


default search action
Jia-Si Weng 0001
Person information
- affiliation: Jinan University, College of Cyber Security, Guangzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Yijian Zhong
, Wuzheng Tan
, Zhifeng Xu
, Shixin Chen
, Jia-Si Weng
, Jian Weng
:
WVFL: Weighted Verifiable Secure Aggregation in Federated Learning. IEEE Internet Things J. 11(11): 19926-19936 (2024) - [j14]Feixiang Zhao, Jian Weng
, Wenli Xie, Ming Li, Jiasi Weng
:
HRA-secure attribute-based threshold proxy re-encryption from lattices. Inf. Sci. 655: 119900 (2024) - [j13]Shun Hu
, Ming Li
, Jiasi Weng
, Jia-Nan Liu
, Jian Weng
, Zhi Li
:
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting. IEEE Trans. Dependable Secur. Comput. 21(4): 3883-3900 (2024) - [j12]Jia-Si Weng
, Shenglong Yao, Yuefeng Du
, Junjie Huang, Jian Weng
, Cong Wang
:
Proof of Unlearning: Definitions and Instantiation. IEEE Trans. Inf. Forensics Secur. 19: 3309-3323 (2024) - [c3]Tao Huang, Jian Weng, Jia-Si Weng, Min-Rong Chen, Ming Li:
SecFloatPlus: More Accurate Floating-Point Meets Secure Two-Party Computation. ProvSec (1) 2024: 3-22 - [i11]Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng:
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network. CoRR abs/2403.00239 (2024) - 2023
- [j11]Jiasi Weng
, Jian Weng
, Gui Tang, Anjia Yang
, Ming Li
, Jia-Nan Liu
:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. IEEE Trans. Inf. Forensics Secur. 18: 2218-2233 (2023) - 2022
- [j10]Xiaohu Chen, Anjia Yang
, Yao Tong, Jian Weng
, Jiasi Weng
, Tao Li
:
A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET. IEEE Internet Things J. 9(22): 23130-23141 (2022) - [j9]Yuxian Li
, Jian Weng
, Ming Li, Wei Wu
, Jiasi Weng, Jia-Nan Liu
, Shun Hu:
ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero. J. Parallel Distributed Comput. 169: 301-316 (2022) - [j8]Jiasi Weng
, Jian Weng
, Chengjun Cai
, Hongwei Huang, Cong Wang
:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. IEEE Trans. Dependable Secur. Comput. 19(5): 3149-3167 (2022) - [j7]Zhijian Shao
, Jian Weng
, Yue Zhang
, Yongdong Wu
, Ming Li
, Jiasi Weng
, Weiqi Luo
, Shui Yu
:
Peripheral-Free Device Pairing by Randomly Switching Power. IEEE Trans. Dependable Secur. Comput. 19(6): 4240-4254 (2022) - [i10]Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu:
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing. CoRR abs/2201.09186 (2022) - [i9]Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng
, Cong Wang:
Proof of Unlearning: Definitions and Instantiation. CoRR abs/2210.11334 (2022) - 2021
- [j6]Yue Zhang
, Jian Weng
, Jiasi Weng
, Lin Hou, Anjia Yang
, Ming Li, Yang Xiang
, Robert H. Deng
:
Looking Back! Using Early Versions of Android Apps as Attack Vectors. IEEE Trans. Dependable Secur. Comput. 18(2): 652-666 (2021) - [j5]Jiasi Weng, Jian Weng, Jilian Zhang, Ming Li, Yue Zhang
, Weiqi Luo:
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive. IEEE Trans. Dependable Secur. Comput. 18(5): 2438-2455 (2021) - [c2]Jiasi Weng, Jian Weng
, Hongwei Huang, Chengjun Cai
, Cong Wang:
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. INFOCOM 2021: 1-10 - [c1]Jinghang Wen
, Jia-Nan Liu, Axin Wu, Jiasi Weng:
A General Framework for Matching Pattern Hiding in Deep Packet Inspection. WISA 2021: 243-254 - [i8]Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Robert H. Deng:
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability. IACR Cryptol. ePrint Arch. 2021: 1244 (2021) - 2020
- [j4]Congge Xie, Jian Weng
, Jiasi Weng, Lin Hou:
Scalable revocable identity-based signature over lattices in the standard model. Inf. Sci. 518: 29-38 (2020) - [j3]Kai He, Jun Guo, Jian Weng
, Jiasi Weng
, Joseph K. Liu
, Xun Yi
:
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data. IEEE Trans. Dependable Secur. Comput. 17(6): 1207-1217 (2020) - [i7]Jiasi Weng, Jian Weng, Yue Zhang, Ming Li, Zhaodi Wen:
SecEL: Privacy-Preserving, Verifiable and Fault-Tolerant Edge Learning for Autonomous Vehicles. CoRR abs/2001.09624 (2020) - [i6]Zhijian Shao, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, Shui Yu:
Peripheral-free Device Pairing by Randomly Switching Power. CoRR abs/2002.11288 (2020) - [i5]Jiasi Weng, Jian Weng, Chengjun Cai, Hongwei Huang, Cong Wang:
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS. CoRR abs/2011.06458 (2020) - [i4]Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang:
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism. CoRR abs/2012.10566 (2020)
2010 – 2019
- 2019
- [j2]Jia-Si Weng
, Jian Weng
, Yue Zhang
, Weiqi Luo
, Weiming Lan:
BENBI: Scalable and Dynamic Access Control on the Northbound Interface of SDN-Based VANET. IEEE Trans. Veh. Technol. 68(1): 822-831 (2019) - [i3]Jiasi Weng, Jian Weng, Jia-Nan Liu, Yue Zhang
:
Secure Software-Defined Networking Based on Blockchain. CoRR abs/1906.04342 (2019) - [i2]Yue Zhang
, Jian Weng, Jiasi Weng, Ming Li, Weiqi Luo:
Onionchain: Towards Balancing Privacy and Traceability of Blockchain-Based Applications. CoRR abs/1909.03367 (2019) - 2018
- [j1]Xin Chen, Jian Weng
, Wei Lu
, Jiaming Xu, Jiasi Weng:
Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition. IEEE Trans. Neural Networks Learn. Syst. 29(9): 3938-3952 (2018) - [i1]Jiasi Weng, Jian Weng, Ming Li, Yue Zhang, Weiqi Luo:
DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-based Incentive. IACR Cryptol. ePrint Arch. 2018: 679 (2018)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-24 22:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint