default search action
Qi Jiang 0001
Person information
- affiliation: Xidian University, Xi'an, China
Other persons with the same name
- Qi Jiang — disambiguation page
- Qi Jiang 0002 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China (and 1 more)
- Qi Jiang 0003 — Université Paris XI, Orsay, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Guichuan Zhao, Qi Jiang, Ding Wang, Xindi Ma, Xinghua Li:
Deep Hashing Based Cancelable Multi-Biometric Template Protection. IEEE Trans. Dependable Secur. Comput. 21(4): 3751-3767 (2024) - [j69]Qi Jiang, Guichuan Zhao, Xindi Ma, Meng Li, Youliang Tian, Xinghua Li:
Cross-Modal Learning Based Flexible Bimodal Biometric Authentication With Template Protection. IEEE Trans. Inf. Forensics Secur. 19: 3593-3607 (2024) - 2023
- [j68]Hui Qiao, Xuewen Dong, Qi Jiang, Siqi Ma, Chao Liu, Ning Xi, Yulong Shen:
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System. IEEE Internet Things J. 10(19): 16715-16726 (2023) - [j67]Zhe Ren, Xinghua Li, Qi Jiang, Yunwei Wang, Jianfeng Ma, Chunyu Miao:
Network Slicing in 6G: An Authentication Framework for Unattended Terminals. IEEE Netw. 37(1): 78-86 (2023) - [j66]Feng Li, Jianfeng Ma, Yinbin Miao, Qi Jiang, Ximeng Liu, Kim-Kwang Raymond Choo:
Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap. IEEE Trans. Cloud Comput. 11(1): 336-348 (2023) - [j65]Xindi Ma, Qi Jiang, Ximeng Liu, Qingqi Pei, Jianfeng Ma, Wenjing Lou:
Learning in Your "Pocket": Secure Collaborative Deep Learning With Membership Privacy. IEEE Trans. Dependable Secur. Comput. 20(3): 2641-2656 (2023) - [j64]Xindi Ma, Qi Jiang, Mohammad Shojafar, Mamoun Alazab, Sachin Kumar, Saru Kumari:
DisBezant: Secure and Robust Federated Learning Against Byzantine Attack in IoT-Enabled MTS. IEEE Trans. Intell. Transp. Syst. 24(2): 2492-2502 (2023) - [j63]Guichuan Zhao, Qi Jiang, Ximeng Liu, Xindi Ma, Ning Zhang, Jianfeng Ma:
Electrocardiogram Based Group Device Pairing for Wearables. IEEE Trans. Mob. Comput. 22(11): 6394-6409 (2023) - 2022
- [j62]Chuang Tian, Qi Jiang, Teng Li, Junwei Zhang, Ning Xi, Jianfeng Ma:
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment. Comput. Networks 218: 109421 (2022) - [j61]Jiawei Zhang, Teng Li, Qi Jiang, Jianfeng Ma:
Enabling efficient traceable and revocable time-based data sharing in smart city. EURASIP J. Wirel. Commun. Netw. 2022(1): 1-26 (2022) - [j60]Xindi Ma, Baopu Li, Qi Jiang, Yimin Chen, Sheng Gao, Jianfeng Ma:
NOSnoop: An Effective Collaborative Meta-Learning Scheme Against Property Inference Attack. IEEE Internet Things J. 9(9): 6778-6789 (2022) - [j59]Junying Zhang, Xindi Ma, Qi Jiang:
A geometric approach to analysing the effects of time delays on stability of vehicular platoons with ring interconnections. Peer-to-Peer Netw. Appl. 15(6): 2542-2556 (2022) - [c12]Yingying Li, Jianfeng Ma, Yinbin Miao, Ximeng Liu, Qi Jiang:
Blockchain-Based Encrypted Image Storage and Search in Cloud Computing. DASFAA (1) 2022: 413-421 - [c11]Shunjie Yuan, Chao Wang, Qi Jiang, Jianfeng Ma:
Community Detection with Graph Neural Network using Markov Stability. ICAIIC 2022: 437-442 - [c10]XinDi Ma, Cunzhu Su, Jianfeng Ma, Qi Jiang, Ning Xi, Sheng Gao, Kang Xie:
Self-Anomaly-Detection Model Training via Initialized Meta Model. NaNA 2022: 471-476 - 2021
- [j58]Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, Xindi Ma, Jianfeng Ma:
Three-factor authentication protocol using physical unclonable function for IoV. Comput. Commun. 173: 45-55 (2021) - [j57]Junshuai Sun, Qi Jiang, Jianfeng Ma, Qingfeng Cheng, Chih-Lin I, Chengguang Yin:
Fuzzy vault-based three-factor authentication and key exchange for 5G-integrated wireless sensor networks. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j56]Guichuan Zhao, Qi Jiang, Xiaohan Huang, Xindi Ma, Youliang Tian, Jian Feng Ma:
Secure and Usable Handshake Based Pairing for Wrist-Worn Smart Devices on Different Users. Mob. Networks Appl. 26(6): 2407-2422 (2021) - [j55]Naijian Zhang, Qi Jiang, Long Li, Xindi Ma, Jianfeng Ma:
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones. Peer-to-Peer Netw. Appl. 14(5): 3319-3332 (2021) - [j54]Jiawei Zhang, Jianfeng Ma, Teng Li, Qi Jiang:
Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing. Secur. Commun. Networks 2021: 6646445:1-6646445:17 (2021) - [j53]Zhe Ren, Xinghua Li, Qi Jiang, Qingfeng Cheng, Jianfeng Ma:
Fast and Universal Inter-Slice Handover Authentication with Privacy Protection in 5G Network. Secur. Commun. Networks 2021: 6694058:1-6694058:19 (2021) - [j52]Qi Jiang, Zhiren Chen, Jianfeng Ma, Xindi Ma, Jian Shen, Dapeng Wu:
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network. IEEE Trans. Emerg. Top. Comput. 9(2): 839-853 (2021) - [j51]Xindi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
PDLM: Privacy-Preserving Deep Learning Model on Cloud with Multiple Keys. IEEE Trans. Serv. Comput. 14(4): 1251-1263 (2021) - [j50]Xinghua Li, Jiao Liu, Mohammad S. Obaidat, Pandi Vijayakumar, Qi Jiang, Ruhul Amin:
An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs. IEEE Trans. Veh. Technol. 70(8): 7992-8006 (2021) - 2020
- [j49]Qingfeng Cheng, Yuting Li, Qi Jiang, Xiong Li:
Security Analysis of Two Unbalancing Pairing-free Identity-based Authenticated Key Exchange Protocols. Int. J. Netw. Secur. 22(4): 597-601 (2020) - [j48]Kai Zhang, Yanping Li, Yun Song, Laifeng Lu, Tao Zhang, Qi Jiang:
A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access. Secur. Commun. Networks 2020: 6661243:1-6661243:14 (2020) - [j47]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang:
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing. IEEE Trans. Serv. Comput. 13(6): 985-998 (2020) - [j46]Fushan Wei, Pandi Vijayakumar, Qi Jiang, Ruijie Zhang:
A Mobile Intelligent Terminal Based Anonymous Authenticated Key Exchange Protocol for Roaming Service in Global Mobility Networks. IEEE Trans. Sustain. Comput. 5(2): 268-278 (2020) - [j45]Qi Jiang, Ning Zhang, Jianbing Ni, Jianfeng Ma, Xindi Ma, Kim-Kwang Raymond Choo:
Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles. IEEE Trans. Veh. Technol. 69(9): 9390-9401 (2020) - [j44]Hui Zhang, Yuanyuan Qian, Qi Jiang:
Provably Secure Crossdomain Multifactor Authentication Protocol for Wearable Health Monitoring Systems. Wirel. Commun. Mob. Comput. 2020: 8818704:1-8818704:13 (2020) - [c9]Xiaohan Huang, Guichuan Zhao, Qi Jiang, Xindi Ma, Youliang Tian, Jianfeng Ma:
Usable and Secure Pairing Based on Handshake for Wrist-Worn Smart Devices on Different Users. CollaborateCom (1) 2020: 493-510 - [c8]Jiao Liu, Xinghua Li, Qi Jiang, Mohammad S. Obaidat, Pandi Vijayakumar:
BUA: A Blockchain-based Unlinkable Authentication in VANETs. ICC 2020: 1-6 - [c7]Xindi Ma, Junying Zhang, Jianfeng Ma, Qi Jiang, Sheng Gao, Kang Xie:
Do Not Perturb Me: A Secure Byzantine-Robust Mechanism for Machine Learning in IoT. NaNA 2020: 348-354
2010 – 2019
- 2019
- [j43]Li Yang, Xiaoyan Jin, Qi Jiang:
Online handwritten signature verification based on the most stable feature and partition. Clust. Comput. 22(Suppl 1): 1691-1701 (2019) - [j42]Qi Jiang, Yuanyuan Qian, Jianfeng Ma, XinDi Ma, Qingfeng Cheng, Fushan Wei:
User centric three-factor authentication protocol for cloud-assisted wearable devices. Int. J. Commun. Syst. 32(6) (2019) - [j41]Qi Jiang, Xiaohan Huang, Ning Zhang, Kuan Zhang, XinDi Ma, Jianfeng Ma:
Shake to Communicate: Secure Handshake Acceleration-Based Pairing Mechanism for Wrist Worn Devices. IEEE Internet Things J. 6(3): 5618-5630 (2019) - [j40]Xiaoqin Feng, Jianfeng Ma, Yinbin Miao, Qian Meng, Ximeng Liu, Qi Jiang, Hui Li:
Pruneable sharding-based blockchain protocol. Peer-to-Peer Netw. Appl. 12(4): 934-950 (2019) - [c6]Qi Jiang, Xin Zhang, Ning Zhang, Youliang Tian, XinDi Ma, Jianfeng Ma:
Two-Factor Authentication Protocol Using Physical Unclonable Function for IoV. ICCC 2019: 195-200 - 2018
- [j39]Yinbin Miao, Jianfeng Ma, Qi Jiang, Xiong Li, Arun Kumar Sangaiah:
Verifiable keyword search over encrypted cloud data in smart city. Comput. Electr. Eng. 65: 90-101 (2018) - [j38]XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
ARMOR: A trust-based privacy-preserving framework for decentralized friend recommendation in online social networks. Future Gener. Comput. Syst. 79: 82-94 (2018) - [j37]Qi Jiang, Zhiren Chen, Bingyan Li, Jian Shen, Li Yang, Jianfeng Ma:
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems. J. Ambient Intell. Humaniz. Comput. 9(4): 1061-1073 (2018) - [j36]Saru Kumari, Ashok Kumar Das, Xiong Li, Fan Wu, Muhammad Khurram Khan, Qi Jiang, SK Hafizul Islam:
A provably secure biometrics-based authenticated key agreement scheme for multi-server environments. Multim. Tools Appl. 77(2): 2359-2389 (2018) - [j35]Qi Jiang, Jianbing Ni, Jianfeng Ma, Li Yang, Xuemin Shen:
Integrated Authentication and Key Agreement Framework for Vehicular Cloud Computing. IEEE Netw. 32(3): 28-35 (2018) - [j34]XinDi Ma, Jianfeng Ma, Hui Li, Qi Jiang, Sheng Gao:
AGENT: an adaptive geo-indistinguishable mechanism for continuous location-based service. Peer-to-Peer Netw. Appl. 11(3): 473-485 (2018) - [j33]Ding Wang, Shujun Li, Qi Jiang:
User Authentication in the IoE Era: Attacks, Challenges, Evaluation, and New Designs. Secur. Commun. Networks 2018: 6150491:1-6150491:2 (2018) - [j32]Qi Jiang, Jianfeng Ma, Fushan Wei:
On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. IEEE Syst. J. 12(2): 2039-2042 (2018) - [c5]Maozhen Liu, Chao Yang, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data. ICC 2018: 1-7 - 2017
- [j31]Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He:
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 5: 3376-3392 (2017) - [j30]Qi Jiang, Jianfeng Ma, Chao Yang, XinDi Ma, Jian Shen, Shehzad Ashraf Chaudhry:
Efficient end-to-end authentication protocol for wearable health monitoring systems. Comput. Electr. Eng. 63: 182-195 (2017) - [j29]XinDi Ma, Hui Li, Jianfeng Ma, Qi Jiang, Sheng Gao, Ning Xi, Di Lu:
APPLET: a privacy-preserving framework for location-aware recommender system. Sci. China Inf. Sci. 60(9): 92101 (2017) - [j28]Qi Jiang, Neeraj Kumar, Jianfeng Ma, Jian Shen, Debiao He, Naveen K. Chilamkurti:
A privacy-aware two-factor authentication protocol based on elliptic curve cryptography for wireless sensor networks. Int. J. Netw. Manag. 27(3) (2017) - [j27]Fushan Wei, Qi Jiang, Ruijie Zhang, Chuangui Ma:
A Privacy-Preserving Multi-Factor Authenticated Key Exchange Protocol with Provable Security for Cloud Computing. J. Inf. Sci. Eng. 33(4): 907-921 (2017) - [j26]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu:
VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob. Comput. 40: 205-219 (2017) - [j25]Chao Yang, Min Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren:
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive Mob. Comput. 41: 243-258 (2017) - [c4]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
A client-based secure deduplication of multimedia data. ICC 2017: 1-6 - 2016
- [j24]Guangsong Li, Qi Jiang, Yanan Shi, Fushan Wei:
Anonymous Network Information Acquirement Protocol for Mobile Users in Heterogeneous Wireless Networks. Int. J. Netw. Secur. 18(1): 193-200 (2016) - [j23]Fushan Wei, Jianfeng Ma, Qi Jiang, Jian Shen, Chuangui Ma:
Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks. Inf. Technol. Control. 45(1): 62-70 (2016) - [j22]Qi Jiang, Xinxin Lian, Chao Yang, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth. J. Medical Syst. 40(11): 231:1-231:10 (2016) - [j21]Qi Jiang, Jianfeng Ma, Fushan Wei, Youliang Tian, Jian Shen, Yuanyuan Yang:
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. J. Netw. Comput. Appl. 76: 37-48 (2016) - [j20]Saru Kumari, Fan Wu, Xiong Li, Mohammad Sabzinejad Farash, Qi Jiang, Muhammad Khurram Khan, Ashok Kumar Das:
Single round-trip SIP authentication scheme with provable security for Voice over Internet Protocol using smart card. Multim. Tools Appl. 75(24): 17215-17245 (2016) - [j19]Shuai Fu, Jianfeng Ma, Hongtao Li, Qi Jiang:
A robust and privacy-preserving aggregation scheme for secure smart grid communications in digital communities. Secur. Commun. Networks 9(15): 2779-2788 (2016) - [j18]Qi Jiang, Muhammad Khurram Khan, Xiang Lu, Jianfeng Ma, Debiao He:
A privacy preserving three-factor authentication protocol for e-Health clouds. J. Supercomput. 72(10): 3826-3849 (2016) - [c3]Qi Jiang, Bingyan Li, Jianfeng Ma:
On the Security of Three-factor Authentication Scheme for Telecare Medical Information Systems. BWCCA 2016: 879-884 - [c2]Qi Jiang, Bingyan Li, Jianfeng Ma, Youliang Tian, Yuanyuan Yang:
Cryptanalysis and Improvement of a Smart Card Based Mutual Authentication Scheme in Cloud Computing. ICCCS (1) 2016: 311-321 - 2015
- [j17]Youliang Tian, Changgen Peng, Dongdai Lin, Jianfeng Ma, Qi Jiang, Wenjiang Ji:
Bayesian mechanism for rational secret sharing scheme. Sci. China Inf. Sci. 58(5): 1-13 (2015) - [j16]Li Yang, Jianfeng Ma, Wenjing Lou, Qi Jiang:
A delegation based cross trusted domain direct anonymous attestation scheme. Comput. Networks 81: 245-257 (2015) - [j15]Qi Jiang, Jianfeng Ma, Guangsong Li, Xinghua Li:
Improvement of robust smart-card-based password authentication scheme. Int. J. Commun. Syst. 28(2): 383-393 (2015) - [j14]Qi Jiang, Jianfeng Ma, Youliang Tian:
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. Int. J. Commun. Syst. 28(7): 1340-1351 (2015) - [j13]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Netw. Appl. 8(6): 1070-1081 (2015) - [j12]Guangsong Li, Qi Jiang, Fushan Wei, Chuangui Ma:
A New Privacy-Aware Handover Authentication Scheme for Wireless Networks. Wirel. Pers. Commun. 80(2): 581-589 (2015) - 2014
- [j11]Qi Jiang, Jianfeng Ma, Xiang Lu, Youliang Tian:
Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Medical Syst. 38(2): 12 (2014) - [j10]Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang:
An Efficient Ticket Based Authentication Protocol with Unlinkability for Wireless Access Networks. Wirel. Pers. Commun. 77(2): 1489-1506 (2014) - 2013
- [j9]Youliang Tian, Jianfeng Ma, Changgen Peng, Qi Jiang:
Fair (t, n) threshold secret sharing scheme. IET Inf. Secur. 7(2) (2013) - [j8]Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma:
An Improved Password-Based Remote User Authentication Protocol without Smart Cards. Inf. Technol. Control. 42(2): 113-123 (2013) - [j7]Qi Jiang, Jianfeng Ma, Zhuo Ma, Guangsong Li:
A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 37(1): 9897 (2013) - [j6]Qi Jiang, Jianfeng Ma, Guangsong Li, Li Yang:
An Enhanced Authentication Scheme with Privacy Preservation for Roaming Service in Global Mobility Networks. Wirel. Pers. Commun. 68(4): 1477-1491 (2013) - 2012
- [j5]Y. Yang, J. Gu, C. Lv, Qi Jiang, W. Ma:
Security analysis of Kulseng et al.'s mutual authentication protocol for RFID systems. IET Inf. Secur. 6(4): 239-248 (2012) - [j4]Li Yang, Jianfeng Ma, Qi Jiang:
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. Int. J. Netw. Secur. 14(3): 156-163 (2012) - 2011
- [j3]Guangsong Li, Jianfeng Ma, Qi Jiang, Xi Chen:
A novel re-authentication scheme based on tickets in wireless local area networks. J. Parallel Distributed Comput. 71(7): 906-914 (2011) - 2010
- [j2]Guangsong Li, Jianfeng Ma, Qi Jiang:
SAM: Secure Access of Media Independent Information Service with User Anonymity. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j1]Yuanyuan Yang, Wenping Ma, Weibo Liu, Qi Jiang:
Security Analysis of the Newest ID-Transfer Scheme for Low-Cost RFID Tags. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(10): 1837-1839 (2010) - [c1]Guangsong Li, Qi Jiang, Jianfeng Ma:
A Novel Localized Authentication Protocol in 3G-WLAN Integrated Networks. ICEE 2010: 1285-1288
Coauthor Index
aka: Xindi Ma
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 21:27 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint