332 (2018) - [j54]Xin Chen, Jian Weng, Wei Lu, Jiaming Xu, Jiasi Weng:
Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE Trans. Neural Networks Learn. Syst. 29(9): 3938-3952 (2018) - [j53]Xingliang Yuan, Jian Weng, Cong Wang, Kui Ren:
Secure Integrated Circuit Design via Hybrid Cloud. IEEE Trans. Parallel Distributed Syst. 29(8): 1851-1864 (2018) - [j52]Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, Robert H. Deng:
Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Trans. Smart Grid 9(5): 4490-4502 (2018) - [j51]Yongdong Wu, Zhuo Wei, Jian Weng, Robert H. Deng:
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Trans. Veh. Technol. 67(6): 5287-5301 (2018) - [c61]Shuang Hu, Lin Hou, Gongliang Chen, Jian Weng, Jianhua Li:
Reputation-based Distributed Knowledge Sharing System in Blockchain. MobiQuitous 2018: 476-481 - [e4]Jun Pang, Chenyi Zhang, Jifeng He, Jian Weng:
2018 International Symposium on Theoretical Aspects of Software Engineering, TASE 2018, Guangzhou, China, August 29-31, 2018. IEEE Computer Society 2018, ISBN 978-1-5386-7305-8 [contents] - [i15]Jiasi Weng, Jian Weng, Ming Li, Yue Zhang, Weiqi Luo:
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive. IACR Cryptol. ePrint Arch. 2018: 679 (2018) - 2017
- [j50]Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng, Robert H. Deng:
HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive. IEEE Access 5: 16314-16323 (2017) - [j49]Linfeng Wei, Weiqi Luo, Jian Weng, Yanjun Zhong, Xiaoqian Zhang, Zheng Yan:
Machine Learning-Based Malicious Application Detection of Android. IEEE Access 5: 25591-25601 (2017) - [j48]Fan Yang, Jingwei Li, Wei Lu, Jian Weng:
Copy-move forgery detection based on hybrid features. Eng. Appl. Artif. Intell. 59: 73-83 (2017) - [j47]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei:
Steganalysis of content-adaptive binary image data hiding. J. Vis. Commun. Image Represent. 46: 119-127 (2017) - [j46]Xin Chen, Jiaming Xu, Jian Weng:
Multi-gait recognition using hypergraph partition. Mach. Vis. Appl. 28(1-2): 117-127 (2017) - [j45]Liehuang Zhu, Zijian Zhang, Zhan Qin, Jian Weng, Kui Ren:
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids. IEEE Netw. 31(1): 59-63 (2017) - [j44]Kai He, Jian Weng, Yijun Mao, Huaqiang Yuan:
Anonymous identity-based broadcast encryption technology for smart city information system. Pers. Ubiquitous Comput. 21(5): 841-853 (2017) - [j43]Xiaoqian Zhang, Jian Weng, Xiaoqing Tan, Weiqi Luo:
Indistinguishability of pure orthogonal product states by LOCC. Quantum Inf. Process. 16(7): 168 (2017) - [j42]Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang:
Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC. Secur. Commun. Networks 2017: 5704865:1-5704865:8 (2017) - [j41]Zhe Liu, Jian Weng, Zhi Hu, Hwajeong Seo:
Efficient Elliptic Curve Cryptography for Embedded Devices. ACM Trans. Embed. Comput. Syst. 16(2): 53:1-53:18 (2017) - [j40]Zhangjie Fu, Fengxiao Huang, Kui Ren, Jian Weng, Cong Wang:
Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data. IEEE Trans. Inf. Forensics Secur. 12(8): 1874-1884 (2017) - [j39]Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert H. Deng:
Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE Trans. Intell. Transp. Syst. 18(4): 814-823 (2017) - [j38]Zhi-Hui Zhan, Xiao Fang Liu, Huaxiang Zhang, Zhengtao Yu, Jian Weng, Yun Li, Tianlong Gu, Jun Zhang:
Cloudde: A Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud Version. IEEE Trans. Parallel Distributed Syst. 28(3): 704-716 (2017) - [j37]Zijian Zhang, Zhan Qin, Liehuang Zhu, Jian Weng, Kui Ren:
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise. IEEE Trans. Smart Grid 8(2): 619-626 (2017) - [c60]Lingguang Lei, Yi He, Kun Sun, Jiwu Jing, Yuewu Wang, Qi Li, Jian Weng:
Vulnerable Implicit Service: A Revisit. CCS 2017: 1051-1063 - [c59]Qingji Zheng, Qi Li, Aytac Azgin, Jian Weng:
Data verification in information-centric networking with efficient revocable certificateless signature. CNS 2017: 1-9 - [c58]Yuxia Sun, Yunlong Xie, Zhi Qiu, Yuchang Pan, Jian Weng, Song Guo:
Detecting Android Malware Based on Extreme Learning Machine. DASC/PiCom/DataCom/CyberSciTech 2017: 47-53 - [c57]Yafei Yuan, Wei Lu, Bingwen Feng, Jian Weng:
Steganalysis with CNN Using Multi-channels Filtered Residuals. ICCCS (1) 2017: 110-120 - [c56]Si Chen, Kui Ren, Sixu Piao, Cong Wang, Qian Wang, Jian Weng, Lu Su, Aziz Mohaisen:
You Can Hear But You Cannot Steal: Defending Against Voice Impersonation Attacks on Smartphones. ICDCS 2017: 183-195 - [c55]Wenjie Yang, Jian Weng, Futai Zhang:
New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model. ICICS 2017: 236-247 - [c54]Song Luo, Lu Yan, Jian Weng, Zheng Yang:
New Proof for BKP IBE Scheme and Improvement in the MIMC Setting. ISPEC 2017: 136-155 - [c53]Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). ISPEC 2017: 638-647 - [c52]Bingwen Feng, Jian Weng, Wei Lu:
Improved Algorithms for Robust Histogram Shape-Based Image Watermarking. IWDW 2017: 275-289 - [c51]Jie Chen, Junqing Gong, Jian Weng:
Tightly Secure IBE Under Constant-Size Master Public Key. Public Key Cryptography (1) 2017: 207-231 - [e3]Robert H. Deng, Jian Weng, Kui Ren, Vinod Yegneswaran:
Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 198, Springer 2017, ISBN 978-3-319-59607-5 [contents] - [i14]Ming Li, Jian Weng, Anjia Yang, Wei Lu:
CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing. IACR Cryptol. ePrint Arch. 2017: 444 (2017) - [i13]Yu Yu, Jiang Zhang, Jian Weng, Chun Guo, Xiangxue Li:
Collision Resistant Hashing from Learning Parity with Noise. IACR Cryptol. ePrint Arch. 2017: 1260 (2017) - 2016
- [j36]Sha Liu, Shun Hu, Jian Weng, Shuhua Zhu, Zhiyan Chen:
A novel asymmetric three-party based authentication scheme in wearable devices environment. J. Netw. Comput. Appl. 60: 144-154 (2016) - [j35]Qingbo Zhang, Wei Lu, Jian Weng:
Joint image splicing detection in DCT and Contourlet transform domain. J. Vis. Commun. Image Represent. 40: 449-458 (2016) - [j34]Xiaotian Wu, Bing Chen, Jian Weng:
Reversible data hiding for encrypted signals by homomorphic encryption and signal energy transfer. J. Vis. Commun. Image Represent. 41: 58-64 (2016) - [j33]Yanjiang Yang, Haiyan Zhu, Haibing Lu, Jian Weng, Youcheng Zhang, Kim-Kwang Raymond Choo:
Cloud based data sharing with fine-grained proxy re-encryption. Pervasive Mob. Comput. 28: 122-134 (2016) - [j32]Zheli Liu, Jian Weng, Jin Li, Jun Yang, Chuan Fu, Chunfu Jia:
Cloud-based electronic health record system supporting fuzzy keyword search. Soft Comput. 20(8): 3243-3255 (2016) - [j31]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. IEEE Trans. Computers 65(10): 3184-3195 (2016) - [j30]Kai He, Jian Weng, Robert H. Deng, Joseph K. Liu:
On the security of two identity-based conditional proxy re-encryption schemes. Theor. Comput. Sci. 652: 18-27 (2016) - [j29]Xianping Mao, Junzuo Lai, Qixiang Mei, Kefei Chen, Jian Weng:
Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Trans. Dependable Secur. Comput. 13(5): 533-546 (2016) - [j28]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Jian Weng:
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys. IEEE Trans. Inf. Forensics Secur. 11(11): 2401-2414 (2016) - [j27]Zhan Qin, Kui Ren, Ting Yu, Jian Weng:
DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud. IEEE Trans. Multim. 18(5): 929-939 (2016) - [j26]Xingliang Yuan, Xinyu Wang, Cong Wang, Jian Weng, Kui Ren:
Enabling Secure and Fast Indexing for Privacy-Assured Healthcare Monitoring via Compressive Sensing. IEEE Trans. Multim. 18(10): 2002-2014 (2016) - [c50]Kai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng:
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. ACISP (2) 2016: 207-222 - [c49]Heyi Tang, Yong Cui, Chaowen Guan, Jianping Wu, Jian Weng, Kui Ren:
Enabling Ciphertext Deduplication for Secure Cloud Storage and Access Control. AsiaCCS 2016: 59-70 - [c48]Yanjiang Yang, Haibing Lu, Joseph K. Liu, Jian Weng, Youcheng Zhang, Jianying Zhou:
Credential Wrapping: From Anonymous Password Authentication to Anonymous Biometric Authentication. AsiaCCS 2016: 141-151 - [c47]Kai He, Jian Weng, Jia-Nan Liu, Joseph K. Liu, Wei Liu, Robert H. Deng:
Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. AsiaCCS 2016: 247-255 - [c46]Chengjun Cai, Jian Weng, Jia-Nan Liu:
Mobile Authentication System Based on National Regulation and NFC Technology. DSC 2016: 590-595 - [c45]Bingwen Feng, Jian Weng, Wei Lu, Bei Pei:
Multiple Watermarking Using Multilevel Quantization Index Modulation. IWDW 2016: 312-326 - [c44]Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jia-Nan Liu:
Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. NSS 2016: 65-79 - [c43]Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng:
CCA-Secure Keyed-Fully Homomorphic Encryption. Public Key Cryptography (1) 2016: 70-98 - [c42]Yongdong Wu, Bo Qiu, Zhuo Wei, Jian Weng:
Secure Subway Train-to-Train Communications via GSM-R Communication Systems. VTC Spring 2016: 1-5 - [i12]Yue Cao, Kaimin Wei, Geyong Min, Jian Weng, Xin Yang, Zhili Sun:
A Geographic Multi-Copy Routing Scheme for DTNs With Heterogeneous Mobility. CoRR abs/1601.03555 (2016) - 2015
- [j25]Kaimin Wei, Mianxiong Dong, Jian Weng, Guangzhou Shi, Kaoru Ota, Ke Xu:
Congestion-aware message forwarding in delay tolerant networks: a community perspective. Concurr. Comput. Pract. Exp. 27(18): 5722-5734 (2015) - [j24]Jin Li, Fatos Xhafa, Jian Weng:
Emerging services and technologies in wireless networks. J. High Speed Networks 21(2): 81-82 (2015) - [j23]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Signcryption KEM/tag-KEM, revisited. Secur. Commun. Networks 8(17): 3067-3082 (2015) - [j22]Xianping Mao, Junzuo Lai, Kefei Chen, Jian Weng, Qixiang Mei:
Efficient revocable identity-based encryption from multilinear maps. Secur. Commun. Networks 8(18): 3511-3522 (2015) - [j21]Yu Yu, Xiangxue Li, Jian Weng:
Pseudorandom generators from regular one-way functions: New constructions with improved parameters. Theor. Comput. Sci. 569: 58-69 (2015) - [j20]Jian Weng, Yunlei Zhao, Robert H. Deng, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [c41]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and Beyond. CRYPTO (2) 2015: 209-229 - [c40]Jun Yan, Jian Weng, Dongdai Lin, Yujuan Quan:
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof (Extended Abstract). ISAAC 2015: 555-565 - [c39]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
The Randomized Iterate, Revisited - Almost Linear Seed Length PRGs from a Broader Class of One-Way Functions. TCC (1) 2015: 7-35 - [i11]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure Against Selective Opening Chosen-Ciphertext Attack. IACR Cryptol. ePrint Arch. 2015: 297 (2015) - 2014
- [j19]Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Min-Rong Chen, Kefei Chen:
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Sci. China Inf. Sci. 57(7): 1-5 (2014) - [j18]Chaowen Guan, Jian Weng, Robert H. Deng, Min-Rong Chen, Dehua Zhou:
Unforgeability of an improved certificateless signature scheme in the standard model. IET Inf. Secur. 8(5): 273-276 (2014) - [j17]Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng, Chaowen Guan, Qiang Yan:
Towards semantically secure outsourcing of association rule mining on categorical data. Inf. Sci. 267: 267-286 (2014) - [j16]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Ziping Wang:
Robust password changing and DoS resilience for human-centric password authentication. Secur. Commun. Networks 7(10): 1552-1559 (2014) - [c38]Junzuo Lai, Robert H. Deng, Yingjiu Li, Jian Weng:
Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption. AsiaCCS 2014: 239-248 - [c37]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords. CCS 2014: 1457-1459 - [c36]Xiangxue Li, Yu Yu, Qiang Li, Haifeng Qian, Yuan Zhou, Jian Weng:
POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results. CCS 2014: 1460-1462 - [c35]Xiaofeng Chen, Jin Li, Jian Weng, Jianfeng Ma, Wenjing Lou:
Verifiable Computation over Large Database with Incremental Updates. ESORICS (1) 2014: 148-162 - [c34]Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng:
Verifiable Computation on Outsourced Encrypted Data. ESORICS (1) 2014: 273-291 - [c33]Jie Shi, Junzuo Lai, Yingjiu Li, Robert H. Deng, Jian Weng:
Authorized Keyword Search on Encrypted Data. ESORICS (1) 2014: 419-435 - [c32]Junzuo Lai, Robert H. Deng, Shengli Liu, Jian Weng, Yunlei Zhao:
Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack. EUROCRYPT 2014: 77-92 - [c31]Hiroaki Anada, Junpei Kawamoto, Jian Weng, Kouichi Sakurai:
Identity-Embedding Method for Decentralized Public-Key Infrastructure. INTRUST 2014: 1-14 - [c30]Yanjiang Yang, Haibing Lu, Jian Weng, Youcheng Zhang, Kouichi Sakurai:
Fine-Grained Conditional Proxy Re-Encryption and Application. ProvSec 2014: 206-222 - [i10]Yu Yu, Dawu Gu, Xiangxue Li, Jian Weng:
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions. IACR Cryptol. ePrint Arch. 2014: 393 (2014) - [i9]Dongdai Lin, Yujuan Quan, Jian Weng, Jun Yan:
Quantum Bit Commitment with Application in Quantum Zero-Knowledge Proof. IACR Cryptol. ePrint Arch. 2014: 791 (2014) - 2013
- [j15]Xiangxue Li, Haifeng Qian, Jian Weng, Yu Yu:
Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model. Math. Comput. Model. 57(3-4): 503-511 (2013) - [j14]Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng:
Attribute-Based Encryption With Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 8(8): 1343-1354 (2013) - [c29]Xiangxue Li, Haifeng Qian, Yu Yu, Yuan Zhou, Jian Weng:
Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles. ACNS 2013: 186-201 - [c28]Yu Yu, Xiangxue Li, Jian Weng:
Pseudorandom Generators from Regular One-Way Functions: New Constructions with Improved Parameters. ASIACRYPT (2) 2013: 261-279 - [c27]Shengli Liu, Kouichi Sakurai, Jian Weng, Fangguo Zhang, Yunlei Zhao:
Security Model and Analysis of FHMQV, Revisited. Inscrypt 2013: 255-269 - [c26]Shengli Liu, Jian Weng, Yunlei Zhao:
Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks. CT-RSA 2013: 84-100 - [c25]Junzuo Lai, Robert H. Deng, Yunlei Zhao, Jian Weng:
Accountable Authority Identity-Based Encryption with Public Traceability. CT-RSA 2013: 326-342 - [c24]Jie Shi, Ge Fu, Jian Weng, Hong Zhu:
Analyzing and Controlling Information Inference of Fine-Grained Access Control Policies in Relational Databases. EIDWT 2013: 385-392 - [c23]Xiangxue Li, Haifeng Qian, Yu Yu, Jian Weng, Yuan Zhou:
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model. ICICS 2013: 167-184 - [c22]Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou:
Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices. ISC 2013: 238-247 - [c21]Junzuo Lai, Robert H. Deng, Yanjiang Yang, Jian Weng:
Adaptable Ciphertext-Policy Attribute-Based Encryption. Pairing 2013: 199-214 - [e2]Changshe Ma, Jian Weng:
Radio Frequency Identification System Security - RFIDsec'13 Asia Workshop Proceedings, Guangzhou, China, November 27, 2013. Cryptology and Information Security Series 11, IOS Press 2013, ISBN 978-1-61499-327-8 [contents] - [i8]Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng:
Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication. IACR Cryptol. ePrint Arch. 2013: 207 (2013) - 2012
- [j13]Sherman S. M. Chow, Changshe Ma, Jian Weng:
Zero-Knowledge Argument for Simultaneous Discrete Logarithms. Algorithmica 64(2): 246-266 (2012) - [c20]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c19]Yanjiang Yang, Haibing Lu, Jian Weng, Xuhua Ding, Jianying Zhou:
A Generic Approach for Providing Revocation Support in Secret Handshake. ICICS 2012: 276-284 - 2011
- [j12]Xu An Wang, Jian Weng, Xiaoyuan Yang, Yanjiang Yang:
Cryptanalysis of an identity based broadcast encryption scheme without random oracles. Inf. Process. Lett. 111(10): 461-464 (2011) - [j11]Jian Weng, Guoxiang Yao, Robert H. Deng, Min-Rong Chen, Xiangxue Li:
Cryptanalysis of a certificateless signcryption scheme in the standard model. Inf. Sci. 181(3): 661-667 (2011) - [j10]Zhong-Mei Wan, Jian Weng, Xuejia Lai, Shengli Liu, Jiguo Li:
On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption. J. Inf. Sci. Eng. 27(1): 243-259 (2011) - [j9]Xu An Wang, Jian Weng, Xiaoyuan Yang, Minqing Zhang:
Cryptanalysis of an (hierarchical) identity based parallel key-insulated encryption scheme. J. Syst. Softw. 84(2): 219-225 (2011) - [c18]Yanjiang Yang, Haibing Lu, Jian Weng:
Multi-User Private Keyword Search for Cloud Computing. CloudCom 2011: 264-271 - [c17]Zhiwei Weng, Jian Weng, Kai He, Yingkai Li:
New Chosen Ciphertext Secure Public Key Encryption in the Standard Model with Public Verifiability. ICIC (2) 2011: 170-176 - [c16]Jian Weng, Yunlei Zhao, Goichiro Hanaoka:
On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. Public Key Cryptography 2011: 284-295 - [e1]Feng Bao, Jian Weng:
Information Security Practice and Experience - 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings. Lecture Notes in Computer Science 6672, Springer 2011, ISBN 978-3-642-21030-3 [contents] - [i7]Jian Weng, Yunlei Zhao:
Direct Constructions of Bidirectional Proxy Re-Encryption with Alleviated Trust in Proxy. IACR Cryptol. ePrint Arch. 2011: 208 (2011) - 2010
- [j8]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53(3): 593-606 (2010) - [j7]Changshe Ma, Jian Weng, Yingjiu Li, Robert H. Deng:
Efficient discrete logarithm based multi-signature scheme in the plain public key model. Des. Codes Cryptogr. 54(2): 121-133 (2010) - [j6]Jian Weng, Min-Rong Chen, Kefei Chen, Robert H. Deng:
Cryptanalysis of a Hierarchical Identity-Based Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(4): 854-856 (2010) - [j5]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen:
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings. Inf. Sci. 180(24): 5077-5089 (2010) - [j4]Zhong-Mei Wan, Jian Weng, Jiguo Li:
Security Mediated Certificateless Signatures Without Pairing. J. Comput. 5(12): 1862-1869 (2010) - [c15]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. AFRICACRYPT 2010: 316-332 - [c14]Sherman S. M. Chow, Changshe Ma, Jian Weng:
Zero-Knowledge Argument for Simultaneous Discrete Logarithms. COCOON 2010: 520-529 - [c13]Goichiro Hanaoka, Jian Weng:
Generic Constructions of Parallel Key-Insulated Encryption. SCN 2010: 36-53 - [i6]Jian Weng, Min-Rong Chen, Yanjiang Yang, Robert H. Deng, Kefei Chen, Feng Bao:
CCA-Secure Unidirectional Proxy Re-Encryption in the Adaptive Corruption Model without Random Oracles. IACR Cryptol. ePrint Arch. 2010: 265 (2010) - [i5]Jian Weng, Yunlei Zhao:
On the Security of a Bidirectional Proxy Re-Encryption Scheme from PKC 2010. IACR Cryptol. ePrint Arch. 2010: 319 (2010) - [i4]Goichiro Hanaoka, Jian Weng:
Generic Constructions of Parallel Key-Insulated Encryption: Stronger Security Model and Novel Schemes. IACR Cryptol. ePrint Arch. 2010: 468 (2010)
2000 – 2009
- 2009
- [c12]Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng:
Conditional Proxy Broadcast Re-Encryption. ACISP 2009: 327-342 - [c11]Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao:
A New Approach for Anonymous Password Authentication. ACSAC 2009: 199-208 - [c10]Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai:
Conditional proxy re-encryption secure against chosen-ciphertext attack. AsiaCCS 2009: 322-332 - [c9]Yanjiang Yang, Jian Weng, Jianying Zhou, Ying Qiu:
Optionally Identifiable Private Handshakes. Inscrypt 2009: 164-178 - [c8]Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao:
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. ISC 2009: 151-166 - [c7]Yanjiang Yang, Feng Bao, Jian Weng:
Private handshakes with optional accountability. LCN 2009: 245-248 - [c6]Yanjiang Yang, Yingjiu Li, Jian Weng, Jianying Zhou, Feng Bao:
Self-enforcing Private Inference Control. ProvSec 2009: 260-274 - [i3]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2009: 189 (2009) - 2008
- [j3]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Parallel Key-Insulated Signature: Framework and Construction. J. Res. Pract. Inf. Technol. 40(1): 55-68 (2008) - [j2]Jian Weng, Xiangxue Li, Kefei Chen, Shengli Liu:
Identity-Based Parallel Key-Insulated Signature Without Random Oracles. J. Inf. Sci. Eng. 24(4): 1143-1157 (2008) - [c5]Robert H. Deng, Jian Weng, Shengli Liu, Kefei Chen:
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. CANS 2008: 1-17 - [c4]Jian Weng, Shengli Liu, Kefei Chen, Dong Zheng, Weidong Qiu:
Identity-Based Threshold Key-Insulated Encryption without Random Oracles. CT-RSA 2008: 203-220 - [i2]Jian Weng, Robert H. Deng, Shengli Liu, Kefei Chen, Junzuo Lai, Xu An Wang:
Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings. IACR Cryptol. ePrint Arch. 2008: 509 (2008) - 2007
- [j1]Jian Weng, Shengli Liu, Kefei Chen:
Pirate decoder for the broadcast encryption schemes from Crypto 2005. Sci. China Ser. F Inf. Sci. 50(3): 318-323 (2007) - [i1]Changshe Ma, Jian Weng, Dong Zheng:
Fast Digital Signature Schemes as Secure as Diffie-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2007: 19 (2007) - 2006
- [c3]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Key-Insulated Signature Without Random Oracles. CIS 2006: 470-480 - [c2]Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Key-Insulated Signature with Secure Key-Updates. Inscrypt 2006: 13-26 - [c1]Jian Weng, Shengli Liu, Kefei Chen, Changshe Ma:
Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction. INDOCRYPT 2006: 409-423
Coauthor Index
aka: Guo-Qiang Zeng
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint