default search action
Jianting Ning
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j97]Xiwen Wang, Kai Zhang, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. Comput. J. 67(1): 179-194 (2024) - [j96]Kai Zhang, Tao Chen, Siyuan Chen, Lifei Wei, Jianting Ning:
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control. Clust. Comput. 27(7): 9957-9973 (2024) - [j95]Yuchen Xiao, Lei Zhang, Yafang Yang, Wei Wu, Jianting Ning, Xinyi Huang:
Provably secure multi-signature scheme based on the standard SM2 signature scheme. Comput. Stand. Interfaces 89: 103819 (2024) - [j94]Zesen Hou, Jianting Ning, Xinyi Huang, Shengmin Xu, Leo Yu Zhang:
Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud. Comput. Stand. Interfaces 90: 103854 (2024) - [j93]Feng Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Jianting Ning, Robert H. Deng:
A Survey on Searchable Symmetric Encryption. ACM Comput. Surv. 56(5): 119:1-119:42 (2024) - [j92]Kai Zhang, Minjun Deng, Bei Gong, Yinbin Miao, Jianting Ning:
Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT. IEEE Internet Things J. 11(2): 3484-3496 (2024) - [j91]Xincheng Li, Lifeng Zhou, Xinchun Yin, Jianting Ning:
A Security-Enhanced Certificateless Designated Verifier Aggregate Signature Scheme for HWMSNs in the YOSO Model. IEEE Internet Things J. 11(6): 10865-10879 (2024) - [j90]Yilei Wang, Chunmei Li, Yiting Zhang, Tao Li, Jianting Ning, Keke Gai, Kim-Kwang Raymond Choo:
A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT. IEEE Internet Things J. 11(11): 19564-19574 (2024) - [j89]Shujun Wang, Jianting Ning, Shengmin Xu, Jiguo Li, Kai Zhang:
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions. IEEE Internet Things J. 11(20): 33940-33952 (2024) - [j88]Boli Hu, Kai Zhang, Junqing Gong, Lifei Wei, Jianting Ning:
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds. J. Inf. Secur. Appl. 83: 103783 (2024) - [j87]Prosanta Gope, Zhihui Lin, Yang Yang, Jianting Ning:
E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system. J. Comput. Secur. 32(4): 319-348 (2024) - [j86]Kai Zhang, Xiaobing Shi, Jinguo Li, Yi Wu, Jianting Ning:
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription. J. Syst. Archit. 153: 103197 (2024) - [j85]Kai Zhang, Ludan Lu, Jian Zhao, Lifei Wei, Jianting Ning:
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid. Peer Peer Netw. Appl. 17(5): 3255-3268 (2024) - [j84]Xiwen Wang, Kai Zhang, Junqing Gong, Shi-Feng Sun, Jianting Ning:
Updatable searchable symmetric encryption: Definitions and constructions. Theor. Comput. Sci. 983: 114304 (2024) - [j83]Zhaoman Liu, Yanbo Chen, Jianting Ning, Yunlei Zhao:
Fully anonymous identity-based broadcast signcryption with public verification. Theor. Comput. Sci. 992: 114464 (2024) - [j82]Guowen Xu, Xingshuo Han, Tianwei Zhang, Shengmin Xu, Jianting Ning, Xinyi Huang, Hongwei Li, Robert H. Deng:
SIMC 2.0: Improved Secure ML Inference Against Malicious Clients. IEEE Trans. Dependable Secur. Comput. 21(4): 1708-1723 (2024) - [j81]Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li:
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder. IEEE Trans. Dependable Secur. Comput. 21(4): 1785-1800 (2024) - [j80]Yinbin Miao, Feng Li, Xinghua Li, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System. IEEE Trans. Dependable Secur. Comput. 21(4): 1845-1862 (2024) - [j79]Xuelian Cao, Zheng Yang, Jianting Ning, Chenglu Jin, Rongxing Lu, Zhiming Liu, Jianying Zhou:
Dynamic Group Time-Based One-Time Passwords. IEEE Trans. Inf. Forensics Secur. 19: 4897-4913 (2024) - [j78]Renwan Bi, Jinbo Xiong, Changqing Luo, Jianting Ning, Ximeng Liu, Youliang Tian, Yan Zhang:
Communication-Efficient Privacy-Preserving Neural Network Inference via Arithmetic Secret Sharing. IEEE Trans. Inf. Forensics Secur. 19: 6722-6737 (2024) - [j77]Chao Liu, Cankun Hou, Tianyu Jiang, Jianting Ning, Hui Qiao, Yusen Wu:
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control With On-Chain and Off-Chain System. IEEE Trans. Inf. Forensics Secur. 19: 7060-7074 (2024) - [j76]Chen Li, Jianting Ning, Shengmin Xu, Chao Lin, Jiguo Li, Jian Shen:
DTACB: Dynamic Threshold Anonymous Credentials With Batch-Showing. IEEE Trans. Inf. Forensics Secur. 19: 7744-7758 (2024) - [j75]Zheyu Chen, Zhiqiang Yao, Biao Jin, Mingwei Lin, Jianting Ning:
FIBNet: Privacy-Enhancing Approach for Face Biometrics Based on the Information Bottleneck Principle. IEEE Trans. Inf. Forensics Secur. 19: 8786-8801 (2024) - [j74]Xiyu Liang, Yali Liu, Jianting Ning:
An Access Control Scheme With Privacy-Preserving Authentication and Flexible Revocation for Smart Healthcare. IEEE J. Biomed. Health Informatics 28(6): 3269-3278 (2024) - [j73]Yinbin Miao, Feng Li, Xinghua Li, Zhiquan Liu, Jianting Ning, Hongwei Li, Kim-Kwang Raymond Choo, Robert H. Deng:
Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud. IEEE Trans. Mob. Comput. 23(5): 3650-3665 (2024) - [j72]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Single-Server Public-Key Authenticated Encryption With Keyword Search and Its Application in IIoT. IEEE Trans. Netw. Sci. Eng. 11(1): 404-415 (2024) - [j71]Shengmin Xu, Jianting Ning, Xiaoguo Li, Jiaming Yuan, Xinyi Huang, Robert H. Deng:
A Privacy-Preserving and Redactable Healthcare Blockchain System. IEEE Trans. Serv. Comput. 17(2): 364-377 (2024) - [j70]Shengmin Xu, Xingshuo Han, Guowen Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption. IEEE Trans. Serv. Comput. 17(3): 776-788 (2024) - [i15]Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang:
Fluent: Round-efficient Secure Aggregation for Private Federated Learning. CoRR abs/2403.06143 (2024) - [i14]Chao Liu, Cankun Hou, Tianyu Jiang, Jianting Ning, Hui Qiao, Yusen Wu:
FACOS: Enabling Privacy Protection Through Fine-Grained Access Control with On-chain and Off-chain System. CoRR abs/2406.03695 (2024) - [i13]Zhaoman Liu, Jianting Ning, Huiying Hou, Yunlei Zhao:
Sanitizable and Accountable Endorsement for Dynamic Transactions in Fabric. IACR Cryptol. ePrint Arch. 2024: 1184 (2024) - 2023
- [j69]Zhe Jiang, Kai Zhang, Liangliang Wang, Jianting Ning:
Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search. Comput. J. 66(9): 2265-2278 (2023) - [j68]Haitang Lu, Jie Chen, Jianting Ning, Kai Zhang:
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy. Comput. J. 66(10): 2379-2392 (2023) - [j67]Xiuyuan Chen, Chao Lin, Wei Wu, Jianting Ning, Junzuo Lai, Debiao He:
Deep-Reuse-Enabled Common Satellite Network via Collaborative Blockchains: Architecture, Challenges, and Solutions. IEEE Commun. Mag. 61(8): 130-136 (2023) - [j66]Peiming Xu, Jiahui Chen, Yiwei Yang, Jianting Ning:
DuMSE: Toward Practical and Dynamic Multiuser Search Over Encrypted Cloud Data Against Keyword Guessing Attack. IEEE Internet Things J. 10(2): 1082-1095 (2023) - [j65]Xincheng Li, Xinchun Yin, Jianting Ning:
RelCLAS: A Reliable Malicious KGC-Resistant Certificateless Aggregate Signature Protocol for Vehicular Ad Hoc Networks. IEEE Internet Things J. 10(23): 21100-21114 (2023) - [j64]Tao Li, Yali Liu, Jianting Ning:
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance. Peer Peer Netw. Appl. 16(4): 1652-1667 (2023) - [j63]Minjun Deng, Kai Zhang, Pengfei Wu, Mi Wen, Jianting Ning:
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes. IEEE Trans. Cloud Comput. 11(4): 3510-3524 (2023) - [j62]Chunlin Li, Jinguo Li, Kai Zhang, Yan Yan, Jianting Ning:
Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy. IEEE Trans. Cloud Comput. 11(4): 3737-3749 (2023) - [j61]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j60]Pengfei Wu, Jianting Ning, Xinyi Huang, Joseph K. Liu:
Differentially Oblivious Two-Party Pattern Matching With Sublinear Round Complexity. IEEE Trans. Dependable Secur. Comput. 20(5): 4101-4117 (2023) - [j59]Chao Lin, Xinyi Huang, Jianting Ning, Debiao He:
ACA: Anonymous, Confidential and Auditable Transaction Systems for Blockchain. IEEE Trans. Dependable Secur. Comput. 20(6): 4536-4550 (2023) - [j58]Kai Zhang, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu:
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services. IEEE Trans. Dependable Secur. Comput. 20(6): 4621-4636 (2023) - [j57]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
AADEC: Anonymous and Auditable Distributed Access Control for Edge Computing Services. IEEE Trans. Inf. Forensics Secur. 18: 290-303 (2023) - [j56]Kai Zhang, Xiwen Wang, Jianting Ning, Xinyi Huang:
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services. IEEE Trans. Inf. Forensics Secur. 18: 449-462 (2023) - [j55]Guowen Xu, Shengmin Xu, Jinhua Ma, Jianting Ning, Xinyi Huang:
An Adaptively Secure and Efficient Data Sharing System for Dynamic User Groups in Cloud. IEEE Trans. Inf. Forensics Secur. 18: 5171-5185 (2023) - [j54]Kai Zhang, Xiwen Wang, Jianting Ning, Junqing Gong, Xinyi Huang:
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control. IEEE Trans. Inf. Forensics Secur. 18: 5286-5301 (2023) - [j53]Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, Xinyi Huang:
Efficient Construction of Verifiable Timed Signatures and Its Application in Scalable Payments. IEEE Trans. Inf. Forensics Secur. 18: 5345-5358 (2023) - [j52]Xincheng Li, Xinchun Yin, Jianting Ning:
Trustworthy Announcement Dissemination Scheme With Blockchain-Assisted Vehicular Cloud. IEEE Trans. Intell. Transp. Syst. 24(2): 1786-1800 (2023) - [j51]Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He:
Exploring Dynamic Task Loading in SGX-Based Distributed Computing. IEEE Trans. Serv. Comput. 16(1): 288-301 (2023) - [j50]Yu Li, Jianting Ning, Jie Chen:
Secure and Practical Wildcard Searchable Encryption System Based on Inner Product. IEEE Trans. Serv. Comput. 16(3): 2178-2190 (2023) - [j49]Jingwei Wang, Xinchun Yin, Jianting Ning, Shengmin Xu, Guowen Xu, Xinyi Huang:
Secure Updatable Storage Access Control System for EHRs in the Cloud. IEEE Trans. Serv. Comput. 16(4): 2939-2953 (2023) - [j48]Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Catch me if you can: A Secure Bilateral Access Control System With Anonymous Credentials. IEEE Trans. Serv. Comput. 16(6): 4444-4455 (2023) - [j47]Shuyi Chen, Yali Liu, Jianting Ning, Xiuping Zhu:
BASRAC: An efficient batch authentication scheme with rule-based access control for VANETs. Veh. Commun. 40: 100575 (2023) - [c25]Jie Chen, Qiaohan Chu, Ying Gao, Jianting Ning, Luping Wang:
Improved Fully Adaptive Decentralized MA-ABE for NC1 from MDDH. ASIACRYPT (5) 2023: 3-32 - 2022
- [j46]Xingbing Fu, Yong Ding, Haifeng Li, Jianting Ning, Ting Wu, Fagen Li:
A survey of lattice based expressive attribute based encryption. Comput. Sci. Rev. 43: 100438 (2022) - [j45]Jiahao Chen, Xinchun Yin, Jianting Ning:
A fine-grained and secure health data sharing scheme based on blockchain. Trans. Emerg. Telecommun. Technol. 33(9) (2022) - [j44]Yutao Yang, Yinbin Miao, Zuobin Ying, Jianting Ning, Xiangdong Meng, Kim-Kwang Raymond Choo:
Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT. IEEE Internet Things J. 9(18): 16990-17001 (2022) - [j43]Yinghui Zhang, Xuanni Wei, Jin Cao, Jianting Ning, Zuobin Ying, Dong Zheng:
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8350-8361 (2022) - [j42]Xingbing Fu, Yinglun Wang, Lin You, Jianting Ning, Ziquan Hu, Fagen Li:
Offline/Online lattice-based ciphertext policy attribute-based encryption. J. Syst. Archit. 130: 102684 (2022) - [j41]Kai Zhang, Jinhu Yu, Chao Lin, Jianting Ning:
Blockchain-based access control for dynamic device management in microgrid. Peer-to-Peer Netw. Appl. 15(3): 1653-1668 (2022) - [j40]Congcong Chen, Lifei Wei, Lei Zhang, Ya Peng, Jianting Ning:
MP-BADNet+: Secure and effective backdoor attack detection and mitigation protocols among multi-participants in private DNNs. Peer-to-Peer Netw. Appl. 15(6): 2457-2473 (2022) - [j39]Jiguo Li, Yichen Zhang, Jianting Ning, Xinyi Huang, Geong Sen Poh, Debang Wang:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Trans. Cloud Comput. 10(2): 762-773 (2022) - [j38]Jianting Ning, Xinyi Huang, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang:
Dual Access Control for Cloud-Based Data Storage and Sharing. IEEE Trans. Dependable Secur. Comput. 19(2): 1036-1048 (2022) - [j37]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j36]Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [j35]Guowen Xu, Hongwei Li, Yun Zhang, Shengmin Xu, Jianting Ning, Robert H. Deng:
Privacy-Preserving Federated Deep Learning With Irregular Users. IEEE Trans. Dependable Secur. Comput. 19(2): 1364-1381 (2022) - [j34]Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng:
Fine-Grained and Controllably Editable Data Sharing With Accountability in Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(5): 3448-3463 (2022) - [j33]Pengfei Wu, Qi Li, Jianting Ning, Xinyi Huang, Wei Wu:
Differentially Oblivious Data Analysis With Intel SGX: Design, Optimization, and Evaluation. IEEE Trans. Dependable Secur. Comput. 19(6): 3741-3758 (2022) - [j32]Shengmin Xu, Jianting Ning, Xinyi Huang, Yingjiu Li, Guowen Xu:
Untouchable Once Revoking: A Practical and Secure Dynamic EHR Sharing System via Cloud. IEEE Trans. Dependable Secur. Comput. 19(6): 3759-3773 (2022) - [j31]Jinhua Ma, Shengmin Xu, Jianting Ning, Xinyi Huang, Robert H. Deng:
Redactable Blockchain in Decentralized Setting. IEEE Trans. Inf. Forensics Secur. 17: 1227-1242 (2022) - [j30]Haixia Chen, Xinyi Huang, Jianting Ning, Futai Zhang, Chao Lin:
VILS: A Verifiable Image Licensing System. IEEE Trans. Inf. Forensics Secur. 17: 1420-1434 (2022) - [j29]Kai Zhang, Zhe Jiang, Jianting Ning, Xinyi Huang:
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 1771-1784 (2022) - [j28]Jianting Ning, Jiageng Chen, Kaitai Liang, Joseph K. Liu, Chunhua Su, Qianhong Wu:
Efficient Encrypted Data Search With Expressive Queries and Flexible Update. IEEE Trans. Serv. Comput. 15(3): 1619-1633 (2022) - [j27]Huiying Hou, Jianting Ning, Yunlei Zhao, Robert H. Deng:
A Traitor-Resistant and Dynamic Anonymous Communication Service for Cloud-Based VANETs. IEEE Trans. Serv. Comput. 15(5): 2551-2564 (2022) - [c24]Yifei Li, Yinghui Zhang, Wei Liu, Jianting Ning, Dong Zheng:
A Collaborative Access Control Scheme Based on Incentive Mechanisms. CSS 2022: 48-55 - [c23]Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang:
VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents. ESORICS (1) 2022: 653-676 - [c22]Jiaming Yuan, Yingjiu Li, Jianting Ning, Robert H. Deng:
M-EDESE: Multi-Domain, Easily Deployable, and Efficiently Searchable Encryption. ISPEC 2022: 606-623 - [c21]Pengfei Wu, Jianting Ning, Jiamin Shen, Hongbing Wang, Ee-Chien Chang:
Hybrid Trust Multi-party Computation with Trusted Execution Environment. NDSS 2022 - [i12]Zhihui Lin, Prosanta Gope, Jianting Ning, Biplab Sikdar:
E-Tenon: An Efficient Privacy-Preserving Secure Open Data Sharing Scheme for EHR System. CoRR abs/2207.05890 (2022) - [i11]Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li:
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder. CoRR abs/2210.08418 (2022) - [i10]Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu:
New Secure Sparse Inner Product with Applications to Machine Learning. CoRR abs/2210.08421 (2022) - [i9]Hao Ren, Guowen Xu, Tianwei Zhang, Jianting Ning, Xinyi Huang, Hongwei Li, Rongxing Lu:
Efficiency Boosting of Secure Cross-platform Recommender Systems over Sparse Data. CoRR abs/2212.01537 (2022) - [i8]Steven Lambregts, Huanhuan Chen, Jianting Ning, Kaitai Liang:
Volume and Access Pattern Leakage-abuse Attack with Leaked Documents. IACR Cryptol. ePrint Arch. 2022: 947 (2022) - [i7]Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Tien Tuan Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. IACR Cryptol. ePrint Arch. 2022: 1280 (2022) - 2021
- [j26]Ximeng Liu, Yi Mu, Jianting Ning, Qingchen Zhang:
Securing the Internet-of-Things: Advances, challenges, future trends. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j25]Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang, Jianting Ning:
Distributed additive encryption and quantization for privacy preserving federated deep learning. Neurocomputing 463: 309-327 (2021) - [j24]Yixiao Zhu, Wenjie Ma, Jiangtao Cui, Xiaofang Xia, Yanguo Peng, Jianting Ning:
PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing. Secur. Commun. Networks 2021: 5514137:1-5514137:18 (2021) - [j23]Jingwei Wang, Xinchun Yin, Jianting Ning:
Fine-Grained Task Access Control System for Mobile Crowdsensing. Secur. Commun. Networks 2021: 6682456:1-6682456:13 (2021) - [j22]Fan Zhang, Ziyuan Liang, Cong Zuo, Jun Shao, Jianting Ning, Jun Sun, Joseph K. Liu, Yibao Bao:
hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1144-1157 (2021) - [j21]Geong Sen Poh, Prosanta Gope, Jianting Ning:
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 18(3): 1095-1107 (2021) - [j20]Haijiang Wang, Jianting Ning, Xinyi Huang, Guiyi Wei, Geong Sen Poh, Ximeng Liu:
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1307-1319 (2021) - [j19]Yinbin Miao, Robert H. Deng, Kim-Kwang Raymond Choo, Ximeng Liu, Jianting Ning, Hongwei Li:
Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings. IEEE Trans. Dependable Secur. Comput. 18(4): 1804-1820 (2021) - [j18]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, Robert H. Deng:
K-Time Modifiable and Epoch-Based Redactable Blockchain. IEEE Trans. Inf. Forensics Secur. 16: 4507-4520 (2021) - [j17]Shengmin Xu, Jianting Ning, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Server-Aided Bilateral Access Control for Secure Data Sharing With Dynamic User Groups. IEEE Trans. Inf. Forensics Secur. 16: 4746-4761 (2021) - [j16]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Lifei Wei, Kim-Kwang Raymond Choo:
CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 111-124 (2021) - [j15]Peng Jiang, Jianting Ning, Kaitai Liang, Changyu Dong, Jiageng Chen, Zhenfu Cao:
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Trans. Serv. Comput. 14(5): 1357-1369 (2021) - [c20]Congcong Chen, Lifei Wei, Lei Zhang, Jianting Ning:
MP-BADNet: A Backdoor-Attack Detection and Identification Protocol among Multi-Participants in Private Deep Neural Networks. ACM TUR-C 2021: 104-109 - [c19]Zheng Yang, Chenglu Jin, Jianting Ning, Zengpeng Li, Anh Dinh, Jianying Zhou:
Group Time-based One-time Passwords and its Application to Efficient Privacy-Preserving Proof of Location. ACSAC 2021: 497-512 - [c18]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE. ASIACRYPT (2) 2021: 427-455 - [c17]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [c16]Zheng Yang, Chao Yin, Chenglu Jin, Jianting Ning, Jianying Zhou:
Lightweight Delegated Authentication with Identity Fraud Detection for Cyber-physical Systems. CPSS@AsiaCCS 2021: 17-28 - [c15]Shengmin Xu, Jianting Ning, Jinhua Ma, Guowen Xu, Jiaming Yuan, Robert H. Deng:
Revocable Policy-Based Chameleon Hash. ESORICS (1) 2021: 327-347 - [c14]Haoran Yuan, Xiaofeng Chen, Guowen Xu, Jianting Ning, Joseph K. Liu, Robert H. Deng:
Efficient and Verifiable Proof of Replication with Fast Fault Localization. INFOCOM 2021: 1-10 - [c13]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang, Robert H. Deng:
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. SACMAT 2021: 143-154 - [i6]Geong Sen Poh, Dinil Mon Divakaran, Hoon Wei Lim, Jianting Ning, Achintya Desai:
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes. CoRR abs/2101.04338 (2021) - [i5]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE. IACR Cryptol. ePrint Arch. 2021: 1261 (2021) - 2020
- [j14]Yi Zhao, Jianting Ning, Kaitai Liang, Yanqi Zhao, Liqun Chen, Bo Yang:
Privacy preserving search services against online attack. Comput. Secur. 95: 101836 (2020) - [j13]Jiahui Chen, Jie Ling, Jianting Ning, Emmanouil Panaousis, George Loukas, Kaitai Liang, Jiageng Chen:
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature. Int. J. Distributed Sens. Networks 16(4) (2020) - [j12]Qingtang Su, Lin Su, Gang Wang, Leida Li, Jianting Ning:
A novel colour image watermarking scheme based on Schur decomposition. Int. J. Embed. Syst. 12(1): 31-38 (2020) - [j11]Jiahui Chen, Jianting Ning, Jie Ling, Terry Shue Chien Lau, Yacheng Wang:
A new encryption scheme for multivariate quadratic systems. Theor. Comput. Sci. 809: 372-383 (2020) - [c12]Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haomiao Yang, Kan Yang, Robert H. Deng:
Secure and Verifiable Inference in Deep Neural Networks. ACSAC 2020: 784-797 - [c11]Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh, Jian Weng, Robert H. Deng:
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment. ESORICS (1) 2020: 3-22 - [i4]Ao Liu, Guangquan Xu, Dexiang Zhou, Xi Zheng, Jianting Ning, Rui Wang, Hao Wang, Hong-Ning Dai, Xiaojiang Du:
SFE-GACN: A Novel Unknown Attack Detection Method Using Intra Categories Generation in Embedding Space. CoRR abs/2004.05693 (2020) - [i3]Hangyu Zhu, Rui Wang, Yaochu Jin, Kaitai Liang, Jianting Ning:
Distributed Additive Encryption and Quantization for Privacy Preserving Federated Deep Learning. CoRR abs/2011.12623 (2020)
2010 – 2019
- 2019
- [j10]Kai He, Yijun Mao, Jianting Ning, Kaitai Liang, Xinyi Huang, Emmanouil Panaousis, George Loukas:
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7: 50658-50668 (2019) - [j9]Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding:
Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems. Comput. J. 62(8): 1132-1147 (2019) - [j8]Ran Ding, Hong Zhong, Jianfeng Ma, Ximeng Liu, Jianting Ning:
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System. IEEE Internet Things J. 6(5): 8393-8405 (2019) - [j7]Hui Tian, Fulin Nan, Hong Jiang, Chin-Chen Chang, Jianting Ning, Yongfeng Huang:
Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472: 107-125 (2019) - [j6]Jianting Ning, Jia Xu, Kaitai Liang, Fan Zhang, Ee-Chien Chang:
Passive Attacks Against Searchable Encryption. IEEE Trans. Inf. Forensics Secur. 14(3): 789-802 (2019) - [c10]Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang:
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. CCS 2019: 1657-1670 - [c9]Jiahui Chen, Jie Ling, Jianting Ning, Zhiniang Peng, Yang Tan:
MQ Aggregate Signature Schemes with Exact Security Based on UOV Signature. Inscrypt 2019: 443-451 - [c8]Xiang Li, Hui Tian, Jianting Ning:
Secure Online/Offline Attribute-Based Encryption for IoT Users in Cloud Computing. ProvSec 2019: 347-354 - 2018
- [j5]Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. Future Gener. Comput. Syst. 79: 337-349 (2018) - [j4]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei:
White-Box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively. IEEE Trans. Dependable Secur. Comput. 15(5): 883-897 (2018) - [j3]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Kaitai Liang, Hui Ma, Lifei Wei:
Auditable σ-Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(1): 94-105 (2018) - [c7]Jingwei Wang, Xinchun Yin, Jianting Ning, Geong Sen Poh:
Attribute-Based Encryption with Efficient Keyword Search and User Revocation. Inscrypt 2018: 490-509 - [i2]Jianting Ning, Hung Dang, Ruomu Hou, Ee-Chien Chang:
Keeping Time-Release Secrets through Smart Contracts. IACR Cryptol. ePrint Arch. 2018: 1166 (2018) - 2017
- [c6]Ru Meng, Yanwei Zhou, Jianting Ning, Kaitai Liang, Jinguang Han, Willy Susilo:
An Efficient Key-Policy Attribute-Based Searchable Encryption in Prime-Order Groups. ProvSec 2017: 39-56 - 2016
- [j2]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei:
Traceable and revocable CP-ABE with shorter ciphertexts. Sci. China Inf. Sci. 59(11): 119102:1-119102:3 (2016) - [c5]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Junqing Gong, Jie Chen:
Traceable CP-ABE with Short Ciphertexts: How to Catch People Selling Decryption Devices on eBay Efficiently. ESORICS (2) 2016: 551-569 - 2015
- [j1]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei, Xiaodong Lin:
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Flexible Attributes. IEEE Trans. Inf. Forensics Secur. 10(6): 1274-1288 (2015) - [c4]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. ESORICS (2) 2015: 270-289 - [i1]Jianting Ning, Xiaolei Dong, Zhenfu Cao, Lifei Wei:
Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud. IACR Cryptol. ePrint Arch. 2015: 613 (2015) - 2014
- [c3]Jianting Ning, Zhenfu Cao, Xiaolei Dong, Lifei Wei, Xiaodong Lin:
Large Universe Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability. ESORICS (2) 2014: 55-72 - 2011
- [c2]Jianting Ning, Xinchun Yin, Ting Yang:
A Trivariate Polynomial-based Dynamic Key Management Scheme for Wireless Sensor Networks. CIS 2011: 625-629 - [c1]Xinchun Yin, Ting Yang, Jianting Ning:
Optimized Approach for Computing Multi-base Chains. CIS 2011: 964-968
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint