default search action
Haibo Hong
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Mande Xie, Xuekang Yang, Haibo Hong, Guiyi Wei, Zhen Zhang:
A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments. Future Gener. Comput. Syst. 153: 287-300 (2024) - [j23]Haibo Hong, Shi Bai, Fenghao Liu:
The group factorization problem in finite groups of Lie type. Inf. Process. Lett. 186: 106484 (2024) - [j22]Chen Chen, Haibo Hong, Tao Xiang, Mande Xie:
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way. IEEE Trans. Inf. Forensics Secur. 19: 7420-7434 (2024) - [i4]Hanfeng Xia, Haibo Hong, Ruili Wang:
CBPF: Filtering Poisoned Data Based on Composite Backdoor Attack. CoRR abs/2406.16125 (2024) - 2023
- [j21]Haiyong Bao, Zheng Xu, Haibo Hong, Qinglei Kong, Haifeng Qian:
NLSP: A novel lattice-based secure primitive for privacy-preserving smart grid communications. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j20]Linghe Zhu, Haibo Hong, Mande Xie, Jun Yu:
DLPM: A dynamic location protection mechanism supporting continuous queries. Concurr. Comput. Pract. Exp. 35(19) (2023) - [c7]Chen Chen, Haibo Hong, Mande Xie, Jun Shao, Tao Xiang:
Bab: A novel algorithm for training clean model based on poisoned data. SafeAI@AAAI 2023 - 2022
- [j19]Haibo Hong, Jun Shao, Licheng Wang, Mande Xie, Guiyi Wei, Yixian Yang, Song Han, Jianhong Lin:
A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65(1) (2022) - [j18]Mande Xie, Qiting Zhao, Haibo Hong, Chen Chen, Jun Yu:
A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices. J. Parallel Distributed Comput. 169: 58-71 (2022) - [j17]Yi-Ru Sun, Xiu-Bo Chen, Jun Shao, Song Han, Haibo Hong, Haiyong Bao, Yixian Yang:
Cyclic preparation of two-qubit state in two noisy environments. Quantum Inf. Process. 21(1): 40 (2022) - 2021
- [j16]Mande Xie, Yingying Ruan, Haibo Hong, Jun Shao:
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices. Future Gener. Comput. Syst. 121: 114-122 (2021) - [c6]Mande Xie, Qiting Zhao, Haibo Hong:
A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices. ICA3PP (1) 2021: 676-692 - [c5]Linghe Zhu, Haibo Hong, Mande Xie:
A Novel Protection Method of Continuous Location Sharing Based on Local Differential Privacy and Conditional Random Field. ICA3PP (1) 2021: 710-725 - 2020
- [c4]Mande Xie, Jifei Hu, Haibo Hong:
Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT. FCS 2020: 3-18 - [c3]Gangqi Shu, Haibo Hong, Mande Xie, Jun Shao:
A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment. SpaCCS Workshops 2020: 357-371
2010 – 2019
- 2019
- [j15]Song Han, Mianxue Gu, Bailin Yang, Jianhong Lin, Haibo Hong, Mengjiao Kong:
A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things. IEEE Access 7: 114060-114076 (2019) - [j14]Shu Han, Mande Xie, Bailin Yang, Rongxing Lu, Haiyong Bao, Jianhong Lin, Haibo Hong, Mianxue Gu, Song Han:
A Certificateless Verifiable Strong Designated Verifier Signature Scheme. IEEE Access 7: 126391-126408 (2019) - [j13]Yue Cong, Haibo Hong, Jun Shao, Song Han, Jianhong Lin, Shuai Zhao:
A New Secure Encryption Scheme Based on Group Factorization Problem. IEEE Access 7: 168728-168735 (2019) - [j12]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - 2018
- [j11]Gaobo Xiao, Mingjun Ren, Haibo Hong:
50 million atoms scale molecular dynamics modelling on a single consumer graphics card. Adv. Eng. Softw. 124: 66-72 (2018) - [j10]Haseeb Ahmad, Licheng Wang, Haibo Hong, Jing Li, Hassan Dawood, Manzoor Ahmed, Yixian Yang:
Primitives towards verifiable computation: a survey. Frontiers Comput. Sci. 12(3): 451-478 (2018) - 2017
- [j9]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang:
Minimal logarithmic signatures for one type of classical groups. Appl. Algebra Eng. Commun. Comput. 28(2): 177-192 (2017) - [j8]Haseeb Ahmad, Ali Daud, Licheng Wang, Haibo Hong, Hussain Dawood, Yixian Yang:
Prediction of Rising Stars in the Game of Cricket. IEEE Access 5: 4104-4124 (2017) - [j7]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang, Zhiguo Qu:
Minimum length key in MST cryptosystems. Sci. China Inf. Sci. 60(5): 052106:1-052106:11 (2017) - 2016
- [j6]Haibo Hong, Yuehong Yin, Xing Chen:
Ontological modelling of knowledge management for human-machine integrated design of ultra-precision grinding machine. Enterp. Inf. Syst. 10(9): 970-981 (2016) - [j5]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang, Changzhong Wu:
Construction of DNA codes by using algebraic number theory. Finite Fields Their Appl. 37: 328-343 (2016) - [j4]Haibo Hong, Yuehong Yin:
Ontology-based human-machine integrated design method for ultra-precision grinding machine spindle. J. Ind. Inf. Integr. 2: 1-10 (2016) - [j3]Haibo Hong, Yuehong Yin:
Ontology-based conceptual design for ultra-precision hydrostatic guideways with human-machine interaction. J. Ind. Inf. Integr. 2: 11-18 (2016) - [i3]Haibo Hong, Jun Shao, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Public Key Encryption in Non-Abelian Groups. CoRR abs/1605.06608 (2016) - 2015
- [j2]Haibo Hong, Licheng Wang, Yixian Yang:
Minimal logarithmic signatures for the unitary group Un(q). Des. Codes Cryptogr. 77(1): 179-191 (2015) - [i2]Haibo Hong, Licheng Wang, Haseeb Ahmad, Jing Li, Yixian Yang:
Minimal Logarithmic Signatures for Sporadic Groups. CoRR abs/1507.01162 (2015) - [i1]Haibo Hong, Licheng Wang, Haseeb Ahmad, Yixian Yang:
Minimal Logarithmic Signatures for one type of Classical Groups. CoRR abs/1507.01163 (2015) - 2014
- [j1]Haibo Hong, Licheng Wang, Yixian Yang, Haseeb Ahmad:
All exceptional groups of lie type have minimal logarithmic signatures. Appl. Algebra Eng. Commun. Comput. 25(4): 287-296 (2014) - [c2]Haibo Hong, Yuehong Yin, Xing Chen:
Ontological Modelling of Knowledge Management for Human-Machine Integrated Design of Ultra-Precision Grinding Machine. ES 2014: 75-80 - [c1]Xing Chen, Haibo Hong, Yuehong Yin:
Ontological Knowledge Capture for the Design of Ultra-Precision Hydrostatic Guideways Based on Imaginal Thinking. ES 2014: 119-124
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint