


Остановите войну!
for scientists:


default search action
Jian Weng 0001
Person information

- affiliation: Jinan University, College of Information Science and Technology, Guangzhou, China
- affiliation (2008 - 2010): Singapore Management University, Singapore
- affiliation (PhD 2008): Shanghai Jiao Tong University, China
Other persons with the same name
- Jian Weng
- Jian Weng 0002
— University of California, Los Angeles, CA, USA
- Jian Weng 0003 — Zhejiang University, Hangzhou, China
- Jian Weng 0004 — Tsinghua University, Beijing, China
- Jian Weng 0005 — Xilinx, Beijing, China
- Jian Weng 0006 — Xiamen Univerisity, Xiamen City, Fujian, China
- Jian Weng 0007 — Shandong University, China
- Jian Weng 0008
— Wuhan University of Technology, School of Mechanical and Electronic Engineering, Hubei Digital Manufacturing Key Laboratory, China
- Jian Weng 0009 — Shenzhen University, College of Computer Science and Software Engineering, China
- Jian Weng 0010 — Beihang University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j200]Qihua Feng
, Peiya Li
, Zhixun Lu, Zhibo Zhou
, Yongdong Wu, Jian Weng, Feiran Huang
:
DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks. Appl. Soft Comput. 133: 109935 (2023) - [j199]Wenli Xie, Jian Weng, Yao Tong, Xiaojian Liang, Lisha Yao, Feixiang Zhao:
Lattice-based autonomous path proxy re-encryption in the standard model. Sci. China Inf. Sci. 66(10) (2023) - [j198]Chengxi Jiang, Shijie Xu
, Guanggang Geng, Jian Weng, Xinchang Zhang:
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification. Clust. Comput. 26(3): 1785-1800 (2023) - [j197]Jia-Cheng Huang
, Guo-Qiang Zeng, Guang-Gang Geng, Jian Weng
, Kang-Di Lu
, Yu Zhang:
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems. Comput. Secur. 132: 103310 (2023) - [j196]Jinzheng Cao, Jian Weng, Yanbin Pan, Qingfeng Cheng
:
Generalized attack on ECDSA: known bits in arbitrary positions. Des. Codes Cryptogr. 91(11): 3803-3823 (2023) - [j195]Long Li, Jianbo Huang, Liang Chang, Jian Weng, Jia Chen, Jingjing Li:
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services. Frontiers Comput. Sci. 17(5): 175814 (2023) - [j194]Sulong Ge, Jianwei Fei, Zhihua Xia, Yao Tong, Jian Weng
, Jia-Nan Liu:
A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Process. 17(2): 323-336 (2023) - [j193]Lisha Yao, Jian Weng, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou:
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing. Inf. Sci. 624: 777-795 (2023) - [j192]Yinyan Zhang
, Shuai Li, Xuefeng Zhou, Jian Weng, Guanggang Geng:
Single-state distributed k-winners-take-all neural network model. Inf. Sci. 647: 119528 (2023) - [j191]Yuxian Li
, Jian Weng, Wei Wu
, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu
, Robert H. Deng
:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j190]Sulong Ge, Zhihua Xia
, Jianwei Fei, Yao Tong, Jian Weng, Ming Li:
A robust document image watermarking scheme using deep neural network. Multim. Tools Appl. 82(25): 38589-38612 (2023) - [j189]Eric Ke Wang
, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen
, Weiping Ding, Siu-Ming Yiu, Jian Weng:
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. Pattern Recognit. 143: 109745 (2023) - [j188]Guofeng Li, Bingwen Feng
, Mingjin He, Jian Weng, Wei Lu:
High-capacity coverless image steganographic scheme based on image synthesis. Signal Process. Image Commun. 111: 116894 (2023) - [j187]Chunkai Zhang
, Quanjian Dai, Zilin Du, Wensheng Gan
, Jian Weng
, Philip S. Yu
:
TUSQ: Targeted High-Utility Sequence Querying. IEEE Trans. Big Data 9(2): 512-527 (2023) - [j186]Yaxi Yang
, Yao Tong, Jian Weng
, Yufeng Yi, Yandong Zheng
, Leo Yu Zhang
, Rongxing Lu
:
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data. IEEE Trans. Cloud Comput. 11(3): 2379-2391 (2023) - [j185]Peipeng Yu
, Jian Tang, Zhihua Xia, Zhetao Li, Jian Weng:
A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2885-2896 (2023) - [j184]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, Jian Weng:
Simulatable verifiable random function from the LWE assumption. Theor. Comput. Sci. 957: 113826 (2023) - [j183]Yinyan Zhang
, Shuai Li
, Jian Weng
:
Distributed k-Winners-Take-All Network: An Optimization Perspective. IEEE Trans. Cybern. 53(8): 5069-5081 (2023) - [j182]Caiqin Dong
, Jian Weng
, Jia-Nan Liu
, Anjia Yang
, Zhiquan Liu
, Yaxi Yang, Jianfeng Ma
:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 20(2): 1243-1257 (2023) - [j181]Yongdong Wu
, Jian Weng
, Zhengxia Wang
, Kaimin Wei, Jinming Wen
, Junzuo Lai, Xin Li:
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. IEEE Trans. Dependable Secur. Comput. 20(2): 1744-1755 (2023) - [j180]Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor:
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network. IEEE Trans. Dependable Secur. Comput. 20(6): 4838-4852 (2023) - [j179]Jia-Si Weng
, Jian Weng, Gui Tang, Anjia Yang
, Ming Li, Jia-Nan Liu
:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. IEEE Trans. Inf. Forensics Secur. 18: 2218-2233 (2023) - [j178]Hongshuang Hu
, Yongdong Wu
, Jian Weng
, Kaimin Wei
, Zhiquan Liu
, Feiran Huang
, Yinyan Zhang
:
Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking. IEEE Trans. Inf. Forensics Secur. 18: 3991-4005 (2023) - [j177]Xueqiao Liu
, Guomin Yang
, Willy Susilo
, Kai He
, Robert H. Deng
, Jian Weng
:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j176]Axin Wu
, Weiqi Luo
, Jian Weng
, Anjia Yang
, Jinghang Wen
:
Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensics Secur. 18: 5592-5607 (2023) - [j175]Xiang Liu
, Xueli Zhao
, Zhihua Xia
, Qian Feng, Peipeng Yu
, Jian Weng
:
Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction. IEEE Trans. Image Process. 32: 4635-4648 (2023) - [j174]Gengsen Huang
, Wensheng Gan
, Jian Weng
, Philip S. Yu
:
US-Rule: Discovering Utility-driven Sequential Rules. ACM Trans. Knowl. Discov. Data 17(1): 10:1-10:22 (2023) - [j173]Qiuyun Tong
, Xinghua Li
, Yinbin Miao
, Ximeng Liu
, Jian Weng
, Robert H. Deng
:
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing. IEEE Trans. Knowl. Data Eng. 35(5): 5159-5172 (2023) - [j172]Qiuyun Tong
, Yinbin Miao
, Jian Weng
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security. IEEE Trans. Knowl. Data Eng. 35(5): 5386-5399 (2023) - [j171]Yanbing Ren
, Xinghua Li
, Yinbin Miao
, Robert H. Deng
, Jian Weng
, Siqi Ma, Jianfeng Ma
:
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 22(6): 3287-3302 (2023) - [j170]Min Shi, Jialin Shen, Qingming Yi, Jian Weng
, Zunkai Huang
, Aiwen Luo
, Yicong Zhou
:
LMFFNet: A Well-Balanced Lightweight Network for Fast and Accurate Semantic Segmentation. IEEE Trans. Neural Networks Learn. Syst. 34(6): 3205-3219 (2023) - [j169]Xin Chen
, Jian Weng
, Xiaoling Deng, Weiqi Luo
, Yubin Lan, Qi Tian
:
Feature Distillation in Deep Attention Network Against Adversarial Examples. IEEE Trans. Neural Networks Learn. Syst. 34(7): 3691-3705 (2023) - [j168]Xinghua Li
, Qiuyun Tong
, Jinwei Zhao
, Yinbin Miao
, Siqi Ma, Jian Weng
, Jianfeng Ma
, Kim-Kwang Raymond Choo
:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. IEEE Trans. Serv. Comput. 16(1): 698-710 (2023) - [j167]Xiaohu Chen, Anjia Yang
, Jian Weng
, Yao Tong, Cheng Huang
, Tao Li
:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. IEEE Trans. Serv. Comput. 16(4): 2316-2329 (2023) - [j166]Heng Sun
, Weiyun Luo
, Jian Weng
, Zhiquan Liu
, Ming Li
:
ECQV-GDH-Based Group Key Exchange Protocol for CAN Bus. IEEE Trans. Veh. Technol. 72(10): 12857-12872 (2023) - [j165]Zhan Zhang, Xinghua Li, Yunwei Wang, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET. IEEE Trans. Veh. Technol. 72(11): 14987-15001 (2023) - [j164]Tao Li, Anjia Yang
, Jian Weng, Yao Tong, Qingfu Pei:
Concurrent and efficient IoT data trading based on probabilistic micropayments. Wirel. Networks 29(2): 607-622 (2023) - [c88]Yaxi Yang, Jian Weng, Yufeng Yi, Changyu Dong, Leo Yu Zhang, Jianying Zhou:
Predicate Private Set Intersection with Linear Complexity. ACNS 2023: 143-166 - [c87]Junzuo Lai
, Gongxian Zeng
, Zhengan Huang
, Siu Ming Yiu
, Xin Mu
, Jian Weng
:
Asymmetric Group Message Franking: Definitions and Constructions. EUROCRYPT (5) 2023: 67-97 - [c86]Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Servers. NDSS 2023 - [c85]Shuyan Huang
, Zitao Liu
, Xiangyu Zhao
, Weiqi Luo
, Jian Weng
:
Towards Robust Knowledge Tracing Models via k-Sparse Attention. SIGIR 2023: 2441-2445 - [c84]Zijun Mai, Yidang He, Jiana Feng, Huawei Tu, Jian Weng, Boyu Gao:
Behavioral Authentication with Head-Tilt Based Locomotion for Metaverse. VRW 2023: 949-950 - [c83]Zitao Liu
, Qiongqiong Liu
, Jiahao Chen
, Shuyan Huang
, Boyu Gao
, Weiqi Luo
, Jian Weng
:
Enhancing Deep Knowledge Tracing with Auxiliary Tasks. WWW 2023: 4178-4187 - [i65]Zitao Liu, Qiongqiong Liu, Jiahao Chen, Shuyan Huang, Boyu Gao, Weiqi Luo, Jian Weng:
Enhancing Deep Knowledge Tracing with Auxiliary Tasks. CoRR abs/2302.07942 (2023) - [i64]Xiaoguo Li, Bowen Zhao, Guomin Yang, Tao Xiang, Jian Weng, Robert H. Deng:
A Survey of Secure Computation Using Trusted Execution Environments. CoRR abs/2302.12150 (2023) - [i63]Tao Wang, Yushu Zhang, Shuren Qi, Ruoyu Zhao, Zhihua Xia, Jian Weng:
Security and Privacy on Generative Data in AIGC: A Survey. CoRR abs/2309.09435 (2023) - [i62]Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han:
Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems. CoRR abs/2309.11039 (2023) - [i61]Junzuo Lai, Gongxian Zeng, Zhengan Huang, Siu Ming Yiu, Xin Mu, Jian Weng:
Asymmetric Group Message Franking: Definitions & Constructions. IACR Cryptol. ePrint Arch. 2023: 332 (2023) - [i60]Yi Liu, Junzuo Lai
, Qi Wang
, Xianrui Qin
, Anjia Yang
, Jian Weng:
Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead. IACR Cryptol. ePrint Arch. 2023: 1392 (2023) - 2022
- [j163]Wei Liu
, Lein Harn, Jian Weng:
Lightweight key establishment with the assistance of mutually connected sensors in wireless sensor networks (WSNs). IET Commun. 16(1): 58-66 (2022) - [j162]Zhiquan Liu
, Jian Weng, Jingjing Guo, Jianfeng Ma, Feiran Huang, Heng Sun, Yudan Cheng:
PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space-Air-Ground-Integrated Vehicular Networks. IEEE Internet Things J. 9(8): 5943-5956 (2022) - [j161]Ming Li
, Jian Weng
, Jia-Nan Liu
, Xiaodong Lin
, Charlie Obimbo:
Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization. IEEE Internet Things J. 9(9): 7009-7024 (2022) - [j160]Lin Song
, Yinbin Miao
, Jian Weng
, Kim-Kwang Raymond Choo
, Ximeng Liu
, Robert H. Deng
:
Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things. IEEE Internet Things J. 9(15): 13598-13611 (2022) - [j159]Kun Cao
, Yangguang Cui
, Zhiquan Liu
, Wuzheng Tan
, Jian Weng
:
Edge Intelligent Joint Optimization for Lifetime and Latency in Large-Scale Cyber-Physical Systems. IEEE Internet Things J. 9(22): 22267-22279 (2022) - [j158]Xiaohu Chen, Anjia Yang
, Yao Tong, Jian Weng, Jia-Si Weng
, Tao Li
:
A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET. IEEE Internet Things J. 9(22): 23130-23141 (2022) - [j157]Congge Xie, Jian Weng, Dehua Zhou:
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Inf. Sci. 594: 249-263 (2022) - [j156]Wei Liu, Jian Weng, Bingsheng Zhang, Kai He, Junjie Huang:
Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages. Inf. Sci. 613: 324-343 (2022) - [j155]Yuxian Li
, Jian Weng, Ming Li, Wei Wu
, Jia-Si Weng, Jia-Nan Liu
, Shun Hu:
ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero. J. Parallel Distributed Comput. 169: 301-316 (2022) - [j154]Yang Yang
, Robert H. Deng
, Ximeng Liu
, Yongdong Wu, Jian Weng
, Xianghan Zheng, Chunming Rong
:
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata. IEEE Trans. Cloud Comput. 10(3): 2020-2037 (2022) - [j153]Yinyan Zhang
, Shuai Li
, Jian Weng
:
Distributed Estimation of Algebraic Connectivity. IEEE Trans. Cybern. 52(5): 3047-3056 (2022) - [j152]Wei Lu
, Junjia Chen, Junhong Zhang, Jiwu Huang
, Jian Weng
, Yicong Zhou
:
Secure Halftone Image Steganography Based on Feature Space and Layer Embedding. IEEE Trans. Cybern. 52(6): 5001-5014 (2022) - [j151]Yinyan Zhang
, Shuai Li
, Jian Weng
:
Learning and Near-Optimal Control of Underactuated Surface Vessels With Periodic Disturbances. IEEE Trans. Cybern. 52(8): 7453-7463 (2022) - [j150]Bing Chen, Wei Lu
, Jiwu Huang
, Jian Weng
, Yicong Zhou
:
Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders. IEEE Trans. Dependable Secur. Comput. 19(2): 978-991 (2022) - [j149]Jia-Nan Liu
, Xizhao Luo
, Jian Weng
, Anjia Yang
, Xu An Wang
, Ming Li
, Xiaodong Lin
:
Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(3): 1518-1531 (2022) - [j148]Jia-Si Weng
, Jian Weng, Chengjun Cai
, Hongwei Huang, Cong Wang
:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. IEEE Trans. Dependable Secur. Comput. 19(5): 3149-3167 (2022) - [j147]Hongwei Huang
, Weiqi Luo
, Guoqiang Zeng
, Jian Weng
, Yue Zhang
, Anjia Yang
:
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks. IEEE Trans. Dependable Secur. Comput. 19(5): 3183-3199 (2022) - [j146]Zhijian Shao
, Jian Weng, Yue Zhang
, Yongdong Wu
, Ming Li, Jia-Si Weng
, Weiqi Luo
, Shui Yu
:
Peripheral-Free Device Pairing by Randomly Switching Power. IEEE Trans. Dependable Secur. Comput. 19(6): 4240-4254 (2022) - [j145]Peipeng Yu
, Jianwei Fei
, Zhihua Xia
, Zhili Zhou
, Jian Weng
:
Improving Generalization by Commonality Learning in Face Forgery Detection. IEEE Trans. Inf. Forensics Secur. 17: 547-558 (2022) - [j144]Yanbing Ren
, Xinghua Li
, Yinbin Miao
, Bin Luo
, Jian Weng
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach. IEEE Trans. Inf. Forensics Secur. 17: 804-818 (2022) - [j143]Shi-Jie Xu
, Guang-Gang Geng
, Xiao-Bo Jin
, Dongjie Liu
, Jian Weng
:
Seeing Traffic Paths: Encrypted Traffic Classification With Path Signature Features. IEEE Trans. Inf. Forensics Secur. 17: 2166-2181 (2022) - [j142]Xiaohan Zhang
, Xinghua Li
, Yinbin Miao
, Xizhao Luo
, Yunwei Wang
, Siqi Ma
, Jian Weng
:
A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT. IEEE Trans. Ind. Informatics 18(7): 4456-4465 (2022) - [j141]Anjia Yang
, Jian Weng
, Kan Yang
, Cheng Huang
, Xuemin Shen
:
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 23(2): 1284-1298 (2022) - [j140]Yunwei Wang
, Xinghua Li
, Xiaohan Zhang
, Ximeng Liu
, Jian Weng
:
ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs. IEEE Trans. Intell. Transp. Syst. 23(9): 16558-16575 (2022) - [j139]Qiuyun Tong
, Yinbin Miao
, Lei Chen, Jian Weng
, Ximeng Liu
, Kim-Kwang Raymond Choo
, Robert H. Deng
:
VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings. IEEE Trans. Serv. Comput. 15(6): 3606-3619 (2022) - [j138]Heng Sun
, Mengsi Sun
, Jian Weng
, Zhiquan Liu
:
Analysis of ID Sequences Similarity Using DTW in Intrusion Detection for CAN Bus. IEEE Trans. Veh. Technol. 71(10): 10426-10441 (2022) - [j137]Yongbiao Li, Dehua Zhou
, Yanling Li
, Jian Weng
, Meng Sun
, Ye Yang
, Ming Li
:
Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles. IEEE Trans. Veh. Technol. 71(12): 12530-12542 (2022) - [c82]Jinzheng Cao
, Qingfeng Cheng
, Jian Weng
:
EHNP Strikes Back: Analyzing SM2 Implementations. AFRICACRYPT 2022: 576-600 - [c81]Jie Chen, Yu Li, Jinming Wen, Jian Weng:
Identity-Based Matchmaking Encryption from Standard Assumptions. ASIACRYPT (3) 2022: 394-422 - [c80]Ling Song
, Nana Zhang
, Qianqian Yang
, Danping Shi
, Jiahao Zhao
, Lei Hu
, Jian Weng
:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. ASIACRYPT (1) 2022: 410-440 - [c79]Zhengan Huang
, Junzuo Lai
, Shuai Han
, Lin Lyu
, Jian Weng
:
Anonymous Public Key Encryption Under Corruptions. ASIACRYPT (3) 2022: 423-453 - [c78]Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng:
Learning Second Order Local Anomaly for General Face Forgery Detection. CVPR 2022: 20238-20248 - [i59]Jia-Si Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. CoRR abs/2201.09186 (2022) - [i58]Sulong Ge, Zhihua Xia, Jianwei Fei, Xingming Sun, Jian Weng:
A Robust Document Image Watermarking Scheme using Deep Neural Network. CoRR abs/2202.13067 (2022) - [i57]Sulong Ge, Zhihua Xia, Yao Tong, Jian Weng, Jia-Nan Liu:
A Screen-Shooting Resilient Document Image Watermarking Scheme using Deep Neural Network. CoRR abs/2203.05198 (2022) - [i56]Caiqin Dong, Jian Weng, Yao Tong, Jia-Nan Liu, Anjia Yang, Yudan Cheng, Shun Hu:
Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients. CoRR abs/2205.03040 (2022) - [i55]Yong Xu, Zhihua Xia, Zichi Wang, Xinpeng Zhang, Jian Weng:
Deniable Steganography. CoRR abs/2205.12587 (2022) - [i54]Wensheng Gan, Gengsen Huang, Jian Weng, Tianlong Gu, Philip S. Yu:
Towards Target Sequential Rules. CoRR abs/2206.04728 (2022) - [i53]Jianwei Fei, Yunshu Dai, Peipeng Yu, Tianrun Shen, Zhihua Xia, Jian Weng:
Learning Second Order Local Anomaly for General Face Forgery Detection. CoRR abs/2209.15490 (2022) - [i52]Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. CoRR abs/2210.11334 (2022) - [i51]Axin Wu, Jian Weng, Weiqi Luo, Anjia Yang, Jia-Nan Liu, Zike Jiang:
Cross-Domain Identity-based Matchmaking Encryption. IACR Cryptol. ePrint Arch. 2022: 85 (2022) - [i50]Zilin Liu, Anjia Yang, Jian Weng, Tao Li, Huang Zeng, Xiaojian Liang:
GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks. IACR Cryptol. ePrint Arch. 2022: 115 (2022) - [i49]Lisha Yao, Jian Weng, Bimei Wang:
Conditional Attribute-Based Proxy Re-Encryption and Its Instantiation. IACR Cryptol. ePrint Arch. 2022: 637 (2022) - [i48]Ling Song, Nana Zhang, Qianqian Yang, Danping Shi, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery. IACR Cryptol. ePrint Arch. 2022: 723 (2022) - [i47]Zhengan Huang, Junzuo Lai, Shuai Han, Lin Lyu, Jian Weng:
Anonymous Public Key Encryption under Corruptions. IACR Cryptol. ePrint Arch. 2022: 1176 (2022) - [i46]Jie Chen, Yu Li, Jinming Wen, Jian Weng:
Identity-Based Matchmaking Encryption from Standard Assumptions. IACR Cryptol. ePrint Arch. 2022: 1246 (2022) - 2021
- [j136]Nan Cui, Shengli Liu
, Dawu Gu, Jian Weng:
Robustly reusable fuzzy extractor with imperfect randomness. Des. Codes Cryptogr. 89(5): 1017-1059 (2021) - [j135]Zhiquan Liu
, Jianfeng Ma, Jian Weng, Feiran Huang, Yongdong Wu, Linfeng Wei, Yuxian Li:
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications. Inf. Fusion 73: 144-156 (2021) - [j134]Hailiang Li, Bin Zhang, Yu Zhang, Xilin Dang, Yuwei Han, Linfeng Wei, Yijun Mao, Jian Weng:
A defense method based on attention mechanism against traffic sign adversarial samples. Inf. Fusion 76: 55-65 (2021) - [j133]Zhiquan Liu
, Feiran Huang
, Jian Weng, Kun Cao, Yinbin Miao, Jingjing Guo, Yongdong Wu:
BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks. IEEE Internet Things J. 8(7): 5386-5407 (2021) - [j132]Anjia Yang
, Dutliff Boshoff
, Qiao Hu, Gerhard P. Hancke
, Xizhao Luo
, Jian Weng
, Keith Mayes, Konstantinos Markantonakis:
Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns. IEEE Internet Things J. 8(14): 11607-11620 (2021) - [j131]Yingling Dai, Jian Weng, Anjia Yang, Shui Yu
, Robert H. Deng:
A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing. KSII Trans. Internet Inf. Syst. 15(8): 2827-2848 (2021) - [j130]Kun Cao
, Tongquan Wei, Mingsong Chen, Keqin Li
, Jian Weng, Wuzheng Tan:
Exploring reliable edge-cloud computing for service latency optimization in sustainable cyber-physical systems. Softw. Pract. Exp. 51(11): 2225-2237 (2021) - [j129]Anjia Yang
, Jia Xu
, Jian Weng
, Jianying Zhou
, Duncan S. Wong:
Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage. IEEE Trans. Cloud Comput. 9(1): 212-225 (2021) - [j128]