Anjia Yang

Orcid: 0000-0002-7958-6571

According to our database1, Anjia Yang authored at least 67 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace.
IEEE Internet Things J., April, 2024

Multi-Motion Segmentation via Co-Attention-Induced Heterogeneous Model Fitting.
IEEE Trans. Circuits Syst. Video Technol., March, 2024

Enabling Secure and Flexible Streaming Media With Blockchain Incentive.
IEEE Internet Things J., January, 2024

PriGenX: Privacy-Preserving Query With Anonymous Access Control for Genomic Data.
IEEE Trans. Dependable Secur. Comput., 2024

Multi-Client Secure and Efficient DPF-Based Keyword Search for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers.
IEEE Internet Things J., September, 2023

Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023

Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing.
Inf. Sci., May, 2023

Fully privacy-preserving location recommendation in outsourced environments.
Ad Hoc Networks, March, 2023

Concurrent and efficient IoT data trading based on probabilistic micropayments.
Wirel. Networks, February, 2023

PPOLQ: Privacy-Preserving Optimal Location Query With Multiple-Condition Filter in Outsourced Environments.
IEEE Trans. Serv. Comput., 2023

A Blockchain-Based Copyright Protection Scheme With Proactive Defense.
IEEE Trans. Serv. Comput., 2023

Fuzzy Identity-Based Matchmaking Encryption and Its Application.
IEEE Trans. Inf. Forensics Secur., 2023

pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing.
IEEE Trans. Inf. Forensics Secur., 2023

Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study With Multi-Party Computation.
IEEE Trans. Dependable Secur. Comput., 2023

Enabling Traceable and Verifiable Multi-User Forward Secure Searchable Encryption in Hybrid Cloud.
IEEE Trans. Cloud Comput., 2023

Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead.
IACR Cryptol. ePrint Arch., 2023

Fusion: Efficient and Secure Inference Resilient to Malicious Servers.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

2022
Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022

Dynamic Multitarget Detection Algorithm of Voxel Point Cloud Fusion Based on PointRCNN.
IEEE Trans. Intell. Transp. Syst., 2022

Revisiting Error-Correction in Precommitment Distance-Bounding Protocols.
IEEE Trans. Ind. Informatics, 2022

Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2022

DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET.
IEEE Internet Things J., 2022

Cross-Domain Identity-based Matchmaking Encryption.
IACR Cryptol. ePrint Arch., 2022

GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks.
IACR Cryptol. ePrint Arch., 2022

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder.
CoRR, 2022

Fusion: Efficient and Secure Inference Resilient to Malicious Server and Curious Clients.
CoRR, 2022

2021
Decentralized Anonymous Authentication With Fair Billing for Space-Ground Integrated Networks.
IEEE Trans. Veh. Technol., 2021

Preventing Overshadowing Attacks in Self-Jamming Audio Channels.
IEEE Trans. Dependable Secur. Comput., 2021

Looking Back! Using Early Versions of Android Apps as Attack Vectors.
IEEE Trans. Dependable Secur. Comput., 2021

Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage.
IEEE Trans. Cloud Comput., 2021

A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing.
KSII Trans. Internet Inf. Syst., 2021

Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns.
IEEE Internet Things J., 2021

Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE.
IACR Cryptol. ePrint Arch., 2021

Efficient and Fully Secure Lattice-Based IBE with Equality Test.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing-Based Smart Grid.
IEEE Trans. Smart Grid, 2020

Energy-Efficient Distance-Bounding with Residual Charge Computation.
IEEE Trans. Emerg. Top. Comput., 2020

Towards Interpreting Smart Contract against Contract Fraud: A Practical and Automatic Realization.
IACR Cryptol. ePrint Arch., 2020

A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks.
Comput. J., 2020

Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation.
IEEE Trans. Veh. Technol., 2019

Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks.
IEEE Trans. Veh. Technol., 2019

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing.
IEEE Trans. Parallel Distributed Syst., 2019

Security Implications of Implementing Multistate Distance-Bounding Protocols.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close.
IEEE Trans. Mob. Comput., 2018

REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks.
IEEE Netw., 2018

OTP-IoT: An ownership transfer protocol for the Internet of Things.
J. Inf. Secur. Appl., 2018

Notes on a provably-secure certificate-based encryption against malicious CA attacks.
Inf. Sci., 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018

HB+DB: Distance bounding meets human based authentication.
Future Gener. Comput. Syst., 2018

Fully distributed certificateless threshold signature without random oracles.
Sci. China Inf. Sci., 2018

2017
A New ADS-B Authentication Framework Based on Efficient Hierarchical Identity-Based Signature with Batch Verification.
IEEE Trans. Serv. Comput., 2017

Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC.
Secur. Commun. Networks, 2017

Security Analysis of Some Diffusion Mechanisms Used in Chaotic Ciphers.
Int. J. Bifurc. Chaos, 2017

CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing.
IACR Cryptol. ePrint Arch., 2017

RFID and Contactless Technology.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

2016
Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization.
Comput. Networks, 2016

Lightweight Delegatable Proofs of Storage.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
A new unpredictability-based radio frequency identification forward privacy model and a provably secure construction.
Secur. Commun. Networks, 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

2014
Lightweight and Privacy-Preserving Delegatable Proofs of Storage.
IACR Cryptol. ePrint Arch., 2014

2013
A Highly Efficient RFID Distance Bounding Protocol without Real-Time PRF Evaluation.
Proceedings of the Network and System Security - 7th International Conference, 2013

A New Unpredictability-Based RFID Privacy Model.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.
Proceedings of the Information and Communications Security - 14th International Conference, 2012


  Loading...