


default search action
BibTeX records: Jianfeng Wang 0001
@article{DBLP:journals/fgcs/JiangWH26,
author = {Anqi Jiang and
Jianfeng Wang and
Wanxuan Huang},
title = {Verifiable multi-client blockchain-based dynamic data retrieval},
journal = {Future Gener. Comput. Syst.},
volume = {174},
pages = {108008},
year = {2026},
url = {https://doi.org/10.1016/j.future.2025.108008},
doi = {10.1016/J.FUTURE.2025.108008},
timestamp = {Thu, 07 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/fgcs/JiangWH26.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiangMW26,
author = {Anqi Jiang and
Shuqi Ma and
Jianfeng Wang},
title = {Towards efficient and verifiable dynamic conjunctive queries in hybrid-storage
blockchain},
journal = {Inf. Sci.},
volume = {741},
pages = {123282},
year = {2026},
url = {https://doi.org/10.1016/j.ins.2026.123282},
doi = {10.1016/J.INS.2026.123282},
timestamp = {Sun, 29 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/isci/JiangMW26.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JingW25,
author = {Xuan Jing and
Jianfeng Wang},
title = {Towards forward secure verifiable data streaming with support for
keyword query},
journal = {Inf. Sci.},
volume = {686},
pages = {121375},
year = {2025},
url = {https://doi.org/10.1016/j.ins.2024.121375},
doi = {10.1016/J.INS.2024.121375},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/isci/JingW25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiJWXZW25,
author = {Shengming Li and
Xuan Jing and
Yunling Wang and
Xin Xu and
Zichen Zhang and
Jianfeng Wang},
title = {Practical searchable encryption scheme against response identity attacks},
journal = {Inf. Sci.},
volume = {706},
pages = {121975},
year = {2025},
url = {https://doi.org/10.1016/j.ins.2025.121975},
doi = {10.1016/J.INS.2025.121975},
timestamp = {Tue, 08 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/LiJWXZW25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/JiangQYQWLAC25,
author = {Qin Jiang and
Saiyu Qi and
Xu Yang and
Yong Qi and
Jianfeng Wang and
Youshui Lu and
Bochao An and
Ee{-}Chien Chang},
title = {Reducing Paging and Exit Overheads in Intel {SGX} for Oblivious Conjunctive
Keyword Search},
journal = {{IEEE} Trans. Computers},
volume = {74},
number = {3},
pages = {776--789},
year = {2025},
url = {https://doi.org/10.1109/TC.2023.3281857},
doi = {10.1109/TC.2023.3281857},
timestamp = {Sun, 22 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tc/JiangQYQWLAC25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWWWS25,
author = {Lei Zhang and
Jianfeng Wang and
Jiaojiao Wu and
Yunling Wang and
Shifeng Sun},
title = {Violin: Powerful Volumetric Injection Attack Against Searchable Encryption
With Optimal Injection Size},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {22},
number = {4},
pages = {4103--4115},
year = {2025},
url = {https://doi.org/10.1109/TDSC.2025.3543248},
doi = {10.1109/TDSC.2025.3543248},
timestamp = {Sat, 09 Aug 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tdsc/ZhangWWWS25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWSC25,
author = {Jiaojiao Wu and
Jianfeng Wang and
Shifeng Sun and
Xiaofeng Chen},
title = {Flash: Practical Volume-Hiding Encrypted Conjunctive Multi-Map With
Optimal Overhead},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {22},
number = {6},
pages = {7802--7817},
year = {2025},
url = {https://doi.org/10.1109/TDSC.2025.3600572},
doi = {10.1109/TDSC.2025.3600572},
timestamp = {Fri, 26 Dec 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdsc/WuWSC25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuHWSC25,
author = {Jiaojiao Wu and
Wanxuan Huang and
Jianfeng Wang and
Shifeng Sun and
Xiaofeng Chen},
title = {False-Positive-Free Wildcard Queries With Dual Wildcard Flexibility
and Enhanced Efficiency},
journal = {{IEEE} Trans. Inf. Forensics Secur.},
volume = {20},
pages = {12539--12551},
year = {2025},
url = {https://doi.org/10.1109/TIFS.2025.3625627},
doi = {10.1109/TIFS.2025.3625627},
timestamp = {Sun, 11 Jan 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tifs/WuHWSC25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/XuWSLC25,
author = {Qiaoer Xu and
Jianfeng Wang and
Shifeng Sun and
Zhipeng Liu and
Xiaofeng Chen},
title = {Practical Equi-Join Over Encrypted Database With Reduced Leakage},
journal = {{IEEE} Trans. Knowl. Data Eng.},
volume = {37},
number = {5},
pages = {2846--2860},
year = {2025},
url = {https://doi.org/10.1109/TKDE.2025.3543168},
doi = {10.1109/TKDE.2025.3543168},
timestamp = {Wed, 23 Jul 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tkde/XuWSLC25.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/XiaoL025,
author = {Fei Xiao and
Chunyang Lv and
Jianfeng Wang},
title = {Fair Server-Aided Multiparty Private Set Intersection from {OKVS}
and {OPRF}},
booktitle = {Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
Security, {ASIA} {CCS} 2025, Hanoi, Vietnam, August 25-29, 2025},
pages = {136--148},
publisher = {{ACM}},
year = {2025},
url = {https://doi.org/10.1145/3708821.3736218},
doi = {10.1145/3708821.3736218},
timestamp = {Wed, 21 Jan 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/asiaccs/XiaoL025.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/WeiSLDJWG24,
author = {Wei Wei and
Yongjie Shu and
Jianfeng Liu and
Linwei Dong and
Leilei Jia and
Jianfeng Wang and
Yan Guo},
title = {Research on a hierarchical feature-based contour extraction method
for spatial complex truss-like structures in aerial images},
journal = {Eng. Appl. Artif. Intell.},
volume = {127},
number = {Part {B}},
pages = {107313},
year = {2024},
url = {https://doi.org/10.1016/j.engappai.2023.107313},
doi = {10.1016/J.ENGAPPAI.2023.107313},
timestamp = {Mon, 07 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/eaai/WeiSLDJWG24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChengQAQWQ24,
author = {Jingxian Cheng and
Saiyu Qi and
Bochao An and
Yong Qi and
Jianfeng Wang and
Yanan Qiao},
title = {Lightweight verifiable blockchain top-k queries},
journal = {Future Gener. Comput. Syst.},
volume = {156},
pages = {105--115},
year = {2024},
url = {https://doi.org/10.1016/j.future.2024.03.011},
doi = {10.1016/J.FUTURE.2024.03.011},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/fgcs/ChengQAQWQ24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DengLYKHWP24,
author = {Weichu Deng and
Jin Li and
Hongyang Yan and
Arthur Sandor Voundi Koe and
Teng Huang and
Jianfeng Wang and
Cong Peng},
title = {Self-sovereign identity management in ciphertext policy attribute
based encryption for IoT protocols},
journal = {J. Inf. Secur. Appl.},
volume = {86},
pages = {103885},
year = {2024},
url = {https://doi.org/10.1016/j.jisa.2024.103885},
doi = {10.1016/J.JISA.2024.103885},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/istr/DengLYKHWP24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LvWSWQC24,
author = {Chunyang Lv and
Jianfeng Wang and
Shifeng Sun and
Yunling Wang and
Saiyu Qi and
Xiaofeng Chen},
title = {Towards Practical Multi-Client Order-Revealing Encryption: Improvement
and Application},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {21},
number = {3},
pages = {1111--1126},
year = {2024},
url = {https://doi.org/10.1109/TDSC.2023.3268652},
doi = {10.1109/TDSC.2023.3268652},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdsc/LvWSWQC24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/QiWWSRHKQ24,
author = {Saiyu Qi and
Wei Wei and
Jianfeng Wang and
Shifeng Sun and
Leszek Rutkowski and
Tingwen Huang and
Janusz Kacprzyk and
Yong Qi},
title = {Secure Data Deduplication With Dynamic Access Control for Mobile Cloud
Storage},
journal = {{IEEE} Trans. Mob. Comput.},
volume = {23},
number = {4},
pages = {2566--2582},
year = {2024},
url = {https://doi.org/10.1109/TMC.2023.3263901},
doi = {10.1109/TMC.2023.3263901},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tmc/QiWWSRHKQ24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/YangWQLWZQ24,
author = {Xu Yang and
Qiuhao Wang and
Saiyu Qi and
Ke Li and
Jianfeng Wang and
Wenjia Zhao and
Yong Qi},
title = {Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization
Over Outsourced Encrypted Data},
journal = {{IEEE} Trans. Netw. Sci. Eng.},
volume = {11},
number = {6},
pages = {6356--6371},
year = {2024},
url = {https://doi.org/10.1109/TNSE.2024.3445343},
doi = {10.1109/TNSE.2024.3445343},
timestamp = {Sun, 22 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tnse/YangWQLWZQ24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuWWW24,
author = {Kai Du and
Jianfeng Wang and
Jiaojiao Wu and
Yunling Wang},
editor = {Bo Luo and
Xiaojing Liao and
Jun Xu and
Engin Kirda and
David Lie},
title = {Scalable Equi-Join Queries over Encrypted Database},
booktitle = {Proceedings of the 2024 on {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2024, Salt Lake City, UT, USA, October
14-18, 2024},
pages = {4002--4016},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3658644.3690377},
doi = {10.1145/3658644.3690377},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ccs/DuWWW24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wang0W0LG24,
author = {Yunling Wang and
Shi{-}Feng Sun and
Jianfeng Wang and
Xiaofeng Chen and
Joseph K. Liu and
Dawu Gu},
editor = {Bo Luo and
Xiaojing Liao and
Jun Xu and
Engin Kirda and
David Lie},
title = {Practical Non-interactive Encrypted Conjunctive Search with Leakage
Suppression},
booktitle = {Proceedings of the 2024 on {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2024, Salt Lake City, UT, USA, October
14-18, 2024},
pages = {4658--4672},
publisher = {{ACM}},
year = {2024},
url = {https://doi.org/10.1145/3658644.3670355},
doi = {10.1145/3658644.3670355},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/ccs/Wang0W0LG24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WuDWSWLTW24,
author = {Jiaojiao Wu and
Kai Du and
Jianfeng Wang and
Shi{-}Feng Sun and
Yunling Wang and
Yong Li and
Wenyuan Tian and
Yusen Wang},
editor = {Joseph K. Liu and
Liqun Chen and
Shi{-}Feng Sun and
Xiaoning Liu},
title = {Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption
with Optimized Storage},
booktitle = {Provable and Practical Security - 18th International Conference, ProvSec
2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings,
Part {I}},
series = {Lecture Notes in Computer Science},
pages = {106--126},
publisher = {Springer},
year = {2024},
url = {https://doi.org/10.1007/978-981-96-0954-3\_6},
doi = {10.1007/978-981-96-0954-3\_6},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/provsec/WuDWSWLTW24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YongWW24,
author = {Xinwei Yong and
Jiaojiao Wu and
Jianfeng Wang},
editor = {Nikolaos Pitropakis and
Sokratis K. Katsikas and
Steven Furnell and
Konstantinos Markantonakis},
title = {Xproofs: New Aggregatable and Maintainable Matrix Commitment with
Optimal Proof Size},
booktitle = {{ICT} Systems Security and Privacy Protection - 39th {IFIP} International
Conference, {SEC} 2024, Edinburgh, UK, June 12-14, 2024, Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
pages = {465--480},
publisher = {Springer},
year = {2024},
url = {https://doi.org/10.1007/978-3-031-65175-5\_33},
doi = {10.1007/978-3-031-65175-5\_33},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sec/YongWW24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YongWW24,
author = {Xinwei Yong and
Jiaojiao Wu and
Jianfeng Wang},
title = {Xproofs: New Aggregatable and Maintainable Matrix Commitment with
Optimal Proof Size},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2024},
pages = {663},
year = {2024},
url = {https://eprint.iacr.org/2024/663},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/YongWW24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWWW24,
author = {Kai Du and
Jianfeng Wang and
Jiaojiao Wu and
Yunling Wang},
title = {Scalable Equi-Join Queries over Encrypted Database},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2024},
pages = {1391},
year = {2024},
url = {https://eprint.iacr.org/2024/1391},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/DuWWW24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YangYQWWQQ23,
author = {Xu Yang and
Jiahe Yu and
Saiyu Qi and
Qiuhao Wang and
Jianfeng Wang and
Yanan Qiao and
Yong Qi},
title = {Less payment and higher efficiency: {A} verifiable, fair and forward-secure
range query scheme using blockchain},
journal = {Comput. Networks},
volume = {237},
pages = {110108},
year = {2023},
url = {https://doi.org/10.1016/j.comnet.2023.110108},
doi = {10.1016/J.COMNET.2023.110108},
timestamp = {Sun, 22 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/cn/YangYQWWQQ23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HuTJLWWT23,
author = {Yunhan Hu and
Guohua Tian and
Anqi Jiang and
Shuqin Liu and
Jianghong Wei and
Jianfeng Wang and
Shichong Tan},
title = {A Practical Heartbeat-based Defense Scheme Against Cloning Attacks
in PoA Blockchain},
journal = {Comput. Stand. Interfaces},
volume = {83},
pages = {103656},
year = {2023},
url = {https://doi.org/10.1016/j.csi.2022.103656},
doi = {10.1016/J.CSI.2022.103656},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/csi/HuTJLWWT23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WeiCWSY23,
author = {Jianghong Wei and
Xiaofeng Chen and
Jianfeng Wang and
Willy Susilo and
Ilsun You},
title = {Towards secure asynchronous messaging with forward secrecy and mutual
authentication},
journal = {Inf. Sci.},
volume = {626},
pages = {114--132},
year = {2023},
url = {https://doi.org/10.1016/j.ins.2023.01.052},
doi = {10.1016/J.INS.2023.01.052},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/WeiCWSY23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/HaoLLWW23,
author = {Wanjun Hao and
Shuqin Liu and
Chunyang Lv and
Yunling Wang and
Jianfeng Wang},
title = {Efficient and privacy-preserving multi-party skyline queries in online
medical primary diagnosis},
journal = {J. King Saud Univ. Comput. Inf. Sci.},
volume = {35},
number = {8},
pages = {101637},
year = {2023},
url = {https://doi.org/10.1016/j.jksuci.2023.101637},
doi = {10.1016/J.JKSUCI.2023.101637},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jksucis/HaoLLWW23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/WangWW23,
author = {Xianmiao Wang and
Jiaojiao Wu and
Jianfeng Wang},
title = {One for all: Efficient verifiable dynamic multi-user searchable encryption
in the presence of corrupted users},
journal = {J. King Saud Univ. Comput. Inf. Sci.},
volume = {35},
number = {8},
pages = {101703},
year = {2023},
url = {https://doi.org/10.1016/j.jksuci.2023.101703},
doi = {10.1016/J.JKSUCI.2023.101703},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jksucis/WangWW23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/JingMWW23,
author = {Xuan Jing and
Meixia Miao and
Jianghong Wei and
Jianfeng Wang},
title = {Communication-Efficient Verifiable Data Streaming Protocol in the
Multi-User Setting},
journal = {{IEEE} Trans. Cloud Comput.},
volume = {11},
number = {4},
pages = {3341--3354},
year = {2023},
url = {https://doi.org/10.1109/TCC.2023.3285783},
doi = {10.1109/TCC.2023.3285783},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tcc/JingMWW23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QiWMZC23,
author = {Saiyu Qi and
Jianfeng Wang and
Meixia Miao and
Meng Zhang and
Xiaofeng Chen},
title = {TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich
Query Support},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {20},
number = {1},
pages = {176--192},
year = {2023},
url = {https://doi.org/10.1109/TDSC.2021.3129332},
doi = {10.1109/TDSC.2021.3129332},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdsc/QiWMZC23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WeiCWHS23,
author = {Jianghong Wei and
Xiaofeng Chen and
Jianfeng Wang and
Xinyi Huang and
Willy Susilo},
title = {Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage
Systems},
journal = {{IEEE} Trans. Parallel Distributed Syst.},
volume = {34},
number = {2},
pages = {552--566},
year = {2023},
url = {https://doi.org/10.1109/TPDS.2022.3225274},
doi = {10.1109/TPDS.2022.3225274},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tpds/WeiCWHS23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengQQWJW23,
author = {Jingxian Cheng and
Saiyu Qi and
Yong Qi and
Jianfeng Wang and
Qin Jiang and
Di Wu},
editor = {Jia Hu and
Geyong Min and
Guojun Wang and
Nektarios Georgalas},
title = {EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme
for Blockchain Databases},
booktitle = {22nd {IEEE} International Conference on Trust, Security and Privacy
in Computing and Communications, TrustCom 2024, Exeter, UK, November
1-3, 2023},
pages = {1306--1311},
publisher = {{IEEE}},
year = {2023},
url = {https://doi.org/10.1109/TrustCom60117.2023.00178},
doi = {10.1109/TRUSTCOM60117.2023.00178},
timestamp = {Sat, 06 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/trustcom/ChengQQWJW23.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/GanLWYSHZW22,
author = {Qingqing Gan and
Joseph K. Liu and
Xiaoming Wang and
Xingliang Yuan and
Shifeng Sun and
Daxin Huang and
Cong Zuo and
Jianfeng Wang},
title = {Verifiable searchable symmetric encryption for conjunctive keyword
queries in cloud storage},
journal = {Frontiers Comput. Sci.},
volume = {16},
number = {6},
pages = {166820},
year = {2022},
url = {https://doi.org/10.1007/s11704-021-0601-8},
doi = {10.1007/S11704-021-0601-8},
timestamp = {Wed, 25 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/fcsc/GanLWYSHZW22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/FengSW22,
author = {Peirou Feng and
Qitian Sheng and
Jianfeng Wang},
title = {Efficient and non-interactive ciphertext range query based on differential
privacy},
journal = {Int. J. Comput. Sci. Eng.},
volume = {25},
number = {5},
pages = {490--503},
year = {2022},
url = {https://doi.org/10.1504/IJCSE.2022.10051196},
doi = {10.1504/IJCSE.2022.10051196},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijcse/FengSW22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Wei0WH022,
author = {Jianghong Wei and
Xiaofeng Chen and
Jianfeng Wang and
Xuexian Hu and
Jianfeng Ma},
title = {Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward
Secrecy},
journal = {{IEEE} Trans. Dependable Secur. Comput.},
volume = {19},
number = {4},
pages = {2318--2332},
year = {2022},
url = {https://doi.org/10.1109/TDSC.2021.3055495},
doi = {10.1109/TDSC.2021.3055495},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tdsc/Wei0WH022.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangCQQWW22,
author = {Qin Jiang and
Ee{-}Chien Chang and
Yong Qi and
Saiyu Qi and
Pengfei Wu and
Jianfeng Wang},
title = {Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed
Index Using Intel {SGX}},
journal = {{IEEE} Trans. Inf. Forensics Secur.},
volume = {17},
pages = {1053--1068},
year = {2022},
url = {https://doi.org/10.1109/TIFS.2022.3144877},
doi = {10.1109/TIFS.2022.3144877},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tifs/JiangCQQWW22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YuanCLJWD22,
author = {Haoran Yuan and
Xiaofeng Chen and
Jin Li and
Tao Jiang and
Jianfeng Wang and
Robert H. Deng},
title = {Secure Cloud Data Deduplication with Efficient Re-Encryption},
journal = {{IEEE} Trans. Serv. Comput.},
volume = {15},
number = {1},
pages = {442--456},
year = {2022},
url = {https://doi.org/10.1109/TSC.2019.2948007},
doi = {10.1109/TSC.2019.2948007},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tsc/YuanCLJWD22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangSWLC22,
author = {Yunling Wang and
Shifeng Sun and
Jianfeng Wang and
Joseph K. Liu and
Xiaofeng Chen},
title = {Achieving Searchable Encryption Scheme With Search Pattern Hidden},
journal = {{IEEE} Trans. Serv. Comput.},
volume = {15},
number = {2},
pages = {1012--1025},
year = {2022},
url = {https://doi.org/10.1109/TSC.2020.2973139},
doi = {10.1109/TSC.2020.2973139},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/tsc/WangSWLC22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GongWWT22,
author = {Jianpeng Gong and
Jiaojiao Wu and
Jianfeng Wang and
Shichong Tan},
editor = {Jianying Zhou and
Sridhar Adepu and
Cristina Alcaraz and
Lejla Batina and
Emiliano Casalicchio and
Sudipta Chattopadhyay and
Chenglu Jin and
Jingqiang Lin and
Eleonora Losiouk and
Suryadipta Majumdar and
Weizhi Meng and
Stjepan Picek and
Jun Shao and
Chunhua Su and
Cong Wang and
Yury Zhauniarovich and
Saman A. Zonouz},
title = {Efficient Verifiable Boolean Range Query for Light Clients on Blockchain
Database},
booktitle = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {15--35},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-16815-4\_2},
doi = {10.1007/978-3-031-16815-4\_2},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acns/GongWWT22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangSLQ022,
author = {Jianfeng Wang and
Shifeng Sun and
Tianci Li and
Saiyu Qi and
Xiaofeng Chen},
editor = {Heng Yin and
Angelos Stavrou and
Cas Cremers and
Elaine Shi},
title = {Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead
and Beyond},
booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
7-11, 2022},
pages = {2825--2839},
publisher = {{ACM}},
year = {2022},
url = {https://doi.org/10.1145/3548606.3559345},
doi = {10.1145/3548606.3559345},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ccs/WangSLQ022.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ShengWW22,
author = {Qitian Sheng and
Jiaojiao Wu and
Jianfeng Wang},
editor = {Xiaofeng Chen and
Jian Shen and
Willy Susilo},
title = {Publicly Verifiable Conjunctive Keyword Search with Balanced Verification
Overhead},
booktitle = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
2022, Xi'an, China, October 16-18, 2022, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {3--16},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-18067-5\_1},
doi = {10.1007/978-3-031-18067-5\_1},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/css/ShengWW22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WuWYHC22,
author = {Jiaojiao Wu and
Jianfeng Wang and
Xinwei Yong and
Xinyi Huang and
Xiaofeng Chen},
editor = {Vijayalakshmi Atluri and
Roberto Di Pietro and
Christian Damsgaard Jensen and
Weizhi Meng},
title = {New Unbounded Verifiable Data Streaming for Batch Query with Almost
Optimal Overhead},
booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
Proceedings, Part {I}},
series = {Lecture Notes in Computer Science},
pages = {346--366},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-17140-6\_17},
doi = {10.1007/978-3-031-17140-6\_17},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/WuWYHC22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiWW22,
author = {Tianci Li and
Jiaojiao Wu and
Jianfeng Wang},
editor = {Weizhi Meng and
Simone Fischer{-}H{\"{u}}bner and
Christian Damsgaard Jensen},
title = {Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive
Queries},
booktitle = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11
International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15,
2022, Proceedings},
series = {{IFIP} Advances in Information and Communication Technology},
pages = {467--485},
publisher = {Springer},
year = {2022},
url = {https://doi.org/10.1007/978-3-031-06975-8\_27},
doi = {10.1007/978-3-031-06975-8\_27},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sec/LiWW22.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWY0022,
author = {Jiaojiao Wu and
Jianfeng Wang and
Xinwei Yong and
Xinyi Huang and
Xiaofeng Chen},
title = {New Unbounded Verifiable Data Streaming for Batch Query with Almost
Optimal Overhead},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2022},
pages = {1028},
year = {2022},
url = {https://eprint.iacr.org/2022/1028},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/WuWY0022.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/MiaoWWH21,
author = {Meixia Miao and
Yunling Wang and
Jianfeng Wang and
Xinyi Huang},
title = {Verifiable database supporting keyword searches with forward security},
journal = {Comput. Stand. Interfaces},
volume = {77},
pages = {103491},
year = {2021},
url = {https://doi.org/10.1016/j.csi.2020.103491},
doi = {10.1016/J.CSI.2020.103491},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/csi/MiaoWWH21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WangMWZ21,
author = {Yunling Wang and
Meixia Miao and
Jianfeng Wang and
Xuefeng Zhang},
title = {Secure deduplication with efficient user revocation in cloud storage},
journal = {Comput. Stand. Interfaces},
volume = {78},
pages = {103523},
year = {2021},
url = {https://doi.org/10.1016/j.csi.2021.103523},
doi = {10.1016/J.CSI.2021.103523},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/csi/WangMWZ21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChowSWBBKL21,
author = {Yang{-}Wai Chow and
Willy Susilo and
Jianfeng Wang and
Richard Buckland and
Joonsang Baek and
Jongkil Kim and
Nan Li},
title = {Utilizing {QR} codes to verify the visual fidelity of image datasets
for machine learning},
journal = {J. Netw. Comput. Appl.},
volume = {173},
pages = {102834},
year = {2021},
url = {https://doi.org/10.1016/j.jnca.2020.102834},
doi = {10.1016/J.JNCA.2020.102834},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jnca/ChowSWBBKL21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LvWSWQC21,
author = {Chunyang Lv and
Jianfeng Wang and
Shifeng Sun and
Yunling Wang and
Saiyu Qi and
Xiaofeng Chen},
editor = {Elisa Bertino and
Haya Schulmann and
Michael Waidner},
title = {Efficient Multi-client Order-Revealing Encryption and Its Applications},
booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
pages = {44--63},
publisher = {Springer},
year = {2021},
url = {https://doi.org/10.1007/978-3-030-88428-4\_3},
doi = {10.1007/978-3-030-88428-4\_3},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/LvWSWQC21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuangCW20,
author = {Hui Huang and
Xiaofeng Chen and
Jianfeng Wang},
title = {Blockchain-based multiple groups data sharing with anonymity and traceability},
journal = {Sci. China Inf. Sci.},
volume = {63},
number = {3},
year = {2020},
url = {https://doi.org/10.1007/s11432-018-9781-0},
doi = {10.1007/S11432-018-9781-0},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/chinaf/HuangCW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/XieTYJW20,
author = {Ying Xie and
Guohua Tian and
Haoran Yuan and
Chong Jiang and
Jianfeng Wang},
title = {Client-side ciphertext deduplication scheme with flexible access control},
journal = {Int. J. Comput. Sci. Eng.},
volume = {23},
number = {2},
pages = {145--157},
year = {2020},
url = {https://doi.org/10.1504/IJCSE.2020.110537},
doi = {10.1504/IJCSE.2020.110537},
timestamp = {Sat, 14 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijcse/XieTYJW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/WangWW20,
author = {Yifan Wang and
Yunling Wang and
Jianfeng Wang},
title = {Efficient self-adaptive access control for personal medical data in
emergency setting},
journal = {Int. J. Comput. Sci. Eng.},
volume = {23},
number = {4},
pages = {341--351},
year = {2020},
url = {https://doi.org/10.1504/IJCSE.2020.113180},
doi = {10.1504/IJCSE.2020.113180},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijcse/WangWW20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YuanCWYYS20,
author = {Haoran Yuan and
Xiaofeng Chen and
Jianfeng Wang and
Jiaming Yuan and
Hongyang Yan and
Willy Susilo},
title = {Blockchain-based public auditing and secure deduplication with fair
arbitration},
journal = {Inf. Sci.},
volume = {541},
pages = {409--425},
year = {2020},
url = {https://doi.org/10.1016/j.ins.2020.07.005},
doi = {10.1016/J.INS.2020.07.005},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/YuanCWYYS20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MaJZWLLC20,
author = {Xu Ma and
Cunmei Ji and
Xiaoyu Zhang and
Jianfeng Wang and
Jin Li and
Kuan{-}Ching Li and
Xiaofeng Chen},
title = {Secure multiparty learning from the aggregation of locally trained
models},
journal = {J. Netw. Comput. Appl.},
volume = {167},
pages = {102754},
year = {2020},
url = {https://doi.org/10.1016/j.jnca.2020.102754},
doi = {10.1016/J.JNCA.2020.102754},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jnca/MaJZWLLC20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaXWTL19,
author = {Hua Ma and
Ying Xie and
Jianfeng Wang and
Guohua Tian and
Zhenhua Liu},
title = {Revocable Attribute-Based Encryption Scheme With Efficient Deduplication
for Ehealth Systems},
journal = {{IEEE} Access},
volume = {7},
pages = {89205--89217},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2926627},
doi = {10.1109/ACCESS.2019.2926627},
timestamp = {Fri, 13 Feb 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/access/MaXWTL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SuWWM19,
author = {Yaping Su and
Jianfeng Wang and
Yunling Wang and
Meixia Miao},
title = {Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing},
journal = {{IEEE} Access},
volume = {7},
pages = {141352--141362},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2943971},
doi = {10.1109/ACCESS.2019.2943971},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/SuWWM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangWSMC19,
author = {Yunling Wang and
Jianfeng Wang and
Shifeng Sun and
Meixia Miao and
Xiaofeng Chen},
title = {Toward Forward Secure {SSE} Supporting Conjunctive Keyword Search},
journal = {{IEEE} Access},
volume = {7},
pages = {142762--142772},
year = {2019},
url = {https://doi.org/10.1109/ACCESS.2019.2944246},
doi = {10.1109/ACCESS.2019.2944246},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/access/WangWSMC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/DongWLM19,
author = {Enting Dong and
Jianfeng Wang and
Zhenhua Liu and
Hua Ma},
title = {Large universe multi-authority attribute-based {PHR} sharing with
user revocation},
journal = {Int. J. Comput. Sci. Eng.},
volume = {19},
number = {3},
pages = {376--386},
year = {2019},
url = {https://doi.org/10.1504/IJCSE.2019.101347},
doi = {10.1504/IJCSE.2019.101347},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijcse/DongWLM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KluczniakWCK19,
author = {Kamil Kluczniak and
Jianfeng Wang and
Xiaofeng Chen and
Miroslaw Kutylowski},
title = {Multi-device anonymous authentication},
journal = {Int. J. Inf. Sec.},
volume = {18},
number = {2},
pages = {181--197},
year = {2019},
url = {https://doi.org/10.1007/s10207-018-0406-4},
doi = {10.1007/S10207-018-0406-4},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ijisec/KluczniakWCK19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MiaoWWM19,
author = {Meixia Miao and
Jianfeng Wang and
Sheng Wen and
Jianfeng Ma},
title = {Publicly verifiable database scheme with efficient keyword search},
journal = {Inf. Sci.},
volume = {475},
pages = {18--28},
year = {2019},
url = {https://doi.org/10.1016/j.ins.2018.09.067},
doi = {10.1016/J.INS.2018.09.067},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/isci/MiaoWWM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/WangWSLSBYC19,
author = {Yunling Wang and
Jianfeng Wang and
Shifeng Sun and
Joseph K. Liu and
Willy Susilo and
Joonsang Baek and
Ilsun You and
Xiaofeng Chen},
title = {Towards Multi-user Searchable Encryption Supporting Boolean Query
and Fast Decryption},
journal = {J. Univers. Comput. Sci.},
volume = {25},
number = {3},
pages = {222--244},
year = {2019},
url = {http://www.jucs.org/jucs\_25\_3/towards\_multi\_user\_searchable},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jucs/WangWSLSBYC19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangMSW19,
author = {Yuan Wang and
Meixia Miao and
Jian Shen and
Jianfeng Wang},
title = {Towards efficient privacy-preserving encrypted image search in cloud
computing},
journal = {Soft Comput.},
volume = {23},
number = {6},
pages = {2101--2112},
year = {2019},
url = {https://doi.org/10.1007/s00500-017-2927-6},
doi = {10.1007/S00500-017-2927-6},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/soco/WangMSW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeiCWHM19,
author = {Jianghong Wei and
Xiaofeng Chen and
Jianfeng Wang and
Xuexian Hu and
Jianfeng Ma},
editor = {Kazue Sako and
Steve A. Schneider and
Peter Y. A. Ryan},
title = {Forward-Secure Puncturable Identity-Based Encryption for Securing
Cloud Emails},
booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
pages = {134--150},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-29962-0\_7},
doi = {10.1007/978-3-030-29962-0\_7},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/WeiCWHM19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangWWS019,
author = {Zhongjun Zhang and
Jianfeng Wang and
Yunling Wang and
Yaping Su and
Xiaofeng Chen},
editor = {Kazue Sako and
Steve A. Schneider and
Peter Y. A. Ryan},
title = {Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption},
booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
pages = {304--321},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-29962-0\_15},
doi = {10.1007/978-3-030-29962-0\_15},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/ZhangWWS019.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/MaJZWLL19,
author = {Xu Ma and
Cunmei Ji and
Xiaoyu Zhang and
Jianfeng Wang and
Jin Li and
Kuan{-}Ching Li},
editor = {Xiaofeng Chen and
Xinyi Huang and
Jun Zhang},
title = {Secure Multiparty Learning from Aggregation of Locally Trained Models},
booktitle = {Machine Learning for Cyber Security - Second International Conference,
{ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {173--182},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-30619-9\_13},
doi = {10.1007/978-3-030-30619-9\_13},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ml4cs/MaJZWLL19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ChowSWBBK019,
author = {Yang{-}Wai Chow and
Willy Susilo and
Jianfeng Wang and
Richard Buckland and
Joonsang Baek and
Jongkil Kim and
Nan Li},
editor = {Xiaofeng Chen and
Xinyi Huang and
Jun Zhang},
title = {Protecting the Visual Fidelity of Machine Learning Datasets Using
{QR} Codes},
booktitle = {Machine Learning for Cyber Security - Second International Conference,
{ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {320--335},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-30619-9\_23},
doi = {10.1007/978-3-030-30619-9\_23},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ml4cs/ChowSWBBK019.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/GanZWSW19,
author = {Qingqing Gan and
Cong Zuo and
Jianfeng Wang and
Shifeng Sun and
Xiaoming Wang},
editor = {Joseph K. Liu and
Xinyi Huang},
title = {Dynamic Searchable Symmetric Encryption with Forward and Backward
Privacy: {A} Survey},
booktitle = {Network and System Security - 13th International Conference, {NSS}
2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {37--52},
publisher = {Springer},
year = {2019},
url = {https://doi.org/10.1007/978-3-030-36938-5\_3},
doi = {10.1007/978-3-030-36938-5\_3},
timestamp = {Wed, 25 Mar 2026 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/nss/GanZWSW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/KluczniakHW18,
author = {Kamil Kluczniak and
Lucjan Hanzlik and
Jianfeng Wang},
title = {Efficient {VLR} group signatures for smart cards},
journal = {Int. J. Embed. Syst.},
volume = {10},
number = {3},
pages = {203--216},
year = {2018},
url = {https://doi.org/10.1504/IJES.2018.10012874},
doi = {10.1504/IJES.2018.10012874},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijes/KluczniakHW18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/WangYW18,
author = {Zhiying Wang and
Jun Ye and
Jianfeng Wang},
title = {An efficient traceable data sharing scheme in cloud computing for
mobile devices},
journal = {Int. J. High Perform. Comput. Netw.},
volume = {12},
number = {2},
pages = {156--165},
year = {2018},
url = {https://doi.org/10.1504/IJHPCN.2016.10009051},
doi = {10.1504/IJHPCN.2016.10009051},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijhpcn/WangYW18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/GuanWWF18,
author = {Wenhao Guan and
Yunling Wang and
Jianfeng Wang and
Xiaotong Fu},
title = {Verifiable memory leakage-resilient dynamic searchable encryption},
journal = {J. High Speed Networks},
volume = {24},
number = {3},
pages = {201--217},
year = {2018},
url = {https://doi.org/10.3233/JHS-180591},
doi = {10.3233/JHS-180591},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jhsn/GuanWWF18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/WangZTW18,
author = {Jingjing Wang and
Xiaoyu Zhang and
Xiaoling Tao and
Jianfeng Wang},
title = {{EPSLP:} Efficient and privacy-preserving single-layer perceptron
learning in cloud computing},
journal = {J. High Speed Networks},
volume = {24},
number = {3},
pages = {259--279},
year = {2018},
url = {https://doi.org/10.3233/JHS-180594},
doi = {10.3233/JHS-180594},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jhsn/WangZTW18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangCWZL18,
author = {Xiaoyu Zhang and
Xiaofeng Chen and
Jianfeng Wang and
Zhihui Zhan and
Jin Li},
title = {Verifiable privacy-preserving single-layer perceptron training scheme
in cloud computing},
journal = {Soft Comput.},
volume = {22},
number = {23},
pages = {7719--7732},
year = {2018},
url = {https://doi.org/10.1007/s00500-018-3233-7},
doi = {10.1007/S00500-018-3233-7},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/soco/ZhangCWZL18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Wang0SLAZ18,
author = {Jianfeng Wang and
Xiaofeng Chen and
Shifeng Sun and
Joseph K. Liu and
Man Ho Au and
Zhi{-}Hui Zhan},
editor = {Javier L{\'{o}}pez and
Jianying Zhou and
Miguel Soriano},
title = {Towards Efficient Verifiable Conjunctive Keyword Search for Large
Encrypted Database},
booktitle = {Computer Security - 23rd European Symposium on Research in Computer
Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
Part {II}},
series = {Lecture Notes in Computer Science},
pages = {83--100},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-98989-1\_5},
doi = {10.1007/978-3-319-98989-1\_5},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/esorics/Wang0SLAZ18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/DulinZTWT18,
author = {Dulin and
Zhiwei Zhang and
Shichong Tan and
Jianfeng Wang and
Xiaoling Tao},
editor = {Jaideep Vaidya and
Jin Li},
title = {An Associated Deletion Scheme for Multi-copy in Cloud Storage},
booktitle = {Algorithms and Architectures for Parallel Processing - 18th International
Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
Proceedings, Part {IV}},
series = {Lecture Notes in Computer Science},
pages = {511--526},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-05063-4\_38},
doi = {10.1007/978-3-030-05063-4\_38},
timestamp = {Fri, 26 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ica3pp/DulinZTWT18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangWTC18,
author = {Changsong Yang and
Jianfeng Wang and
Xiaoling Tao and
Xiaofeng Chen},
editor = {David Naccache and
Shouhuai Xu and
Sihan Qing and
Pierangela Samarati and
Gregory Blanc and
Rongxing Lu and
Zonghua Zhang and
Ahmed Meddahi},
title = {Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage},
booktitle = {Information and Communications Security - 20th International Conference,
{ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {445--458},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-01950-1\_26},
doi = {10.1007/978-3-030-01950-1\_26},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icics/YangWTC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GuoWZC18,
author = {Jingjing Guo and
Jianfeng Wang and
Zhiwei Zhang and
Xiaofeng Chen},
editor = {Chunhua Su and
Hiroaki Kikuchi},
title = {An Almost Non-interactive Order Preserving Encryption Scheme},
booktitle = {Information Security Practice and Experience - 14th International
Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {87--100},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-99807-7\_6},
doi = {10.1007/978-3-319-99807-7\_6},
timestamp = {Fri, 26 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ispec/GuoWZC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MengWWLYLZC18,
author = {Weizhi Meng and
Jianfeng Wang and
Xianmin Wang and
Joseph K. Liu and
Zuoxia Yu and
Jin Li and
Yongjun Zhao and
Sherman S. M. Chow},
editor = {Man Ho Au and
Siu{-}Ming Yiu and
Jin Li and
Xiapu Luo and
Cong Wang and
Aniello Castiglione and
Kamil Kluczniak},
title = {Position Paper on Blockchain Technology: Smart Contract and Applications},
booktitle = {Network and System Security - 12th International Conference, {NSS}
2018, Hong Kong, China, August 27-29, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {474--483},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-02744-5\_35},
doi = {10.1007/978-3-030-02744-5\_35},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/nss/MengWWLYLZC18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangCLZS17,
author = {Jianfeng Wang and
Xiaofeng Chen and
Jin Li and
Jiaolian Zhao and
Jian Shen},
title = {Towards achieving flexible and verifiable search for outsourced database
in cloud computing},
journal = {Future Gener. Comput. Syst.},
volume = {67},
pages = {266--275},
year = {2017},
url = {https://doi.org/10.1016/j.future.2016.05.002},
doi = {10.1016/J.FUTURE.2016.05.002},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/fgcs/WangCLZS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/WangCLKK17,
author = {Jianfeng Wang and
Xiaofeng Chen and
Jin Li and
Kamil Kluczniak and
Miroslaw Kutylowski},
title = {TrDup: enhancing secure data deduplication with user traceability
in cloud computing},
journal = {Int. J. Web Grid Serv.},
volume = {13},
number = {3},
pages = {270--289},
year = {2017},
url = {https://doi.org/10.1504/IJWGS.2017.10006054},
doi = {10.1504/IJWGS.2017.10006054},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ijwgs/WangCLKK17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/MiaoWMS17,
author = {Meixia Miao and
Jianfeng Wang and
Jianfeng Ma and
Willy Susilo},
title = {Publicly verifiable databases with efficient insertion/deletion operations},
journal = {J. Comput. Syst. Sci.},
volume = {86},
pages = {49--58},
year = {2017},
url = {https://doi.org/10.1016/j.jcss.2016.07.005},
doi = {10.1016/J.JCSS.2016.07.005},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jcss/MiaoWMS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/LiuWTS17,
author = {Jinfeng Liu and
Jianfeng Wang and
Xiaoling Tao and
Jian Shen},
title = {Secure similarity-based cloud data deduplication in Ubiquitous city},
journal = {Pervasive Mob. Comput.},
volume = {41},
pages = {231--242},
year = {2017},
url = {https://doi.org/10.1016/j.pmcj.2017.03.010},
doi = {10.1016/J.PMCJ.2017.03.010},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/percom/LiuWTS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZouWYSC17,
author = {Qin Zou and
Jianfeng Wang and
Jun Ye and
Jian Shen and
Xiaofeng Chen},
title = {Efficient and secure encrypted image search in mobile cloud computing},
journal = {Soft Comput.},
volume = {21},
number = {11},
pages = {2959--2969},
year = {2017},
url = {https://doi.org/10.1007/s00500-016-2153-7},
doi = {10.1007/S00500-016-2153-7},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/soco/ZouWYSC17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/YeWZSL17,
author = {Jun Ye and
Jianfeng Wang and
Jiaolian Zhao and
Jian Shen and
Kuan{-}Ching Li},
title = {Fine-grained searchable encryption in multi-user setting},
journal = {Soft Comput.},
volume = {21},
number = {20},
pages = {6201--6212},
year = {2017},
url = {https://doi.org/10.1007/s00500-016-2179-x},
doi = {10.1007/S00500-016-2179-X},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/soco/YeWZSL17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangWSLS017,
author = {Yunling Wang and
Jianfeng Wang and
Shifeng Sun and
Joseph K. Liu and
Willy Susilo and
Xiaofeng Chen},
editor = {Tatsuaki Okamoto and
Yong Yu and
Man Ho Au and
Yannan Li},
title = {Towards Multi-user Searchable Encryption Supporting Boolean Query
and Fast Decryption},
booktitle = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
China, October 23-25, 2017, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {24--38},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-68637-0\_2},
doi = {10.1007/978-3-319-68637-0\_2},
timestamp = {Tue, 10 Feb 2026 15:42:19 +0100},
biburl = {https://dblp.org/rec/conf/provsec/WangWSLS017.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZgW17,
author = {Jingjing Wang and
Xiaoyu Zhang and
Jingjing Guo and
Jianfeng Wang},
title = {Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron
Learning for e-Healthcare"},
journal = {{IACR} Cryptol. ePrint Arch.},
volume = {2017},
pages = {405},
year = {2017},
url = {http://eprint.iacr.org/2017/405},
timestamp = {Mon, 07 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/WangZgW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dase/Wang016,
author = {Jianfeng Wang and
Xiaofeng Chen},
title = {Efficient and Secure Storage for Outsourced Data: {A} Survey},
journal = {Data Sci. Eng.},
volume = {1},
number = {3},
pages = {178--188},
year = {2016},
url = {https://doi.org/10.1007/s41019-016-0018-9},
doi = {10.1007/S41019-016-0018-9},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/dase/Wang016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcin/WangWC16,
author = {Yunling Wang and
Jianfeng Wang and
Xiaofeng Chen},
title = {Secure searchable encryption: a survey},
journal = {J. Commun. Inf. Networks},
volume = {1},
number = {4},
pages = {52--65},
year = {2016},
url = {https://doi.org/10.1007/BF03391580},
doi = {10.1007/BF03391580},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jcin/WangWC16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangMG016,
author = {Jianfeng Wang and
Meixia Miao and
Yaqian Gao and
Xiaofeng Chen},
title = {Enabling efficient approximate nearest neighbor search for outsourced
database in cloud computing},
journal = {Soft Comput.},
volume = {20},
number = {11},
pages = {4487--4495},
year = {2016},
url = {https://doi.org/10.1007/s00500-015-1758-6},
doi = {10.1007/S00500-015-1758-6},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/soco/WangMG016.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ZhangWW0M16,
author = {Zhiwei Zhang and
Yunling Wang and
Jianfeng Wang and
Xiaofeng Chen and
Jianfeng Ma},
editor = {Leonard Barolli and
Fatos Xhafa and
Kangbin Yim},
title = {Location-Sensitive Data Sharing in Mobile Cloud Computing},
booktitle = {Advances on Broad-Band Wireless Computing, Communication and Applications,
Proceedings of the 11th International Conference On Broad-Band Wireless
Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
University, Asan, Korea, November 5-7, 2016},
series = {Lecture Notes on Data Engineering and Communications Technologies},
pages = {799--805},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-49106-6\_81},
doi = {10.1007/978-3-319-49106-6\_81},
timestamp = {Fri, 26 Sep 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/ZhangWW0M16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KutylowskiCHKCW16,
author = {Miroslaw Kutylowski and
Jacek Cichon and
Lucjan Hanzlik and
Kamil Kluczniak and
Xiaofeng Chen and
Jianfeng Wang},
editor = {Raphael C.{-}W. Phan and
Moti Yung},
title = {Protecting Electronic Signatures in Case of Key Leakage},
booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
Cryptology - Second International Conference, Mycrypt 2016, Kuala
Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
pages = {252--274},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-61273-7\_13},
doi = {10.1007/978-3-319-61273-7\_13},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/mycrypt/KutylowskiCHKCW16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KluczniakW0K16,
author = {Kamil Kluczniak and
Jianfeng Wang and
Xiaofeng Chen and
Miroslaw Kutylowski},
editor = {Jiageng Chen and
Vincenzo Piuri and
Chunhua Su and
Moti Yung},
title = {Multi-device Anonymous Authentication},
booktitle = {Network and System Security - 10th International Conference, {NSS}
2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {21--36},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-46298-1\_2},
doi = {10.1007/978-3-319-46298-1\_2},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/nss/KluczniakW0K16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MiaoWLC15,
author = {Meixia Miao and
Jianfeng Wang and
Hui Li and
Xiaofeng Chen},
title = {Secure multi-server-aided data deduplication in cloud computing},
journal = {Pervasive Mob. Comput.},
volume = {24},
pages = {129--137},
year = {2015},
url = {https://doi.org/10.1016/j.pmcj.2015.03.002},
doi = {10.1016/J.PMCJ.2015.03.002},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/percom/MiaoWLC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/WangCHYX15,
author = {Jianfeng Wang and
Xiaofeng Chen and
Xinyi Huang and
Ilsun You and
Yang Xiang},
title = {Verifiable Auditing for Outsourced Database in Cloud Computing},
journal = {{IEEE} Trans. Computers},
volume = {64},
number = {11},
pages = {3293--3303},
year = {2015},
url = {https://doi.org/10.1109/TC.2015.2401036},
doi = {10.1109/TC.2015.2401036},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tc/WangCHYX15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/Wang00KK15,
author = {Jianfeng Wang and
Xiaofeng Chen and
Jin Li and
Kamil Kluczniak and
Miroslaw Kutylowski},
editor = {Leonard Barolli and
Fatos Xhafa and
Marek R. Ogiela and
Lidia Ogiela},
title = {A New Secure Data Deduplication Approach Supporting User Traceability},
booktitle = {10th International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
4-6, 2015},
pages = {120--124},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/BWCCA.2015.49},
doi = {10.1109/BWCCA.2015.49},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/Wang00KK15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/WangCL15,
author = {Jianfeng Wang and
Xiaofeng Chen and
Jin Li},
editor = {Leonard Barolli and
Fatos Xhafa and
Marek R. Ogiela and
Lidia Ogiela},
title = {Verifiable Search for Dynamic Outsourced Database in Cloud Computing},
booktitle = {10th International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
4-6, 2015},
pages = {568--571},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/BWCCA.2015.48},
doi = {10.1109/BWCCA.2015.48},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/WangCL15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ZouWC15,
author = {Qin Zou and
Jianfeng Wang and
Xiaofeng Chen},
editor = {Leonard Barolli and
Fatos Xhafa and
Marek R. Ogiela and
Lidia Ogiela},
title = {Secure Encrypted Image Search in Mobile Cloud Computing},
booktitle = {10th International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
4-6, 2015},
pages = {572--575},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/BWCCA.2015.41},
doi = {10.1109/BWCCA.2015.41},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/ZouWC15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/MiaoWM15,
author = {Meixia Miao and
Jianfeng Wang and
Jianfeng Ma},
editor = {Leonard Barolli and
Makoto Takizawa and
Hui{-}Huang Hsu and
Tomoya Enokido and
Fatos Xhafa},
title = {New Publicly Verifiable Databases Supporting Insertion Operation},
booktitle = {18th International Conference on Network-Based Information Systems,
NBis 2015, Taipei, Taiwan, September 2-4, 2015},
pages = {640--642},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/NBiS.2015.95},
doi = {10.1109/NBIS.2015.95},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/nbis/MiaoWM15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/YeW15,
author = {Jun Ye and
Jianfeng Wang},
editor = {Leonard Barolli and
Makoto Takizawa and
Hui{-}Huang Hsu and
Tomoya Enokido and
Fatos Xhafa},
title = {Secure Outsourcing of Modular Exponentiation with Single Untrusted
Server},
booktitle = {18th International Conference on Network-Based Information Systems,
NBis 2015, Taipei, Taiwan, September 2-4, 2015},
pages = {643--645},
publisher = {{IEEE} Computer Society},
year = {2015},
url = {https://doi.org/10.1109/NBiS.2015.96},
doi = {10.1109/NBIS.2015.96},
timestamp = {Mon, 05 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/nbis/YeW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LiWZM14,
author = {Keying Li and
Jianfeng Wang and
Yinghui Zhang and
Hua Ma},
title = {Key Policy Attribute-based Proxy Re-encryption and {RCCA} Secure Scheme},
journal = {J. Internet Serv. Inf. Secur.},
volume = {4},
number = {2},
pages = {70--82},
year = {2014},
url = {https://doi.org/10.22667/JISIS.2014.05.31.070},
doi = {10.22667/JISIS.2014.05.31.070},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jisis/LiWZM14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/XhafaWCLLK14,
author = {Fatos Xhafa and
Jianfeng Wang and
Xiaofeng Chen and
Joseph K. Liu and
Jin Li and
Paul Krause},
title = {An efficient {PHR} service system supporting fuzzy keyword search
and fine-grained access control},
journal = {Soft Comput.},
volume = {18},
number = {9},
pages = {1795--1802},
year = {2014},
url = {https://doi.org/10.1007/s00500-013-1202-8},
doi = {10.1007/S00500-013-1202-8},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/soco/XhafaWCLLK14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ZhangCW14,
author = {Shaojun Zhang and
Peng Chen and
Jianfeng Wang},
editor = {Leonard Barolli and
Fatos Xhafa and
Xiaofeng Chen and
Makoto Ikeda},
title = {Online/Offline Attribute Based Signature},
booktitle = {Ninth International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2014, Guangdong, China, November
8-10, 2014},
pages = {566--571},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/BWCCA.2014.116},
doi = {10.1109/BWCCA.2014.116},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/ZhangCW14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/NieMW014,
author = {Haixin Nie and
Hua Ma and
Jianfeng Wang and
Xiaofeng Chen},
editor = {Leonard Barolli and
Fatos Xhafa and
Xiaofeng Chen and
Makoto Ikeda},
title = {Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations
in the Case of No Solution},
booktitle = {Ninth International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2014, Guangdong, China, November
8-10, 2014},
pages = {572--577},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/BWCCA.2014.117},
doi = {10.1109/BWCCA.2014.117},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/NieMW014.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/GaoMW014,
author = {Yaqian Gao and
Meixia Miao and
Jianfeng Wang and
Xiaofeng Chen},
editor = {Leonard Barolli and
Fatos Xhafa and
Xiaofeng Chen and
Makoto Ikeda},
title = {Secure Approximate Nearest Neighbor Search over Encrypted Data},
booktitle = {Ninth International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2014, Guangdong, China, November
8-10, 2014},
pages = {578--583},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/BWCCA.2014.118},
doi = {10.1109/BWCCA.2014.118},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/GaoMW014.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/LiuWMN14,
author = {Pengliang Liu and
Jianfeng Wang and
Hua Ma and
Haixin Nie},
editor = {Leonard Barolli and
Fatos Xhafa and
Xiaofeng Chen and
Makoto Ikeda},
title = {Efficient Verifiable Public Key Encryption with Keyword Search Based
on {KP-ABE}},
booktitle = {Ninth International Conference on Broadband and Wireless Computing,
Communication and Applications, {BWCCA} 2014, Guangdong, China, November
8-10, 2014},
pages = {584--589},
publisher = {{IEEE} Computer Society},
year = {2014},
url = {https://doi.org/10.1109/BWCCA.2014.119},
doi = {10.1109/BWCCA.2014.119},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/bwcca/LiuWMN14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ZhangZWC14,
author = {Zhenyu Zhang and
Wujun Zhang and
Jianfeng Wang and
Xiaofeng Chen},
editor = {Linawati and
Made Sudiana Mahendra and
Erich J. Neuhold and
A Min Tjoa and
Ilsun You},
title = {An Effective Cloud-Based Active Defense System against Malicious Codes},
booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International
Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
Proceedings},
series = {Lecture Notes in Computer Science},
pages = {690--695},
publisher = {Springer},
year = {2014},
url = {https://doi.org/10.1007/978-3-642-55032-4\_71},
doi = {10.1007/978-3-642-55032-4\_71},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ict-eurasia/ZhangZWC14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/WangMTLZMC13,
author = {Jianfeng Wang and
Hua Ma and
Qiang Tang and
Jin Li and
Hui Zhu and
Siqi Ma and
Xiaofeng Chen},
title = {Efficient verifiable fuzzy keyword search over encrypted data in cloud
computing},
journal = {Comput. Sci. Inf. Syst.},
volume = {10},
number = {2},
pages = {667--684},
year = {2013},
url = {https://doi.org/10.2298/CSIS121104028W},
doi = {10.2298/CSIS121104028W},
timestamp = {Thu, 01 May 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/comsis/WangMTLZMC13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/WangCMTLZ12,
author = {Jianfeng Wang and
Xiaofeng Chen and
Hua Ma and
Qiang Tang and
Jin Li and
Hui Zhu},
title = {A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data},
journal = {J. Internet Serv. Inf. Secur.},
volume = {2},
number = {1/2},
pages = {49--58},
year = {2012},
url = {https://doi.org/10.22667/JISIS.2012.02.31.049},
doi = {10.22667/JISIS.2012.02.31.049},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jisis/WangCMTLZ12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WangMT0ZM012,
author = {Jianfeng Wang and
Hua Ma and
Qiang Tang and
Jin Li and
Hui Zhu and
Siqi Ma and
Xiaofeng Chen},
title = {A New Efficient Verifiable Fuzzy Keyword Search Scheme},
journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
volume = {3},
number = {4},
pages = {61--71},
year = {2012},
url = {https://doi.org/10.22667/JOWUA.2012.12.31.061},
doi = {10.22667/JOWUA.2012.12.31.061},
timestamp = {Wed, 26 Mar 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jowua/WangMT0ZM012.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













