default search action
Zoe Lin Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Qian Chen, Xuan Wang, Cenying Yang, Zoe Lin Jiang, Shuhan Qi, Jiajia Zhang, Na Li, Lei Wang, Jing Xiao:
Reverse double auction mechanism: An efficient algorithm for E-commerce platform operations. Electron. Commer. Res. Appl. 65: 101401 (2024) - [j49]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. Expert Syst. Appl. 250: 123761 (2024) - [j48]Jie Zhao, Hejiao Huang, Xiaojun Zhang, Daojing He, Kim-Kwang Raymond Choo, Zoe Lin Jiang:
VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks. IEEE Internet Things J. 11(10): 18647-18662 (2024) - [j47]Yiming Wu, Gaoyun Lin, Lisong Liu, Zhen Hong, Yangyang Wang, Xing Yang, Zoe Lin Jiang, Shouling Ji, Zhenyu Wen:
MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework. IEEE Internet Things J. 11(14): 25136-25146 (2024) - [j46]Liqi Lai, Luyao Wang, Rui Huang, Zoe Lin Jiang, Junbo Huang, Wenyue Shi, Bin Zhou, Renzhang Chen, Bin Lei, Junbin Fang:
Task-Driven ADDIE-Twist Model With a Teach-Study Double-Helix Structure. IEEE Trans. Educ. 67(1): 1-10 (2024) - [j45]Zoe L. Jiang, Min Xie, Hanlin Chen, Yijian Pan, Jiazhuo Lyu, Man Ho Au, Junbin Fang, Yang Liu, Xuan Wang:
RPSC: Regulatable Privacy-Preserving Smart Contracts on Account-Based Blockchain. IEEE Trans. Netw. Sci. Eng. 11(5): 4822-4835 (2024) - [j44]Ruoli Zhao, Yong Xie, Debiao He, Kim-Kwang Raymond Choo, Zoe L. Jiang:
Practical Privacy-Preserving Convolutional Neural Network Inference Framework With Edge Computing for Health Monitoring. IEEE Trans. Netw. Sci. Eng. 11(6): 5995-6006 (2024) - [c71]Man Chen, Yuyue Chen, Rui Zong, ZengPeng Li, Zoe L. Jiang:
F-FHEW: High-Precision Approximate Homomorphic Encryption with Batch Bootstrapping. ACISP (1) 2024: 121-140 - [c70]Yi Huang, Junping Wan, Zoe L. Jiang, Jun Zhou, Junbin Fang, Zhenfu Cao:
An Efficient Integer-Wise ReLU on TFHE. ACISP (1) 2024: 161-179 - [c69]Hucheng Liu, Shaohuai Shi, Xuan Wang, Zoe L. Jiang, Qian Chen:
Performance Analysis and Optimizations of Matrix Multiplications on ARMv8 Processors. DATE 2024: 1-6 - [c68]Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu-Ming Yiu, Xuan Wang:
FSSiBNN: FSS-Based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. ESORICS (1) 2024: 229-250 - [c67]Junping Wan, Danjie Li, Junbin Fang, Zoe L. Jiang:
LPFHE: Low-Complexity Polynomial CNNs for Secure Inference over FHE. ESORICS (3) 2024: 403-423 - [c66]Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. Public Key Cryptography (2) 2024: 3-35 - [i11]Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe Lin Jiang:
Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice. IACR Cryptol. ePrint Arch. 2024: 27 (2024) - [i10]Min Xie, Peichen Ju, Yanqi Zhao, Zoe L. Jiang, Junbin Fang, Yong Yu, Xuan Wang:
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation. IACR Cryptol. ePrint Arch. 2024: 610 (2024) - [i9]Hongxiao Wang, Siu-Ming Yiu, Yanmin Zhao, Zoe L. Jiang, Min Xie:
Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2024: 617 (2024) - [i8]Peng Yang, Zoe Lin Jiang, Jiehang Zhuang, Junbin Fang, Siu Ming Yiu, Xuan Wang:
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion. IACR Cryptol. ePrint Arch. 2024: 1010 (2024) - 2023
- [j43]Yuchen Tian, Weizhe Zhang, Andrew Simpson, Yang Liu, Zoe Lin Jiang:
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning. Comput. J. 66(3): 711-726 (2023) - [j42]Qian Chen, Xuan Wang, Zoe Lin Jiang, Yulin Wu, Huale Li, Lei Cui, Xiaozhen Sun:
Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments. Neural Comput. Appl. 35(22): 16193-16222 (2023) - [j41]Qian Chen, Yulin Wu, Xuan Wang, Zoe Lin Jiang, Weizhe Zhang, Yang Liu, Mamoun Alazab:
A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 16: 3309-3321 (2023) - [c65]Wenyu Xiang, Jie Zhao, Hejiao Huang, Xiaojun Zhang, Zoe Lin Jiang, Daojing He:
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems. ICA3PP (2) 2023: 292-310 - [c64]Hongxiao Wang, Zoe L. Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Man Chen, Zejiu Tan, Bohan Jin:
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE. MobiSec 2023: 94-108 - [c63]Junbin Fang, Zewei Yang, Siyuan Dai, You Jiang, Canjian Jiang, Zoe Lin Jiang, Chuanyi Liu, Siu-Ming Yiu:
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation. PRCV (3) 2023: 478-491 - [c62]Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang:
Privacy-Preserving Distributed Machine Learning Made Faster. SecTL@AsiaCCS 2023: 2:1-2:14 - [c61]Man Chen, Yuyue Chen, Zoe L. Jiang:
SIMD Bootstrapping in FHEW Scheme. TrustCom 2023: 1006-1013 - [i7]Junbin Fang, You Jiang, Canjian Jiang, Zoe Lin Jiang, Siu-Ming Yiu, Chuanyi Liu:
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems. CoRR abs/2303.12249 (2023) - [i6]Junbin Fang, Canjian Jiang, You Jiang, Puxi Lin, Zhaojie Chen, Yujing Sun, Siu-Ming Yiu, Zoe Lin Jiang:
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation. CoRR abs/2307.13294 (2023) - [i5]Peng Yang, Zoe Lin Jiang, Shiqi Gao, Jiehang Zhuang, Hongxiao Wang, Junbin Fang, Siu-Ming Yiu, Yulin Wu:
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 73 (2023) - 2022
- [j40]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Siu-Ming Yiu, Hao Wang:
Generic server-aided secure multi-party computation in cloud computing. Comput. Stand. Interfaces 79: 103552 (2022) - [j39]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Junyi Li, Xueqiao Liu:
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security. Comput. Stand. Interfaces 80: 103570 (2022) - [j38]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Hao Wang, Tong Wu:
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Comput. Stand. Interfaces 80: 103571 (2022) - [j37]Jinyuan Xie, Canjian Jiang, Jiajun Lin, Zoe Lin Jiang, Jindong Wang, Junbin Fang:
Blind reconciliation based on inverse encoding of polar codes with adaptive step sizes for quantum key distribution. Quantum Inf. Process. 21(10): 349 (2022) - [j36]Qian Chen, Lin Yao, Xuan Wang, Zoe Lin Jiang, Yulin Wu, Tianzi Ma:
SecMDGM: Federated Learning Security Mechanism Based on Multi-Dimensional Auctions. Sensors 22(23): 9434 (2022) - [c60]Zoe Lin Jiang, Songjiang Shi, Hongxiao Wang, Peng Yang, Xuan Wang, Yulin Wu, Yantao Zhong, Yan Jia:
Efficient Mixed-Protocol Secure Four-Party Computation with Private Robustness. ICDIS 2022: 1-8 - [c59]Liyao Xiong, Zoe Lin Jiang, Yi Huang, Jianzong Wang, Jing Xiao, Weizhe Zhang, Xuan Wang:
Efficient Private Set Intersection Based on Functional Encryption. ICDIS 2022: 9-15 - [c58]Qian Chen, Lin Yao, Yulin Wu, Xuan Wang, Weizhe Zhang, Zoe Lin Jiang, Yang Liu, Mamoun Alazab:
PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption. ICDIS 2022: 127-133 - [c57]Zoe Lin Jiang, Yijian Pan, Maoshun Fan, Lin Yao, Yang Liu, Yulin Wu, Siu-Ming Yiu, Xuan Wang, Junbin Fang:
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature. ICDIS 2022: 134-141 - [c56]Chengjin Liu, Zoe Lin Jiang, Xin Zhao, Qian Chen, Junbin Fang, Daojing He, Jun Zhang, Xuan Wang:
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption. INFOCOM Workshops 2022: 1-6 - [c55]Yixuan Shen, Yu Cheng, Yini Lin, Sicheng Long, Canjian Jiang, Danjie Li, Siyuan Dai, You Jiang, Junbin Fang, Zoe Lin Jiang, Siu-Ming Yiu:
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle. TrustCom 2022: 1020-1027 - [i4]Zoe Lin Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang:
Privacy-Preserving Distributed Machine Learning Made Faster. CoRR abs/2205.05825 (2022) - [i3]Hongxiao Wang, Zoe Lin Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Zejiu Tan, Bohan Jin, Shiyuan Xu, Shimin Pan:
Securer and Faster Privacy-Preserving Distributed Machine Learning. CoRR abs/2211.09353 (2022) - 2021
- [j35]Jun Zhang, Zoe Lin Jiang, Ping Li, Siu-Ming Yiu:
Privacy-preserving multikey computing framework for encrypted data in the cloud. Inf. Sci. 575: 217-230 (2021) - [j34]Wenbin Chen, Jin Li, Zhengan Huang, Chongzhi Gao, Siu-Ming Yiu, Zoe Lin Jiang:
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key. J. Comput. Syst. Sci. 120: 137-148 (2021) - [j33]Yifan Li, Xuan Wang, Shuhan Qi, Chengkai Huang, Zoe Lin Jiang, Qing Liao, Jian Guan, Jiajia Zhang:
Self-supervised learning-based weight adaptive hashing for fast cross-modal retrieval. Signal Image Video Process. 15(4): 673-680 (2021) - [j32]Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Qian Chen, Peng Xu:
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2820-2834 (2021) - [c54]Zoe Lin Jiang, Hui Guo, Yijian Pan, Yang Liu, Xuan Wang, Jun Zhang:
Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys. CSCloud/EdgeCom 2021: 47-52 - 2020
- [j31]Jun Zhang, Shiqing Hu, Zoe Lin Jiang:
Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks. IEEE Access 8: 111889-111898 (2020) - [j30]Junbin Fang, Guikai Xi, Rong Li, Qian Chen, Puxi Lin, Sijin Li, Zoe Lin Jiang, Siu-Ming Yiu:
Coarse-to-fine two-stage semantic video carving approach in digital forensics. Comput. Secur. 97: 101942 (2020) - [j29]Chengkai Huang, Xuan Luo, Jiajia Zhang, Qing Liao, Xuan Wang, Zoe Lin Jiang, Shuhan Qi:
Explore instance similarity: An instance correlation based hashing method for multi-label cross-model retrieval. Inf. Process. Manag. 57(2): 102165 (2020) - [j28]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Zechao Liu, Junbin Fang, Siu-Ming Yiu, Xuan Wang:
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing. Inf. Sci. 518: 168-180 (2020) - [j27]Xixi Huang, Ye Ding, Zoe Lin Jiang, Shuhan Qi, Xuan Wang, Qing Liao:
DP-FL: a novel differentially private federated learning framework for the unbalanced data. World Wide Web 23(4): 2529-2545 (2020) - [c53]Zhaojie Chen, Puxi Lin, Zoe Lin Jiang, Zhanhang Wei, Sichen Yuan, Junbin Fang:
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System. Inscrypt 2020: 53-69 - [c52]Jun Zhang, Siu-Ming Yiu, Zoe Lin Jiang:
Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions. ICA3PP (2) 2020: 126-141 - [c51]Jun Zhang, Zoe Lin Jiang, Ping Li, Siu-Ming Yiu:
Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys. SmartCom 2020: 215-225
2010 – 2019
- 2019
- [j26]Ye Li, Zoe Lin Jiang, Lin Yao, Xuan Wang, Siu-Ming Yiu, Zhengan Huang:
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties. Clust. Comput. 22(Suppl 1): 1581-1593 (2019) - [j25]Qing Liao, Ye Ding, Zoe Lin Jiang, Xuan Wang, Chunkai Zhang, Qian Zhang:
Multi-task deep convolutional neural network for cancer diagnosis. Neurocomputing 348: 66-73 (2019) - [j24]Chunkai Zhang, Panbo Tian, Xudong Zhang, Zoe Lin Jiang, Lin Yao, Xuan Wang:
Fast Eclat Algorithms Based on Minwise Hashing for Large Scale Transactions. IEEE Internet Things J. 6(2): 3948-3961 (2019) - [j23]Chunkai Zhang, Panbo Tian, Xudong Zhang, Qing Liao, Zoe Lin Jiang, Xuan Wang:
HashEclat: an efficient frequent itemset algorithm. Int. J. Mach. Learn. Cybern. 10(11): 3003-3016 (2019) - [j22]Shuhan Qi, Zawlin Kyaw, Xuan Wang, Zoe Lin Jiang, Jian Guan:
Large scale product search with spatial quantization and deep ranking. Multim. Tools Appl. 78(19): 27045-27065 (2019) - [j21]Zhengzhong Yi, Junbin Fang, Puxi Lin, Xiao-Jun Wen, Zoe Lin Jiang, Xuan Wang:
Efficient quantum key distribution protocol based on classical-quantum polarized channels. Quantum Inf. Process. 18(12): 356 (2019) - [c50]Yifan Li, Xuan Wang, Zoe Lin Jiang, Shuhan Qi, Xinhui Liu, Qian Chen:
RGB-D tracker under Hierarchical structure. CIFEr 2019: 1-6 - [c49]Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang, Yiqun Chen, Hengyu Luo:
A New Robust and Reversible Watermarking Technique Based on Erasure Code. ICA3PP (1) 2019: 153-168 - [c48]Zhentian Xiong, Zoe Lin Jiang, Shuqiang Yang, Xuan Wang, Junbin Fang:
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique. NSS 2019: 272-287 - [c47]Zeming Lu, Zoe Lin Jiang, Yulin Wu, Xuan Wang, Yantao Zhong:
A Lattice-Based Anonymous Distributed E-Cash from Bitcoin. ProvSec 2019: 275-287 - [c46]Heyan Chai, Shuqiang Yang, Zoe Lin Jiang, Xuan Wang:
A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering. TrustCom/BigDataSE 2019: 411-418 - [c45]Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. TrustCom/BigDataSE 2019: 570-577 - [i2]Chunkai Zhang, Yingyang Chen, Ao Yin, Zhen Qin, Xing Zhang, Keli Zhang, Zoe Lin Jiang:
An Improvement of PAA on Trend-Based Approximation for Time Series. CoRR abs/1907.00700 (2019) - 2018
- [j20]Aisha Sikandar, Waqas Anwar, Usama Ijaz Bajwa, Xuan Wang, Misba Sikandar, Lin Yao, Zoe Lin Jiang, Chunkai Zhang:
Decision Tree Based Approaches for Detecting Protein Complex in Protein Protein Interaction Network (PPI) via Link and Sequence Analysis. IEEE Access 6: 22108-22120 (2018) - [j19]Xiao-Jun Wen, Genping Wang, Yongzhi Chen, Zhengzhong Yi, Zoe Lin Jiang, Jun-bin Fang:
Quantum solution for secure information transmission of wearable devices. Int. J. Distributed Sens. Networks 14(5) (2018) - [j18]Yongzhi Chen, Xiao-Jun Wen, Zhiwei Sun, Zoe Lin Jiang, Junbin Fang:
A sensitive information protection scheme in wearable devices based on quantum entanglement. Int. J. Distributed Sens. Networks 14(10) (2018) - [j17]Ye Li, Xuan Wang, Zoe Lin Jiang, Siu-Ming Yiu:
Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties. Int. J. High Perform. Comput. Netw. 12(2): 207-215 (2018) - [j16]Shuhan Qi, Xuan Wang, Xi Zhang, Xuemeng Song, Zoe Lin Jiang:
Scalable graph based non-negative multi-view embedding for image ranking. Neurocomputing 274: 29-36 (2018) - [j15]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating. J. Netw. Comput. Appl. 108: 112-123 (2018) - [j14]Jian Guan, Xuan Wang, Pengming Feng, Jing Dong, Jonathon A. Chambers, Zoe Lin Jiang, Wenwu Wang:
Polynomial dictionary learning algorithms in sparse representations. Signal Process. 142: 492-503 (2018) - [j13]Ye Li, Zoe Lin Jiang, Xuan Wang, Jun-bin Fang, En Zhang, Xianmin Wang:
Securely Outsourcing ID3 Decision Tree in Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 2385150:1-2385150:10 (2018) - [c44]Chunkai Zhang, Yingyang Chen, Ao Yin, Zhen Qin, Xing Zhang, Keli Zhang, Zoe Lin Jiang:
An Improvement of PAA on Trend-Based Approximation for Time Series. ICA3PP (2) 2018: 248-262 - [c43]Ao Yin, Chunkai Zhang, Zoe Lin Jiang, Yulin Wu, Xing Zhang, Keli Zhang, Xuan Wang:
PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving. ICA3PP (4) 2018: 358-373 - [c42]Yulin Wu, Xuan Wang, Zoe Lin Jiang, Xuan Li, Jin Li, Siu-Ming Yiu, Zechao Liu, Hainan Zhao, Chunkai Zhang:
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection. ICA3PP (4) 2018: 374-388 - [c41]Chuxin Wu, Peng Zhang, Hongwei Liu, Zehong Chen, Zoe Lin Jiang:
An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control. ICA3PP (4) 2018: 389-398 - [c40]Wenli Sun, Zoe Lin Jiang, Jun Zhang, Siu-Ming Yiu, Yulin Wu, Hainan Zhao, Xuan Wang, Peng Zhang:
Outsourced Privacy Preserving SVM with Multiple Keys. ICA3PP (4) 2018: 415-430 - [c39]Zoe Lin Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, Siu-Ming Yiu, Junbin Fang:
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing. ICA3PP (4) 2018: 447-460 - [c38]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Yulin Wu, Siu-Ming Yiu:
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 1003-1008 - [c37]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - [c36]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Ruoqing Zhang, Yulin Wu:
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage. TrustCom/BigDataSE 2018: 614-623 - 2017
- [j12]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Xinyi Huang, Siu-Ming Yiu, Kunihiko Sadakane:
Offline/online attribute-based encryption with verifiable outsourced decryption. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j11]Meng Liu, Xuan Wang, Chi Yang, Zoe Lin Jiang, Ye Li:
An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing. Int. J. Distributed Sens. Networks 13(1) (2017) - [j10]Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j9]Cong Zuo, Kaitai Liang, Zoe Lin Jiang, Jun Shao, Jun-bin Fang:
Cost-effective privacy-preserving vehicular urban sensing system. Pers. Ubiquitous Comput. 21(5): 893-901 (2017) - [c35]Jun Zhang, Xin Wang, Siu-Ming Yiu, Zoe Lin Jiang, Jin Li:
Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM. SCC@AsiaCCS 2017: 75-82 - [c34]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu:
Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys. CSE/EUC (1) 2017: 548-555 - [c33]Hongwei Liu, Ping Zhu, Zehong Chen, Peng Zhang, Zoe Lin Jiang:
Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage. CSE/EUC (1) 2017: 556-561 - [c32]Yulin Wu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage. CSE/EUC (1) 2017: 562-567 - [c31]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Qing Liao:
Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases. DSC 2017: 124-132 - [c30]Junbin Fang, Sijin Li, Guikai Xi, Zoe Lin Jiang, Siu-Ming Yiu, Liyang Yu, Xuan Wang, Qi Han, Qiong Li:
Semantic Video Carving Using Perceptual Hashing and Optical Flow. IFIP Int. Conf. Digital Forensics 2017: 223-244 - [c29]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang:
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration. ISPEC 2017: 525-538 - [c28]Qing Liao, Zoe Lin Jiang, Xuan Wang, Chunkai Zhang, Ye Ding:
Cancer classification with multi-task deep learning. SPAC 2017: 76-81 - [c27]Chunkai Zhang, Jianwei Guo, Changqing Qi, Zoe Lin Jiang, Qing Liao, Lin Yao, Xuan Wang:
EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling. SPAC 2017: 118-123 - [c26]Chunkai Zhang, Xudong Zhang, Zoe Lin Jiang, Qing Liao, Lin Yao, Xuan Wang:
Mining inter-transaction association rules from multiple time-series data. SPAC 2017: 158-163 - [c25]Zoe Lin Jiang, Jiajun Huang, Zechao Liu, Xuan Wang:
Attribute-based queries over outsourced encrypted database. SPAC 2017: 164-168 - [c24]Chunkai Zhang, Guoquan Wang, Ying Zhou, Lin Yao, Zoe Lin Jiang, Qing Liao, Xuan Wang:
Feature selection for high dimensional imbalanced class data based on F-measure optimization. SPAC 2017: 278-283 - [c23]Chunkai Zhang, Haodong Liu, Ye Li, Ao Yin, Zoe Lin Jiang, Qing Liao, Xuan Wang:
A novel privacy-preserving distributed anomaly detection method. SPAC 2017: 463-468 - [c22]Zechao Liu, Xuan Wang, Lei Cui, Zoe Lin Jiang, Chunkai Zhang:
White-box traceable dynamic attribute based encryption. SPAC 2017: 526-530 - [c21]Zoe Lin Jiang, Yudong Liang, Zechao Liu, Xuan Wang:
Lattice-based proxy signature scheme with reject sampling method. SPAC 2017: 558-563 - [c20]Ruoqing Zhang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xiaoqi Yu, Zechao Liu, Zoe Lin Jiang:
A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation. TrustCom/BigDataSE/ICESS 2017: 363-370 - [c19]Peng Zhang, Xiafei Zhang, Xiaoqiang Sun, Joseph K. Liu, Jianping Yu, Zoe Lin Jiang:
Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics. TrustCom/BigDataSE/ICESS 2017: 668-674 - [c18]Ye Li, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Peng Zhang:
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties. TrustCom/BigDataSE/ICESS 2017: 1070-1075 - [p1]Junbin Fang, Zoe Lin Jiang, Sijin Li, Siu-Ming Yiu, Lucas C. K. Hui, Kam-Pui Chow:
Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone. Mobile Security and Privacy 2017: 205-216 - 2016
- [j8]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j7]Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe Lin Jiang, Xuan Wang:
Key based data analytics across data centers considering bi-level resource provision in cloud computing. Future Gener. Comput. Syst. 62: 40-50 (2016) - [c17]Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. ACISP (2) 2016: 153-169 - [c16]Chuting Tan, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Jun-bin Fang, Jin Li, Yabin Jin, Jiajun Huang:
Generic Construction of Publicly Verifiable Predicate Encryption. AsiaCCS 2016: 889-894 - [c15]Zoe Lin Jiang, Ruoqing Zhang, Zechao Liu, Siu-Ming Yiu, Lucas C. K. Hui, Xuan Wang, Junbin Fang:
A Revocable Outsourcing Attribute-Based Encryption Scheme. CloudComp 2016: 145-161 - [c14]Jiangtao Zhang, Lingmin Zhang, Hejiao Huang, Zoe Lin Jiang, Xuan Wang:
Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing. IoTBD 2016: 243-254 - [c13]Zechao Liu, Zoe Lin Jiang, Xuan Wang, Siu-Ming Yiu, Chunkai Zhang, Xiaomeng Zhao:
Dynamic Attribute-Based Access Control in Cloud Storage Systems. Trustcom/BigDataSE/ISPA 2016: 129-137 - [i1]Jun-bin Fang, Zhen Che, Xiaolong Yu, Zhe Chen, Zoe Lin Jiang, Siu-Ming Yiu, Kui Ren, Xiaoqing Tan:
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes. CoRR abs/1608.07202 (2016) - 2015
- [j6]Zili Zhang, Xuan Wang, Kai Han, Zoe Lin Jiang:
A Novel Arc Segmentation Approach for Document Image Processing. Int. J. Pattern Recognit. Artif. Intell. 29(1): 1553001:1-1553001:25 (2015) - [c12]Xiaoyan Liu, Zoe Lin Jiang, Siu-Ming Yiu, Xuan Wang, Chuting Tan, Ye Li, Zechao Liu, Yabin Jin, Jun-bin Fang:
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks. MSN 2015: 124-133 - 2014
- [j5]Jun-bin Fang, Zoe Lin Jiang, Kexin Ren, Yunhan Luo, Zhe Chen, Weiping Liu, Xuan Wang, Xiamu Niu, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design. Quantum Inf. Process. 13(6): 1425-1435 (2014) - [j4]Man Ho Au, Joseph K. Liu, Jun-bin Fang, Zoe Lin Jiang, Willy Susilo, Jianying Zhou:
A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Trans. Veh. Technol. 63(1): 3-18 (2014) - [c11]Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang:
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. ICICS 2014: 274-289 - 2013
- [j3]Zoe Lin Jiang, Jun-bin Fang, Frank Y. W. Law, Pierre K. Y. Lai, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kevin K. H. Pun:
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data. IEEE Trans. Inf. Forensics Secur. 8(5): 821-828 (2013) - [c10]Gang Zhou, Yanbin Tang, Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Rongsheng Xu, Yonghao Mai, Shuhui Hou, Fei Xu:
Photo Forensics on Shanzhai Mobile Phone. WASA 2013: 454-464 - 2012
- [c9]Jun-bin Fang, Zoe Lin Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang:
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones. IFIP Int. Conf. Digital Forensics 2012: 129-142 - 2011
- [j2]Zoe Lin Jiang, Jun-bin Fang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Meng-meng Sheng:
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics. J. Zhejiang Univ. Sci. C 12(10): 809-818 (2011) - [c8]Jun-bin Fang, Zoe Lin Jiang, Siu-Ming Yiu, Kam-Pui Chow, Lucas Chi Kwong Hui, Long Chen, Xiamu Niu:
A Dual Cube Hashing Scheme for Solving LPP Integrity Problem. SADFE 2011: 1-7
2000 – 2009
- 2009
- [j1]Zoe Lin Jiang, Siu-Ming Yiu, Y. Dong, Lucas Chi Kwong Hui, Starsky H. Y. Wong:
Secure Chained Threshold Proxy Signature without and with Supervision. J. Softw. Eng. Appl. 2(4): 267-275 (2009) - [c7]Tat Wing Chim, Siu-Ming Yiu, Lucas Chi Kwong Hui, Zoe Lin Jiang, Victor O. K. Li:
SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs. ADHOCNETS 2009: 160-175 - [c6]Starsky H. Y. Wong, Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability. Security and Management 2009: 307-313 - 2008
- [c5]Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong:
Chained Threshold Proxy Signature without and with Supervision. CSSE (3) 2008: 837-840 - [c4]Zoe Lin Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Improving Disk Sector Integrity Using K-Dimension Hashing. IFIP Int. Conf. Digital Forensics 2008: 87-98 - [c3]Frank Y. W. Law, Pierre K. Y. Lai, Zoe Lin Jiang, Ricci S. C. Ieong, Michael Y. K. Kwan, Kam-Pui Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, C. F. Chong:
Protecting Digital Legal Professional Privilege (LPP) Data. SADFE 2008: 91-101 - 2007
- [c2]Zoe Lin Jiang, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu, Pierre K. Y. Lai:
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. FGCN (2) 2007: 141-145 - 2006
- [c1]Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu:
A Key-Recovery System for Long-term Encrypted Documents. EDOC Workshops 2006: 52
Coauthor Index
aka: Jun-bin Fang
aka: Lucas Chi Kwong Hui
aka: Siu Ming Yiu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint