Lattice-based autonomous path proxy re-encryption in the standard model W Xie, J Weng, Y Tong, X Liang, L Yao, F Zhao Science China Information Sciences 66 (10), 202101, 2023 | | 2023 |
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services L Li, J Huang, L Chang, J Weng, J Chen, J Li Frontiers of Computer Science 17 (5), 175814, 2023 | | 2023 |
Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality J Wang, BY Gao, H Tu, HN Liang, Z Liu, W Luo, J Weng International Journal of Human–Computer Interaction, 1-19, 2023 | | 2023 |
PRI: PCH-based Privacy-Preserving with Reusability and Interoperability for Enhancing Blockchain Scalability Y Li, J Weng, W Wu, M Li, Y Li, H Tu, Y Wu, RH Deng Journal of Parallel and Distributed Computing, 104721, 2023 | | 2023 |
Predicate Private Set Intersection with Linear Complexity Y Yang, J Weng, Y Yi, C Dong, LY Zhang, J Zhou International Conference on Applied Cryptography and Network Security, 143-166, 2023 | | 2023 |
Differential Evolution-Based Convolutional Neural Networks: An Automatic Architecture Design Method for Intrusion Detection in Industrial Control Systems JC Huang, GQ Zeng, GG Geng, J Weng, KD Lu, Y Zhang Computers & Security, 103310, 2023 | | 2023 |
ECQV-GDH-Based Group Key Exchange Protocol for CAN Bus H Sun, W Luo, J Weng, Z Liu, M Li IEEE Transactions on Vehicular Technology, 2023 | | 2023 |
Simulatable verifiable random function from the LWE assumption Y Li, S Liu, S Han, D Gu, J Weng Theoretical Computer Science 957, 113826, 2023 | | 2023 |
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing L Yao, J Weng, A Yang, X Liang, Z Wu, Z Jiang, L Hou Information Sciences 624, 777-795, 2023 | 2 | 2023 |
Enhancing deep knowledge tracing with auxiliary tasks Z Liu, Q Liu, J Chen, S Huang, B Gao, W Luo, J Weng Proceedings of the ACM Web Conference 2023, 4178-4187, 2023 | 1 | 2023 |
Asymmetric Group Message Franking: Definitions and Constructions J Lai, G Zeng, Z Huang, SM Yiu, X Mu, J Weng Annual International Conference on the Theory and Applications of …, 2023 | | 2023 |
PriGenX: Privacy-preserving Query With Anonymous Access Control for Genomic Data Y Yang, J Weng, Y Tong, JN Liu, Z Wu, LY Zhang, A Yang IEEE Transactions on Dependable and Secure Computing, 2023 | | 2023 |
Privacy-Preserving and Byzantine-Robust Federated Learning C Dong, J Weng, M Li, JN Liu, Z Liu, Y Cheng, S Yu IEEE Transactions on Dependable and Secure Computing, 2023 | | 2023 |
pvcnn: Privacy-preserving and verifiable convolutional neural network testing J Weng, J Weng, G Tang, A Yang, M Li, JN Liu IEEE Transactions on Information Forensics and Security 18, 2218-2233, 2023 | 1 | 2023 |
Behavioral Authentication with Head-Tilt Based Locomotion for Metaverse Z Mai, Y He, J Feng, H Tu, J Weng, BY Gao 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and …, 2023 | | 2023 |
A robust document image watermarking scheme using deep neural network S Ge, Z Xia, J Fei, Y Tong, J Weng, M Li Multimedia Tools and Applications, 1-24, 2023 | 7 | 2023 |
SOPA‐GA‐CNN: Synchronous optimisation of parameters and architectures by genetic algorithms with convolutional neural network blocks for securing Industrial Internet‐of‐Things JC Huang, GQ Zeng, GG Geng, J Weng, KD Lu IET Cyber‐Systems and Robotics 5 (1), e12085, 2023 | | 2023 |
A Survey of Secure Computation Using Trusted Execution Environments X Li, B Zhao, G Yang, T Xiang, J Weng, RH Deng arXiv preprint arXiv:2302.12150, 2023 | | 2023 |
A Blockchain-Based Copyright Protection Scheme With Proactive Defense X Chen, A Yang, J Weng, Y Tong, C Huang, T Li IEEE Transactions on Services Computing, 2023 | | 2023 |
US-Rule: Discovering utility-driven sequential rules G Huang, W Gan, J Weng, PS Yu ACM Transactions on Knowledge Discovery from Data 17 (1), 1-22, 2023 | 3 | 2023 |