default search action
Changgen Peng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j65]Zhengqing Xiao, Youliang Tian, Changgen Peng, Yangyang Long, Chuanda Cai:
Ghost-Weight protocol: a highly efficient blockchain consensus for IoT. J. Supercomput. 81(1): 61 (2025) - 2024
- [j64]Xun Yang, Shuwen Xiang, Changgen Peng, Weijie Tan, Yue Wang, Hai Liu, Hongfa Ding:
Federated Learning Incentive Mechanism with Supervised Fuzzy Shapley Value. Axioms 13(4): 254 (2024) - [j63]Zhimei Yang, Changgen Peng, Chongyi Zhong, Yangyang Long:
Consortium blockchain private key protection scheme based on rational secret sharing and blockchain. Comput. Networks 242: 110260 (2024) - [j62]Xinxin Deng, Changgen Peng, Haoxuan Yang, Zongfeng Peng, Chongyi Zhong:
A dynamic data access control scheme for hierarchical structures in big data. Comput. Commun. 220: 128-137 (2024) - [j61]Xiaoran Zhao, Changgen Peng, Hongfa Ding, Weijie Tan:
An integrated graph data privacy attack framework based on graph neural networks in IoT. Concurr. Comput. Pract. Exp. 36(20) (2024) - [j60]Huawei Huang, Changgen Peng, Lunzhi Deng:
Cryptanalysis of a key exchange protocol based on a modified tropical structure. Des. Codes Cryptogr. 92(11): 3843-3858 (2024) - [j59]Jiawang Liu, Changgen Peng, Weijie Tan, Chenghui Shi:
Federated Learning Backdoor Attack Based on Frequency Domain Injection. Entropy 26(2): 164 (2024) - [j58]Jinqiu Hou, Changgen Peng, Weijie Tan:
A lattice-based data sharing functional encryption scheme with HRA security for IoT. Expert Syst. Appl. 254: 124355 (2024) - [j57]Dequan Xu, Changgen Peng, Weizheng Wang, Kapal Dev, Sunder Ali Khowaja, Youliang Tian:
Multikeyword-Ranked Search Scheme Supporting Extreme Environments for Internet of Vehicles. IEEE Internet Things J. 11(3): 3868-3880 (2024) - [j56]Axin Xiang, Hongfeng Gao, Youliang Tian, Jinbo Xiong, Linjie Wang, Changgen Peng:
H²CT: Asynchronous Distributed Key Generation With High-Computational Efficiency and Threshold Security in Blockchain Network. IEEE Internet Things J. 11(20): 33758-33772 (2024) - [j55]Yangyang Long, Changgen Peng, Yuling Chen, Weijie Tan, Jing Sun:
BFFDT: Blockchain-Based Fair and Fine-Grained Data Trading Using Proxy Re-Encryption and Verifiable Commitment. IEEE Internet Things J. 11(23): 38508-38520 (2024) - [j54]Yangyang Long, Changgen Peng, Weijie Tan, Yuling Chen:
Blockchain-assisted full-session key agreement for secure data sharing in cloud computing. J. Parallel Distributed Comput. 193: 104943 (2024) - [j53]Huawei Huang, Changgen Peng, Lunzhi Deng:
Reduction of the semigroup-action problem on a module to the hidden-subgroup problem. Quantum Inf. Process. 23(8): 300 (2024) - [j52]Ruoxia Li, Zengxiang Wang, Liming Fang, Changgen Peng, Weizheng Wang, Hu Xiong:
Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse. IEEE Trans. Consumer Electron. 70(1): 3770-3780 (2024) - [j51]Haoxuan Yang, Changgen Peng:
CP-IPFE: Ciphertext-Policy Based Inner Product Functional Encryption. IEEE Trans. Inf. Forensics Secur. 19: 5419-5433 (2024) - [j50]Yangyang Long, Changgen Peng, Weijie Tan, Yuling Chen:
Blockchain-Based Anonymous Authentication and Key Management for Internet of Things With Chebyshev Chaotic Maps. IEEE Trans. Ind. Informatics 20(5): 7883-7893 (2024) - [j49]Hai Liu, Dequan Xu, Youliang Tian, Changgen Peng, Zhenqiang Wu, Ziyue Wang:
Wasserstein Generative Adversarial Networks Based Differential Privacy Metaverse Data Sharing. IEEE J. Biomed. Health Informatics 28(11): 6348-6359 (2024) - [c17]Xiaoran Zhao, Changgen Peng, Weijie Tan, Hongfa Ding:
Blockchain-based access control dynamic key authentication protocol in IoT. ICBTA 2024: 55-59 - 2023
- [j48]Xun Yang, Shuwen Xiang, Changgen Peng, Weijie Tan, Zhen Li, Ningbo Wu, Yan Zhou:
Federated Learning Incentive Mechanism Design via Shapley Value and Pareto Optimality. Axioms 12(7): 636 (2023) - [j47]Xinyue Wu, Zhineng Chen, Changgen Peng, Xiongjun Ye:
MMSRNet: Pathological image super-resolution by multi-task and multi-scale learning. Biomed. Signal Process. Control. 81: 104428 (2023) - [j46]Fan Zhao, Changgen Peng, Dequan Xu, Yicen Liu, Kun Niu, Hanlin Tang:
Attribute-based multi-user collaborative searchable encryption in COVID-19. Comput. Commun. 205: 118-126 (2023) - [j45]Chaoyue Tan, Yuling Chen, Xiaojun Ren, Changgen Peng:
A mobile energy trading scheme based on Lightning Network. Concurr. Comput. Pract. Exp. 35(20) (2023) - [j44]Zhou Zhou, Youliang Tian, Changgen Peng, Nan Yang, Shigong Long:
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things. Concurr. Comput. Pract. Exp. 35(20) (2023) - [j43]Zhiyi Lin, Changgen Peng, Weijie Tan, Xing He:
Image Adversarial Example Generation Method Based on Adaptive Parameter Adjustable Differential Evolution. Entropy 25(3): 487 (2023) - [j42]Zifan Wang, Changgen Peng, Xing He, Weijie Tan:
Wasserstein Distance-Based Deep Leakage from Gradients. Entropy 25(5): 810 (2023) - [j41]Lin Wang, Changgen Peng, Weijie Tan:
Secure Ring Signature Scheme for Privacy-Preserving Blockchain. Entropy 25(9): 1334 (2023) - [j40]Xing He, Changgen Peng, Lin Wang, Weijie Tan, Zifan Wang:
Stable and Fast Deep Mutual Information Maximization Based on Wasserstein Distance. Entropy 25(12): 1607 (2023) - [j39]Xing He, Changgen Peng, Weijie Tan:
Fast and Accurate Deep Leakage from Gradients Based on Wasserstein Distance. Int. J. Intell. Syst. 2023: 1-12 (2023) - [j38]Hai Liu, Youliang Tian, Changgen Peng, Zhenqiang Wu:
Privacy-utility equilibrium data generation based on Wasserstein generative adversarial networks. Inf. Sci. 642: 119069 (2023) - [j37]Wendan Li, Changgen Peng, Weijie Tan, Yi Xu, Kun Niu:
A reversible and lossless secret image sharing scheme with authentication for color images. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101854 (2023) - [j36]Yan Zhou, Changgen Peng, Youliang Tian, Zuolong Li, Weijie Tan:
Unbounded Attribute-Based Encryption Supporting Non-Monotonic Access Structure and Traceability without Key Escrow. Mob. Networks Appl. 28(5): 1625-1635 (2023) - [j35]Dequan Xu, Changgen Peng, Weizheng Wang, Hai Liu, Shoaib Ahmed Shaikh, Youliang Tian:
Privacy-Preserving Dynamic Multi-Keyword Ranked Search Scheme in Multi-User Settings. IEEE Trans. Consumer Electron. 69(4): 890-901 (2023) - [j34]Zhou Zhou, Youliang Tian, Jinbo Xiong, Jianfeng Ma, Changgen Peng:
Blockchain-Enabled Secure and Trusted Federated Data Sharing in IIoT. IEEE Trans. Ind. Informatics 19(5): 6669-6681 (2023) - [c16]Dequan Xu, Changgen Peng, Youliang Tian, Hai Liu, Ziyue Wang, Weizheng Wang:
POSTER: Collaborative Authority-Based Searchable Encryption Using Access Control Encryption. ACNS Workshops 2023: 722-726 - [c15]Jinqiu Hou, Changgen Peng, Weijie Tan, Chongyi Zhong, Kun Niu, Hu Li:
Fine-Grained Access Control Proxy Re-encryption with HRA Security from Lattice. GPC (2) 2023: 175-190 - [c14]Panpan Xu, Weijie Tan, Kun Niu, Zhen Li, Changgen Peng:
Secrecy Performance Analysis of Artificial Noise Assisted Secure Transmission for MISO systems with Multiple Eavesdroppers. ICSPCC 2023: 1-6 - 2022
- [j33]Hai Liu, Changgen Peng, Youliang Tian, Shigong Long, Feng Tian, Zhenqiang Wu:
GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel. Entropy 24(3): 430 (2022) - [j32]Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Kun Niu:
Non-interactive verifiable privacy-preserving federated learning. Future Gener. Comput. Syst. 128: 365-380 (2022) - [j31]Youliang Tian, Zhiying Zhang, Jinbo Xiong, Lei Chen, Jianfeng Ma, Changgen Peng:
Achieving Graph Clustering Privacy Preservation Based on Structure Entropy in Social IoT. IEEE Internet Things J. 9(4): 2761-2777 (2022) - [j30]Kun Niu, Changgen Peng, Youliang Tian, Weijie Tan:
K -implicit Tracking Data Publishing Scheme against Geo-matching Attacks. J. Inf. Sci. Eng. 38(1): 1-16 (2022) - [j29]Kang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan:
Game-based Theory Rational Delegation Learning Scheme. J. Inf. Sci. Eng. 38(1): 57-82 (2022) - [j28]Youliang Tian, Ta Li, Jinbo Xiong, Md. Zakirul Alam Bhuiyan, Jianfeng Ma, Changgen Peng:
A Blockchain-Based Machine Learning Framework for Edge Services in IIoT. IEEE Trans. Ind. Informatics 18(3): 1918-1929 (2022) - [c13]Lingqin Ran, Changgen Peng, Dequan Xu, Weijie Tan, Zhongming Lin:
Blockchain Privacy Disclosure Risk Assessment Scheme Based on Improved Paillier Algorithm. HPCC/DSS/SmartCity/DependSys 2022: 1881-1887 - 2021
- [j27]Zerui Chen, Youliang Tian, Changgen Peng:
An incentive-compatible rational secret sharing scheme using blockchain and smart contract. Sci. China Inf. Sci. 64(10) (2021) - [j26]Zhen Li, Changgen Peng, Weijie Tan, Liangrong Li:
An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method. Complex. 2021: 8824915:1-8824915:18 (2021) - [j25]Zerui Chen, Youliang Tian, Jinbo Xiong, Changgen Peng, Jianfeng Ma:
Towards reducing delegation overhead in replication-based verification: An incentive-compatible rational delegation computing scheme. Inf. Sci. 568: 286-316 (2021) - [j24]Ge Song, Yuqiao Deng, Qiong Huang, Changgen Peng, Chunming Tang, Xiaohua Wang:
Hierarchical identity-based inner product functional encryption. Inf. Sci. 573: 332-344 (2021) - [j23]Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Hongfa Ding:
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning. Peer-to-Peer Netw. Appl. 14(3): 1414-1430 (2021) - [j22]Hai Liu, Changgen Peng, Youliang Tian, Shigong Long, Zhenqiang Wu:
Balancing Privacy-Utility of Differential Privacy Mechanism: A Collaborative Perspective. Secur. Commun. Networks 2021: 5592191:1-5592191:14 (2021) - [j21]Kun Niu, Changgen Peng, Weijie Tan, Zhou Zhou, Yi Xu:
Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing. Secur. Commun. Networks 2021: 6654539:1-6654539:11 (2021) - [j20]Zhen Li, Changgen Peng, Weijie Tan, Liangrong Li:
An Efficient Plaintext-Related Chaotic Image Encryption Scheme Based on Compressive Sensing. Sensors 21(3): 758 (2021) - [j19]Zhou Zhou, Youliang Tian, Changgen Peng:
Privacy-Preserving Federated Learning Framework with General Aggregation and Multiparty Entity Matching. Wirel. Commun. Mob. Comput. 2021: 6692061:1-6692061:14 (2021) - [c12]Shuai Zhao, Xuanya Li, Zhineng Chen, Chang Liu, Changgen Peng:
Res2-Unet: An Enhanced Network for Generalized Nuclear Segmentation in Pathological Images. MMM (2) 2021: 87-98 - 2020
- [j18]Ningbo Wu, Changgen Peng, Kun Niu:
A Privacy-Preserving Game Model for Local Differential Privacy by Using Information-Theoretic Approach. IEEE Access 8: 216741-216751 (2020) - [j17]Huilan Liu, Junjie Ma, Changgen Peng:
Shrinkage estimation for identification of linear components in composite quantile additive models. Commun. Stat. Simul. Comput. 49(10): 2678-2692 (2020) - [j16]Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu:
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration. Int. Arab J. Inf. Technol. 17(4): 450-460 (2020) - [j15]Hongfa Ding, Youliang Tian, Changgen Peng, Youshan Zhang, Shuwen Xiang:
Inference attacks on genomic privacy with an improved HMM and an RCNN model for unrelated individuals. Inf. Sci. 512: 207-218 (2020) - [j14]Zhen Li, Changgen Peng, Weijie Tan, Liangrong Li:
A Novel Chaos-Based Color Image Encryption Scheme Using Bit-Level Permutation. Symmetry 12(9): 1497 (2020) - [j13]Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu:
Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms. Theor. Comput. Sci. 816: 195-220 (2020) - [c11]Kang Xiang, Youliang Tian, Sheng Gao, Changgen Peng, Weijie Tan:
Rational Delegation Learning Outsourcing Scheme Based on Game Theory. NaNA 2020: 130-135 - [c10]Kun Niu, Changgen Peng, Youliang Tian, Weijie Tan:
Spatial Ciphertext Aggregation Computing Scheme for Mobile Crowd Sensing Privacy Protection. NaNA 2020: 388-393
2010 – 2019
- 2019
- [j12]Cheng Liu, Youliang Tian, Jinbo Xiong, Yanhua Lu, Qiuxian Li, Changgen Peng:
Towards Attack and Defense Views to K-Anonymous Using Information Theory Approach. IEEE Access 7: 156025-156032 (2019) - [j11]Huilan Liu, Hu Yang, Changgen Peng:
Weighted composite quantile regression for single index model with missing covariates at random. Comput. Stat. 34(4): 1711-1740 (2019) - [j10]Hongfa Ding, Changgen Peng, Youliang Tian, Shuwen Xiang:
A risk adaptive access control model based on Markov for big data in the cloud. Int. J. High Perform. Comput. Netw. 13(4): 464-475 (2019) - [c9]Xing Ding, Changgen Peng, Hongfa Ding, Maoni Wang, Hui Yang, Qinyong Yu:
User Identity Authentication and Identification Based on Multi-Factor Behavior Features. GLOBECOM Workshops 2019: 1-6 - [c8]Hongfa Ding, Changgen Peng, Youliang Tian, Shuwen Xiang:
A Game Theoretical Analysis of Risk Adaptive Access Control for Privacy Preserving. NaNA 2019: 253-258 - [c7]Hai Liu, Zhenqiang Wu, Changgen Peng, Xiujuan Lei, Feng Tian, Laifeng Lu:
Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing. NaNA 2019: 429-436 - 2018
- [j9]Hai Liu, Zhenqiang Wu, Changgen Peng, Feng Tian, Laifeng Lu:
Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise. KSII Trans. Internet Inf. Syst. 12(7): 3497-3515 (2018) - [j8]Panpan Zhang, Changgen Peng, Chenyan Hao:
一种基于隐私偏好的隐私保护模型及其量化方法 (Privacy Protection Model and Privacy Metric Methods Based on Privacy Preference). 计算机科学 45(6): 130-134 (2018) - [j7]Zhen Lv, Changgen Peng, Yanguo Peng, Junwei Zhang:
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 9437936:1-9437936:13 (2018) - 2017
- [j6]Yanguo Peng, Hui Li, Jiangtao Cui, Junwei Zhang, Jianfeng Ma, Changgen Peng:
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6): 62101 (2017) - [c6]Hai Liu, Zhenqiang Wu, Changgen Peng, Shuangyue Zhang, Feng Tian, Laifeng Lu:
Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy. ICICS 2017: 446-458 - [c5]Hai Liu, Zhenqiang Wu, Changgen Peng, Xiujuan Lei:
Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated Sequences. NaNA 2017: 125-132 - 2016
- [c4]Yanguo Peng, Hui Li, Jiangtao Cui, Yixiao Zhu, Changgen Peng:
An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D Tree. NaNA 2016: 250-253 - 2015
- [j5]Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang, Wenjiang Ji:
Bayesian mechanism for rational secret sharing scheme. Sci. China Inf. Sci. 58(5): 1-13 (2015) - [j4]Hai Liu, Changgen Peng, Hong Zhang, Zhijing Ren:
一种理性安全协议的博弈逻辑描述模型 (Game Logic Formal Model of Rational Secure Protocol). 计算机科学 42(9): 118-126 (2015) - 2014
- [i1]Youliang Tian, Changgen Peng:
Universally Composable Secure Group Communication. IACR Cryptol. ePrint Arch. 2014: 647 (2014) - 2013
- [j3]Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang:
Fair (t, n) threshold secret sharing scheme. IET Inf. Secur. 7(2) (2013) - [j2]Youliang Tian, Jianfeng Ma, Changgen Peng, Yichuan Wang, Liumei Zhang:
A rational framework for secure communication. Inf. Sci. 250: 215-226 (2013) - 2012
- [j1]Youliang Tian, Changgen Peng, Jianfeng Ma:
Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings. Int. J. Netw. Secur. 14(3): 142-148 (2012) - 2011
- [c3]Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu:
Secret Sharing Scheme with Fairness. TrustCom 2011: 494-500 - 2010
- [c2]Weimin Shi, Changgen Peng:
A Protocol of Secure Multi-party Multiplication Based on Bilinear Pairing. CIS 2010: 302-305
2000 – 2009
- 2005
- [c1]Changgen Peng, Xiang Li:
An Identity-Based Threshold Signcryption Scheme with Semantic Security. CIS (2) 2005: 173-179
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-29 21:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint