default search action
Jianye Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Kaifeng Xiao, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang:
A lattice-based public key encryption scheme with delegated equality test. Comput. Stand. Interfaces 87: 103758 (2024) - [j20]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
An Identity-Based Encryption with Equality Test scheme for healthcare social apps. Comput. Stand. Interfaces 87: 103759 (2024) - [j19]Shuang Lin, Jianye Huang, Chenxiang Lin, Zhou Zheng, Deming He, Teng Ma, Xinxin Wu:
Application of automatic structured pruning method based on YOLO in power operation scenarios. Intell. Decis. Technol. 18(4): 3323-3332 (2024) - [j18]Kaifeng Xiao, Xinjian Chen, Hongbo Li, Jianye Huang, Willy Susilo, Qiong Huang:
A fully secure lattice-based signcryption with designated equality test in standard model. Inf. Sci. 658: 120015 (2024) - [c10]Bingqian Liu, Xinxin Wu, Deng Pan, Yanyu Chen, Jianye Huang, Feilong Liao, Shuang Lin:
Enhancing Large Language Models with Graph-Based Node Sampling for Fault Attribution in Power Distribution Networks. ICIC (13) 2024: 444-455 - [c9]Feilong Liao, Jianye Huang, Qichuan Liu, Xinjie Peng, Bingqian Liu, Xinxin Wu, Jian Qian:
TCEKG: A Temporal and Causal Event Knowledge Graph for Power Distribution Network Fault Diagnosis. ICIC (12) 2024: 505-517 - 2023
- [j17]Xinmin Yang, Xinjian Chen, Jianye Huang, Hongbo Li, Qiong Huang:
FS-IBEKS: Forward secure identity-based encryption with keyword search from lattice. Comput. Stand. Interfaces 86: 103732 (2023) - [j16]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang:
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. Future Gener. Comput. Syst. 145: 511-520 (2023) - [j15]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. Inf. 14(3): 142 (2023) - [j14]Junbin Liang, Jianye Huang, Qiong Huang, Liantao Lan, Man Ho Allen Au:
A Lattice-Based Certificateless Traceable Ring Signature Scheme. Inf. 14(3): 160 (2023) - [j13]Qiong Huang, Peisen Huang, Hongbo Li, Jianye Huang, Hongyuan Lin:
A more efficient public-key authenticated encryption scheme with keyword search. J. Syst. Archit. 137: 102839 (2023) - [j12]Junbin Liang, Qiong Huang, Jianye Huang, Liantao Lan, Man Ho Allen Au:
An identity-based traceable ring signatures based on lattice. Peer Peer Netw. Appl. 16(2): 1270-1285 (2023) - [j11]Hongbo Li, Qiong Huang, Jianye Huang, Willy Susilo:
Public-Key Authenticated Encryption With Keyword Search Supporting Constant Trapdoor Generation and Fast Search. IEEE Trans. Inf. Forensics Secur. 18: 396-410 (2023) - [c8]Yanyu Chen, Jianye Huang, Jian Qian, Longqiang Yi, Jinhu Li, Jiangsheng Huang, Zhihong Zhang:
A Novel Approach to Analyzing Defects: Enhancing Knowledge Graph Embedding Models for Main Electrical Equipment. ICIC (5) 2023: 715-725 - [c7]Jianye Huang, Jian Qian, Yanyu Chen, Rui Lin, Yuyou Weng, Guoqing Lin, Zhihong Zhang:
Improve Knowledge Graph Completion for Diagnosing Defects in Main Electrical Equipment. ICIC (5) 2023: 738-748 - 2022
- [j10]Jianye Huang, Willy Susilo, Fuchun Guo, Ge Wu, Zhen Zhao, Qiong Huang:
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*. IEEE Trans. Dependable Secur. Comput. 19(2): 1280-1291 (2022) - [c6]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. ProvSec 2022: 20-35 - 2021
- [c5]Xinjian Chen, Qiong Huang, Jianye Huang:
A Novel Certificateless Multi-signature Scheme over NTRU Lattices. ISPEC 2021: 345-362 - [c4]Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan Xiao, Jianye Huang, Guomin Yang:
Public Key Encryption with Fuzzy Matching. ProvSec 2021: 39-62 - 2020
- [j9]Yuanhao Wang, Yuzhao Cui, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang:
Attribute-Based Equality Test Over Encrypted Data Without Random Oracles. IEEE Access 8: 32891-32903 (2020) - [j8]Jianye Huang, Qiong Huang, Willy Susilo:
Leakage-resilient group signature: Definitions and constructions. Inf. Sci. 509: 119-132 (2020)
2010 – 2019
- 2019
- [j7]Yuanhao Wang, Qiong Huang, Hongbo Li, Jianye Huang, Guomin Yang, Willy Susilo:
Public Key Authenticated Encryption With Designated Equality Test and its Applications in Diagnostic Related Groups. IEEE Access 7: 135999-136011 (2019) - [j6]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. Comput. J. 62(8): 1166-1177 (2019) - [j5]Jianye Huang, Qiong Huang, Willy Susilo:
Leakage-resilient ring signature schemes. Theor. Comput. Sci. 759: 1-13 (2019) - [c3]Jianhua He, Andrew Radford, Laura Li, Zhiliang Xiong, Zuoyin Tang, Xiaoming Fu, Supeng Leng, Fan Wu, Kaisheng Huang, Jianye Huang, Jie Zhang, Yan Zhang:
Cooperative Connected Autonomous Vehicles (CAV): Research, Applications and Challenges. ICNP 2019: 1-6 - [i3]Jianye Huang, Qiong Huang:
Leakage-Resilient Group Signature: Definitions and Constructions. IACR Cryptol. ePrint Arch. 2019: 2 (2019) - 2018
- [j4]Jianye Huang, Qiong Huang, Willy Susilo:
Leakage-Resilient Dual-Form Signatures. Comput. J. 61(8): 1216-1227 (2018) - [j3]Jianye Huang, Qiong Huang:
Black-box constructions of signature schemes in the bounded leakage setting. Inf. Sci. 423: 313-325 (2018) - [j2]Zhengquan Cai, Shujuan Zhu, Huihuang Xie, Rongjin Zheng, Jianye Huang, Han Wu:
Modeling and Optimization of The Four-Coil Wireless Power Transfer System. J. Inf. Hiding Multim. Signal Process. 9(5): 1072-1079 (2018) - [c2]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test. Inscrypt 2018: 448-467 - [i2]Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang:
Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification. IACR Cryptol. ePrint Arch. 2018: 1058 (2018) - 2017
- [j1]Jianye Huang, Qiong Huang, Chunhua Pan:
A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting. Int. J. Found. Comput. Sci. 28(6): 761-780 (2017) - [i1]Qiong Huang, Jianye Huang:
Black-Box Constructions of Signature Schemes in the Bounded Leakage Setting. IACR Cryptol. ePrint Arch. 2017: 619 (2017) - 2016
- [c1]Jianye Huang, Qiong Huang, Chunhua Pan:
A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model. ProvSec 2016: 320-339
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint