BibTeX records: Jianfeng Wang 0001

download as .bib file

@article{DBLP:journals/fgcs/JiangWH26,
  author       = {Anqi Jiang and
                  Jianfeng Wang and
                  Wanxuan Huang},
  title        = {Verifiable multi-client blockchain-based dynamic data retrieval},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {174},
  pages        = {108008},
  year         = {2026},
  url          = {https://doi.org/10.1016/j.future.2025.108008},
  doi          = {10.1016/J.FUTURE.2025.108008},
  timestamp    = {Thu, 07 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/JiangWH26.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JiangMW26,
  author       = {Anqi Jiang and
                  Shuqi Ma and
                  Jianfeng Wang},
  title        = {Towards efficient and verifiable dynamic conjunctive queries in hybrid-storage
                  blockchain},
  journal      = {Inf. Sci.},
  volume       = {741},
  pages        = {123282},
  year         = {2026},
  url          = {https://doi.org/10.1016/j.ins.2026.123282},
  doi          = {10.1016/J.INS.2026.123282},
  timestamp    = {Sun, 29 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/JiangMW26.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JingW25,
  author       = {Xuan Jing and
                  Jianfeng Wang},
  title        = {Towards forward secure verifiable data streaming with support for
                  keyword query},
  journal      = {Inf. Sci.},
  volume       = {686},
  pages        = {121375},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.ins.2024.121375},
  doi          = {10.1016/J.INS.2024.121375},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/JingW25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiJWXZW25,
  author       = {Shengming Li and
                  Xuan Jing and
                  Yunling Wang and
                  Xin Xu and
                  Zichen Zhang and
                  Jianfeng Wang},
  title        = {Practical searchable encryption scheme against response identity attacks},
  journal      = {Inf. Sci.},
  volume       = {706},
  pages        = {121975},
  year         = {2025},
  url          = {https://doi.org/10.1016/j.ins.2025.121975},
  doi          = {10.1016/J.INS.2025.121975},
  timestamp    = {Tue, 08 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiJWXZW25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/JiangQYQWLAC25,
  author       = {Qin Jiang and
                  Saiyu Qi and
                  Xu Yang and
                  Yong Qi and
                  Jianfeng Wang and
                  Youshui Lu and
                  Bochao An and
                  Ee{-}Chien Chang},
  title        = {Reducing Paging and Exit Overheads in Intel {SGX} for Oblivious Conjunctive
                  Keyword Search},
  journal      = {{IEEE} Trans. Computers},
  volume       = {74},
  number       = {3},
  pages        = {776--789},
  year         = {2025},
  url          = {https://doi.org/10.1109/TC.2023.3281857},
  doi          = {10.1109/TC.2023.3281857},
  timestamp    = {Sun, 22 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/JiangQYQWLAC25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWWWS25,
  author       = {Lei Zhang and
                  Jianfeng Wang and
                  Jiaojiao Wu and
                  Yunling Wang and
                  Shifeng Sun},
  title        = {Violin: Powerful Volumetric Injection Attack Against Searchable Encryption
                  With Optimal Injection Size},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {22},
  number       = {4},
  pages        = {4103--4115},
  year         = {2025},
  url          = {https://doi.org/10.1109/TDSC.2025.3543248},
  doi          = {10.1109/TDSC.2025.3543248},
  timestamp    = {Sat, 09 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangWWWS25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WuWSC25,
  author       = {Jiaojiao Wu and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Xiaofeng Chen},
  title        = {Flash: Practical Volume-Hiding Encrypted Conjunctive Multi-Map With
                  Optimal Overhead},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {22},
  number       = {6},
  pages        = {7802--7817},
  year         = {2025},
  url          = {https://doi.org/10.1109/TDSC.2025.3600572},
  doi          = {10.1109/TDSC.2025.3600572},
  timestamp    = {Fri, 26 Dec 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/WuWSC25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WuHWSC25,
  author       = {Jiaojiao Wu and
                  Wanxuan Huang and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Xiaofeng Chen},
  title        = {False-Positive-Free Wildcard Queries With Dual Wildcard Flexibility
                  and Enhanced Efficiency},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {20},
  pages        = {12539--12551},
  year         = {2025},
  url          = {https://doi.org/10.1109/TIFS.2025.3625627},
  doi          = {10.1109/TIFS.2025.3625627},
  timestamp    = {Sun, 11 Jan 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/WuHWSC25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/XuWSLC25,
  author       = {Qiaoer Xu and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Zhipeng Liu and
                  Xiaofeng Chen},
  title        = {Practical Equi-Join Over Encrypted Database With Reduced Leakage},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {37},
  number       = {5},
  pages        = {2846--2860},
  year         = {2025},
  url          = {https://doi.org/10.1109/TKDE.2025.3543168},
  doi          = {10.1109/TKDE.2025.3543168},
  timestamp    = {Wed, 23 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/XuWSLC25.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/XiaoL025,
  author       = {Fei Xiao and
                  Chunyang Lv and
                  Jianfeng Wang},
  title        = {Fair Server-Aided Multiparty Private Set Intersection from {OKVS}
                  and {OPRF}},
  booktitle    = {Proceedings of the 20th {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2025, Hanoi, Vietnam, August 25-29, 2025},
  pages        = {136--148},
  publisher    = {{ACM}},
  year         = {2025},
  url          = {https://doi.org/10.1145/3708821.3736218},
  doi          = {10.1145/3708821.3736218},
  timestamp    = {Wed, 21 Jan 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/XiaoL025.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eaai/WeiSLDJWG24,
  author       = {Wei Wei and
                  Yongjie Shu and
                  Jianfeng Liu and
                  Linwei Dong and
                  Leilei Jia and
                  Jianfeng Wang and
                  Yan Guo},
  title        = {Research on a hierarchical feature-based contour extraction method
                  for spatial complex truss-like structures in aerial images},
  journal      = {Eng. Appl. Artif. Intell.},
  volume       = {127},
  number       = {Part {B}},
  pages        = {107313},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.engappai.2023.107313},
  doi          = {10.1016/J.ENGAPPAI.2023.107313},
  timestamp    = {Mon, 07 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eaai/WeiSLDJWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChengQAQWQ24,
  author       = {Jingxian Cheng and
                  Saiyu Qi and
                  Bochao An and
                  Yong Qi and
                  Jianfeng Wang and
                  Yanan Qiao},
  title        = {Lightweight verifiable blockchain top-k queries},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {156},
  pages        = {105--115},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2024.03.011},
  doi          = {10.1016/J.FUTURE.2024.03.011},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChengQAQWQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DengLYKHWP24,
  author       = {Weichu Deng and
                  Jin Li and
                  Hongyang Yan and
                  Arthur Sandor Voundi Koe and
                  Teng Huang and
                  Jianfeng Wang and
                  Cong Peng},
  title        = {Self-sovereign identity management in ciphertext policy attribute
                  based encryption for IoT protocols},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {86},
  pages        = {103885},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.jisa.2024.103885},
  doi          = {10.1016/J.JISA.2024.103885},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DengLYKHWP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LvWSWQC24,
  author       = {Chunyang Lv and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Yunling Wang and
                  Saiyu Qi and
                  Xiaofeng Chen},
  title        = {Towards Practical Multi-Client Order-Revealing Encryption: Improvement
                  and Application},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {3},
  pages        = {1111--1126},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3268652},
  doi          = {10.1109/TDSC.2023.3268652},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LvWSWQC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/QiWWSRHKQ24,
  author       = {Saiyu Qi and
                  Wei Wei and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Leszek Rutkowski and
                  Tingwen Huang and
                  Janusz Kacprzyk and
                  Yong Qi},
  title        = {Secure Data Deduplication With Dynamic Access Control for Mobile Cloud
                  Storage},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {23},
  number       = {4},
  pages        = {2566--2582},
  year         = {2024},
  url          = {https://doi.org/10.1109/TMC.2023.3263901},
  doi          = {10.1109/TMC.2023.3263901},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/QiWWSRHKQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/YangWQLWZQ24,
  author       = {Xu Yang and
                  Qiuhao Wang and
                  Saiyu Qi and
                  Ke Li and
                  Jianfeng Wang and
                  Wenjia Zhao and
                  Yong Qi},
  title        = {Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization
                  Over Outsourced Encrypted Data},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {11},
  number       = {6},
  pages        = {6356--6371},
  year         = {2024},
  url          = {https://doi.org/10.1109/TNSE.2024.3445343},
  doi          = {10.1109/TNSE.2024.3445343},
  timestamp    = {Sun, 22 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/YangWQLWZQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DuWWW24,
  author       = {Kai Du and
                  Jianfeng Wang and
                  Jiaojiao Wu and
                  Yunling Wang},
  editor       = {Bo Luo and
                  Xiaojing Liao and
                  Jun Xu and
                  Engin Kirda and
                  David Lie},
  title        = {Scalable Equi-Join Queries over Encrypted Database},
  booktitle    = {Proceedings of the 2024 on {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2024, Salt Lake City, UT, USA, October
                  14-18, 2024},
  pages        = {4002--4016},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658644.3690377},
  doi          = {10.1145/3658644.3690377},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DuWWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wang0W0LG24,
  author       = {Yunling Wang and
                  Shi{-}Feng Sun and
                  Jianfeng Wang and
                  Xiaofeng Chen and
                  Joseph K. Liu and
                  Dawu Gu},
  editor       = {Bo Luo and
                  Xiaojing Liao and
                  Jun Xu and
                  Engin Kirda and
                  David Lie},
  title        = {Practical Non-interactive Encrypted Conjunctive Search with Leakage
                  Suppression},
  booktitle    = {Proceedings of the 2024 on {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2024, Salt Lake City, UT, USA, October
                  14-18, 2024},
  pages        = {4658--4672},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3658644.3670355},
  doi          = {10.1145/3658644.3670355},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wang0W0LG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WuDWSWLTW24,
  author       = {Jiaojiao Wu and
                  Kai Du and
                  Jianfeng Wang and
                  Shi{-}Feng Sun and
                  Yunling Wang and
                  Yong Li and
                  Wenyuan Tian and
                  Yusen Wang},
  editor       = {Joseph K. Liu and
                  Liqun Chen and
                  Shi{-}Feng Sun and
                  Xiaoning Liu},
  title        = {Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption
                  with Optimized Storage},
  booktitle    = {Provable and Practical Security - 18th International Conference, ProvSec
                  2024, Gold Coast, QLD, Australia, September 25-27, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  pages        = {106--126},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-981-96-0954-3\_6},
  doi          = {10.1007/978-981-96-0954-3\_6},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WuDWSWLTW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YongWW24,
  author       = {Xinwei Yong and
                  Jiaojiao Wu and
                  Jianfeng Wang},
  editor       = {Nikolaos Pitropakis and
                  Sokratis K. Katsikas and
                  Steven Furnell and
                  Konstantinos Markantonakis},
  title        = {Xproofs: New Aggregatable and Maintainable Matrix Commitment with
                  Optimal Proof Size},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 39th {IFIP} International
                  Conference, {SEC} 2024, Edinburgh, UK, June 12-14, 2024, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  pages        = {465--480},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-65175-5\_33},
  doi          = {10.1007/978-3-031-65175-5\_33},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/YongWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YongWW24,
  author       = {Xinwei Yong and
                  Jiaojiao Wu and
                  Jianfeng Wang},
  title        = {Xproofs: New Aggregatable and Maintainable Matrix Commitment with
                  Optimal Proof Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  volume       = {2024},
  pages        = {663},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/663},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YongWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuWWW24,
  author       = {Kai Du and
                  Jianfeng Wang and
                  Jiaojiao Wu and
                  Yunling Wang},
  title        = {Scalable Equi-Join Queries over Encrypted Database},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  volume       = {2024},
  pages        = {1391},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1391},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DuWWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/YangYQWWQQ23,
  author       = {Xu Yang and
                  Jiahe Yu and
                  Saiyu Qi and
                  Qiuhao Wang and
                  Jianfeng Wang and
                  Yanan Qiao and
                  Yong Qi},
  title        = {Less payment and higher efficiency: {A} verifiable, fair and forward-secure
                  range query scheme using blockchain},
  journal      = {Comput. Networks},
  volume       = {237},
  pages        = {110108},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.comnet.2023.110108},
  doi          = {10.1016/J.COMNET.2023.110108},
  timestamp    = {Sun, 22 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/YangYQWWQQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/HuTJLWWT23,
  author       = {Yunhan Hu and
                  Guohua Tian and
                  Anqi Jiang and
                  Shuqin Liu and
                  Jianghong Wei and
                  Jianfeng Wang and
                  Shichong Tan},
  title        = {A Practical Heartbeat-based Defense Scheme Against Cloning Attacks
                  in PoA Blockchain},
  journal      = {Comput. Stand. Interfaces},
  volume       = {83},
  pages        = {103656},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103656},
  doi          = {10.1016/J.CSI.2022.103656},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/HuTJLWWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WeiCWSY23,
  author       = {Jianghong Wei and
                  Xiaofeng Chen and
                  Jianfeng Wang and
                  Willy Susilo and
                  Ilsun You},
  title        = {Towards secure asynchronous messaging with forward secrecy and mutual
                  authentication},
  journal      = {Inf. Sci.},
  volume       = {626},
  pages        = {114--132},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.01.052},
  doi          = {10.1016/J.INS.2023.01.052},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WeiCWSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/HaoLLWW23,
  author       = {Wanjun Hao and
                  Shuqin Liu and
                  Chunyang Lv and
                  Yunling Wang and
                  Jianfeng Wang},
  title        = {Efficient and privacy-preserving multi-party skyline queries in online
                  medical primary diagnosis},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {8},
  pages        = {101637},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101637},
  doi          = {10.1016/J.JKSUCI.2023.101637},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/HaoLLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jksucis/WangWW23,
  author       = {Xianmiao Wang and
                  Jiaojiao Wu and
                  Jianfeng Wang},
  title        = {One for all: Efficient verifiable dynamic multi-user searchable encryption
                  in the presence of corrupted users},
  journal      = {J. King Saud Univ. Comput. Inf. Sci.},
  volume       = {35},
  number       = {8},
  pages        = {101703},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jksuci.2023.101703},
  doi          = {10.1016/J.JKSUCI.2023.101703},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jksucis/WangWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/JingMWW23,
  author       = {Xuan Jing and
                  Meixia Miao and
                  Jianghong Wei and
                  Jianfeng Wang},
  title        = {Communication-Efficient Verifiable Data Streaming Protocol in the
                  Multi-User Setting},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {4},
  pages        = {3341--3354},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3285783},
  doi          = {10.1109/TCC.2023.3285783},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/JingMWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/QiWMZC23,
  author       = {Saiyu Qi and
                  Jianfeng Wang and
                  Meixia Miao and
                  Meng Zhang and
                  Xiaofeng Chen},
  title        = {TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich
                  Query Support},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {176--192},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3129332},
  doi          = {10.1109/TDSC.2021.3129332},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/QiWMZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WeiCWHS23,
  author       = {Jianghong Wei and
                  Xiaofeng Chen and
                  Jianfeng Wang and
                  Xinyi Huang and
                  Willy Susilo},
  title        = {Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage
                  Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {34},
  number       = {2},
  pages        = {552--566},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPDS.2022.3225274},
  doi          = {10.1109/TPDS.2022.3225274},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/WeiCWHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChengQQWJW23,
  author       = {Jingxian Cheng and
                  Saiyu Qi and
                  Yong Qi and
                  Jianfeng Wang and
                  Qin Jiang and
                  Di Wu},
  editor       = {Jia Hu and
                  Geyong Min and
                  Guojun Wang and
                  Nektarios Georgalas},
  title        = {EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme
                  for Blockchain Databases},
  booktitle    = {22nd {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2024, Exeter, UK, November
                  1-3, 2023},
  pages        = {1306--1311},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TrustCom60117.2023.00178},
  doi          = {10.1109/TRUSTCOM60117.2023.00178},
  timestamp    = {Sat, 06 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChengQQWJW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/GanLWYSHZW22,
  author       = {Qingqing Gan and
                  Joseph K. Liu and
                  Xiaoming Wang and
                  Xingliang Yuan and
                  Shifeng Sun and
                  Daxin Huang and
                  Cong Zuo and
                  Jianfeng Wang},
  title        = {Verifiable searchable symmetric encryption for conjunctive keyword
                  queries in cloud storage},
  journal      = {Frontiers Comput. Sci.},
  volume       = {16},
  number       = {6},
  pages        = {166820},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11704-021-0601-8},
  doi          = {10.1007/S11704-021-0601-8},
  timestamp    = {Wed, 25 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/GanLWYSHZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/FengSW22,
  author       = {Peirou Feng and
                  Qitian Sheng and
                  Jianfeng Wang},
  title        = {Efficient and non-interactive ciphertext range query based on differential
                  privacy},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {25},
  number       = {5},
  pages        = {490--503},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJCSE.2022.10051196},
  doi          = {10.1504/IJCSE.2022.10051196},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcse/FengSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/Wei0WH022,
  author       = {Jianghong Wei and
                  Xiaofeng Chen and
                  Jianfeng Wang and
                  Xuexian Hu and
                  Jianfeng Ma},
  title        = {Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward
                  Secrecy},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2318--2332},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3055495},
  doi          = {10.1109/TDSC.2021.3055495},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/Wei0WH022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangCQQWW22,
  author       = {Qin Jiang and
                  Ee{-}Chien Chang and
                  Yong Qi and
                  Saiyu Qi and
                  Pengfei Wu and
                  Jianfeng Wang},
  title        = {Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed
                  Index Using Intel {SGX}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {1053--1068},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3144877},
  doi          = {10.1109/TIFS.2022.3144877},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangCQQWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/YuanCLJWD22,
  author       = {Haoran Yuan and
                  Xiaofeng Chen and
                  Jin Li and
                  Tao Jiang and
                  Jianfeng Wang and
                  Robert H. Deng},
  title        = {Secure Cloud Data Deduplication with Efficient Re-Encryption},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {442--456},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2019.2948007},
  doi          = {10.1109/TSC.2019.2948007},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/YuanCLJWD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/WangSWLC22,
  author       = {Yunling Wang and
                  Shifeng Sun and
                  Jianfeng Wang and
                  Joseph K. Liu and
                  Xiaofeng Chen},
  title        = {Achieving Searchable Encryption Scheme With Search Pattern Hidden},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {1012--1025},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.2973139},
  doi          = {10.1109/TSC.2020.2973139},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/WangSWLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GongWWT22,
  author       = {Jianpeng Gong and
                  Jiaojiao Wu and
                  Jianfeng Wang and
                  Shichong Tan},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {Efficient Verifiable Boolean Range Query for Light Clients on Blockchain
                  Database},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {15--35},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_2},
  doi          = {10.1007/978-3-031-16815-4\_2},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GongWWT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangSLQ022,
  author       = {Jianfeng Wang and
                  Shifeng Sun and
                  Tianci Li and
                  Saiyu Qi and
                  Xiaofeng Chen},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead
                  and Beyond},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2825--2839},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3559345},
  doi          = {10.1145/3548606.3559345},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangSLQ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ShengWW22,
  author       = {Qitian Sheng and
                  Jiaojiao Wu and
                  Jianfeng Wang},
  editor       = {Xiaofeng Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {Publicly Verifiable Conjunctive Keyword Search with Balanced Verification
                  Overhead},
  booktitle    = {Cyberspace Safety and Security - 14th International Symposium, {CSS}
                  2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18067-5\_1},
  doi          = {10.1007/978-3-031-18067-5\_1},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/ShengWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WuWYHC22,
  author       = {Jiaojiao Wu and
                  Jianfeng Wang and
                  Xinwei Yong and
                  Xinyi Huang and
                  Xiaofeng Chen},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {New Unbounded Verifiable Data Streaming for Batch Query with Almost
                  Optimal Overhead},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  pages        = {346--366},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6\_17},
  doi          = {10.1007/978-3-031-17140-6\_17},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WuWYHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LiWW22,
  author       = {Tianci Li and
                  Jiaojiao Wu and
                  Jianfeng Wang},
  editor       = {Weizhi Meng and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christian Damsgaard Jensen},
  title        = {Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive
                  Queries},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11
                  International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15,
                  2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  pages        = {467--485},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06975-8\_27},
  doi          = {10.1007/978-3-031-06975-8\_27},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LiWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WuWY0022,
  author       = {Jiaojiao Wu and
                  Jianfeng Wang and
                  Xinwei Yong and
                  Xinyi Huang and
                  Xiaofeng Chen},
  title        = {New Unbounded Verifiable Data Streaming for Batch Query with Almost
                  Optimal Overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  volume       = {2022},
  pages        = {1028},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1028},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WuWY0022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/MiaoWWH21,
  author       = {Meixia Miao and
                  Yunling Wang and
                  Jianfeng Wang and
                  Xinyi Huang},
  title        = {Verifiable database supporting keyword searches with forward security},
  journal      = {Comput. Stand. Interfaces},
  volume       = {77},
  pages        = {103491},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.csi.2020.103491},
  doi          = {10.1016/J.CSI.2020.103491},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/MiaoWWH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WangMWZ21,
  author       = {Yunling Wang and
                  Meixia Miao and
                  Jianfeng Wang and
                  Xuefeng Zhang},
  title        = {Secure deduplication with efficient user revocation in cloud storage},
  journal      = {Comput. Stand. Interfaces},
  volume       = {78},
  pages        = {103523},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.csi.2021.103523},
  doi          = {10.1016/J.CSI.2021.103523},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/WangMWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ChowSWBBKL21,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Jianfeng Wang and
                  Richard Buckland and
                  Joonsang Baek and
                  Jongkil Kim and
                  Nan Li},
  title        = {Utilizing {QR} codes to verify the visual fidelity of image datasets
                  for machine learning},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {173},
  pages        = {102834},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.jnca.2020.102834},
  doi          = {10.1016/J.JNCA.2020.102834},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/ChowSWBBKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LvWSWQC21,
  author       = {Chunyang Lv and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Yunling Wang and
                  Saiyu Qi and
                  Xiaofeng Chen},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Efficient Multi-client Order-Revealing Encryption and Its Applications},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  pages        = {44--63},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_3},
  doi          = {10.1007/978-3-030-88428-4\_3},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LvWSWQC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/HuangCW20,
  author       = {Hui Huang and
                  Xiaofeng Chen and
                  Jianfeng Wang},
  title        = {Blockchain-based multiple groups data sharing with anonymity and traceability},
  journal      = {Sci. China Inf. Sci.},
  volume       = {63},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11432-018-9781-0},
  doi          = {10.1007/S11432-018-9781-0},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/HuangCW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/XieTYJW20,
  author       = {Ying Xie and
                  Guohua Tian and
                  Haoran Yuan and
                  Chong Jiang and
                  Jianfeng Wang},
  title        = {Client-side ciphertext deduplication scheme with flexible access control},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {23},
  number       = {2},
  pages        = {145--157},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJCSE.2020.110537},
  doi          = {10.1504/IJCSE.2020.110537},
  timestamp    = {Sat, 14 Feb 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcse/XieTYJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/WangWW20,
  author       = {Yifan Wang and
                  Yunling Wang and
                  Jianfeng Wang},
  title        = {Efficient self-adaptive access control for personal medical data in
                  emergency setting},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {23},
  number       = {4},
  pages        = {341--351},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJCSE.2020.113180},
  doi          = {10.1504/IJCSE.2020.113180},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/WangWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/YuanCWYYS20,
  author       = {Haoran Yuan and
                  Xiaofeng Chen and
                  Jianfeng Wang and
                  Jiaming Yuan and
                  Hongyang Yan and
                  Willy Susilo},
  title        = {Blockchain-based public auditing and secure deduplication with fair
                  arbitration},
  journal      = {Inf. Sci.},
  volume       = {541},
  pages        = {409--425},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.07.005},
  doi          = {10.1016/J.INS.2020.07.005},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/YuanCWYYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MaJZWLLC20,
  author       = {Xu Ma and
                  Cunmei Ji and
                  Xiaoyu Zhang and
                  Jianfeng Wang and
                  Jin Li and
                  Kuan{-}Ching Li and
                  Xiaofeng Chen},
  title        = {Secure multiparty learning from the aggregation of locally trained
                  models},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {167},
  pages        = {102754},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jnca.2020.102754},
  doi          = {10.1016/J.JNCA.2020.102754},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/MaJZWLLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaXWTL19,
  author       = {Hua Ma and
                  Ying Xie and
                  Jianfeng Wang and
                  Guohua Tian and
                  Zhenhua Liu},
  title        = {Revocable Attribute-Based Encryption Scheme With Efficient Deduplication
                  for Ehealth Systems},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {89205--89217},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2926627},
  doi          = {10.1109/ACCESS.2019.2926627},
  timestamp    = {Fri, 13 Feb 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MaXWTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SuWWM19,
  author       = {Yaping Su and
                  Jianfeng Wang and
                  Yunling Wang and
                  Meixia Miao},
  title        = {Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {141352--141362},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2943971},
  doi          = {10.1109/ACCESS.2019.2943971},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SuWWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangWSMC19,
  author       = {Yunling Wang and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Meixia Miao and
                  Xiaofeng Chen},
  title        = {Toward Forward Secure {SSE} Supporting Conjunctive Keyword Search},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {142762--142772},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2944246},
  doi          = {10.1109/ACCESS.2019.2944246},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangWSMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/DongWLM19,
  author       = {Enting Dong and
                  Jianfeng Wang and
                  Zhenhua Liu and
                  Hua Ma},
  title        = {Large universe multi-authority attribute-based {PHR} sharing with
                  user revocation},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {19},
  number       = {3},
  pages        = {376--386},
  year         = {2019},
  url          = {https://doi.org/10.1504/IJCSE.2019.101347},
  doi          = {10.1504/IJCSE.2019.101347},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/DongWLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/KluczniakWCK19,
  author       = {Kamil Kluczniak and
                  Jianfeng Wang and
                  Xiaofeng Chen and
                  Miroslaw Kutylowski},
  title        = {Multi-device anonymous authentication},
  journal      = {Int. J. Inf. Sec.},
  volume       = {18},
  number       = {2},
  pages        = {181--197},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10207-018-0406-4},
  doi          = {10.1007/S10207-018-0406-4},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/KluczniakWCK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MiaoWWM19,
  author       = {Meixia Miao and
                  Jianfeng Wang and
                  Sheng Wen and
                  Jianfeng Ma},
  title        = {Publicly verifiable database scheme with efficient keyword search},
  journal      = {Inf. Sci.},
  volume       = {475},
  pages        = {18--28},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.09.067},
  doi          = {10.1016/J.INS.2018.09.067},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/MiaoWWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/WangWSLSBYC19,
  author       = {Yunling Wang and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Willy Susilo and
                  Joonsang Baek and
                  Ilsun You and
                  Xiaofeng Chen},
  title        = {Towards Multi-user Searchable Encryption Supporting Boolean Query
                  and Fast Decryption},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {25},
  number       = {3},
  pages        = {222--244},
  year         = {2019},
  url          = {http://www.jucs.org/jucs\_25\_3/towards\_multi\_user\_searchable},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/WangWSLSBYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangMSW19,
  author       = {Yuan Wang and
                  Meixia Miao and
                  Jian Shen and
                  Jianfeng Wang},
  title        = {Towards efficient privacy-preserving encrypted image search in cloud
                  computing},
  journal      = {Soft Comput.},
  volume       = {23},
  number       = {6},
  pages        = {2101--2112},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00500-017-2927-6},
  doi          = {10.1007/S00500-017-2927-6},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/WangMSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WeiCWHM19,
  author       = {Jianghong Wei and
                  Xiaofeng Chen and
                  Jianfeng Wang and
                  Xuexian Hu and
                  Jianfeng Ma},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Forward-Secure Puncturable Identity-Based Encryption for Securing
                  Cloud Emails},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  pages        = {134--150},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_7},
  doi          = {10.1007/978-3-030-29962-0\_7},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WeiCWHM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZhangWWS019,
  author       = {Zhongjun Zhang and
                  Jianfeng Wang and
                  Yunling Wang and
                  Yaping Su and
                  Xiaofeng Chen},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  pages        = {304--321},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29962-0\_15},
  doi          = {10.1007/978-3-030-29962-0\_15},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZhangWWS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/MaJZWLL19,
  author       = {Xu Ma and
                  Cunmei Ji and
                  Xiaoyu Zhang and
                  Jianfeng Wang and
                  Jin Li and
                  Kuan{-}Ching Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Secure Multiparty Learning from Aggregation of Locally Trained Models},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {173--182},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_13},
  doi          = {10.1007/978-3-030-30619-9\_13},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/MaJZWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ChowSWBBK019,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Jianfeng Wang and
                  Richard Buckland and
                  Joonsang Baek and
                  Jongkil Kim and
                  Nan Li},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Protecting the Visual Fidelity of Machine Learning Datasets Using
                  {QR} Codes},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {320--335},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_23},
  doi          = {10.1007/978-3-030-30619-9\_23},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ChowSWBBK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/GanZWSW19,
  author       = {Qingqing Gan and
                  Cong Zuo and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Xiaoming Wang},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {Dynamic Searchable Symmetric Encryption with Forward and Backward
                  Privacy: {A} Survey},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_3},
  doi          = {10.1007/978-3-030-36938-5\_3},
  timestamp    = {Wed, 25 Mar 2026 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/GanZWSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/KluczniakHW18,
  author       = {Kamil Kluczniak and
                  Lucjan Hanzlik and
                  Jianfeng Wang},
  title        = {Efficient {VLR} group signatures for smart cards},
  journal      = {Int. J. Embed. Syst.},
  volume       = {10},
  number       = {3},
  pages        = {203--216},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJES.2018.10012874},
  doi          = {10.1504/IJES.2018.10012874},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/KluczniakHW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/WangYW18,
  author       = {Zhiying Wang and
                  Jun Ye and
                  Jianfeng Wang},
  title        = {An efficient traceable data sharing scheme in cloud computing for
                  mobile devices},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {12},
  number       = {2},
  pages        = {156--165},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJHPCN.2016.10009051},
  doi          = {10.1504/IJHPCN.2016.10009051},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/WangYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/GuanWWF18,
  author       = {Wenhao Guan and
                  Yunling Wang and
                  Jianfeng Wang and
                  Xiaotong Fu},
  title        = {Verifiable memory leakage-resilient dynamic searchable encryption},
  journal      = {J. High Speed Networks},
  volume       = {24},
  number       = {3},
  pages        = {201--217},
  year         = {2018},
  url          = {https://doi.org/10.3233/JHS-180591},
  doi          = {10.3233/JHS-180591},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/GuanWWF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/WangZTW18,
  author       = {Jingjing Wang and
                  Xiaoyu Zhang and
                  Xiaoling Tao and
                  Jianfeng Wang},
  title        = {{EPSLP:} Efficient and privacy-preserving single-layer perceptron
                  learning in cloud computing},
  journal      = {J. High Speed Networks},
  volume       = {24},
  number       = {3},
  pages        = {259--279},
  year         = {2018},
  url          = {https://doi.org/10.3233/JHS-180594},
  doi          = {10.3233/JHS-180594},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/WangZTW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZhangCWZL18,
  author       = {Xiaoyu Zhang and
                  Xiaofeng Chen and
                  Jianfeng Wang and
                  Zhihui Zhan and
                  Jin Li},
  title        = {Verifiable privacy-preserving single-layer perceptron training scheme
                  in cloud computing},
  journal      = {Soft Comput.},
  volume       = {22},
  number       = {23},
  pages        = {7719--7732},
  year         = {2018},
  url          = {https://doi.org/10.1007/s00500-018-3233-7},
  doi          = {10.1007/S00500-018-3233-7},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ZhangCWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Wang0SLAZ18,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Man Ho Au and
                  Zhi{-}Hui Zhan},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Towards Efficient Verifiable Conjunctive Keyword Search for Large
                  Encrypted Database},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  pages        = {83--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_5},
  doi          = {10.1007/978-3-319-98989-1\_5},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Wang0SLAZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/DulinZTWT18,
  author       = {Dulin and
                  Zhiwei Zhang and
                  Shichong Tan and
                  Jianfeng Wang and
                  Xiaoling Tao},
  editor       = {Jaideep Vaidya and
                  Jin Li},
  title        = {An Associated Deletion Scheme for Multi-copy in Cloud Storage},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 18th International
                  Conference, {ICA3PP} 2018, Guangzhou, China, November 15-17, 2018,
                  Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  pages        = {511--526},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05063-4\_38},
  doi          = {10.1007/978-3-030-05063-4\_38},
  timestamp    = {Fri, 26 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/DulinZTWT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YangWTC18,
  author       = {Changsong Yang and
                  Jianfeng Wang and
                  Xiaoling Tao and
                  Xiaofeng Chen},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {445--458},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_26},
  doi          = {10.1007/978-3-030-01950-1\_26},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YangWTC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GuoWZC18,
  author       = {Jingjing Guo and
                  Jianfeng Wang and
                  Zhiwei Zhang and
                  Xiaofeng Chen},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {An Almost Non-interactive Order Preserving Encryption Scheme},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_6},
  doi          = {10.1007/978-3-319-99807-7\_6},
  timestamp    = {Fri, 26 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/GuoWZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MengWWLYLZC18,
  author       = {Weizhi Meng and
                  Jianfeng Wang and
                  Xianmin Wang and
                  Joseph K. Liu and
                  Zuoxia Yu and
                  Jin Li and
                  Yongjun Zhao and
                  Sherman S. M. Chow},
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {Position Paper on Blockchain Technology: Smart Contract and Applications},
  booktitle    = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {474--483},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5\_35},
  doi          = {10.1007/978-3-030-02744-5\_35},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MengWWLYLZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangCLZS17,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Jin Li and
                  Jiaolian Zhao and
                  Jian Shen},
  title        = {Towards achieving flexible and verifiable search for outsourced database
                  in cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {67},
  pages        = {266--275},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.05.002},
  doi          = {10.1016/J.FUTURE.2016.05.002},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangCLZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/WangCLKK17,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Jin Li and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  title        = {TrDup: enhancing secure data deduplication with user traceability
                  in cloud computing},
  journal      = {Int. J. Web Grid Serv.},
  volume       = {13},
  number       = {3},
  pages        = {270--289},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJWGS.2017.10006054},
  doi          = {10.1504/IJWGS.2017.10006054},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijwgs/WangCLKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/MiaoWMS17,
  author       = {Meixia Miao and
                  Jianfeng Wang and
                  Jianfeng Ma and
                  Willy Susilo},
  title        = {Publicly verifiable databases with efficient insertion/deletion operations},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {86},
  pages        = {49--58},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jcss.2016.07.005},
  doi          = {10.1016/J.JCSS.2016.07.005},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/MiaoWMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/LiuWTS17,
  author       = {Jinfeng Liu and
                  Jianfeng Wang and
                  Xiaoling Tao and
                  Jian Shen},
  title        = {Secure similarity-based cloud data deduplication in Ubiquitous city},
  journal      = {Pervasive Mob. Comput.},
  volume       = {41},
  pages        = {231--242},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2017.03.010},
  doi          = {10.1016/J.PMCJ.2017.03.010},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/LiuWTS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/ZouWYSC17,
  author       = {Qin Zou and
                  Jianfeng Wang and
                  Jun Ye and
                  Jian Shen and
                  Xiaofeng Chen},
  title        = {Efficient and secure encrypted image search in mobile cloud computing},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {11},
  pages        = {2959--2969},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2153-7},
  doi          = {10.1007/S00500-016-2153-7},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/ZouWYSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/YeWZSL17,
  author       = {Jun Ye and
                  Jianfeng Wang and
                  Jiaolian Zhao and
                  Jian Shen and
                  Kuan{-}Ching Li},
  title        = {Fine-grained searchable encryption in multi-user setting},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {20},
  pages        = {6201--6212},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-016-2179-x},
  doi          = {10.1007/S00500-016-2179-X},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/YeWZSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangWSLS017,
  author       = {Yunling Wang and
                  Jianfeng Wang and
                  Shifeng Sun and
                  Joseph K. Liu and
                  Willy Susilo and
                  Xiaofeng Chen},
  editor       = {Tatsuaki Okamoto and
                  Yong Yu and
                  Man Ho Au and
                  Yannan Li},
  title        = {Towards Multi-user Searchable Encryption Supporting Boolean Query
                  and Fast Decryption},
  booktitle    = {Provable Security - 11th International Conference, ProvSec 2017, Xi'an,
                  China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {24--38},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68637-0\_2},
  doi          = {10.1007/978-3-319-68637-0\_2},
  timestamp    = {Tue, 10 Feb 2026 15:42:19 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/WangWSLS017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZgW17,
  author       = {Jingjing Wang and
                  Xiaoyu Zhang and
                  Jingjing Guo and
                  Jianfeng Wang},
  title        = {Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron
                  Learning for e-Healthcare"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  volume       = {2017},
  pages        = {405},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/405},
  timestamp    = {Mon, 07 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZgW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dase/Wang016,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen},
  title        = {Efficient and Secure Storage for Outsourced Data: {A} Survey},
  journal      = {Data Sci. Eng.},
  volume       = {1},
  number       = {3},
  pages        = {178--188},
  year         = {2016},
  url          = {https://doi.org/10.1007/s41019-016-0018-9},
  doi          = {10.1007/S41019-016-0018-9},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dase/Wang016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcin/WangWC16,
  author       = {Yunling Wang and
                  Jianfeng Wang and
                  Xiaofeng Chen},
  title        = {Secure searchable encryption: a survey},
  journal      = {J. Commun. Inf. Networks},
  volume       = {1},
  number       = {4},
  pages        = {52--65},
  year         = {2016},
  url          = {https://doi.org/10.1007/BF03391580},
  doi          = {10.1007/BF03391580},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcin/WangWC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/WangMG016,
  author       = {Jianfeng Wang and
                  Meixia Miao and
                  Yaqian Gao and
                  Xiaofeng Chen},
  title        = {Enabling efficient approximate nearest neighbor search for outsourced
                  database in cloud computing},
  journal      = {Soft Comput.},
  volume       = {20},
  number       = {11},
  pages        = {4487--4495},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00500-015-1758-6},
  doi          = {10.1007/S00500-015-1758-6},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/WangMG016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ZhangWW0M16,
  author       = {Zhiwei Zhang and
                  Yunling Wang and
                  Jianfeng Wang and
                  Xiaofeng Chen and
                  Jianfeng Ma},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Kangbin Yim},
  title        = {Location-Sensitive Data Sharing in Mobile Cloud Computing},
  booktitle    = {Advances on Broad-Band Wireless Computing, Communication and Applications,
                  Proceedings of the 11th International Conference On Broad-Band Wireless
                  Computing, Communication and Applications, {BWCCA} 2016, Soonchunhyang
                  University, Asan, Korea, November 5-7, 2016},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  pages        = {799--805},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49106-6\_81},
  doi          = {10.1007/978-3-319-49106-6\_81},
  timestamp    = {Fri, 26 Sep 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/ZhangWW0M16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KutylowskiCHKCW16,
  author       = {Miroslaw Kutylowski and
                  Jacek Cichon and
                  Lucjan Hanzlik and
                  Kamil Kluczniak and
                  Xiaofeng Chen and
                  Jianfeng Wang},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Protecting Electronic Signatures in Case of Key Leakage},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  pages        = {252--274},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_13},
  doi          = {10.1007/978-3-319-61273-7\_13},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KutylowskiCHKCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KluczniakW0K16,
  author       = {Kamil Kluczniak and
                  Jianfeng Wang and
                  Xiaofeng Chen and
                  Miroslaw Kutylowski},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Multi-device Anonymous Authentication},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_2},
  doi          = {10.1007/978-3-319-46298-1\_2},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KluczniakW0K16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/MiaoWLC15,
  author       = {Meixia Miao and
                  Jianfeng Wang and
                  Hui Li and
                  Xiaofeng Chen},
  title        = {Secure multi-server-aided data deduplication in cloud computing},
  journal      = {Pervasive Mob. Comput.},
  volume       = {24},
  pages        = {129--137},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.pmcj.2015.03.002},
  doi          = {10.1016/J.PMCJ.2015.03.002},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/percom/MiaoWLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/WangCHYX15,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Ilsun You and
                  Yang Xiang},
  title        = {Verifiable Auditing for Outsourced Database in Cloud Computing},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {11},
  pages        = {3293--3303},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2015.2401036},
  doi          = {10.1109/TC.2015.2401036},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/WangCHYX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/Wang00KK15,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Jin Li and
                  Kamil Kluczniak and
                  Miroslaw Kutylowski},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {A New Secure Data Deduplication Approach Supporting User Traceability},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {120--124},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.49},
  doi          = {10.1109/BWCCA.2015.49},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/Wang00KK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/WangCL15,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Jin Li},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {Verifiable Search for Dynamic Outsourced Database in Cloud Computing},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {568--571},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.48},
  doi          = {10.1109/BWCCA.2015.48},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/WangCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ZouWC15,
  author       = {Qin Zou and
                  Jianfeng Wang and
                  Xiaofeng Chen},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Marek R. Ogiela and
                  Lidia Ogiela},
  title        = {Secure Encrypted Image Search in Mobile Cloud Computing},
  booktitle    = {10th International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2015, Krakow, Poland, November
                  4-6, 2015},
  pages        = {572--575},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/BWCCA.2015.41},
  doi          = {10.1109/BWCCA.2015.41},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/ZouWC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/MiaoWM15,
  author       = {Meixia Miao and
                  Jianfeng Wang and
                  Jianfeng Ma},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Hui{-}Huang Hsu and
                  Tomoya Enokido and
                  Fatos Xhafa},
  title        = {New Publicly Verifiable Databases Supporting Insertion Operation},
  booktitle    = {18th International Conference on Network-Based Information Systems,
                  NBis 2015, Taipei, Taiwan, September 2-4, 2015},
  pages        = {640--642},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/NBiS.2015.95},
  doi          = {10.1109/NBIS.2015.95},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/MiaoWM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/YeW15,
  author       = {Jun Ye and
                  Jianfeng Wang},
  editor       = {Leonard Barolli and
                  Makoto Takizawa and
                  Hui{-}Huang Hsu and
                  Tomoya Enokido and
                  Fatos Xhafa},
  title        = {Secure Outsourcing of Modular Exponentiation with Single Untrusted
                  Server},
  booktitle    = {18th International Conference on Network-Based Information Systems,
                  NBis 2015, Taipei, Taiwan, September 2-4, 2015},
  pages        = {643--645},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/NBiS.2015.96},
  doi          = {10.1109/NBIS.2015.96},
  timestamp    = {Mon, 05 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nbis/YeW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LiWZM14,
  author       = {Keying Li and
                  Jianfeng Wang and
                  Yinghui Zhang and
                  Hua Ma},
  title        = {Key Policy Attribute-based Proxy Re-encryption and {RCCA} Secure Scheme},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {70--82},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.05.31.070},
  doi          = {10.22667/JISIS.2014.05.31.070},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/LiWZM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/XhafaWCLLK14,
  author       = {Fatos Xhafa and
                  Jianfeng Wang and
                  Xiaofeng Chen and
                  Joseph K. Liu and
                  Jin Li and
                  Paul Krause},
  title        = {An efficient {PHR} service system supporting fuzzy keyword search
                  and fine-grained access control},
  journal      = {Soft Comput.},
  volume       = {18},
  number       = {9},
  pages        = {1795--1802},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00500-013-1202-8},
  doi          = {10.1007/S00500-013-1202-8},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/XhafaWCLLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/ZhangCW14,
  author       = {Shaojun Zhang and
                  Peng Chen and
                  Jianfeng Wang},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Xiaofeng Chen and
                  Makoto Ikeda},
  title        = {Online/Offline Attribute Based Signature},
  booktitle    = {Ninth International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2014, Guangdong, China, November
                  8-10, 2014},
  pages        = {566--571},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BWCCA.2014.116},
  doi          = {10.1109/BWCCA.2014.116},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/ZhangCW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/NieMW014,
  author       = {Haixin Nie and
                  Hua Ma and
                  Jianfeng Wang and
                  Xiaofeng Chen},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Xiaofeng Chen and
                  Makoto Ikeda},
  title        = {Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations
                  in the Case of No Solution},
  booktitle    = {Ninth International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2014, Guangdong, China, November
                  8-10, 2014},
  pages        = {572--577},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BWCCA.2014.117},
  doi          = {10.1109/BWCCA.2014.117},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/NieMW014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/GaoMW014,
  author       = {Yaqian Gao and
                  Meixia Miao and
                  Jianfeng Wang and
                  Xiaofeng Chen},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Xiaofeng Chen and
                  Makoto Ikeda},
  title        = {Secure Approximate Nearest Neighbor Search over Encrypted Data},
  booktitle    = {Ninth International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2014, Guangdong, China, November
                  8-10, 2014},
  pages        = {578--583},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BWCCA.2014.118},
  doi          = {10.1109/BWCCA.2014.118},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/GaoMW014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bwcca/LiuWMN14,
  author       = {Pengliang Liu and
                  Jianfeng Wang and
                  Hua Ma and
                  Haixin Nie},
  editor       = {Leonard Barolli and
                  Fatos Xhafa and
                  Xiaofeng Chen and
                  Makoto Ikeda},
  title        = {Efficient Verifiable Public Key Encryption with Keyword Search Based
                  on {KP-ABE}},
  booktitle    = {Ninth International Conference on Broadband and Wireless Computing,
                  Communication and Applications, {BWCCA} 2014, Guangdong, China, November
                  8-10, 2014},
  pages        = {584--589},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/BWCCA.2014.119},
  doi          = {10.1109/BWCCA.2014.119},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bwcca/LiuWMN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/ZhangZWC14,
  author       = {Zhenyu Zhang and
                  Wujun Zhang and
                  Jianfeng Wang and
                  Xiaofeng Chen},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {An Effective Cloud-Based Active Defense System against Malicious Codes},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {690--695},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_71},
  doi          = {10.1007/978-3-642-55032-4\_71},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/ZhangZWC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsis/WangMTLZMC13,
  author       = {Jianfeng Wang and
                  Hua Ma and
                  Qiang Tang and
                  Jin Li and
                  Hui Zhu and
                  Siqi Ma and
                  Xiaofeng Chen},
  title        = {Efficient verifiable fuzzy keyword search over encrypted data in cloud
                  computing},
  journal      = {Comput. Sci. Inf. Syst.},
  volume       = {10},
  number       = {2},
  pages        = {667--684},
  year         = {2013},
  url          = {https://doi.org/10.2298/CSIS121104028W},
  doi          = {10.2298/CSIS121104028W},
  timestamp    = {Thu, 01 May 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsis/WangMTLZMC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/WangCMTLZ12,
  author       = {Jianfeng Wang and
                  Xiaofeng Chen and
                  Hua Ma and
                  Qiang Tang and
                  Jin Li and
                  Hui Zhu},
  title        = {A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {1/2},
  pages        = {49--58},
  year         = {2012},
  url          = {https://doi.org/10.22667/JISIS.2012.02.31.049},
  doi          = {10.22667/JISIS.2012.02.31.049},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/WangCMTLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WangMT0ZM012,
  author       = {Jianfeng Wang and
                  Hua Ma and
                  Qiang Tang and
                  Jin Li and
                  Hui Zhu and
                  Siqi Ma and
                  Xiaofeng Chen},
  title        = {A New Efficient Verifiable Fuzzy Keyword Search Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {61--71},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.061},
  doi          = {10.22667/JOWUA.2012.12.31.061},
  timestamp    = {Wed, 26 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/WangMT0ZM012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}