default search action
Jia Yu 0003
Person information
- affiliation: Qingdao University, College of Computer Science and Technology, Qingdao, China
- affiliation: Nanjing University of Information Science & Technology, Nanjing, China
- affiliation: Shandong University, Jinan, China
Other persons with the same name
- Jia Yu — disambiguation page
- Jia Yu 0001 — Arizona State University, Tempe, AZ, USA
- Jia Yu 0002 — Northwestern Polytechnical University, Xi'an, China
- Jia Yu 0004 — Nanyang Technological University, Singapore
- Jia Yu 0006 — Harbin Institute of Technology, Shenzhen, China
- Jia Yu 0007 — Shanghai Normal University, China (and 1 more)
- Jia Yu 0008 — University of California Riverside, CA, USA
- Jia Yu 0009 — University of Melbourne, VIC, Australia
- Jia Yu 0010 — Huazhong University of Science and Technology, Wuhan, China
- Jia Yu 0011 — Minzu University of China, Beijing, China
- Jia Yu 0012 — Hohai University, Nanjing, China
- Jia Yu 0013 — University of New South Wales, Sydney, Australia
- Jia Yu 0014 — Administrative College of JiangSu Province, Nanjing, China
- Jia Yu 0015 — University of California, Department of Mathematics, Berkeley, CA, USA
- Jia Yu 0016 — Ocean University of China, Qingdao, China
- Jia Yu 0017 — Seeburger China Inc., Shanghai, China
- Jia Yu 0018 — China Electronics Technology Cyber Security Co., Ltd.
- Jia Yu 0019 — University of Jinan, Jinan, China
- Jia Yu 0020 — Washington State University, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j127]Xuan Zhao, Jia Yu:
Privacy-preserving top-k spatio-temporal keyword preference query. Comput. Stand. Interfaces 92: 103900 (2025) - 2024
- [j126]Yihong Wang, Baolei Cheng, Yan Wang, Jia Yu, Jianxi Fan:
Strongly Menger Connectedness of a Class of Recursive Networks. Comput. J. 67(6): 2030-2038 (2024) - [j125]Xuan Zhao, Jia Yu, Xinrui Ge, Rong Hao:
Towards efficient Secure Boolean Range Query over encrypted spatial data. Comput. Secur. 136: 103544 (2024) - [j124]Yunting Tao, Yuqun Li, Fanyu Kong, Yuliang Shi, Ming Yang, Jia Yu, Hanlin Zhang:
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding. Comput. Secur. 144: 103931 (2024) - [j123]Pengyu Cui, Yunting Tao, Bin Zhen, Fanyu Kong, Chunpeng Ge, Chuan Ma, Jia Yu:
Accelerating Graph Embedding Through Secure Distributed Outsourcing Computation in Internet of Things. IEEE Internet Things J. 11(16): 27687-27699 (2024) - [j122]Yunjiao Song, Jia Yu, Xinrui Ge, Rong Hao:
Enabling Privacy-Preserving Boolean kNN Query Over Cloud-Based Spatial Data. IEEE Internet Things J. 11(23): 38262-38272 (2024) - [j121]Mengjie Lv, Jianxi Fan, Baolei Cheng, Jia Yu, Xiaohua Jia:
Construction algorithms of fault-tolerant paths and disjoint paths in k-ary n-cube networks. J. Parallel Distributed Comput. 183: 104761 (2024) - [j120]Chengliang Tian, Jia Yu, Panpan Meng, Guoyan Zhang, Weizhong Tian, Yan Zhang:
How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud. IEEE Trans. Cloud Comput. 12(3): 913-927 (2024) - [j119]Qianru Zhou, Baolei Cheng, Jingya Zhou, Jia Yu, Yan Wang, Jianxi Fan:
Reliability evaluation for a class of recursive match networks. Theor. Comput. Sci. 981: 114253 (2024) - [j118]Xiaoqing Liu, Baolei Cheng, Yan Wang, Jia Yu, Jianxi Fan:
Enhancing fault tolerance of balanced hypercube networks by the edge partition method. Theor. Comput. Sci. 986: 114340 (2024) - [j117]Xinrui Ge, Jia Yu, Rong Hao:
Privacy-Preserving Graph Matching Query Supporting Quick Subgraph Extraction. IEEE Trans. Dependable Secur. Comput. 21(3): 1286-1300 (2024) - [j116]Fangyuan Sun, Jia Yu, Jiankun Hu:
Privacy-Preserving Approximate Minimum Community Search on Large Networks. IEEE Trans. Inf. Forensics Secur. 19: 4146-4160 (2024) - [j115]Min Wang, Jia Yu, Wenting Shen, Rong Hao:
Privacy-Preserving Time-Based Auditing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 19: 7866-7878 (2024) - [j114]Li Guo, Rong Hao, Jia Yu, Ming Yang:
Privacy-Preserving Naïve Bayesian Classification for Health Monitoring Systems. IEEE Trans. Ind. Informatics 20(10): 11622-11634 (2024) - [j113]Yaqian Tang, Baolei Cheng, Yan Wang, Yuejuan Han, Jia Yu, Jianxi Fan:
Connectivity and diagnosability of a class of recursive networks. J. Supercomput. 80(3): 3817-3848 (2024) - [j112]Yunjiao Song, Xinrui Ge, Jia Yu, Rong Hao, Ming Yang:
Enabling Privacy-Preserving $K$K-Hop Reachability Query Over Encrypted Graphs. IEEE Trans. Serv. Comput. 17(3): 893-904 (2024) - [j111]Huaqun Wang, Zhiguo Wan, Debiao He, Jia Yu:
Synchronous Blockchain-Based Distributed Provable Data Possession With Forward-Security. IEEE Trans. Serv. Comput. 17(3): 1227-1238 (2024) - [j110]Wenting Shen, Chao Gai, Jia Yu, Ye Su:
Keyword-Based Remote Data Integrity Auditing Supporting Full Data Dynamics. IEEE Trans. Serv. Comput. 17(5): 2516-2529 (2024) - 2023
- [j109]Yunting Tao, Fanyu Kong, Yuliang Shi, Jia Yu, Hanlin Zhang, Xiangyi Wang:
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system. Future Gener. Comput. Syst. 149: 445-454 (2023) - [j108]Wenjing Gao, Jia Yu, Rong Hao, Fanyu Kong, Xiaodong Liu:
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems. IEEE Internet Things J. 10(12): 10948-10958 (2023) - [j107]Chao Gai, Wenting Shen, Ming Yang, Jia Yu:
PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data. IEEE Internet Things J. 10(22): 20065-20079 (2023) - [j106]Linhao Cong, Jia Yu, Xinrui Ge:
Privacy preserving subgraph isomorphism query for dynamic graph database. J. Netw. Comput. Appl. 211: 103562 (2023) - [j105]Yunfeng Zhang, Rong Hao, Xinrui Ge, Jia Yu:
Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems. J. Syst. Archit. 142: 102940 (2023) - [j104]Fangyuan Sun, Jia Yu, Rong Hao, Ming Yang, Fanyu Kong:
Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network. IEEE Syst. J. 17(2): 1729-1740 (2023) - [j103]Zhiqiang Wang, Wenjing Gao, Jia Yu, Wengting Shen, Rong Hao:
Lightweight Secure Deduplication Based on Data Popularity. IEEE Syst. J. 17(4): 5531-5542 (2023) - [j102]Wenting Shen, Jia Yu, Ming Yang, Jiankun Hu:
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage. IEEE Trans. Dependable Secur. Comput. 20(6): 4593-4606 (2023) - [j101]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT. IEEE Trans. Inf. Forensics Secur. 18: 4640-4651 (2023) - [j100]Xueli Sun, Jianxi Fan, Eminjan Sabir, Baolei Cheng, Jia Yu:
Reliability of augmented k-ary n-cubes under the extra connectivity condition. J. Supercomput. 79(12): 13641-13669 (2023) - [j99]Wenjing Gao, Jia Yu:
Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing. IEEE Trans. Serv. Comput. 16(5): 3578-3589 (2023) - [j98]Hongjun Li, Jia Yu, Jianxi Fan, Yihai Pi:
DSOS: A Distributed Secure Outsourcing System for Edge Computing Service in IoT. IEEE Trans. Syst. Man Cybern. Syst. 53(1): 238-250 (2023) - [c32]Yunting Tao, Fanyu Kong, Yuliang Shi, Jia Yu, Hanlin Zhang, Huiyi Liu:
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System. ISCC 2023: 857-863 - 2022
- [j97]Mengjie Lv, Jianxi Fan, Jingya Zhou, Jia Yu, Xiaohua Jia:
The Reliability of k-Ary n-Cube Based on Component Connectivity. Comput. J. 65(8): 2197-2208 (2022) - [j96]Yi Yi, Jianxi Fan, Baolei Cheng, Yan Wang, Jia Yu:
The 3-Extra Connectivity of the Data Center Network BCube. Comput. J. 65(12): 3199-3208 (2022) - [j95]Haiyang Liu, Hanlin Zhang, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving cloud-Aided broad learning system. Comput. Secur. 112: 102503 (2022) - [j94]Xin Sun, Chengliang Tian, Changhui Hu, Weizhong Tian, Hanlin Zhang, Jia Yu:
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance. Comput. Secur. 118: 102740 (2022) - [j93]Li Guo, Jia Yu, Ming Yang, Fanyu Kong:
Privacy-Preserving Convolution Neural Network Inference with Edge-assistance. Comput. Secur. 123: 102910 (2022) - [j92]Yaru Liu, Jia Yu, Ming Yang, Wenqiang Hou, Huaqun Wang:
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data. Future Gener. Comput. Syst. 128: 178-191 (2022) - [j91]Linhao Cong, Jia Yu, Xinrui Ge:
Enabling efficient privacy-preserving subgraph isomorphic query over graphs. Future Gener. Comput. Syst. 132: 1-10 (2022) - [j90]Xiulan Li, Jingguo Bi, Chengliang Tian, Hanlin Zhang, Jia Yu, Yanbin Pan:
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things. IEEE Internet Things J. 9(9): 6790-6802 (2022) - [j89]Hongjun Li, Jia Yu, Ming Yang, Fanyu Kong:
Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things. IEEE Internet Things J. 9(11): 8737-8748 (2022) - [j88]Hongjun Li, Fanyu Kong, Jia Yu:
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things. IEEE Internet Things J. 9(14): 12711-12722 (2022) - [j87]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT. IEEE Internet Things J. 9(16): 15138-15149 (2022) - [j86]Wenjing Gao, Jia Yu, Ming Yang, Huaqun Wang:
Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT. IEEE Internet Things J. 9(17): 15915-15927 (2022) - [j85]Yuhang Shao, Chengliang Tian, Lidong Han, Hequn Xian, Jia Yu:
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier. IEEE Internet Things J. 9(21): 21648-21661 (2022) - [j84]Suying Wu, Jianxi Fan, Baolei Cheng, Jia Yu, Yan Wang:
Connectivity and constructive algorithms of disjoint paths in dragonfly networks. Theor. Comput. Sci. 922: 257-270 (2022) - [j83]Hanlin Zhang, Jia Yu, Mohammad S. Obaidat, Pandi Vijayakumar, Linqiang Ge, Jie Lin, Jianxi Fan, Rong Hao:
Secure Edge-Aided Computations for Social Internet-of-Things Systems. IEEE Trans. Comput. Soc. Syst. 9(1): 76-87 (2022) - [j82]Xiang Gao, Jia Yu, Yan Chang, Huaqun Wang, Jianxi Fan:
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data. IEEE Trans. Dependable Secur. Comput. 19(6): 3774-3789 (2022) - [j81]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Synchronized Provable Data Possession Based on Blockchain for Digital Twin. IEEE Trans. Inf. Forensics Secur. 17: 472-485 (2022) - [j80]Yaru Liu, Jia Yu, Jianxi Fan, Pandi Vijayakumar, Victor Chang:
Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System. IEEE Trans. Ind. Informatics 18(3): 2010-2020 (2022) - [j79]Xinrui Ge, Jia Yu, Rong Hao, Haibin Lv:
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System. IEEE Trans. Ind. Informatics 18(8): 5573-5583 (2022) - [j78]Xi Wang, Jianxi Fan, Shukui Zhang, Jia Yu:
Node-to-set disjoint paths problem in cross-cubes. J. Supercomput. 78(1): 1356-1380 (2022) - [j77]Xinrui Ge, Guofu Wei, Jia Yu, Amit Kumar Singh, Neal N. Xiong:
An Intelligent Fuzzy Phrase Search Scheme Over Encrypted Network Data for IoT. IEEE Trans. Netw. Sci. Eng. 9(2): 377-388 (2022) - [j76]Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong:
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. IEEE Trans. Netw. Sci. Eng. 9(6): 3956-3967 (2022) - [j75]Chengliang Tian, Jia Yu, Hanlin Zhang, Haiyang Xue, Cong Wang, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [j74]Xinrui Ge, Jia Yu, Hanlin Zhang, Jianli Bai, Jianxi Fan, Neal N. Xiong:
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT. IEEE Trans. Syst. Man Cybern. Syst. 52(1): 136-150 (2022) - [c31]Fazong Wu, Xin Wang, Ming Yang, Heng Zhang, Xiaoming Wu, Jia Yu:
Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids. ASCC 2022: 2012-2017 - [c30]Hongjun Li, Fanyu Kong, Jia Yu, Hanlin Zhang, Luhong Diao, Yunting Tao:
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT. TrustCom 2022: 556-564 - 2021
- [j73]Mengjie Lv, Baolei Cheng, Jianxi Fan, Xi Wang, Jingya Zhou, Jia Yu:
The Conditional Reliability Evaluation of Data Center Network BCDC. Comput. J. 64(9): 1451-1464 (2021) - [j72]Fangyuan Sun, Jia Yu, Xinrui Ge, Ming Yang, Fanyu Kong:
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network. Comput. Secur. 111: 102456 (2021) - [j71]Peng Gao, Hanlin Zhang, Jia Yu, Jie Lin, Xiaopeng Wang, Ming Yang, Fanyu Kong:
Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images. IEEE Internet Things J. 8(5): 3287-3299 (2021) - [j70]Tian Li, Huaqun Wang, Debiao He, Jia Yu:
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things. IEEE Internet Things J. 8(10): 8387-8398 (2021) - [j69]Xinrui Ge, Jia Yu, Fei Chen, Fanyu Kong, Huaqun Wang:
Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data. IEEE Internet Things J. 8(16): 12902-12918 (2021) - [j68]Hanlin Zhang, Le Tong, Jia Yu, Jie Lin:
Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. IEEE Internet Things J. 8(20): 15596-15607 (2021) - [j67]Xiang Gao, Jia Yu, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. Inf. Sci. 546: 177-191 (2021) - [j66]Yunhai Zheng, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. J. Comput. Syst. Sci. 121: 18-33 (2021) - [j65]Huaqun Wang, Debiao He, Jia Yu, Neal N. Xiong, Bin Wu:
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks. J. Parallel Distributed Comput. 152: 1-10 (2021) - [j64]Yan Xu, Long Ding, Jie Cui, Hong Zhong, Jia Yu:
PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing. IEEE Syst. J. 15(3): 3730-3739 (2021) - [j63]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu, Jixin Ma:
Data Integrity Auditing without Private Key Storage for Secure Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1408-1421 (2021) - [j62]Xueli Sun, Jianxi Fan, Baolei Cheng, Zhao Liu, Jia Yu:
Component conditional fault tolerance of hierarchical folded cubic networks. Theor. Comput. Sci. 883: 44-58 (2021) - [j61]Xinrui Ge, Jia Yu, Hanlin Zhang, Chengyu Hu, Zengpeng Li, Zhan Qin, Rong Hao:
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification. IEEE Trans. Dependable Secur. Comput. 18(1): 490-504 (2021) - [j60]Jia Yu, Rong Hao:
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage". IEEE Trans. Serv. Comput. 14(6): 2090-2092 (2021) - [c29]Yunting Tao, Fanyu Kong, Jia Yu, Qiuliang Xu:
Modification and Performance Improvement of Paillier Homomorphic Cryptosystem. EUC 2021: 131-136 - [i3]Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong:
Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. CoRR abs/2101.02334 (2021) - [i2]Hanlin Zhang, Le Tong, Jia Yu, Jie Lin:
Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. CoRR abs/2101.02341 (2021) - [i1]Haiyang Liu, Hanlin Zhang, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving Cloud-Aided Broad Learning System. CoRR abs/2101.02826 (2021) - 2020
- [j59]Hanlin Zhang, Jia Yu, Chengliang Tian, Guobin Xu, Peng Gao, Jie Lin:
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things. IEEE Internet Things J. 7(4): 2968-2981 (2020) - [j58]Hanlin Zhang, Jia Yu, Chengliang Tian, Le Tong, Jie Lin, Linqiang Ge, Huaqun Wang:
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. IEEE Internet Things J. 7(8): 6868-6881 (2020) - [j57]Hongjun Li, Jia Yu, Hanlin Zhang, Ming Yang, Huaqun Wang:
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance. IEEE Internet Things J. 7(9): 8769-8779 (2020) - [j56]Qiang Zhou, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. Inf. Sci. 512: 641-660 (2020) - [j55]Chengyu Hu, Yuqin Xu, Pengtao Liu, Jia Yu, Shanqing Guo, Minghao Zhao:
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Inf. Sci. 520: 15-30 (2020) - [j54]Liang Zhang, Hanlin Zhang, Jia Yu, Hequn Xian:
Blockchain-based two-party fair contract signing scheme. Inf. Sci. 535: 142-155 (2020) - [j53]Qianqian Su, Rong Hao, Shaoxia Duan, Fanyu Kong, Xiaodong Liu, Jia Yu:
Secure Computation Outsourcing for Inversion in Finite Field. J. Internet Serv. Inf. Secur. 10(2): 35-48 (2020) - [j52]Jianli Bai, Jia Yu, Xiang Gao:
Secure auditing and deduplication for encrypted cloud data supporting ownership modification. Soft Comput. 24(16): 12197-12214 (2020) - [j51]Mengjie Lv, Jianxi Fan, Guo Chen, Baolei Cheng, Jingya Zhou, Jia Yu:
The reliability analysis of k-ary n-cube networks. Theor. Comput. Sci. 835: 1-14 (2020) - [j50]Yue Zhang, Jia Yu, Rong Hao, Cong Wang, Kui Ren:
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data. IEEE Trans. Dependable Secur. Comput. 17(3): 608-619 (2020) - [j49]Pu Zhao, Jia Yu, Hanlin Zhang, Zhan Qin, Cong Wang:
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs. IEEE Trans. Inf. Forensics Secur. 15: 315-328 (2020)
2010 – 2019
- 2019
- [j48]Shengxia Zhang, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method. IEEE Access 7: 53823-53838 (2019) - [j47]Huaqun Wang, Debiao He, Jia Yu:
Privacy-preserving incentive and rewarding scheme for crowd computing in social media. Inf. Sci. 470: 15-27 (2019) - [j46]Pu Zhao, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing. J. Inf. Sci. Eng. 35(3): 635-650 (2019) - [j45]Huiying Hou, Jia Yu, Rong Hao:
Cloud storage auditing with deduplication supporting different security levels according to data popularity. J. Netw. Comput. Appl. 134: 26-39 (2019) - [j44]Wenting Shen, Jing Qin, Jia Yu, Rong Hao, Jiankun Hu:
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(2): 331-346 (2019) - [j43]Huaqun Wang, Debiao He, Jia Yu, Zhiwei Wang:
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession. IEEE Trans. Serv. Comput. 12(5): 824-835 (2019) - [c28]Le Tong, Jia Yu, Hanlin Zhang:
Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation. DSC 2019: 1-7 - 2018
- [j42]Hanlin Zhang, Jia Yu, Chengliang Tian, Pu Zhao, Guobin Xu, Jie Lin:
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing. IEEE Access 6: 40713-40722 (2018) - [j41]Xinrui Ge, Jia Yu, Chengyu Hu, Hanlin Zhang, Rong Hao:
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing. IEEE Access 6: 45725-45739 (2018) - [j40]Huiying Hou, Jia Yu, Hanlin Zhang, Yan Xu, Rong Hao:
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage. Clust. Comput. 21(4): 1849-1863 (2018) - [j39]Huiying Hou, Jia Yu, Rong Hao:
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing. Int. J. Netw. Secur. 20(3): 575-584 (2018) - [j38]Jia Yu, Rong Hao, Hui Xia, Hanlin Zhang, Xiangguo Cheng, Fanyu Kong:
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction. Inf. Sci. 442-443: 158-172 (2018) - 2017
- [j37]Wenting Shen, Guangyang Yang, Jia Yu, Hanlin Zhang, Fanyu Kong, Rong Hao:
Remote data possession checking with privacy-preserving authenticators for cloud storage. Future Gener. Comput. Syst. 76: 136-145 (2017) - [j36]Xiuxiu Jiang, Jia Yu, Jingbo Yan, Rong Hao:
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data. Inf. Sci. 403: 22-41 (2017) - [j35]Xiuxiu Jiang, Xinrui Ge, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage. J. Internet Serv. Inf. Secur. 7(2): 1-18 (2017) - [j34]Wenting Shen, Jia Yu, Hui Xia, Hanlin Zhang, Xiuqing Lu, Rong Hao:
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium. J. Netw. Comput. Appl. 82: 56-64 (2017) - [j33]Qianqian Su, Jia Yu, Chengliang Tian, Hanlin Zhang, Rong Hao:
How to securely outsource the inversion modulo a large composite number. J. Syst. Softw. 129: 26-34 (2017) - [j32]Jia Yu, Huaqun Wang:
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(8): 1931-1940 (2017) - [c27]Fanyu Kong, Dashui Zhou, Yali Jiang, Jianwei Shang, Jia Yu:
Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method. CSE/EUC (1) 2017: 866-869 - 2016
- [j31]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A public cloud storage auditing scheme for resource-constrained clients. Int. J. High Perform. Syst. Archit. 6(3): 121-130 (2016) - [j30]Hui Xia, Ruihua Zhang, Jia Yu, Zhenkuan Pan:
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 23(2): 141-150 (2016) - [j29]Jia Yu, Rong Hao, Huawei Zhao, Minglei Shu, Jianxi Fan:
IRIBE: Intrusion-resilient identity-based encryption. Inf. Sci. 329: 90-104 (2016) - [j28]Wenting Shen, Jia Yu, Guangyang Yang, Yue Zhang, Zhangjie Fu, Rong Hao:
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data. KSII Trans. Internet Inf. Syst. 10(7): 3319-3338 (2016) - [j27]Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl. 62: 112-127 (2016) - [j26]Guangyang Yang, Jia Yu, Wenting Shen, Qianqian Su, Zhangjie Fu, Rong Hao:
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113: 130-139 (2016) - [j25]Jia Yu, Kui Ren, Cong Wang:
Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates. IEEE Trans. Inf. Forensics Secur. 11(6): 1362-1375 (2016) - [j24]Hui Xia, Jia Yu, Zhenkuan Pan, Xiangguo Cheng, Edwin Hsing-Mean Sha:
Applying trust enhancements to reactive routing protocols in mobile ad hoc networks. Wirel. Networks 22(7): 2239-2257 (2016) - [j23]Jia Yu, Hui Xia, Huawei Zhao, Rong Hao, Zhangjie Fu, Xiangguo Cheng:
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments. Wirel. Pers. Commun. 86(3): 1467-1491 (2016) - [c26]Wenting Shen, Jia Yu, Hui Xia, Rong Hao:
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model". ICCCS (1) 2016: 335-342 - 2015
- [j22]Jia Yu, Kui Ren, Cong Wang, Vijay Varadharajan:
Enabling Cloud Storage Auditing With Key-Exposure Resistance. IEEE Trans. Inf. Forensics Secur. 10(6): 1167-1179 (2015) - [c25]Wenting Shen, Jia Yu, Rong Hao, Xu An Wang:
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation. 3PGCIC 2015: 36-39 - [c24]Xiuxiu Jiang, Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data. 3PGCIC 2015: 836-839 - [c23]Fanyu Kong, Jie Wang, Jia Yu, Xu An Wang:
Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase. 3PGCIC 2015: 840-843 - [c22]Chaowen Guan, Kui Ren, Fangguo Zhang, Florian Kerschbaum, Jia Yu:
Symmetric-Key Based Proofs of Retrievability Supporting Public Verification. ESORICS (1) 2015: 203-223 - 2014
- [j21]Huiyan Zhao, Jia Yu, Shaoxia Duan, Xiangguo Cheng, Rong Hao:
Key-insulated aggregate signature. Frontiers Comput. Sci. 8(5): 837-846 (2014) - [j20]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
One forward-secure signature scheme using bilinear maps and its applications. Inf. Sci. 279: 60-76 (2014) - [c21]Hui Xia, Jia Yu, Zhiyong Zhang, Xiangguo Cheng, Zhenkuan Pan:
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs. TrustCom 2014: 473-480 - 2013
- [j19]Jia Yu, Rong Hao, Xiangguo Cheng:
Security analysis and improvement of two verifiable multi-secret sharing schemes. Int. J. Secur. Networks 8(4): 200-206 (2013) - [j18]Xiangguo Cheng, Shaojie Zhou, Lifeng Guo, Jia Yu, Huiran Ma:
An ID-Based Short Group Signature Scheme. J. Softw. 8(3): 554-559 (2013) - 2012
- [j17]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 114(1): 103 (2012) - [j16]Xiangguo Cheng, Shaojie Zhou, Jia Yu, Xin Li, Huiran Ma:
A Practical ID-Based Group Signature Scheme. J. Comput. 7(11): 2650-2654 (2012) - [j15]Jia Yu, Fanyu Kong, Huawei Zhao, Xiangguo Cheng, Rong Hao, Xiang-Fa Guo:
Non-Interactive Forward-Secure Threshold Signature without Random Oracles. J. Inf. Sci. Eng. 28(3): 571-586 (2012) - [j14]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Intrusion-resilient identity-based signature: Security definition and construction. J. Syst. Softw. 85(2): 382-391 (2012) - 2011
- [j13]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
Forward-Secure Identity-Based Public-Key Encryption without Random Oracles. Fundam. Informaticae 111(2): 241-256 (2011) - [j12]Jia Yu, Rong Hao, Fanyu Kong, Xiangguo Cheng, Jianxi Fan, Yangkui Chen:
Forward-secure identity-based signature: Security notions and construction. Inf. Sci. 181(3): 648-660 (2011) - [j11]Jianxi Fan, Xiaohua Jia, Xin Liu, Shukui Zhang, Jia Yu:
Efficient unicast in bijective connection networks with the restricted faulty node set. Inf. Sci. 181(11): 2303-2315 (2011) - [j10]Xi Wang, Jianxi Fan, Xiaohua Jia, Shukui Zhang, Jia Yu:
Embedding meshes into twisted-cubes. Inf. Sci. 181(14): 3085-3099 (2011) - [j9]Xiangguo Cheng, Chen Yang, Jia Yu:
A New Approach to Group Signature Schemes. J. Comput. 6(4): 812-817 (2011) - [j8]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Jianxi Fan:
New Forward-Secure Signature Scheme with Untrusted Update. J. Inf. Sci. Eng. 27(4): 1435-1448 (2011) - [j7]Xiangguo Cheng, Lifeng Guo, Chen Yang, Jia Yu:
ID-Based Sequential Aggregate Signatures. J. Softw. 6(12): 2495-2499 (2011) - [j6]Jianxi Fan, Xiaohua Jia, Baolei Cheng, Jia Yu:
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges. Theor. Comput. Sci. 412(29): 3440-3450 (2011) - [c20]Fanyu Kong, Jia Yu, Lei Wu:
Security Analysis of an RSA Key Generation Algorithm with a Large Private Key. ISC 2011: 95-101 - [c19]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
Two Protocols for Member Revocation in Secret Sharing Schemes. PAISI 2011: 64-70 - 2010
- [j5]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Yangkui Chen, Xuliang Li, Guowen Li:
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes. J. Networks 5(6): 634-641 (2010)
2000 – 2009
- 2009
- [j4]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao:
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree. J. Softw. 4(1): 73-80 (2009) - [c18]Fanyu Kong, Jia Yu:
Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme. IAS 2009: 666-668 - 2008
- [j3]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang, Guowen Li:
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme. J. Commun. 3(7): 28-35 (2008) - [j2]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen Li:
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures. J. Commun. 3(7): 36-43 (2008) - [c17]Jia Yu, Fanyu Kong, Rong Hao, Dexiang Zhang:
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme. ISECS 2008: 558-561 - [c16]Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li:
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. ISI Workshops 2008: 138-148 - [c15]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps. ProvSec 2008: 83-97 - [c14]Jia Yu, Fanyu Kong, Xiangguo Cheng, Rong Hao, Guowen Li:
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005. ProvSec 2008: 176-184 - [c13]Jia Yu, Fanyu Kong, Rong Hao, Zhen Cheng:
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage. WAIM 2008: 471-472 - 2007
- [c12]Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li:
Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. ATC 2007: 52-60 - [c11]Guowen Li, Jia Yu, Rupeng Li, Daxing Li:
Two Threshold Multisignature Schemes from Bilinear Pairings. MUE 2007: 1041-1045 - [c10]Rupeng Li, Jia Yu, Guowen Li, Daxing Li:
A New Identity-Based Blind Signature Scheme with Batch Verifications. MUE 2007: 1051-1056 - [c9]Rupeng Li, Xianghua Du, Guowen Li, Jia Yu, Daxing Li:
Key-Insulated Group Signature Scheme with Selective Revocation. MUE 2007: 1057-1063 - [c8]Jia Yu, Fanyu Kong, Rong Hao:
Publicly Verifiable Secret Sharing with Enrollment Ability. SNPD (3) 2007: 194-199 - [c7]Rupeng Li, Jia Yu, Jin Wang, Guowen Li, Daxing Li:
Key-Insulated Group Signature Scheme with Verifier-Local Revocation. SNPD (3) 2007: 273-278 - [c6]Guowen Li, Jia Yu, Rupeng Li, Daxing Li:
An Approach to Convert Any Threshold Signature into a Threshold Group Signature. SNPD (2) 2007: 723-726 - [c5]Fanyu Kong, Jia Yu, Baodong Qin, Ming Li, Daxing Li:
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme. SNPD (3) 2007: 923-926 - [c4]Jin Wang, Xi Bai, Jia Yu, Daxing Li:
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem. TAMC 2007: 148-158 - [c3]Fanyu Kong, Jia Yu, Zhun Cai, Daxing Li:
New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems. TAMC 2007: 189-198 - 2006
- [j1]Fanyu Kong, Zhun Cai, Jia Yu, Daxing Li:
Improved generalized Atkin algorithm for computing square roots in finite fields. Inf. Process. Lett. 98(1): 1-5 (2006) - [c2]Jia Yu, Fanyu Kong, Rong Hao:
Forward Secure Threshold Signature Scheme from Bilinear Pairings. CIS 2006: 587-597 - [c1]Jin Wang, Jia Yu, Daxing Li, Xi Bai, Zhongtian Jia:
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. CIS 2006: 847-857
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint