default search action
Chengliang Tian
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Duo Wu, Leibo Li, Weizhong Tian, Hequn Xian, Chengliang Tian:
Biometric identification on the cloud: A more secure and faster construction. Inf. Sci. 669: 120553 (2024) - [j28]Yunfeng Wang, Yi Zhou, Hao Wu, Xiyu Liu, Xiaodi Zhai, Kuizhi Sun, Chengliang Tian, Haixia Zhao, Tao Li, Wenguang Jia, Yan Zhang:
MFCANet: A road scene segmentation network based on Multi-Scale feature fusion and context information aggregation. J. Vis. Commun. Image Represent. 98: 104055 (2024) - [j27]Chengliang Tian, Jia Yu, Panpan Meng, Guoyan Zhang, Weizhong Tian, Yan Zhang:
How to Securely and Efficiently Solve the Large-Scale Modular System of Linear Equations on the Cloud. IEEE Trans. Cloud Comput. 12(3): 913-927 (2024) - 2023
- [j26]Yao Lu, Yankang Chang, Zhouzhou Zheng, Yingwei Sun, Mengmeng Zhao, Bin Yu, Chengliang Tian, Yan Zhang:
GMetaNet: Multi-scale ghost convolutional neural network with auxiliary MetaFormer decoding path for brain tumor segmentation. Biomed. Signal Process. Control. 83: 104694 (2023) - [j25]Kun Yang, Chengliang Tian, Hequn Xian, Weizhong Tian, Yan Zhang:
Query on the cloud: improved privacy-preserving k-nearest neighbor classification over the outsourced database. World Wide Web (WWW) 26(4): 1747-1774 (2023) - 2022
- [j24]Xin Sun, Chengliang Tian, Weizhong Tian, Yan Zhang:
Privacy-Enhanced and Verifiable Compressed Sensing Reconstruction for Medical Image Processing on the Cloud. IEEE Access 10: 18134-18145 (2022) - [j23]Linlin Yang, Chengliang Tian, Gongjing Zhang, Leibo Li, Huanli Wang:
Efficient Biometric Identification on the Cloud With Privacy Preservation Guarantee. IEEE Access 10: 115520-115531 (2022) - [j22]Xin Sun, Chengliang Tian, Changhui Hu, Weizhong Tian, Hanlin Zhang, Jia Yu:
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance. Comput. Secur. 118: 102740 (2022) - [j21]Xiulan Li, Jingguo Bi, Chengliang Tian, Hanlin Zhang, Jia Yu, Yanbin Pan:
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things. IEEE Internet Things J. 9(9): 6790-6802 (2022) - [j20]Yuhang Shao, Chengliang Tian, Lidong Han, Hequn Xian, Jia Yu:
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier. IEEE Internet Things J. 9(21): 21648-21661 (2022) - [j19]Junling Guo, Lidong Han, Guang Yang, Xuejiao Liu, Chengliang Tian:
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. J. Cloud Comput. 11: 14 (2022) - [j18]Guang Yang, Junling Guo, Lidong Han, Xuejiao Liu, Chengliang Tian:
An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy. Peer-to-Peer Netw. Appl. 15(1): 503-515 (2022) - [j17]Jun Che, Chengliang Tian, Yupeng Jiang, Guangwu Xu:
Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited. IEEE Trans. Inf. Theory 68(2): 1316-1328 (2022) - [j16]Chengliang Tian, Jia Yu, Hanlin Zhang, Haiyang Xue, Cong Wang, Kui Ren:
Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus. IEEE Trans. Serv. Comput. 15(1): 241-253 (2022) - [i4]Lidong Han, Guangwu Xu, Qi Xie, Xiao Tan, Chengliang Tian:
Cryptanalysis of an Identity-Based Provable Data Possession Protocol with Compressed Cloud Storage. IACR Cryptol. ePrint Arch. 2022: 581 (2022) - 2021
- [j15]Lidong Han, Junling Guo, Guang Yang, Qi Xie, Chengliang Tian:
An Efficient and Secure Public Key Authenticated Encryption With Keyword Search in the Logarithmic Time. IEEE Access 9: 151245-151253 (2021) - [j14]Yunhai Zheng, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. J. Comput. Syst. Sci. 121: 18-33 (2021) - [j13]Xudong Deng, Chengliang Tian, Fei Chen, Hequn Xian:
Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems. Mob. Inf. Syst. 2021: 2807395:1-2807395:15 (2021) - [c2]Xiulan Li, Yanbin Pan, Chengliang Tian:
Cloud-Assisted LLL: A Secure and Efficient Outsourcing Algorithm for Approximate Shortest Vector Problem. ISPEC 2021: 223-241 - 2020
- [j12]Wei Zhao, Chengliang Tian, Weizhong Tian, Yan Zhang:
Securely and Efficiently Computing the Hermite Normal Form of Integer Matrices via Cloud Computing. IEEE Access 8: 137616-137630 (2020) - [j11]Hanlin Zhang, Jia Yu, Chengliang Tian, Guobin Xu, Peng Gao, Jie Lin:
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things. IEEE Internet Things J. 7(4): 2968-2981 (2020) - [j10]Hanlin Zhang, Jia Yu, Chengliang Tian, Le Tong, Jie Lin, Linqiang Ge, Huaqun Wang:
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. IEEE Internet Things J. 7(8): 6868-6881 (2020) - [j9]Qiang Zhou, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields. Inf. Sci. 512: 641-660 (2020)
2010 – 2019
- 2019
- [j8]Shengxia Zhang, Chengliang Tian, Hanlin Zhang, Jia Yu, Fengjun Li:
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method. IEEE Access 7: 53823-53838 (2019) - [j7]Panpan Meng, Chengliang Tian, Xiangguo Cheng:
Publicly verifiable and efficiency/security-adjustable outsourcing scheme for solving large-scale modular system of linear equations. J. Cloud Comput. 8: 24 (2019) - 2018
- [j6]Hanlin Zhang, Jia Yu, Chengliang Tian, Pu Zhao, Guobin Xu, Jie Lin:
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing. IEEE Access 6: 40713-40722 (2018) - 2017
- [j5]Qianqian Su, Jia Yu, Chengliang Tian, Hanlin Zhang, Rong Hao:
How to securely outsource the inversion modulo a large composite number. J. Syst. Softw. 129: 26-34 (2017) - 2016
- [j4]Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl. 62: 112-127 (2016) - 2015
- [j3]Chengliang Tian, Wei Wei, Dongdai Lin:
Solving Closest Vector Instances Using an Approximate Shortest Independent Vectors Oracle. J. Comput. Sci. Technol. 30(6): 1370-1377 (2015) - 2014
- [j2]Chengliang Tian, Lidong Han, Guangwu Xu:
A polynomial time algorithm for GapCVPP in l 1 norm. Sci. China Inf. Sci. 57(3): 1-7 (2014) - [j1]Wei Wei, Chengliang Tian, Xiaoyun Wang:
New transference theorems on lattices possessing n∈-unique shortest vectors. Discret. Math. 315-316: 144-155 (2014) - [i3]Chengliang Tian, Wei Wei, Dongdai Lin:
Solving closest vector instances using an approximate shortest independent vectors oracle. IACR Cryptol. ePrint Arch. 2014: 545 (2014) - 2012
- [i2]Wei Wei, Chengliang Tian, Xiaoyun Wang:
New Transference Theorems on Lattices Possessing nε-unique Shortest Vectors. IACR Cryptol. ePrint Arch. 2012: 293 (2012) - 2011
- [c1]Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi:
Improved Nguyen-Vidick heuristic sieve algorithm for shortest vector problem. AsiaCCS 2011: 1-9 - 2010
- [i1]Xiaoyun Wang, Mingjie Liu, Chengliang Tian, Jingguo Bi:
Improved Nguyen-Vidick Heuristic Sieve Algorithm for Shortest Vector Problem. IACR Cryptol. ePrint Arch. 2010: 647 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint