default search action
Jian Weng 0001
Person information
- affiliation: Jinan University, College of Information Science and Technology, Guangzhou, China
- affiliation (2008 - 2010): Singapore Management University, Singapore
- affiliation (PhD 2008): Shanghai Jiao Tong University, China
Other persons with the same name
- Jian Weng
- Jian Weng 0002 — University of California, Los Angeles, CA, USA
- Jian Weng 0003 — Zhejiang University, Hangzhou, China
- Jian Weng 0004 — Tsinghua University, Beijing, China
- Jian Weng 0005 — Xilinx, Beijing, China
- Jian Weng 0006 — Xiamen Univerisity, Xiamen City, Fujian, China
- Jian Weng 0007 — Shandong University, China
- Jian Weng 0008 — Wuhan University of Technology, School of Mechanical and Electronic Engineering, Hubei Digital Manufacturing Key Laboratory, China
- Jian Weng 0009 — Shenzhen University, College of Computer Science and Software Engineering, China
- Jian Weng 0010 — Beihang University, Beijing, China
- Jian Weng 0011 — Lanzhou Jiaotong University, China
- Jian Weng 0012 — AMD, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j247]Lisha Yao, Lin Hou, Jian Weng, Feixiang Zhao:
Provably secure attribute-based authenticated encryption with keyword search from ideal lattices. Sci. China Inf. Sci. 67(1) (2024) - [j246]Jinzheng Cao, Qingfeng Cheng, Jian Weng:
Optimizing c-sum BKW and Faster Quantum Variant for LWE. IACR Commun. Cryptol. 1(3): 7 (2024) - [j245]Jun-Min Shao, Guo-Qiang Zeng, Kang-Di Lu, Guang-Gang Geng, Jian Weng:
Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search. Comput. Secur. 143: 103910 (2024) - [j244]Yu Zhang, Guo-Qiang Zeng, Min-Rong Chen, Guang-Gang Geng, Jian Weng, Kang-Di Lu:
DoFA: Adversarial examples detection for SAR images by dual-objective feature attribution. Expert Syst. Appl. 255: 124705 (2024) - [j243]Wuzheng Tan, Shenglong Du, Jian Weng:
Enhancing Efficiency and Security in Unbalanced PSI-CA Protocols through Cloud Computing and Homomorphic Encryption in Mobile Networks. Future Internet 16(6): 205 (2024) - [j242]Shuyuan Lin, Feiran Huang, Taotao Lai, Jianhuang Lai, Hanzi Wang, Jian Weng:
Robust Heterogeneous Model Fitting for Multi-source Image Correspondences. Int. J. Comput. Vis. 132(8): 2907-2928 (2024) - [j241]Jiawei Wang, Boyu Gao, Huawei Tu, Hai-Ning Liang, Zitao Liu, Weiqi Luo, Jian Weng:
Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality. Int. J. Hum. Comput. Interact. 40(17): 4608-4626 (2024) - [j240]Qian Feng, Shenglong Du, Wuzheng Tan, Jian Weng:
Efficient Cryptographic Solutions for Unbalanced Private Set Intersection in Mobile Communication. Inf. 15(9): 554 (2024) - [j239]Tao Li, Anjia Yang, Jian Weng, Min-Rong Chen, Xizhao Luo, Xiaohu Chen, Changkun Jiang:
Enabling Secure and Flexible Streaming Media With Blockchain Incentive. IEEE Internet Things J. 11(2): 1966-1980 (2024) - [j238]Yuan Chen, Jia-Nan Liu, Anjia Yang, Jian Weng, Min-Rong Chen, Zilin Liu, Ming Li:
PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace. IEEE Internet Things J. 11(8): 13424-13436 (2024) - [j237]Yijian Zhong, Wuzheng Tan, Zhifeng Xu, Shixin Chen, Jia-Si Weng, Jian Weng:
WVFL: Weighted Verifiable Secure Aggregation in Federated Learning. IEEE Internet Things J. 11(11): 19926-19936 (2024) - [j236]Heng Sun, Weilin Huang, Jian Weng, Zhiquan Liu, Weihua Tan, Zaobo He, Mingyang Chen, Biaobang Wu, Long Li, Xinyuan Peng:
CCID-CAN: Cross-Chain Intrusion Detection on CAN Bus for Autonomous Vehicles. IEEE Internet Things J. 11(15): 26146-26159 (2024) - [j235]Qinggan Fu, Yin Lv, Zhiquan Liu, Yingying Li, Ling Song, Jian Weng:
Preimage Attacks on Xoodyak and Gaston Based on Algebraic Strategies. IEEE Internet Things J. 11(19): 31368-31384 (2024) - [j234]Yinuo Chen, Wuzheng Tan, Yijian Zhong, Yulin Kang, Anjia Yang, Jian Weng:
Byzantine-Robust and Privacy-Preserving Federated Learning With Irregular Participants. IEEE Internet Things J. 11(21): 35193-35205 (2024) - [j233]Feixiang Zhao, Jian Weng, Wenli Xie, Ming Li, Jiasi Weng:
HRA-secure attribute-based threshold proxy re-encryption from lattices. Inf. Sci. 655: 119900 (2024) - [j232]Fenghua Zhang, Bingwen Feng, Zhihua Xia, Jian Weng, Wei Lu, Bing Chen:
Conditional image hiding network based on style transfer. Inf. Sci. 662: 120225 (2024) - [j231]Zhi Li, Chaozhuo Li, Zhoujun Li, Jian Weng, Feiran Huang, Zhibo Zhou:
PPMGS: An efficient and effective solution for distributed privacy-preserving semi-supervised learning. Inf. Sci. 678: 120934 (2024) - [j230]Yuanmeng Zhao, Jian Weng, Jia-Nan Liu, Mei Cai:
Enabling privacy-preserving medication analysis in distributed EHR systems. J. Inf. Secur. Appl. 82: 103749 (2024) - [j229]Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. J. Cryptol. 37(2): 19 (2024) - [j228]Qingming Yi, Mingfeng Zheng, Min Shi, Jian Weng, Aiwen Luo:
AFANet: A Multibackbone Compatible Feature Fusion Framework for Effective Remote Sensing Object Detection. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j227]Pengcheng Xia, Jun Li, Long Shi, Bin Cao, Wuzheng Tan, Jian Weng, Yang Liu, Zhu Han:
A Reputation-Aided Lightweight Consensus Service Framework for Multi-Chain Metaverse. IEEE Netw. 38(6): 201-210 (2024) - [j226]Xin Chen, Xiaoling Deng, Yubin Lan, Yongbing Long, Jian Weng, Zhiquan Liu, Qi Tian:
Explanatory Object Part Aggregation for Zero-Shot Learning. IEEE Trans. Pattern Anal. Mach. Intell. 46(2): 851-868 (2024) - [j225]Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng, Naixue Xiong:
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy. IEEE Trans. Computers 73(2): 340-352 (2024) - [j224]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(3): 200-223 (2024) - [j223]Shuyuan Lin, Anjia Yang, Taotao Lai, Jian Weng, Hanzi Wang:
Multi-Motion Segmentation via Co-Attention-Induced Heterogeneous Model Fitting. IEEE Trans. Circuits Syst. Video Technol. 34(3): 1786-1798 (2024) - [j222]Qihua Feng, Peiya Li, Zhixun Lu, Chaozhuo Li, Zefan Wang, Zhiquan Liu, Chunhui Duan, Feiran Huang, Jian Weng, Philip S. Yu:
EViT: Privacy-Preserving Image Retrieval via Encrypted Vision Transformer in Cloud Computing. IEEE Trans. Circuits Syst. Video Technol. 34(8): 7467-7483 (2024) - [j221]Caiqin Dong, Jian Weng, Ming Li, Jia-Nan Liu, Zhiquan Liu, Yudan Cheng, Shui Yu:
Privacy-Preserving and Byzantine-Robust Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(2): 889-904 (2024) - [j220]Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang:
PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data. IEEE Trans. Dependable Secur. Comput. 21(2): 961-974 (2024) - [j219]Shun Hu, Ming Li, Jiasi Weng, Jia-Nan Liu, Jian Weng, Zhi Li:
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting. IEEE Trans. Dependable Secur. Comput. 21(4): 3883-3900 (2024) - [j218]Jia-Si Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. IEEE Trans. Inf. Forensics Secur. 19: 3309-3323 (2024) - [j217]Yushu Zhang, Junhao Ji, Wenying Wen, Youwen Zhu, Zhihua Xia, Jian Weng:
Understanding Visual Privacy Protection: A Generalized Framework With an Instance on Facial Privacy. IEEE Trans. Inf. Forensics Secur. 19: 5046-5059 (2024) - [j216]Xiangli Xiao, Yushu Zhang, Zhongyun Hua, Zhihua Xia, Jian Weng:
Client-Side Embedding of Screen-Shooting Resilient Image Watermarking. IEEE Trans. Inf. Forensics Secur. 19: 5357-5372 (2024) - [j215]Liqing Chen, Jiayi Li, Jiguo Li, Jian Weng:
PAESS: Public-Key Authentication Encryption With Similar Data Search for Pay-Per-Query. IEEE Trans. Inf. Forensics Secur. 19: 9910-9923 (2024) - [j214]Guo-Qiang Zeng, Hai-Nan Wei, Kang-Di Lu, Guang-Gang Geng, Jian Weng:
DACO-BD: Data Augmentation Combinatorial Optimization-Based Backdoor Defense in Deep Neural Networks for SAR Image Classification. IEEE Trans. Instrum. Meas. 73: 1-13 (2024) - [j213]Shuyuan Lin, Xiao Chen, Guobao Xiao, Hanzi Wang, Feiran Huang, Jian Weng:
Multi-Stage Network With Geometric Semantic Attention for Two-View Correspondence Learning. IEEE Trans. Image Process. 33: 3031-3046 (2024) - [j212]Shiying Zhang, Jun Li, Long Shi, Ming Ding, Dinh C. Nguyen, Wuzheng Tan, Jian Weng, Zhu Han:
Federated Learning in Intelligent Transportation Systems: Recent Applications and Open Problems. IEEE Trans. Intell. Transp. Syst. 25(5): 3259-3285 (2024) - [j211]Min Shi, Shaowen Lin, Qingming Yi, Jian Weng, Aiwen Luo, Yicong Zhou:
Lightweight Context-Aware Network Using Partial-Channel Transformation for Real-Time Semantic Segmentation. IEEE Trans. Intell. Transp. Syst. 25(7): 7401-7416 (2024) - [j210]Heng Sun, Huibiao Su, Jian Weng, Zhiquan Liu, Ming Li, Yi Liu, Yucheng Zhong, Wenzhen Sun:
MTDCAP: Moving Target Defense-Based CAN Authentication Protocol. IEEE Trans. Intell. Transp. Syst. 25(9): 12800-12817 (2024) - [j209]Haiyan Zhang, Xinghua Li, Mengfan Xu, Ximeng Liu, Tong Wu, Jian Weng, Robert H. Deng:
BADFL: Backdoor Attack Defense in Federated Learning From Local Model Perspective. IEEE Trans. Knowl. Data Eng. 36(11): 5661-5674 (2024) - [j208]Zhetao Li, Jianhui Wang, Saiqin Long, Jianming Fu, Min Yang, Jian Weng:
A Trust Evaluation Joint Active Detection Method in Video Sharing D2D Networks. IEEE Trans. Mob. Comput. 23(7): 7739-7752 (2024) - [j207]Eric Ke Wang, Zicong Chen, Mingjia Zhu, Zhetao Li, Jian Weng, Tianlong Gu:
Score-Based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization. IEEE Trans. Medical Imaging 43(10): 3596-3607 (2024) - [j206]Yinyan Zhang, Shuai Li, Jian Weng, Bolin Liao:
GNN Model for Time-Varying Matrix Inversion With Robust Finite-Time Convergence. IEEE Trans. Neural Networks Learn. Syst. 35(1): 559-569 (2024) - [j205]Jia Zhang, Yidong Lin, Min Jiang, Shaozi Li, Yong Tang, Jinyi Long, Jian Weng, Kay Chen Tan:
Fast Multilabel Feature Selection via Global Relevance and Redundancy Optimization. IEEE Trans. Neural Networks Learn. Syst. 35(4): 5721-5734 (2024) - [j204]Kun Cao, Jian Weng, Keqin Li:
Reliability-Driven End-End-Edge Collaboration for Energy Minimization in Large-Scale Cyber-Physical Systems. IEEE Trans. Reliab. 73(1): 230-244 (2024) - [j203]Kun Cao, Jian Weng:
REPFS: Reliability-Ensured Personalized Function Scheduling in Sustainable Serverless Edge Computing. IEEE Trans. Sustain. Comput. 9(3): 494-511 (2024) - [c98]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-hop Fully Homomorphic Proxy Re-encryption from Lattices. ESORICS (3) 2024: 238-258 - [c97]Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. EUROCRYPT (1) 2024: 339-367 - [c96]Huang Zeng, Anjia Yang, Jian Weng, Min-Rong Chen, Fengjun Xiao, Yi Liu, Ye Yao:
Enabling Privacy-Preserving and Publicly Auditable Federated Learning. ICC 2024: 5178-5183 - [c95]Xueyi Li, Youheng Bai, Teng Guo, Zitao Liu, Yaying Huang, Xiangyu Zhao, Feng Xia, Weiqi Luo, Jian Weng:
Enhancing Length Generalization for Attention Based Knowledge Tracing Models with Linear Biases. IJCAI 2024: 5918-5926 - [c94]Zixuan Yang, Yushu Zhang, Tao Wang, Zhongyun Hua, Zhihua Xia, Jian Weng:
Once-for-all: Efficient Visual Face Privacy Protection via Person-specific Veils. ACM Multimedia 2024: 7705-7713 - [c93]Tao Wang, Yushu Zhang, Xiangli Xiao, Lin Yuan, Zhihua Xia, Jian Weng:
Make Privacy Renewable! Generating Privacy-Preserving Faces Supporting Cancelable Biometric Recognition. ACM Multimedia 2024: 10268-10276 - [c92]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - [i79]Shuren Qi, Yushu Zhang, Chao Wang, Zhihua Xia, Jian Weng, Xiaochun Cao:
Hierarchical Invariance for Robust and Interpretable Vision Tasks at Larger Scales. CoRR abs/2402.15430 (2024) - [i78]Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng:
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network. CoRR abs/2403.00239 (2024) - [i77]Huang Zeng, Anjia Yang, Jian Weng, Min-Rong Chen, Fengjun Xiao, Yi Liu, Ye Yao:
Enabling Privacy-Preserving and Publicly Auditable Federated Learning. CoRR abs/2405.04029 (2024) - [i76]Shuyan Huang, Zitao Liu, Xiangyu Zhao, Weiqi Luo, Jian Weng:
Towards Robust Knowledge Tracing Models via k-Sparse Attention. CoRR abs/2407.17097 (2024) - [i75]Yijia Chang, Hanrui Jiang, Chao Lin, Xinyi Huang, Jian Weng:
Towards Understanding and Enhancing Security of Proof-of-Training for DNN Model Ownership Verification. CoRR abs/2410.04397 (2024) - [i74]Tianrun Yu, Chi Cheng, Zilong Yang, Yingchen Wang, Yanbin Pan, Jian Weng:
Hints from Hertz: Dynamic Frequency Scaling Side-Channel Analysis of Number Theoretic Transform in Lattice-Based KEMs. IACR Cryptol. ePrint Arch. 2024: 70 (2024) - [i73]Ling Song, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Probabilistic Extensions: A One-Step Framework for Finding Rectangle Attacks and Beyond. IACR Cryptol. ePrint Arch. 2024: 344 (2024) - [i72]Feixiang Zhao, Huaxiong Wang, Jian Weng:
Constant-Size Unbounded Multi-Hop Fully Homomorphic Proxy Re-Encryption from Lattices. IACR Cryptol. ePrint Arch. 2024: 1023 (2024) - [i71]Jinnuo Li, Chi Cheng, Muyan Shen, Peng Chen, Qian Guo, Dongsheng Liu, Liji Wu, Jian Weng:
Grafted Trees Bear Better Fruit: An Improved Multiple-Valued Plaintext-Checking Side-Channel Attack against Kyber. IACR Cryptol. ePrint Arch. 2024: 1174 (2024) - [i70]Qianqian Yang, Ling Song, Nana Zhang, Danping Shi, Libo Wang, Jiahao Zhao, Lei Hu, Jian Weng:
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key Recovery. IACR Cryptol. ePrint Arch. 2024: 1197 (2024) - [i69]Ling Song, Huimin Liu, Qianqian Yang, Yincen Chen, Lei Hu, Jian Weng:
Generic Differential Key Recovery Attacks and Beyond. IACR Cryptol. ePrint Arch. 2024: 1447 (2024) - [i68]Zhengan Huang, Junzuo Lai, Gongxian Zeng, Jian Weng:
Mild Asymmetric Message Franking: Illegal-Messages-Only and Retrospective Content Moderation. IACR Cryptol. ePrint Arch. 2024: 1608 (2024) - [i67]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. IACR Cryptol. ePrint Arch. 2024: 1783 (2024) - 2023
- [j202]Qihua Feng, Peiya Li, Zhixun Lu, Zhibo Zhou, Yongdong Wu, Jian Weng, Feiran Huang:
DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks. Appl. Soft Comput. 133: 109935 (2023) - [j201]Wenli Xie, Jian Weng, Yao Tong, Xiaojian Liang, Lisha Yao, Feixiang Zhao:
Lattice-based autonomous path proxy re-encryption in the standard model. Sci. China Inf. Sci. 66(10) (2023) - [j200]Chengxi Jiang, Shijie Xu, Guanggang Geng, Jian Weng, Xinchang Zhang:
Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification. Clust. Comput. 26(3): 1785-1800 (2023) - [j199]Jia-Cheng Huang, Guo-Qiang Zeng, Guang-Gang Geng, Jian Weng, Kang-Di Lu, Yu Zhang:
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems. Comput. Secur. 132: 103310 (2023) - [j198]Jinzheng Cao, Jian Weng, Yanbin Pan, Qingfeng Cheng:
Generalized attack on ECDSA: known bits in arbitrary positions. Des. Codes Cryptogr. 91(11): 3803-3823 (2023) - [j197]Long Li, Jianbo Huang, Liang Chang, Jian Weng, Jia Chen, Jingjing Li:
DPPS: A novel dual privacy-preserving scheme for enhancing query privacy in continuous location-based services. Frontiers Comput. Sci. 17(5): 175814 (2023) - [j196]Sulong Ge, Jianwei Fei, Zhihua Xia, Yao Tong, Jian Weng, Jia-Nan Liu:
A screen-shooting resilient document image watermarking scheme using deep neural network. IET Image Process. 17(2): 323-336 (2023) - [j195]Lisha Yao, Jian Weng, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou:
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing. Inf. Sci. 624: 777-795 (2023) - [j194]Yinyan Zhang, Shuai Li, Xuefeng Zhou, Jian Weng, Guanggang Geng:
Single-state distributed k-winners-take-all neural network model. Inf. Sci. 647: 119528 (2023) - [j193]Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j192]Sulong Ge, Zhihua Xia, Jianwei Fei, Yao Tong, Jian Weng, Ming Li:
A robust document image watermarking scheme using deep neural network. Multim. Tools Appl. 82(25): 38589-38612 (2023) - [j191]Eric Ke Wang, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen, Weiping Ding, Siu-Ming Yiu, Jian Weng:
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. Pattern Recognit. 143: 109745 (2023) - [j190]Guofeng Li, Bingwen Feng, Mingjin He, Jian Weng, Wei Lu:
High-capacity coverless image steganographic scheme based on image synthesis. Signal Process. Image Commun. 111: 116894 (2023) - [j189]Chunkai Zhang, Quanjian Dai, Zilin Du, Wensheng Gan, Jian Weng, Philip S. Yu:
TUSQ: Targeted High-Utility Sequence Querying. IEEE Trans. Big Data 9(2): 512-527 (2023) - [j188]Yaxi Yang, Yao Tong, Jian Weng, Yufeng Yi, Yandong Zheng, Leo Yu Zhang, Rongxing Lu:
PriRanGe: Privacy-Preserving Range-Constrained Intersection Query Over Genomic Data. IEEE Trans. Cloud Comput. 11(3): 2379-2391 (2023) - [j187]Peipeng Yu, Jian Tang, Zhihua Xia, Zhetao Li, Jian Weng:
A Privacy-Preserving JPEG Image Retrieval Scheme Using the Local Markov Feature and Bag-of-Words Model in Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2885-2896 (2023) - [j186]Jiao Liu, Xinghua Li, Ximeng Liu, Jiawei Tang, Siqi Ma, Jian Weng:
A Privacy-Preserving Service Framework for Traveling Salesman Problem-Based Neural Combinatorial Optimization Network. IEEE Trans. Cloud Comput. 11(4): 3381-3395 (2023) - [j185]Yiming Li, Shengli Liu, Shuai Han, Dawu Gu, Jian Weng:
Simulatable verifiable random function from the LWE assumption. Theor. Comput. Sci. 957: 113826 (2023) - [j184]Yinyan Zhang, Shuai Li, Jian Weng:
Distributed k-Winners-Take-All Network: An Optimization Perspective. IEEE Trans. Cybern. 53(8): 5069-5081 (2023) - [j183]Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang, Jianfeng Ma:
Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation. IEEE Trans. Dependable Secur. Comput. 20(2): 1243-1257 (2023) - [j182]Yongdong Wu, Jian Weng, Zhengxia Wang, Kaimin Wei, Jinming Wen, Junzuo Lai, Xin Li:
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. IEEE Trans. Dependable Secur. Comput. 20(2): 1744-1755 (2023) - [j181]Chuan Ma, Jun Li, Ming Ding, Bo Liu, Kang Wei, Jian Weng, H. Vincent Poor:
RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network. IEEE Trans. Dependable Secur. Comput. 20(6): 4838-4852 (2023) - [j180]Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. IEEE Trans. Inf. Forensics Secur. 18: 2218-2233 (2023) - [j179]Hongshuang Hu, Yongdong Wu, Jian Weng, Kaimin Wei, Zhiquan Liu, Feiran Huang, Yinyan Zhang:
Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking. IEEE Trans. Inf. Forensics Secur. 18: 3991-4005 (2023) - [j178]Xueqiao Liu, Guomin Yang, Willy Susilo, Kai He, Robert H. Deng, Jian Weng:
Privacy-Preserving Multi-User Outsourced Computation for Boolean Circuits. IEEE Trans. Inf. Forensics Secur. 18: 4929-4943 (2023) - [j177]Axin Wu, Weiqi Luo, Jian Weng, Anjia Yang, Jinghang Wen:
Fuzzy Identity-Based Matchmaking Encryption and Its Application. IEEE Trans. Inf. Forensics Secur. 18: 5592-5607 (2023) - [j176]Xiang Liu, Xueli Zhao, Zhihua Xia, Qian Feng, Peipeng Yu, Jian Weng:
Secure Outsourced SIFT: Accurate and Efficient Privacy-Preserving Image SIFT Feature Extraction. IEEE Trans. Image Process. 32: 4635-4648 (2023) - [j175]Gengsen Huang, Wensheng Gan, Jian Weng, Philip S. Yu:
US-Rule: Discovering Utility-driven Sequential Rules. ACM Trans. Knowl. Discov. Data 17(1): 10:1-10:22 (2023) - [j174]Qiuyun Tong, Xinghua Li, Yinbin Miao, Ximeng Liu, Jian Weng, Robert H. Deng:
Privacy-Preserving Boolean Range Query With Temporal Access Control in Mobile Computing. IEEE Trans. Knowl. Data Eng. 35(5): 5159-5172 (2023) - [j173]Qiuyun Tong, Yinbin Miao, Jian Weng, Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng:
Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security. IEEE Trans. Knowl. Data Eng. 35(5): 5386-5399 (2023) - [j172]Yanbing Ren, Xinghua Li, Yinbin Miao, Robert H. Deng, Jian Weng, Siqi Ma, Jianfeng Ma:
DistPreserv: Maintaining User Distribution for Privacy-Preserving Location-Based Services. IEEE Trans. Mob. Comput. 22(6): 3287-3302 (2023) - [j171]Min Shi, Jialin Shen, Qingming Yi, Jian Weng, Zunkai Huang, Aiwen Luo, Yicong Zhou:
LMFFNet: A Well-Balanced Lightweight Network for Fast and Accurate Semantic Segmentation. IEEE Trans. Neural Networks Learn. Syst. 34(6): 3205-3219 (2023) - [j170]Xin Chen, Jian Weng, Xiaoling Deng, Weiqi Luo, Yubin Lan, Qi Tian:
Feature Distillation in Deep Attention Network Against Adversarial Examples. IEEE Trans. Neural Networks Learn. Syst. 34(7): 3691-3705 (2023) - [j169]Yinyan Zhang, Jilian Zhang, Jian Weng:
Dynamic Moore-Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach. IEEE Trans. Neural Networks Learn. Syst. 34(12): 10919-10929 (2023) - [j168]Xinghua Li, Qiuyun Tong, Jinwei Zhao, Yinbin Miao, Siqi Ma, Jian Weng, Jianfeng Ma, Kim-Kwang Raymond Choo:
VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data. IEEE Trans. Serv. Comput. 16(1): 698-710 (2023) - [j167]Xiaohu Chen, Anjia Yang, Jian Weng, Yao Tong, Cheng Huang, Tao Li:
A Blockchain-Based Copyright Protection Scheme With Proactive Defense. IEEE Trans. Serv. Comput. 16(4): 2316-2329 (2023) - [j166]Heng Sun, Weiyun Luo, Jian Weng, Zhiquan Liu, Ming Li:
ECQV-GDH-Based Group Key Exchange Protocol for CAN Bus. IEEE Trans. Veh. Technol. 72(10): 12857-12872 (2023) - [j165]