Haibo Hong

Orcid: 0000-0003-2908-8651

According to our database1, Haibo Hong authored at least 30 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DLPM: A dynamic location protection mechanism supporting continuous queries.
Concurr. Comput. Pract. Exp., 2023

NLSP: A novel lattice-based secure primitive for privacy-preserving smart grid communications.
Concurr. Comput. Pract. Exp., 2023

Bab: A novel algorithm for training clean model based on poisoned data.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
Cyclic preparation of two-qubit state in two noisy environments.
Quantum Inf. Process., 2022

A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices.
J. Parallel Distributed Comput., 2022

A CCA secure public key encryption scheme based on finite groups of Lie type.
Sci. China Inf. Sci., 2022

2021
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices.
Future Gener. Comput. Syst., 2021

A Novel Protection Method of Continuous Location Sharing Based on Local Differential Privacy and Conditional Random Field.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

A Certificateless Verifiable Strong Designated Verifier Signature Scheme.
IEEE Access, 2019

A Secure Trust-Based Key Distribution With Self-Healing for Internet of Things.
IEEE Access, 2019

A New Secure Encryption Scheme Based on Group Factorization Problem.
IEEE Access, 2019

2018
Primitives towards verifiable computation: a survey.
Frontiers Comput. Sci., 2018

50 million atoms scale molecular dynamics modelling on a single consumer graphics card.
Adv. Eng. Softw., 2018

2017
Minimum length key in MST cryptosystems.
Sci. China Inf. Sci., 2017

Prediction of Rising Stars in the Game of Cricket.
IEEE Access, 2017

Minimal logarithmic signatures for one type of classical groups.
Appl. Algebra Eng. Commun. Comput., 2017

2016
Ontology-based conceptual design for ultra-precision hydrostatic guideways with human-machine interaction.
J. Ind. Inf. Integr., 2016

Ontology-based human-machine integrated design method for ultra-precision grinding machine spindle.
J. Ind. Inf. Integr., 2016

Construction of DNA codes by using algebraic number theory.
Finite Fields Their Appl., 2016

Ontological modelling of knowledge management for human-machine integrated design of ultra-precision grinding machine.
Enterp. Inf. Syst., 2016

Public Key Encryption in Non-Abelian Groups.
CoRR, 2016

2015
Minimal logarithmic signatures for the unitary group U<sub>n</sub>(q).
Des. Codes Cryptogr., 2015

Minimal Logarithmic Signatures for one type of Classical Groups.
CoRR, 2015

Minimal Logarithmic Signatures for Sporadic Groups.
CoRR, 2015

2014
All exceptional groups of lie type have minimal logarithmic signatures.
Appl. Algebra Eng. Commun. Comput., 2014

Ontological Knowledge Capture for the Design of Ultra-Precision Hydrostatic Guideways Based on Imaginal Thinking.
Proceedings of the Enterprise Systems Conference, 2014


  Loading...