default search action
Shiyuan Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Qianheng Yang, Yuer Yang, Shiyuan Xu, Rongrong Guo, Huiguang Xian, Yifeng Lin, Xue Chen, Wuzheng Tan, Siu-Ming Yiu:
PPCT: Privacy-Preserving Contact Tracing Using Concise Private Set Intersection Cardinality. J. Netw. Syst. Manag. 32(4): 97 (2024) - [j6]Xue Chen, Shiyuan Xu, Shang Gao, Yu Guo, Siu-Ming Yiu, Bin Xiao:
FS-LLRS: Lattice-Based Linkable Ring Signature With Forward Security for Cloud-Assisted Electronic Medical Records. IEEE Trans. Inf. Forensics Secur. 19: 8875-8891 (2024) - [c15]Shiyuan Xu, Yibo Cao, Xue Chen, Yu Guo, Yuer Yang, Fangda Guo, Siu-Ming Yiu:
Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management. CIKM 2024: 2702-2711 - [c14]Xinying Zhu, Liqing Geng, Genghuang Yang, Yang Huo, Shiyuan Xu:
Prediction of Heat Load of Thermal Station Based on Neural Network. ICCCV 2024: 47-54 - [c13]Bo Chen, Yongxin Zhu, Yu Guo, Shiyuan Xu:
TurboFed: A Federated Learning Approach to The PHM of Distributed Wind Turbines. HPSC 2024: 105-109 - [i7]Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Gang Xu, Siu-Ming Yiu:
Lattice-based Broadcast Authenticated Searchable Encryption for Cloud Storage. IACR Cryptol. ePrint Arch. 2024: 761 (2024) - [i6]Shiyuan Xu, Xue Chen, Yu Guo, Siu-Ming Yiu, Shang Gao, Bin Xiao:
Efficient and Secure Post-Quantum Certificateless Signcryption for Internet of Medical Things. IACR Cryptol. ePrint Arch. 2024: 965 (2024) - [i5]Yibo Cao, Shiyuan Xu, Xiu-Bo Chen, Siu-Ming Yiu:
RABAEKS: Revocable Attribute-based Authenticated Encrypted Search over Lattice for Multi-receiver Cloud Storage. IACR Cryptol. ePrint Arch. 2024: 1302 (2024) - 2023
- [j5]Xue Chen, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
AQRS: Anti-quantum ring signature scheme for secure epidemic control with blockchain. Comput. Networks 224: 109595 (2023) - [j4]Gang Xu, Fan Yun, Shiyuan Xu, Yiying Yu, Xiu-Bo Chen, Mianxiong Dong:
A blockchain-based log storage model with efficient query. Soft Comput. 27(19): 13779-13787 (2023) - [c12]Shiyuan Xu, Yibo Cao, Xue Chen, Yanmin Zhao, Siu-Ming Yiu:
Post-Quantum Public-Key Authenticated Searchable Encryption with Forward Security: General Construction, and Applications. Inscrypt (1) 2023: 274-298 - [c11]Shiyuan Xu, Xue Chen, Weimin Kong, Yibo Cao, Yunhua He, Ke Xiao:
An Efficient Blockchain-based Privacy-Preserving Authentication Scheme in VANET. VTC2023-Spring 2023: 1-6 - [i4]Gang Xu, Shiyuan Xu, Yibo Cao, Ke Xiao, Xiu-Bo Chen, Mianxiong Dong, Shui Yu:
AAQ-PEKS: An Attribute-based Anti-Quantum Public-Key Encryption Scheme with Keyword Search for E-healthcare Scenarios. IACR Cryptol. ePrint Arch. 2023: 349 (2023) - [i3]Shiyuan Xu, Yibo Cao, Xue Chen, Siu-Ming Yiu, Yanmin Zhao:
Post-Quantum Public-key Authenticated Searchable Encryption with Forward Security: General Construction, Implementation, and Applications. IACR Cryptol. ePrint Arch. 2023: 591 (2023) - [i2]Shiyuan Xu, Yibo Cao, Xue Chen, Yuer Yang, Siu-Ming Yiu:
Lattice-based Public Key Encryption with Authorized Keyword Search: Construction, Implementation, and Applications. IACR Cryptol. ePrint Arch. 2023: 1715 (2023) - 2022
- [j3]Yibo Cao, Shiyuan Xu, Xue Chen, Yunhua He, Shuo Jiang:
A forward-secure and efficient authentication protocol through lattice-based group signature in VANETs scenarios. Comput. Networks 214: 109149 (2022) - [j2]Gang Xu, Yibo Cao, Shiyuan Xu, Ke Xiao, Xin Liu, Xiubo Chen, Mianxiong Dong:
A Novel Post-Quantum Blind Signature for Log System in Blockchain. Comput. Syst. Sci. Eng. 41(3): 945-958 (2022) - [j1]Jin Ren, Yuyang Cheng, Shiyuan Xu:
EDPPA: An efficient distance-based privacy preserving authentication protocol in VANET. Peer-to-Peer Netw. Appl. 15(3): 1385-1397 (2022) - [c10]Shiyuan Xu, Yingjie Shi, Tong Feng, Huayi Yuan:
ShoeMaster: A Benchmark for Sketch2Image Translation of Shoes. Bench 2022: 55-69 - [c9]Xue Chen, Shiyuan Xu, Yunhua He, Yu Cui, Jiahuan He, Shang Gao:
LFS-AS: Lightweight Forward Secure Aggregate Signature for e-Health Scenarios. ICC 2022: 1239-1244 - [c8]Shiyuan Xu, Xue Chen, Yunhua He, Yibo Cao, Shang Gao:
VMT: Secure VANETs Message Transmission Scheme with Encryption and Blockchain. WASA (1) 2022: 244-257 - [c7]Yuyang Cheng, Shiyuan Xu, Yibo Cao, Yunhua He, Ke Xiao:
SBA-GT: A Secure Bandwidth Allocation Scheme with Game Theory for UAV-Assisted VANET Scenarios. WASA (2) 2022: 356-364 - [c6]Yijie Yan, Shiyuan Xu:
CA-Free Real-Time Fuzzy Digital Signature Scheme. WASA (1) 2022: 479-490 - [c5]Xue Chen, Shiyuan Xu, Tao Qin, Yu Cui, Shang Gao, Weimin Kong:
AQ-ABS: Anti-Quantum Attribute-based Signature for EMRs Sharing with Blockchain. WCNC 2022: 1176-1181 - [i1]Hongxiao Wang, Zoe Lin Jiang, Yanmin Zhao, Siu-Ming Yiu, Peng Yang, Zejiu Tan, Bohan Jin, Shiyuan Xu, Shimin Pan:
Securer and Faster Privacy-Preserving Distributed Machine Learning. CoRR abs/2211.09353 (2022) - 2021
- [c4]Yuyang Cheng, Shiyuan Xu, Miao Zang, Weimin Kong:
LPPA: A Lightweight Privacy-Preserving Authentication Scheme for the Internet of Drones. ICCT 2021: 656-661 - [c3]Shiyuan Xu, Xue Chen, Chao Wang, Yunhua He, Ke Xiao, Yibo Cao:
A Lattice-Based Ring Signature Scheme to Secure Automated Valet Parking. WASA (2) 2021: 70-83
2010 – 2019
- 2013
- [c2]Jungang Dong, Jun Wang, Zhenlou Chen, Shiyuan Xu:
The risk scenario analysis of typhoon gale in eastern coastal area of China. Geoinformatics 2013: 1-6 - 2010
- [c1]Jie Yin, Shiyuan Xu, Jun Wang, Haidong Zhong, Yingjie Hu, Zhane Yin, Kangfasheng Wang, Xinjian Zhang:
Vulnerability assessment of combined impacts of sea level rise and coastal flooding for China's coastal region using remote sensing and GIS. Geoinformatics 2010: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint