关注
Jian Weng
Jian Weng
Professor, College of Cyber Security, Jinan University
在 jnu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
An overview on smart contracts: Challenges, advances and platforms
Z Zheng, S Xie, HN Dai, W Chen, X Chen, J Weng, M Imran
Future Generation Computer Systems 105, 475-491, 2020
5742020
Attribute-based encryption with verifiable outsourced decryption
J Lai, RH Deng, C Guan, J Weng
IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013
5172013
Efficient unidirectional proxy re-encryption
SSM Chow, J Weng, Y Yang, RH Deng
Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010
4212010
CrowdBC: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1251-1266, 2018
4002018
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
J Weng, RH Deng, S Liu, K Chen
Information Sciences 180 (24), 5077-5089, 2010
381*2010
Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive
J Weng, J Weng, J Zhang, M Li, Y Zhang, W Luo
IEEE Transactions on Dependable and Secure Computing 18 (5), 2438-2455, 2019
3622019
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
3062015
Feature selection for text classification: A review
X Deng, Y Li, J Weng, J Zhang
Multimedia Tools and Applications 78, 3797-3816, 2019
2542019
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th international symposium on information, computer, and …, 2009
2422009
An efficient privacy-preserving outsourced calculation toolkit with multiple keys
X Liu, RH Deng, KKR Choo, J Weng
IEEE Transactions on Information Forensics and Security 11 (11), 2401-2414, 2016
2082016
Adaptive population extremal optimization-based PID neural network for multivariable nonlinear control systems
GQ Zeng, XQ Xie, MR Chen, J Weng
Swarm and evolutionary computation 44, 320-334, 2019
1762019
Efficient and privacy-preserving outsourced calculation of rational numbers
X Liu, KKR Choo, RH Deng, R Lu, J Weng
IEEE Transactions on Dependable and Secure Computing 15 (1), 27-39, 2016
1672016
Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data
Z Fu, F Huang, K Ren, J Weng, C Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017
1632017
Conditional proxy broadcast re-encryption
CK Chu, J Weng, SSM Chow, J Zhou, RH Deng
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
1612009
A two-layer nonlinear combination method for short-term wind speed prediction based on ELM, ENN, and LSTM
MR Chen, GQ Zeng, KD Lu, J Weng
IEEE Internet of Things Journal 6 (4), 6997-7010, 2019
1582019
Copy-move forgery detection based on hybrid features
F Yang, J Li, W Lu, J Weng
Engineering Applications of Artificial Intelligence 59, 73-83, 2017
1442017
Cloudde: A heterogeneous differential evolution algorithm and its distributed cloud version
ZH Zhan, XF Liu, H Zhang, Z Yu, J Weng, Y Li, T Gu, J Zhang
IEEE Transactions on Parallel and Distributed Systems 28 (3), 704-716, 2016
1432016
Multi-user private keyword search for cloud computing
Y Yang, H Lu, J Weng
2011 IEEE third international conference on cloud computing technology and …, 2011
1412011
Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise
Z Zhang, Z Qin, L Zhu, J Weng, K Ren
IEEE Transactions on Smart Grid 8 (2), 619-626, 2016
1382016
An improved deep learning approach for detection of thyroid papillary cancer in ultrasound images
H Li, J Weng, Y Shi, W Gu, Y Mao, Y Wang, W Liu, J Zhang
Scientific reports 8 (1), 6600, 2018
1352018
系统目前无法执行此操作,请稍后再试。
文章 1–20