default search action
Jianghong Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j50]Meixia Miao, Siqi Zhao, Jiawei Li, Jianghong Wei, Willy Susilo:
Practically secure linear-map vector commitment and its applications. Comput. Stand. Interfaces 91: 103885 (2025) - 2024
- [j49]Yanmei Cao, Jianghong Wei, Yang Xiang, Willy Susilo, Xiaofeng Chen:
Abuse-resistant deniable encryption. Comput. Stand. Interfaces 87: 103761 (2024) - [j48]Meixia Miao, Siqi Zhao, Jiawei Li, Jianghong Wei:
Aggregatably Verifiable Data Streaming. IEEE Internet Things J. 11(13): 24109-24122 (2024) - [j47]Wenzhao Liu, Wanli Zhang, Kuiwu Yang, Yue Chen, Kaiwei Guo, Jianghong Wei:
Enhancing Generalization in Few-Shot Learning for Detecting Unknown Adversarial Examples. Neural Process. Lett. 56(2): 85 (2024) - [j46]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks. IEEE Trans. Dependable Secur. Comput. 21(4): 3469-3486 (2024) - [j45]Guohua Tian, Jianghong Wei, Meixia Miao, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. IEEE Trans. Dependable Secur. Comput. 21(4): 3917-3930 (2024) - [j44]Jianghong Wei, Meixia Miao, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Under Concurrent Queries. IEEE Trans. Mob. Comput. 23(5): 5543-5557 (2024) - [c12]Jianghong Wei, Guohua Tian, Ding Wang, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Pixel+ and Pixel++: Compact and Efficient Forward-Secure Multi-Signatures for PoS Blockchain Consensus. USENIX Security Symposium 2024 - 2023
- [j43]Peng He, Gang Zhou, Mengli Zhang, Jianghong Wei, Jing Chen:
Improving temporal knowledge graph embedding using tensor factorization. Appl. Intell. 53(8): 8746-8760 (2023) - [j42]Yunhan Hu, Guohua Tian, Anqi Jiang, Shuqin Liu, Jianghong Wei, Jianfeng Wang, Shichong Tan:
A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain. Comput. Stand. Interfaces 83: 103656 (2023) - [j41]Shuqin Liu, Yusong Yao, Guohua Tian, Jianghong Wei, Xialin Liu:
A blockchain-based compact audit-enabled deduplication in decentralized storage. Comput. Stand. Interfaces 85: 103718 (2023) - [j40]Jingkai Zhou, Guohua Tian, Jianghong Wei:
Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage. Int. J. Comput. Sci. Eng. 26(4): 406-417 (2023) - [j39]Tianran Dang, Guohua Tian, Jianghong Wei, Shuqin Liu:
Blockchain-based collaborative intrusion detection scheme. Int. J. Comput. Sci. Eng. 26(4): 418-429 (2023) - [j38]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Willy Susilo, Ilsun You:
Towards secure asynchronous messaging with forward secrecy and mutual authentication. Inf. Sci. 626: 114-132 (2023) - [j37]Dongmei Yang, Jianghong Wei, Xuexian Hu, Kuiwu Yang, Yue Chen:
System-widely and fine-grained forward secure identity-based signature scheme. J. Inf. Secur. Appl. 79: 103659 (2023) - [j36]Yang Xu, Xuexian Hu, Jianghong Wei, Hongjian Yang, Kejia Li:
VF-CART: A communication-efficient vertical federated framework for the CART algorithm. J. King Saud Univ. Comput. Inf. Sci. 35(1): 237-249 (2023) - [j35]Guohua Tian, Jianghong Wei, Miroslaw Kutylowski, Willy Susilo, Xinyi Huang, Xiaofeng Chen:
VRBC: A Verifiable Redactable Blockchain With Efficient Query and Integrity Auditing. IEEE Trans. Computers 72(7): 1928-1942 (2023) - [j34]Jun Shen, Xiaofeng Chen, Jianghong Wei, Fuchun Guo, Willy Susilo:
Blockchain-Based Accountable Auditing With Multi-Ownership Transfer. IEEE Trans. Cloud Comput. 11(3): 2711-2724 (2023) - [j33]Xuan Jing, Meixia Miao, Jianghong Wei, Jianfeng Wang:
Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting. IEEE Trans. Cloud Comput. 11(4): 3341-3354 (2023) - [j32]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xinyi Huang, Willy Susilo:
Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems. IEEE Trans. Parallel Distributed Syst. 34(2): 552-566 (2023) - [c11]Yamin Li, Jianghong Wei, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Robust Decentralized Multi-client Functional Encryption: Motivation, Definition, and Inner-Product Constructions. ASIACRYPT (5) 2023: 134-165 - 2022
- [j31]Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
VAEPass: A lightweight passwords guessing model based on variational auto-encoder. Comput. Secur. 114: 102587 (2022) - [j30]Yanmei Cao, Jianghong Wei, Fangguo Zhang, Yang Xiang, Xiaofeng Chen:
Efficient public-key authenticated deniable encryption schemes. Comput. Stand. Interfaces 82: 103620 (2022) - [j29]Meixia Miao, Jianghong Wei, Jiaojiao Wu, Kuan-Ching Li, Willy Susilo:
Verifiable data streaming with efficient update for intelligent automation systems. Int. J. Intell. Syst. 37(2): 1322-1338 (2022) - [j28]Meixia Miao, Jiawei Li, Yunling Wang, Jianghong Wei, Xinghua Li:
Verifiable data streaming protocol supporting update history queries. Int. J. Intell. Syst. 37(12): 11342-11361 (2022) - [j27]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. IEEE Trans. Dependable Secur. Comput. 19(4): 2318-2332 (2022) - [j26]Guohua Tian, Yunhan Hu, Jianghong Wei, Zheli Liu, Xinyi Huang, Xiaofeng Chen, Willy Susilo:
Blockchain-Based Secure Deduplication and Shared Auditing in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 19(6): 3941-3954 (2022) - [c10]Yuting Jiang, Jianghong Wei:
Batched Fully Homomorphic Encryption from TFHE. ISC 2022: 92-109 - [c9]Yuting Jiang, Jianghong Wei, Jing Pan:
Batched Fully Dynamic Multi-key FHE from FHEW-Like Cryptosystems. ProvSec 2022: 105-120 - [c8]Yuting Jiang, Jianghong Wei, Jing Pan:
Publicly Verifiable Private Set Intersection from Homomorphic Encryption. SocialSec 2022: 117-137 - 2021
- [j25]Jianghong Wei, Xiaofeng Chen, Xinyi Huang, Xuexian Hu, Willy Susilo:
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans. Dependable Secur. Comput. 18(5): 2301-2315 (2021) - [j24]Jianghong Wei, Xiaofeng Chen, Jianfeng Ma, Xuexian Hu, Kui Ren:
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging. IEEE/ACM Trans. Netw. 29(5): 2242-2253 (2021) - [c7]Jianghong Wei, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Protocol with Data Auditing. ESORICS (2) 2021: 296-312 - [c6]Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution. ICICS (1) 2021: 153-168 - [i1]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications. CoRR abs/2105.05525 (2021) - 2020
- [j23]Ji Li, Jianghong Wei, Mao Ye, Wenfen Liu, Xuexian Hu:
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets. IET Inf. Secur. 14(3): 321-331 (2020) - [c5]Ming Yang, Xuexian Hu, Jianghong Wei, Qihui Zhang, Wenfen Liu:
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain. ICCNS 2020: 60-69
2010 – 2019
- 2019
- [j22]Chun Liu, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security. IEEE Access 7: 105363-105375 (2019) - [j21]Mengli Zhang, Qihui Zhang, Wenfen Liu, Xuexian Hu, Jianghong Wei:
TG-SPSR: A Systematic Targeted Password Attacking Model. KSII Trans. Internet Inf. Syst. 13(5): 2674-2697 (2019) - [j20]Jianghong Wei, Xuexian Hu, Wenfen Liu, Qihui Zhang:
Forward and backward secure fuzzy encryption for data sharing in cloud computing. Soft Comput. 23(2): 497-506 (2019) - [c4]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails. ESORICS (2) 2019: 134-150 - 2018
- [j19]Jianghong Wei, Wenfen Liu, Xuexian Hu:
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS. Int. J. Commun. Syst. 31(15) (2018) - [j18]Wenfen Liu, Gang Zhou, Jianghong Wei, Xuexian Hu, Saru Kumari:
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks. Inf. Technol. Control. 47(2): 275-294 (2018) - [j17]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage. IEEE Syst. J. 12(2): 1731-1742 (2018) - [j16]Pankaj Kumar Sa, Saru Kumari, Vishnu Sharma, Arun Kumar Sangaiah, Jianghong Wei, Xiong Li:
A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput. Informatics Syst. 18: 80-89 (2018) - [j15]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption. IEEE Trans. Cloud Comput. 6(4): 1136-1148 (2018) - [c3]Yuxuan Zhang, Jianghong Wei, Xiaojian Zhang, Xuexian Hu, Wenfen Liu:
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy. ICCNS 2018: 84-89 - 2017
- [j14]Wenfen Liu, Mao Ye, Jianghong Wei, Xuexian Hu:
Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection. Comput. Intell. Neurosci. 2017: 2658707:1-2658707:14 (2017) - [j13]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Forward-secure identity-based signature with efficient revocation. Int. J. Comput. Math. 94(7): 1390-1411 (2017) - [j12]Jianghong Wei, Xuexian Hu, Wenfen Liu:
Two-factor authentication scheme using attribute and password. Int. J. Commun. Syst. 30(1) (2017) - [j11]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. Int. J. Found. Comput. Sci. 28(7): 843-868 (2017) - [j10]Wenfen Liu, Mao Ye, Jianghong Wei, Xuexian Hu:
Compressed constrained spectral clustering framework for large-scale data sets. Knowl. Based Syst. 135: 77-88 (2017) - [j9]Ji Li, Jianghong Wei, Wenfen Liu, Xuexian Hu:
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. Secur. Commun. Networks 2017: 6097253:1-6097253:14 (2017) - [c2]Qihui Zhang, Xuexian Hu, Jianghong Wei, Wenfen Liu:
Universally Composable Three-Party Password Authenticated Key Exchange. ICCCS (2) 2017: 123-137 - 2016
- [j8]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Practical Attribute-based Signature: Traceability and Revocability. Comput. J. 59(11): 1714-1734 (2016) - [j7]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme. Int. J. Netw. Secur. 18(4): 782-792 (2016) - [j6]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Security pitfalls of "ePASS: An expressive attribute-based signature scheme". J. Inf. Secur. Appl. 30: 40-45 (2016) - 2015
- [j5]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Forward-Secure Threshold Attribute-Based Signature Scheme. Comput. J. 58(10): 2492-2506 (2015) - [j4]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure control protocol for universal serial bus mass storage devices. IET Comput. Digit. Tech. 9(6): 321-327 (2015) - [c1]Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure. ISPEC 2015: 316-330 - 2014
- [j3]Jianghong Wei, Xuexian Hu, Wenfen Liu:
Traceable attribute-based signcryption. Secur. Commun. Networks 7(12): 2302-2317 (2014) - [j2]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture. Wirel. Pers. Commun. 77(3): 2255-2269 (2014) - 2012
- [j1]Jianghong Wei, Xuexian Hu, Wenfen Liu:
An Improved Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 36(6): 3597-3604 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint