


default search action
Jiankuo Dong
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j28]Wen Wu
, Jiankuo Dong
, Yuze Hou
, Mengke Liu
, Lunjie Li
, Zhenjiang Dong
:
RIGHT: GPU-Optimized Parallel PQC HAETAE for High-Throughput Cryptographic Acceleration. IEEE Trans. Ind. Informatics 22(1): 532-542 (2026)
[i9]Jiankuo Dong, Yuze Hou, Shiqin Wang, Letian Sha, Fu Xiao, Zhenjiang Dong, Jingqiang Lin:
HIGH: Harnessing GPU Parallelism for Optimized HQC Performance. IACR Cryptol. ePrint Arch. 2026: 12 (2026)- 2025
[j27]Kai Wang
, Jiankuo Dong, Yijie Xu, Xinyi Ji, Letian Sha, Fu Xiao
:
READ: Resource efficient authentication scheme for digital twin edge networks. Future Gener. Comput. Syst. 163: 107498 (2025)
[j26]Xiao Chen
, Letian Sha, Fu Xiao, Jiaye Pan, Jiankuo Dong:
AB-DHD: An Attention Mechanism and Bi-Directional Gated Recurrent Unit Based Model for Dynamic Link Library Hijacking Vulnerability Discovery. J. Comput. Sci. Technol. 40(3): 887-903 (2025)
[j25]Yi Bian
, Fangyu Zheng
, Yuewu Wang
, Lingguang Lei
, Yuan Ma
, Tian Zhou
, Jiankuo Dong
, Guang Fan
, Jiwu Jing
:
AsyncGBP${}^{+}$+: Bridging SSL/TLS and Heterogeneous Computing Power With GPU-Based Providers. IEEE Trans. Computers 74(2): 356-370 (2025)
[j24]Xinyi Ji
, Jiankuo Dong
, Junhao Huang
, Zhijian Yuan
, Wangchen Dai
, Fu Xiao
, Jingqiang Lin
:
ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA. IEEE Trans. Computers 74(2): 401-413 (2025)
[j23]Letian Sha
, Xingpeng Huo
, Fu Xiao
, Jiankuo Dong
, Jianwen Liu
, Shang Wu
, Ziyue Su
:
AWDP-Automated Windows Domain Penetration Framework With Deep Reinforcement Learning. IEEE Trans. Dependable Secur. Comput. 22(5): 5744-5759 (2025)
[j22]Pinchang Zhang
, Huangwenqing Shi
, Jiankuo Dong
, Ji He
, Xiaohong Jiang
, Fu Xiao
:
Enhanced Two-Way Privacy-Preserving PHY-Layer Authentication for UAV-Assisted MIMO Systems. IEEE Trans. Dependable Secur. Comput. 22(6): 6998-7009 (2025)
[j21]Wen Wu
, Jiankuo Dong
, Zhen Xu
, Zhenjiang Dong
, Dung Hoang Duong
, Fu Xiao
, Jingqiang Lin
:
Symphony of Speeds: Harmonizing Classic McEliece Cryptography With GPU Innovation. IEEE Trans. Inf. Forensics Secur. 20: 8746-8759 (2025)
[j20]Ruihao Dai
, Jiankuo Dong
, Mingrui Qiu, Zhenjiang Dong
, Fu Xiao
, Jingqiang Lin
:
GOLF: Unleashing GPU-Driven Acceleration for FALCON Post-Quantum Cryptography. IEEE Trans. Inf. Forensics Secur. 20: 9441-9453 (2025)
[j19]Mengxue Yang
, Huaqun Wang
, Debiao He
, Jiankuo Dong
:
RLP-ABE: Puncturable CP-ABE for Efficient User Revocation From Lattices in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 20: 10219-10230 (2025)
[j18]Xiao Chen
, Letian Sha
, Jincheng Wang
, Fu Xiao
, Jiankuo Dong
:
SFO-CID: Structural Feature Optimization Based Command Injection Vulnerability Discovery for Internet of Things. IEEE Trans. Ind. Informatics 21(2): 1429-1438 (2025)
[j17]Lingjia Meng
, Yu Fu
, Fangyu Zheng
, Mingyu Wang
, Ziqiang Ma
, Jiankuo Dong
, Jingqiang Lin
:
HTM-PQC: Hardening Cryptography Keys Under the Trend of Post-Quantum Cryptography Migration on Industrial Internet. IEEE Trans. Ind. Informatics 21(4): 3504-3514 (2025)
[j16]Jiankuo Dong
, Jie Wei
, Xiaoyu Hu
, Zhenjiang Dong
, Fuyuan Chen, Xin Hu, Jin Qi
:
DDCC: Synergizing Denoising Diffusion Probabilistic Models and Curriculum-Based Complexity Control for Insider Threat Detection. IEEE Trans. Ind. Informatics 21(11): 8351-8361 (2025)
[j15]Letian Sha
, Xiao Chen
, Fu Xiao
, Zhong Wang
, Zhangbo Long
, Qianyu Fan
, Jiankuo Dong
:
VRVul-Discovery: BiLSTM-based Vulnerability Discovery for Virtual Reality Devices in Metaverse. ACM Trans. Multim. Comput. Commun. Appl. 21(2): 53:1-53:19 (2025)
[j14]Fangyu Zheng
, Guang Fan
, Wenxu Tang
, Yixuan Song
, Tian Zhou
, Yuan Zhao
, Jiankuo Dong
, Jingqiang Lin
, Shoumeng Yan
, Jiwu Jing
:
GIF-FHE: A Comprehensive Implementation and Evaluation of GPU-Accelerated FHE With Integer and Floating-Point Computing Power. IEEE Trans. Parallel Distributed Syst. 36(7): 1524-1541 (2025)
[j13]Kai Wang, Jiankuo Dong
, Shiqin Wang, Zhijian Yuan, Letian Sha
, Fu Xiao
:
RSAKA-VDT: Designing Reliable and Provably Secure Authenticated Key Agreement Scheme for Vehicular Digital Twin Networks. IEEE Trans. Veh. Technol. 74(8): 12330-12346 (2025)
[i8]Wen Wu, Jiankuo Dong, Zhen Xu, Zhenjiang Dong, Dung Duong, Fu Xiao, Jingqiang Lin:
Symphony of Speeds: Harmonizing Classic McEliece Cryptography with GPU Innovation. IACR Cryptol. ePrint Arch. 2025: 748 (2025)
[i7]Ruihao Dai, Jiankuo Dong, Mingrui Qiu, Zhenjiang Dong, Fu Xiao, Jingqiang Lin:
GOLF: Unleashing GPU-Driven Acceleration for FALCON Post-Quantum Cryptography. IACR Cryptol. ePrint Arch. 2025: 749 (2025)
[i6]Wen Wu, Jiankuo Dong, Xuecheng Liu, Shuzhou Sun, Zhenjiang Dong, Jingqiang Lin, Fu Xiao:
RACE: A Rapid ARM Cryptographic Engine for Code-Based Classic McEliece PQC Scheme. IACR Cryptol. ePrint Arch. 2025: 2310 (2025)- 2024
[j12]Yulin Teng
, Pinchang Zhang
, Yangyang Liu, Jiankuo Dong, Fu Xiao
:
Exploiting Carrier Frequency Offset and Phase Noise for Physical Layer Authentication in UAV-Aided Communication Systems. IEEE Trans. Commun. 72(8): 4708-4724 (2024)
[j11]Jiankuo Dong
, Yusheng Fu, Xusheng Qin, Zhenjiang Dong
, Fu Xiao
, Jingqiang Lin
:
ECO-BIKE: Bridging the Gap Between PQC BIKE and GPU Acceleration. IEEE Trans. Inf. Forensics Secur. 19: 8952-8965 (2024)
[j10]Xingjian Zhu
, Jiankuo Dong
, Jin Qi
, Zhenguo Zhou
, Zhenjiang Dong
, Yanfei Sun
, Moyu Wang
:
AUTH: An Adversarial Autoencoder Based Unsupervised Insider Threat Detection Scheme for Multisource Logs. IEEE Trans. Ind. Informatics 20(9): 10954-10965 (2024)
[j9]Xinyi Ji
, Jiankuo Dong
, Tonggui Deng
, Pinchang Zhang
, Jiafeng Hua
, Fu Xiao
:
HI-Kyber: A Novel High-Performance Implementation Scheme of Kyber Based on GPU. IEEE Trans. Parallel Distributed Syst. 35(6): 722-736 (2024)
[i5]Yijing Ning, Jiankuo Dong, Jingqiang Lin, Fangyu Zheng, Yu Fu, Zhenjiang Dong, Fu Xiao:
GRASP: Accelerating Hash-based PQC Performance on GPU Parallel Architecture. IACR Cryptol. ePrint Arch. 2024: 1030 (2024)
[i4]Xinyi Ji, Jiankuo Dong, Junhao Huang, Zhijian Yuan, Wangchen Dai, Fu Xiao, Jingqiang Lin:
ECO-CRYSTALS: Efficient Cryptography CRYSTALS on Standard RISC-V ISA. IACR Cryptol. ePrint Arch. 2024: 1198 (2024)
[i3]Fuyuan Chen, Jiankuo Dong, Xiaoyu Hu, Zhenjiang Dong, Wangchen Dai, Jingqiang Lin, Fu Xiao:
HI-CKKS: Is High-Throughput Neglected? Reimagining CKKS Efficiency with Parallelism. IACR Cryptol. ePrint Arch. 2024: 1976 (2024)- 2023
[j8]Yulin Teng
, Huangwenqing Shi, Pinchang Zhang, Jiankuo Dong, Fu Xiao:
PHY-layer authentication exploiting CFO for smart healthcare systems with mmWave communication technology. Ad Hoc Networks 140: 103075 (2023)
[j7]Kai Wang
, Kaisheng Sun, Jiankuo Dong, Letian Sha, Fu Xiao
:
AP-CDE: Cost-Efficient Authentication Protocol for Cross-Domain Data Exchange in IIoT. IEEE Syst. J. 17(3): 3882-3893 (2023)
[j6]Jiankuo Dong
, Pinchang Zhang
, Kaisheng Sun, Fu Xiao
, Fangyu Zheng
, Jingqiang Lin
:
EG-Four$\mathbb {Q}$: An Embedded GPU-Based Efficient ECC Cryptography Accelerator for Edge Computing. IEEE Trans. Ind. Informatics 19(6): 7291-7300 (2023)
[j5]Pinchang Zhang
, Jiankuo Dong, Ji He
, Jun Liu
, Fu Xiao
:
Adaptive Jamming Attack Detection Under Noise Uncertainty in mmWave Massive MIMO Systems. IEEE Trans. Veh. Technol. 72(7): 9002-9016 (2023)
[c17]Haosong Zhao, Rui Su, Rui Lin, Jiankuo Dong, Donglong Chen:
Efficient Arithmetic for Polynomial Multiplication in Post-quantum Lattice-Based Cryptosystem on RISC-V Platform. ACNS Workshops 2023: 439-458
[c16]Qingguan Gao, Kaisheng Sun, Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Yongjun Ren, Zhe Liu:
V-Curve25519: Efficient Implementation of Curve25519 on RISC-V Architecture. Inscrypt (2) 2023: 130-149
[c15]Biao Gao
, Shijie Jia, Jiankuo Dong, Peixin Ren:
XPORAM: A Practical Multi-client ORAM Against Malicious Adversaries. Inscrypt (1) 2023: 397-417
[c14]Yi Bian
, Fangyu Zheng
, Yuewu Wang
, Lingguang Lei
, Yuan Ma
, Jiankuo Dong
, Jiwu Jing
:
AsyncGBP: Unleashing the Potential of Heterogeneous Computing for SSL/TLS with GPU-based Provider. ICPP 2023: 337-346
[c13]Guang Fan
, Fangyu Zheng, Lipeng Wan
, Lili Gao, Yuan Zhao, Jiankuo Dong, Yixuan Song, Yuewu Wang, Jingqiang Lin:
Towards Faster Fully Homomorphic Encryption Implementation with Integer and Floating-point Computing Power of GPUs. IPDPS 2023: 798-808
[i2]Xinyi Ji, Jiankuo Dong, Pinchang Zhang, Tonggui Deng, Jiafeng Hua, Fu Xiao:
HI-Kyber: A novel high-performance implementation scheme of Kyber based on GPU. IACR Cryptol. ePrint Arch. 2023: 1194 (2023)- 2022
[j4]Jiankuo Dong
, Guang Fan
, Fangyu Zheng
, Tianyu Mao, Fu Xiao
, Jingqiang Lin
:
TEGRAS: An Efficient Tegra Embedded GPU-Based RSA Acceleration Server. IEEE Internet Things J. 9(18): 16850-16861 (2022)
[j3]Jiankuo Dong, Fangyu Zheng, Jingqiang Lin, Zhe Liu, Fu Xiao, Guang Fan:
EC-ECC: Accelerating Elliptic Curve Cryptography for Edge Computing on Embedded GPU TX2. ACM Trans. Embed. Comput. Syst. 21(2): 16:1-16:25 (2022)
[c12]Guangshen Cheng, Jiankuo Dong, Xinyi Ji, Bingyu Li, Haoling Fan, Pinchang Zhang:
PEPEC: Precomputed ECC Points Embedded in Certificates and Verified by CT Log Servers. ACNS Workshops 2022: 447-460
[c11]Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Yuewu Wang, Jingqiang Lin, Jiankuo Dong:
A Novel High-Performance Implementation of CRYSTALS-Kyber with AI Accelerator. ESORICS (3) 2022: 514-534
[c10]Jiankuo Dong, Sheng Lu, Pinchang Zhang, Fangyu Zheng, Fu Xiao:
G-SM3: High-Performance Implementation of GPU-based SM3 Hash Function. ICPADS 2022: 201-208
[i1]Lipeng Wan, Fangyu Zheng, Guang Fan, Rong Wei, Lili Gao, Jiankuo Dong, Jingqiang Lin, Yuewu Wang:
A Novel High-performance Implementation of CRYSTALS-Kyber with AI Accelerator. IACR Cryptol. ePrint Arch. 2022: 881 (2022)- 2021
[j2]Lili Gao
, Fangyu Zheng
, Rong Wei
, Jiankuo Dong, Niall Emmart, Yuan Ma
, Jingqiang Lin, Charles C. Weems
:
DPF-ECC: A Framework for Efficient ECC With Double Precision Floating-Point Computing Power. IEEE Trans. Inf. Forensics Secur. 16: 3988-4002 (2021)
[c9]Rong Wei, Fangyu Zheng, Lili Gao, Jiankuo Dong, Guang Fan, Lipeng Wan, Jingqiang Lin, Yuewu Wang:
Heterogeneous-PAKE: Bridging the Gap between PAKE Protocols and Their Real-World Deployment. ACSAC 2021: 76-90
[c8]Guang Fan, Fangyu Zheng, Jiankuo Dong, Jingqiang Lin, Lili Gao, Rong Wei, Lipeng Wan:
SECCEG: A Secure and Efficient Cryptographic Co-processor Based on Embedded GPU System. WASA (2) 2021: 107-122
[c7]Jiankuo Dong, Guang Fan, Fangyu Zheng, Jingqiang Lin, Fu Xiao:
TX-RSA: A High Performance RSA Implementation Scheme on NVIDIA Tegra X2. WASA (2) 2021: 210-222- 2020
[c6]Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Guang Fan, Jiankuo Dong:
SEGIVE: A Practical Framework of Secure GPU Execution in Virtualization Environment. IPCCC 2020: 1-10
[c5]Lili Gao, Fangyu Zheng, Niall Emmart, Jiankuo Dong, Jingqiang Lin, Charles C. Weems:
DPF-ECC: Accelerating Elliptic Curve Cryptography with Floating-Point Computing Power of GPUs. IPDPS 2020: 494-504
2010 – 2019
- 2018
[c4]Jiankuo Dong, Fangyu Zheng, Juanjuan Cheng, Jingqiang Lin, Wuqiong Pan
, Ziyang Wang:
Towards High-performance X25519/448 Key Agreement in General Purpose GPUs. CNS 2018: 1-9
[c3]Ziyang Wang, Fangyu Zheng, Jingqiang Lin, Jiankuo Dong:
Utilizing GPU Virtualization to Protect the Private Keys of GPU Cryptographic Computation. ICICS 2018: 142-157
[c2]Jiankuo Dong, Fangyu Zheng, Niall Emmart, Jingqiang Lin, Charles C. Weems:
sDPF-RSA: Utilizing Floating-point Computing Power of GPUs for Massive Digital Signature Computations. IPDPS 2018: 599-609
[c1]Shiran Pan, Qiongxiao Wang, Fangyu Zheng, Jiankuo Dong:
Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation. WASA 2018: 374-386- 2017
[j1]Jiankuo Dong
, Fangyu Zheng
, Wuqiong Pan, Jingqiang Lin, Jiwu Jing, Yuan Zhao:
Utilizing the Double-Precision Floating-Point Computing Power of GPUs for RSA Acceleration. Secur. Commun. Networks 2017: 3508786:1-3508786:15 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-26 01:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







