default search action
BibTeX records: Xiaofen Wang
@article{DBLP:journals/ijufks/Wang24, author = {Xiaofen Wang}, title = {Automatic Alignment of Ring-Grid Laser Images based on an Improved Classical Iterative Algorithm}, journal = {Int. J. Uncertain. Fuzziness Knowl. Based Syst.}, volume = {32}, number = {4}, pages = {433--452}, year = {2024}, url = {https://doi.org/10.1142/S0218488524400026}, doi = {10.1142/S0218488524400026}, timestamp = {Thu, 12 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijufks/Wang24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenWDY24, author = {Tao Chen and Xiaofen Wang and Hong{-}Ning Dai and Haomiao Yang}, title = {A Dropout-Tolerated Privacy-Preserving Method for Decentralized Crowdsourced Federated Learning}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {2}, pages = {1788--1799}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3315730}, doi = {10.1109/JIOT.2023.3315730}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ChenWDY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/Wang0CDWZL24, author = {Yanping Wang and Xiaosong Zhang and Ruidong Chen and Hong{-}Ning Dai and Xiaofen Wang and Leo Yu Zhang and Ming Li}, title = {Multireceiver Conditional Anonymous Singcryption for IoMT Crowdsourcing}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {5}, pages = {8401--8413}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3319074}, doi = {10.1109/JIOT.2023.3319074}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/Wang0CDWZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/softx/WangSZWW24, author = {Xiaofen Wang and Haodong Shi and Xiaotong Zhang and Yadong Wan and Peng Wang}, title = {MicEMD: Open-source toolbox for electromagnetic modeling, inversion, and classification in underground metal target detection}, journal = {SoftwareX}, volume = {27}, pages = {101812}, year = {2024}, url = {https://doi.org/10.1016/j.softx.2024.101812}, doi = {10.1016/J.SOFTX.2024.101812}, timestamp = {Thu, 15 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/softx/WangSZWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenWD24, author = {Tao Chen and Xiaofen Wang and Hong{-}Ning Dai}, editor = {Tianqing Zhu and Yannan Li}, title = {{R-PPDFL:} {A} Robust and Privacy-Preserving Decentralized Federated Learning System}, booktitle = {Information Security and Privacy - 29th Australasian Conference, {ACISP} 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {14897}, pages = {158--173}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5101-3\_9}, doi = {10.1007/978-981-97-5101-3\_9}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenWD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icit2/OuyangLJWWWWP24, author = {Yuanbing Ouyang and Yiming Luo and Ran Ji and Di Wu and Ding Wang and Xiaofen Wang and Hao Wang and Yushan Pan}, title = {AIoT and VR-Based Technology for Robots Control in Critical Safety Environments: Challenges and Opportunities}, booktitle = {{IEEE} International Conference on Industrial Technology, {ICIT} 2024, Bristol, UK, March 25-27, 2024}, pages = {1--6}, publisher = {{IEEE}}, year = {2024}, url = {https://doi.org/10.1109/ICIT58233.2024.10541037}, doi = {10.1109/ICIT58233.2024.10541037}, timestamp = {Wed, 19 Jun 2024 08:33:46 +0200}, biburl = {https://dblp.org/rec/conf/icit2/OuyangLJWWWWP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gandc/WangWZWLS23, author = {Xiaofen Wang and Peng Wang and Xiaotong Zhang and Yadong Wan and Wen Liu and Haodong Shi}, title = {Efficient and robust Levenberg-Marquardt Algorithm based on damping parameters for parameter inversion in underground metal target detection}, journal = {Comput. Geosci.}, volume = {176}, pages = {105354}, year = {2023}, url = {https://doi.org/10.1016/j.cageo.2023.105354}, doi = {10.1016/J.CAGEO.2023.105354}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/gandc/WangWZWLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WangWDZI23, author = {Yanping Wang and Xiaofen Wang and Hong{-}Ning Dai and Xiaosong Zhang and Muhammad Imran}, title = {A Data Reporting Protocol With Revocable Anonymous Authentication for Edge-Assisted Intelligent Transport Systems}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {19}, number = {6}, pages = {7835--7847}, year = {2023}, url = {https://doi.org/10.1109/TII.2022.3226244}, doi = {10.1109/TII.2022.3226244}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/WangWDZI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/Peng0SWZ23, author = {Yubo Peng and Xiong Li and Shuai Shang and Xiaofen Wang and Xiaosong Zhang}, title = {Low-overhead Privacy-preserving Location-based Skyline Query}, booktitle = {{IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking, ISPA/BDCloud/SocialCom/SustainCom, 2023, Wuhan, China, December 21-24, 2023}, pages = {344--351}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00077}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM59178.2023.00077}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bdcloud/Peng0SWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cgi/ChenCWXLH23, author = {Jin Chen and Jun Chen and Xiaofen Wang and Dongshu Xu and Chao Liang and Zhen Han}, editor = {Bin Sheng and Lei Bi and Jinman Kim and Nadia Magnenat{-}Thalmann and Daniel Thalmann}, title = {Learning Degradation for Real-World Face Super-Resolution}, booktitle = {Advances in Computer Graphics - 40th Computer Graphics International Conference, {CGI} 2023, Shanghai, China, August 28 - September 1, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14496}, pages = {120--131}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50072-5\_10}, doi = {10.1007/978-3-031-50072-5\_10}, timestamp = {Sun, 14 Jan 2024 19:41:03 +0100}, biburl = {https://dblp.org/rec/conf/cgi/ChenCWXLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouZWYDL22, author = {Rang Zhou and Xiaosong Zhang and Xiaofen Wang and Guowu Yang and Hong{-}Ning Dai and Mingzhe Liu}, title = {Device-Oriented Keyword-Searchable Encryption Scheme for Cloud-Assisted Industrial IoT}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {18}, pages = {17098--17109}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3124807}, doi = {10.1109/JIOT.2021.3124807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhouZWYDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuNLZWLH22, author = {Hang Zhu and Weina Niu and Xuhan Liao and Xiaosong Zhang and Xiaofen Wang and Beibei Li and Zheyuan He}, title = {Attacker Traceability on Ethereum through Graph Analysis}, journal = {Secur. Commun. Networks}, volume = {2022}, pages = {3448950:1--3448950:12}, year = {2022}, url = {https://doi.org/10.1155/2022/3448950}, doi = {10.1155/2022/3448950}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhuNLZWLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spl/WangCHZR22, author = {Xiaofen Wang and Jun Chen and Zhen Han and Qikui Zhu and Weijian Ruan}, title = {Real-Time Video Deraining via Global Motion Compensation and Hybrid Multi-Scale Temporal Correlations}, journal = {{IEEE} Signal Process. Lett.}, volume = {29}, pages = {672--676}, year = {2022}, url = {https://doi.org/10.1109/LSP.2022.3152080}, doi = {10.1109/LSP.2022.3152080}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spl/WangCHZR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/LuWGLY22, author = {Ruiheng Lu and Xiaofen Wang and Mengyu Ge and Jiasheng Li and Haomiao Yang}, title = {Secure {SVM} Services with Multiple Service Providers and Subscribers in the Cloud}, booktitle = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications; 8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}, pages = {1473--1479}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00227}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00227}, timestamp = {Thu, 06 Apr 2023 11:34:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/LuWGLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/ZhangLPLW22, author = {Junwei Zhang and Zhao Li and Hao Peng and Ming Li and Xiaofen Wang}, title = {Feedforward Neural Network Reconstructed from High-order Quantum Systems}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2022, Padua, Italy, July 18-23, 2022}, pages = {1--8}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IJCNN55064.2022.9892720}, doi = {10.1109/IJCNN55064.2022.9892720}, timestamp = {Fri, 26 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/ZhangLPLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ChaiWZYC22, author = {Dongwen Chai and Xiaofen Wang and Xiaosong Zhang and Haomiao Yang and Tao Chen}, title = {An intrusion detection system based on multiple interpretation methods}, booktitle = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable Computing {\&} Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022, Haikou, China, December 15-18, 2022}, pages = {1304--1309}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00224}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00224}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/ChaiWZYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijinfoman/AnZOLYW21, author = {Lu An and Wenjing Zhou and Menghua Ou and Gang Li and Chuanming Yu and Xiaofen Wang}, title = {Measuring and profiling the topical influence and sentiment contagion of public event stakeholders}, journal = {Int. J. Inf. Manag.}, volume = {58}, pages = {102327}, year = {2021}, url = {https://doi.org/10.1016/j.ijinfomgt.2021.102327}, doi = {10.1016/J.IJINFOMGT.2021.102327}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijinfoman/AnZOLYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouZWYGD21, author = {Rang Zhou and Xiaosong Zhang and Xiaofen Wang and Guowu Yang and Nadra Guizani and Xiaojiang Du}, title = {Efficient and Traceable Patient Health Data Search System for Hospital Management in Smart Cities}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {8}, pages = {6425--6436}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2020.3028598}, doi = {10.1109/JIOT.2020.3028598}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhouZWYGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jstsp/JiangWYCWJX21, author = {Kui Jiang and Zhongyuan Wang and Peng Yi and Chen Chen and Xiaofen Wang and Junjun Jiang and Zixiang Xiong}, title = {Multi-Level Memory Compensation Network for Rain Removal via Divide-and-Conquer Strategy}, journal = {{IEEE} J. Sel. Top. Signal Process.}, volume = {15}, number = {2}, pages = {216--228}, year = {2021}, url = {https://doi.org/10.1109/JSTSP.2021.3052648}, doi = {10.1109/JSTSP.2021.3052648}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jstsp/JiangWYCWJX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhangLWDL021, author = {Ke Zhang and Jiahuan Long and Xiaofen Wang and Hong{-}Ning Dai and Kaitai Liang and Muhammad Imran}, title = {Lightweight Searchable Encryption Protocol for Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {17}, number = {6}, pages = {4248--4259}, year = {2021}, url = {https://doi.org/10.1109/TII.2020.3014168}, doi = {10.1109/TII.2020.3014168}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhangLWDL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LiuDWIWS20, author = {Yalin Liu and Hong{-}Ning Dai and Hao Wang and Muhammad Imran and Xiaofen Wang and Muhammad Shoaib}, title = {UAV-enabled data acquisition scheme with directional wireless energy transfer for Internet of Things}, journal = {Comput. Commun.}, volume = {155}, pages = {184--196}, year = {2020}, url = {https://doi.org/10.1016/j.comcom.2020.03.020}, doi = {10.1016/J.COMCOM.2020.03.020}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/LiuDWIWS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/WangCJHRWL20, author = {Xiaofen Wang and Jun Chen and Kui Jiang and Zhen Han and Weijian Ruan and Zhongyuan Wang and Chao Liang}, title = {Single image de-raining via clique recursive feedback mechanism}, journal = {Neurocomputing}, volume = {417}, pages = {142--154}, year = {2020}, url = {https://doi.org/10.1016/j.neucom.2020.07.083}, doi = {10.1016/J.NEUCOM.2020.07.083}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijon/WangCJHRWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HuangZMRWLXQ20, author = {Ke Huang and Xiaosong Zhang and Yi Mu and Fatemeh Rezaeibagha and Xiaofen Wang and Jingwei Li and Qi Xia and Jing Qin}, title = {{EVA:} Efficient Versatile Auditing Scheme for IoT-Based Datamarket in Jointcloud}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {2}, pages = {882--892}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2945921}, doi = {10.1109/JIOT.2019.2945921}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HuangZMRWLXQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jms/JinFCSWZYQPHHJG20, author = {Hong Jin and Xinyan Fu and Xinyi Cao and Mingxia Sun and Xiaofen Wang and Yuhong Zhong and Suwen Yang and Chao Qi and Bo Peng and Xin He and Fei He and Yongfang Jiang and Haiyan Gao and Shun Li and Zhen Huang and Qiang Li and Fengqi Fang and Jun Zhang}, title = {Developing and Preliminary Validating an Automatic Cell Classification System for Bone Marrow Smears: a Pilot Study}, journal = {J. Medical Syst.}, volume = {44}, number = {10}, pages = {184}, year = {2020}, url = {https://doi.org/10.1007/s10916-020-01654-y}, doi = {10.1007/S10916-020-01654-Y}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jms/JinFCSWZYQPHHJG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/AffumZWA20, author = {Eric Affum and Xiasong Zhang and Xiaofen Wang and John Bosco Ansuura}, title = {Efficient Lattice {CP-ABE} {AC} Scheme Supporting Reduced-OBDD Structure for {CCN/NDN}}, journal = {Symmetry}, volume = {12}, number = {1}, pages = {166}, year = {2020}, url = {https://doi.org/10.3390/sym12010166}, doi = {10.3390/SYM12010166}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/AffumZWA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/HuangZWMRXWZYXD20, author = {Ke Huang and Xiaosong Zhang and Xiaofen Wang and Yi Mu and Fatemeh Rezaeibagha and Guangquan Xu and Hao Wang and Xi Zheng and Guomin Yang and Qi Xia and Xiaojiang Du}, title = {{HUCDO:} {A} Hybrid User-centric Data Outsourcing Scheme}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {4}, number = {3}, pages = {35:1--35:23}, year = {2020}, url = {https://doi.org/10.1145/3379464}, doi = {10.1145/3379464}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/HuangZWMRXWZYXD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atci/MaW20, author = {Xiaodan Ma and Xiaofen Wang}, editor = {Jemal H. Abawajy and Kim{-}Kwang Raymond Choo and Zheng Xu and Mohammed Atiquzzaman}, title = {Construction of User Portrait Based on Alipay Big Data}, booktitle = {2020 International Conference on Applications and Techniques in Cyber Intelligence - Applications and Techniques in Cyber Intelligence {(ATCI} 2020), Fuyang, China, 20-22 June, 2020}, series = {Advances in Intelligent Systems and Computing}, volume = {1244}, pages = {467--472}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-53980-1\_69}, doi = {10.1007/978-3-030-53980-1\_69}, timestamp = {Tue, 05 Apr 2022 12:05:39 +0200}, biburl = {https://dblp.org/rec/conf/atci/MaW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csonet/WangWWHZ20, author = {Yanping Wang and Xiaofen Wang and Pan Wen and Teng Hu and Xiaosong Zhang}, editor = {Sriram Chellappan and Kim{-}Kwang Raymond Choo and NhatHai Phan}, title = {A Privacy-Preserving Blockchain-based Information Shared Scheme in Smart-Cities}, booktitle = {Computational Data and Social Networks - 9th International Conference, CSoNet 2020, Dallas, TX, USA, December 11-13, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12575}, pages = {283--294}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-66046-8\_23}, doi = {10.1007/978-3-030-66046-8\_23}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csonet/WangWWHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangDZ19, author = {Xiaofen Wang and Hong{-}Ning Dai and Ke Zhang}, title = {Secure and flexible economic data sharing protocol based on ID-based dynamic exclusive broadcast encryption in economic system}, journal = {Future Gener. Comput. Syst.}, volume = {99}, pages = {177--185}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.11.013}, doi = {10.1016/J.FUTURE.2018.11.013}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangDZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijfcs/RezaeibaghaMZW19, author = {Fatemeh Rezaeibagha and Yi Mu and Shiwei Zhang and Xiaofen Wang}, title = {Provably Secure (Broadcast) Homomorphic Signcryption}, journal = {Int. J. Found. Comput. Sci.}, volume = {30}, number = {4}, pages = {511--529}, year = {2019}, url = {https://doi.org/10.1142/S0129054119400100}, doi = {10.1142/S0129054119400100}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijfcs/RezaeibaghaMZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhouZWYWW19, author = {Rang Zhou and Xiaosong Zhang and Xiaofen Wang and Guowu Yang and Hao Wang and Yulei Wu}, title = {Privacy-preserving data search with fine-grained dynamic search right management in fog-assisted Internet of Things}, journal = {Inf. Sci.}, volume = {491}, pages = {251--264}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2019.04.003}, doi = {10.1016/J.INS.2019.04.003}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhouZWYWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YangWYCZ19, author = {Haomiao Yang and Xiaofen Wang and Chun Yang and Xin Cong and You Zhang}, title = {Securing content-centric networks with content-based encryption}, journal = {J. Netw. Comput. Appl.}, volume = {128}, pages = {21--32}, year = {2019}, url = {https://doi.org/10.1016/j.jnca.2018.12.005}, doi = {10.1016/J.JNCA.2018.12.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YangWYCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/HuangZMWYDRXG19, author = {Ke Huang and Xiaosong Zhang and Yi Mu and Xiaofen Wang and Guomin Yang and Xiaojiang Du and Fatemeh Rezaeibagha and Qi Xia and Mohsen Guizani}, title = {Building Redactable Consortium Blockchain for Industrial Internet-of-Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {6}, pages = {3670--3679}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2901011}, doi = {10.1109/TII.2019.2901011}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/HuangZMWYDRXG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/WangCHXLZW19, author = {Xiaofen Wang and Jun Chen and Zhen Han and Mingfu Xiong and Chao Liang and Qi Zheng and Zhongyuan Wang}, title = {Rain Streak Removal via Multi-scale Mixture Exponential Power Model}, booktitle = {{IEEE} International Conference on Acoustics, Speech and Signal Processing, {ICASSP} 2019, Brighton, United Kingdom, May 12-17, 2019}, pages = {1767--1771}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICASSP.2019.8682552}, doi = {10.1109/ICASSP.2019.8682552}, timestamp = {Tue, 15 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icassp/WangCHXLZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/LongZWD19, author = {Jiahuan Long and Ke Zhang and Xiaofen Wang and Hong{-}Ning Dai}, editor = {Guojun Wang and Jun Feng and Md. Zakirul Alam Bhuiyan and Rongxing Lu}, title = {Lightweight Distributed Attribute Based Keyword Search System for Internet of Things}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11637}, pages = {253--264}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-24900-7\_21}, doi = {10.1007/978-3-030-24900-7\_21}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/LongZWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MohamedWZ18, author = {Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang}, title = {Adaptively-Secure Authenticated Key Exchange Protocol in Standard Model}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {345--358}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p345-358.pdf}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/MohamedWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhouZDWYG18, author = {Rang Zhou and Xiaosong Zhang and Xiaojiang Du and Xiaofen Wang and Guowu Yang and Mohsen Guizani}, title = {File-Centric Multi-Key Aggregate Keyword Searchable Encryption for Industrial Internet of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {8}, pages = {3648--3658}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2794442}, doi = {10.1109/TII.2018.2794442}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhouZDWYG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ZhouZWYL18, author = {Rang Zhou and Xiaosong Zhang and Xiaofen Wang and Guowu Yang and Wanpeng Li}, editor = {Jaideep Vaidya and Jin Li}, title = {Keyword Searchable Encryption with Fine-Grained Forward Secrecy for Internet of Thing Data}, booktitle = {Algorithms and Architectures for Parallel Processing - 18th International Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {11337}, pages = {288--302}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05063-4\_23}, doi = {10.1007/978-3-030-05063-4\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/ZhouZWYL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WangMC17, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {Privacy-preserving data search and sharing protocol for social networks through wireless applications}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {7}, year = {2017}, url = {https://doi.org/10.1002/cpe.3870}, doi = {10.1002/CPE.3870}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/WangMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/WangMC17, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {Privacy-Preserving Data Packet Filtering Protocol with Source {IP} Authentication}, journal = {Wirel. Pers. Commun.}, volume = {95}, number = {4}, pages = {3509--3537}, year = {2017}, url = {https://doi.org/10.1007/s11277-017-4010-0}, doi = {10.1007/S11277-017-4010-0}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/WangMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangMYW17, author = {Shiwei Zhang and Yi Mu and Guomin Yang and Xiaofen Wang}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Hierarchical Functional Encryption for Linear Transformations}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {23--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_2}, doi = {10.1007/978-3-319-60055-0\_2}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangMYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/HuangZWDZ17, author = {Ke Huang and Xiaosong Zhang and Xiaofen Wang and Xiaojiang Du and Ruonan Zhang}, title = {{EBD-MLE:} Enabling Block Dynamics under {BL-MLE} for Ubiquitous Data}, booktitle = {2017 {IEEE} International Symposium on Parallel and Distributed Processing with Applications and 2017 {IEEE} International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, December 12-15, 2017}, pages = {1281--1288}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISPA/IUCC.2017.00196}, doi = {10.1109/ISPA/IUCC.2017.00196}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/HuangZWDZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/RezaeibaghaMZW17, author = {Fatemeh Rezaeibagha and Yi Mu and Shiwei Zhang and Xiaofen Wang}, editor = {Tatsuaki Okamoto and Yong Yu and Man Ho Au and Yannan Li}, title = {Provably Secure Homomorphic Signcryption}, booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10592}, pages = {349--360}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68637-0\_21}, doi = {10.1007/978-3-319-68637-0\_21}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/RezaeibaghaMZW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/JiangMGWW16, author = {Peng Jiang and Yi Mu and Fuchun Guo and Xiaofen Wang and Qiaoyan Wen}, title = {Online/Offline Ciphertext Retrieval on Resource Constrained Devices}, journal = {Comput. J.}, volume = {59}, number = {7}, pages = {955--969}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv099}, doi = {10.1093/COMJNL/BXV099}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/JiangMGWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/YuNXWYZ16, author = {Yong Yu and Jianbing Ni and Qi Xia and Xiaofen Wang and Haomiao Yang and Xiaosong Zhang}, title = {SDIVIP\({}^{\mbox{2}}\): shared data integrity verification with identity privacy preserving in mobile clouds}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {10}, pages = {2877--2888}, year = {2016}, url = {https://doi.org/10.1002/cpe.3484}, doi = {10.1002/CPE.3484}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/YuNXWYZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ChenMWS16, author = {Xiaojuan Chen and Yi Mu and Xiaofen Wang and Runhua Shi}, title = {Privacy-enhanced distance computation with applications}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {8}, number = {3}, pages = {234--249}, year = {2016}, url = {https://doi.org/10.1504/IJESDF.2016.077448}, doi = {10.1504/IJESDF.2016.077448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ChenMWS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/Wang16b, author = {Xiaofen Wang}, title = {One-round secure fair meeting location determination based on homomorphic encryption}, journal = {Inf. Sci.}, volume = {372}, pages = {758--772}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2016.08.083}, doi = {10.1016/J.INS.2016.08.083}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/Wang16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/WangMCZ16, author = {Xiaofen Wang and Yi Mu and Rongmao Chen and Xiaosong Zhang}, title = {Secure Channel Free ID-Based Searchable Encryption for Peer-to-Peer Group}, journal = {J. Comput. Sci. Technol.}, volume = {31}, number = {5}, pages = {1012--1027}, year = {2016}, url = {https://doi.org/10.1007/s11390-016-1676-9}, doi = {10.1007/S11390-016-1676-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/WangMCZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangMC16, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {An efficient privacy-preserving aggregation and billing protocol for smart grid}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4536--4547}, year = {2016}, url = {https://doi.org/10.1002/sec.1645}, doi = {10.1002/SEC.1645}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangMGWL16, author = {Peng Jiang and Yi Mu and Fuchun Guo and Xiaofen Wang and Jianchang Lai}, title = {Centralized keyword search on encrypted data for cloud applications}, journal = {Secur. Commun. Networks}, volume = {9}, number = {18}, pages = {5064--5084}, year = {2016}, url = {https://doi.org/10.1002/sec.1679}, doi = {10.1002/SEC.1679}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiangMGWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYGW16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xiaofen Wang}, title = {Dual-Server Public-Key Encryption With Keyword Search for Secure Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {789--798}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2510822}, doi = {10.1109/TIFS.2015.2510822}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYGW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangMC16, author = {Xiaofen Wang and Yi Mu and Rongmao Chen}, title = {One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {8}, pages = {1712--1721}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2549508}, doi = {10.1109/TIFS.2016.2549508}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangMC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChenMYGHWW16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xinyi Huang and Xiaofen Wang and Yongjun Wang}, title = {Server-Aided Public Key Encryption With Keyword Search}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2833--2842}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2599293}, doi = {10.1109/TIFS.2016.2599293}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChenMYGHWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangM16, author = {Xiaofen Wang and Yi Mu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Content-Based Encryption}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {57--72}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_4}, doi = {10.1007/978-3-319-40367-0\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/JiangWLGC16, author = {Peng Jiang and Xiaofen Wang and Jianchang Lai and Fuchun Guo and Rongmao Chen}, editor = {Liqun Chen and Jinguang Han}, title = {Oblivious Keyword Search with Authorization}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {173--190}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_10}, doi = {10.1007/978-3-319-47422-9\_10}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/JiangWLGC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohamedWZ16, author = {Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang}, title = {Tightly-Secure Authenticated Key Exchange without NAXOS' approach based on Decision Linear Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2016}, url = {http://eprint.iacr.org/2016/388}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohamedWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMYGW15, author = {Rongmao Chen and Yi Mu and Guomin Yang and Fuchun Guo and Xiaofen Wang}, editor = {Ernest Foo and Douglas Stebila}, title = {A New General Framework for Secure Public Key Encryption with Keyword Search}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {59--76}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_4}, doi = {10.1007/978-3-319-19962-7\_4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenMYGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/MohamedWZ15, author = {Mojahed Mohamed and Xiaofen Wang and Xiaosong Zhang}, editor = {Song Guo and Xiaofei Liao and Fangming Liu and Yanmin Zhu}, title = {Efficient Secure Authenticated Key Exchange Without NAXOS' Approach Based on Decision Linear Problem}, booktitle = {Collaborative Computing: Networking, Applications, and Worksharing - 11th International Conference, CollaborateCom 2015, Wuhan, China, November 10-11, 2015. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {163}, pages = {243--256}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28910-6\_22}, doi = {10.1007/978-3-319-28910-6\_22}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/MohamedWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcity/WangZM15, author = {Xiaofen Wang and Xiaosong Zhang and Yi Mu}, title = {Hierarchical ID-Based Searchable Encryption with Constant Size Ciphertext in Cloud}, booktitle = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, Chengdu, China, December 19-21, 2015}, pages = {1024--1031}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SmartCity.2015.204}, doi = {10.1109/SMARTCITY.2015.204}, timestamp = {Thu, 13 Apr 2023 12:52:26 +0200}, biburl = {https://dblp.org/rec/conf/smartcity/WangZM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmlc/LiLW14, author = {Ying Li and Yan Li and Xiaofen Wang}, editor = {Xizhao Wang and Witold Pedrycz and Patrick P. K. Chan and Qiang He}, title = {Study on Orthogonal Basis NN-Based Storage Modelling for Lake Hume of Upper Murray River, Australia}, booktitle = {Machine Learning and Cybernetics - 13th International Conference, Lanzhou, China, July 13-16, 2014. Proceedings}, series = {Communications in Computer and Information Science}, volume = {481}, pages = {431--441}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45652-1\_43}, doi = {10.1007/978-3-662-45652-1\_43}, timestamp = {Wed, 07 Aug 2024 10:31:55 +0200}, biburl = {https://dblp.org/rec/conf/icmlc/LiLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YangKLYWD13, author = {Haomiao Yang and Hyunsung Kim and Hongwei Li and Eunjun Yoon and Xiaofen Wang and Xuefeng Ding}, title = {An Efficient Somewhat {HE} scheme over Integers and Its Variation}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {10}, pages = {2497--2513}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.10.010}, doi = {10.3837/TIIS.2013.10.010}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YangKLYWD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/YangKLYWD13a, author = {Haomiao Yang and Hyunsung Kim and Hongwei Li and Eunjun Yoon and Xiaofen Wang and Xuefeng Ding}, title = {An Efficient Broadcast Authentication Scheme with Batch Verification for {ADS-B} Messages}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {10}, pages = {2544--2560}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.10.013}, doi = {10.3837/TIIS.2013.10.013}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/YangKLYWD13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.