Haifeng Qian

Orcid: 0000-0002-7189-6903

According to our database1, Haifeng Qian authored at least 180 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Partially-hiding functional encryption for degree-2 polynomials with fine-grained access control.
Frontiers Comput. Sci., June, 2024

Parameters of several families of binary duadic codes and their related codes.
Des. Codes Cryptogr., January, 2024

Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Registered Functional Encryptions from Pairings.
IACR Cryptol. ePrint Arch., 2024

Bifurcated Attention for Single-Context Large-Batch Sampling.
CoRR, 2024

Constrained Decoding for Code Language Models via Efficient Left and Right Quotienting of Context-Sensitive Grammars.
CoRR, 2024

Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
IRS-Aided Secure Communications Over an Untrusted AF Relay System.
IEEE Trans. Wirel. Commun., December, 2023

Parameters of Squares of Primitive Narrow-Sense BCH Codes and Their Complements.
IEEE Trans. Inf. Theory, August, 2023

Revocable identity-based matchmaking encryption in the standard model.
IET Inf. Secur., July, 2023

Bounded-collusion decentralized ABE with sublinear parameters.
Theor. Comput. Sci., June, 2023

PartitionChain: A Scalable and Reliable Data Storage Strategy for Permissioned Blockchain.
IEEE Trans. Knowl. Data Eng., April, 2023

Characterization of the East - West Spatial Uniformity for GOES-16/17 ABI Bands Using the Moon.
Remote. Sens., April, 2023

Blockchain-Based Fair Payment for ABE with Outsourced Decryption.
Peer Peer Netw. Appl., January, 2023

Privacy-Preserving Federated Learning via Functional Encryption, Revisited.
IEEE Trans. Inf. Forensics Secur., 2023

Registered ABE via Predicate Encodings.
IACR Cryptol. ePrint Arch., 2023

Enhancing SCF with Privacy-Preserving and Splitting-Enabled E-Bills on Blockchain.
CoRR, 2023

Greener yet Powerful: Taming Large Code Generation Models with Quantization.
CoRR, 2023

NLSP: A novel lattice-based secure primitive for privacy-preserving smart grid communications.
Concurr. Comput. Pract. Exp., 2023

Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Approximate Inference in Logical Credal Networks.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023


ReCode: Robustness Evaluation of Code Generation Models.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Joint Beamforming Design for IRS Aided Multiuser MIMO With Imperfect CSI.
IEEE Trans. Veh. Technol., 2022

Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Virtual full-duplex buffer-aided relay selection schemes for secure cooperative wireless networks.
EURASIP J. Wirel. Commun. Netw., 2022

Multi-lingual Evaluation of Code Generation Models.
CoRR, 2022

Improved Collision Detection Of MD5 Using Sufficient Condition Combination.
Comput. J., 2022

IRS-Aided Secure Communications over an Untrusted AF Relay System.
Proceedings of the 14th International Conference on Wireless Communications and Signal Processing, 2022

Verify Deep Learning Models Ownership via Preset Embedding.
Proceedings of the IEEE Smartworld, 2022

Logical Credal Networks.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

MEW: Evading Ownership Detection Against Deep Learning Models.
Proceedings of the Neural Information Processing - 29th International Conference, 2022

Enhancing RUP security for the OCB mode.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2021
On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes.
IEEE Trans. Inf. Theory, 2021

With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Linear Regression Models.
IEEE Trans. Inf. Forensics Secur., 2021

CPA/CCA2-secure PKE with squared-exponential DFR from low-noise LPN.
Theor. Comput. Sci., 2021

Group Signature with Verifier-Local Revocation Based on Coding Theory.
Secur. Commun. Networks, 2021

Parameters of Hulls of Primitive BCH Codes of Length q<sup>3</sup> - 1.
IEEE Commun. Lett., 2021

Simple and efficient FE for quadratic functions.
Des. Codes Cryptogr., 2021

An Ensemble Approach Towards Adversarial Robustness.
CoRR, 2021

LVRT: Low Variances of Solo Mining Reward & Inter-block Time in Collaborative PoW.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Updatable All-But-One Dual Projective Hashing and Its Applications.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Imitating Full-Duplex Secure Communication with Buffer-Aided Half-Duplex Relays.
Proceedings of the ICC 2021, 2021

Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting.
Theor. Comput. Sci., 2020

Calibration and Validation of Antenna and Brightness Temperatures from Metop-C Advanced Microwave Sounding Unit-A (AMSU-A).
Remote. Sens., 2020

Integral Attacks on Some Lightweight Block Ciphers.
KSII Trans. Internet Inf. Syst., 2020

Joint Beamforming Design for IRS-Aided Communications with Channel Estimation Errors.
CoRR, 2020

Logical Neural Networks.
CoRR, 2020

With Great Dispersion Comes Greater Resilience: Efficient Poisoning Attacks and Defenses for Online Regression Models.
CoRR, 2020

Alternate Distributed Beamforming for Buffer-Aided Multi-Antenna Relay Systems.
CoRR, 2020

Mimicking Full-Duplex Secure Communications for Buffer-Aided Multi-Relay Systems.
CoRR, 2020

Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data.
IEEE Access, 2020

Weighted Local Outlier Factor for Detecting Anomaly on In-Vehicle Network.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Revisiting the Fairness and Randomness of Delegated Proof of Stake Consensus Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Neural Belief Reasoner.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Beamforming Design for Intelligent Reflecting Surface Aided Multi-Antenna MU-MIMO Communications with Imperfect CSI.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

Linear Scalability from Sharding and PoS.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Efficient Bandwidth Allocation for URLLC in Frequency-Selective Fading Channels.
Proceedings of the IEEE Global Communications Conference, 2020

PALOR: Poisoning Attacks Against Logistic Regression.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Efficient public key encryption with equality test in the standard model.
Theor. Comput. Sci., 2019

Public key encryption with equality test via hash proof system.
Theor. Comput. Sci., 2019

A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019

Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall.
IEEE Access, 2019

Outage Analysis of Relay-Assisted mmWave Cellular Systems Employing JSDM.
IEEE Access, 2019

FinExpert: domain-specific test generation for FinTech systems.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

L2-Nonexpansive Neural Networks.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
Buffer-Aided Two-Hop Secure Communications With Power Control and Link Selection.
IEEE Trans. Wirel. Commun., 2018

P3GQ: A practical privacy-preserving generic location-based services query scheme.
Pervasive Mob. Comput., 2018

Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

CCA Secure Multi-recipient KEM from LPN.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure Communications.
Proceedings of the 2018 International Conference on Computing, 2018

Validation of GOES-16 ABI infrared spatial response uniformity.
Proceedings of the Earth Observing Systems XXIII, 2018

In-orbit response versus scan-angle (RVS) validation for the GOES-16 ABI solar reflective bands.
Proceedings of the Earth Observing Systems XXIII, 2018

Radiometric quality assessment of GOES-16 ABI L1b images.
Proceedings of the Earth Observing Systems XXIII, 2018

Validation of GOES-16 ABI reflective solar band calibration through reanalysis and comparison with field campaign data.
Proceedings of the Earth Observing Systems XXIII, 2018

Detection and characterization of striping in GOES-16 ABI VNIR/IR bands.
Proceedings of the Earth Observing Systems XXIII, 2018

An Encrypted Database with Enforced Access Control and Blockchain Validation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
Wirel. Commun. Mob. Comput., 2017

Machine Learning for Noise Sensor Placement and Full-Chip Voltage Emergency Detection.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2017

Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study.
Peer-to-Peer Netw. Appl., 2017

Buffer-aided secure two-hop communications with adaptive link selection and on/off power control.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Multi-resolution codebook design for two-stage precoding in FDD massive MIMO networks.
Proceedings of the 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2017

Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Early radiometric calibration performances of GOES-16 advanced baseline imager.
Proceedings of the Earth Observing Systems XXII, 2017

Collaboratively filtering malware infections: a tensor decomposition approach.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Broadbeam for Massive MIMO Systems.
IEEE Trans. Signal Process., 2016

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Inf. Forensics Secur., 2016

New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016

Thwarting location privacy protection in location-based social discovery services.
Secur. Commun. Networks, 2016

A Proximity Measure using Blink Model.
CoRR, 2016

Gate movement for timing improvement on row based Dual-VDD designs.
Proceedings of the 17th International Symposium on Quality Electronic Design, 2016

You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

On the design of broadbeam for massive MIMO systems.
Proceedings of the 2016 International Conference on Computing, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Signcryption KEM/tag-KEM, revisited.
Secur. Commun. Networks, 2015

Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

I know where you are: Thwarting privacy protection in location-based social discovery services.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Broadbeam design for massive MIMO systems with uniform rectangular array.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

A statistical methodology for noise sensor placement and full-chip voltage map generation.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
Generating signatures with optimal overhead: practical paddings for signature schemes.
Secur. Commun. Networks, 2014

Robust password changing and DoS resilience for human-centric password authentication.
Secur. Commun. Networks, 2014

Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014

PWG: Progressive Weight-Growth Algorithm for LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Pacman: driving nonuniform clock grid loads for low-skew robust clock network.
Proceedings of the ACM/IEEE International Workshop on System Level Interconnect Prediction, 2014

Bridging high performance and low power in processor design.
Proceedings of the International Symposium on Low Power Electronics and Design, 2014

Row Based Dual-VDD Island Generation and Placement.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A hybrid random walk algorithm for 3-D thermal analysis of integrated circuits.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014

2013
Fast 3-D Thermal Simulation for Integrated Circuits With Domain Decomposition Method.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2013

Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Math. Comput. Model., 2013

Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Fast poisson solvers for thermal analysis.
ACM Trans. Design Autom. Electr. Syst., 2012

Subtractive Router for Tree-Driven-Grid Clocks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2012

Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Secur. Commun. Networks, 2012

Chosen-ciphertext attack secure public key encryption with auxiliary inputs.
Secur. Commun. Networks, 2012

Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012

Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model.
Informatica, 2012

Pitfalls in identity based encryption using an elliptic curve combined public key.
Appl. Math. Lett., 2012

Two-source extractors for leaky sources.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

An information-theoretic framework for optimal temperature sensor allocation and full-chip thermal monitoring.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

An anonymous remote attestation for trusted cloud computing.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Design methodology for the IBM POWER7 microprocessor.
IBM J. Res. Dev., 2011

Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011

Vicarious calibration of GOES visible channel using GOME-2.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Myth busters: Microprocessor clocking is from Mars, ASICs clocking is from Venus.
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011

A novel identity-based signature with message recovery from RSA.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Non-interactive editable signatures for assured data provenance.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
Non-interactive multisignatures in the plain public-key model with efficient verification.
Inf. Process. Lett., 2010

Trustworthy Information: Concepts and Mechanisms.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Fast Poisson solvers for thermal analysis.
Proceedings of the 2010 International Conference on Computer-Aided Design, 2010

Fully-Secure and Practical Sanitizable Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Provably secure RSA-type signature based on conic curve.
Wirel. Commun. Mob. Comput., 2009

Fast and Accurate Statistical Criticality Computation Under Process Variations.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2009

Adaptively Secure Threshold Signature Scheme in the Standard Model.
Informatica, 2009

Toward optimizing cauchy matrix for cauchy reed-solomon code.
IEEE Commun. Lett., 2009

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

Research of Chang'an Street Coordinated Fuzzy Control Based on Traffic Flow Forecasting.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

An Optimal Blind Signature Padding with Message Recovery.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Stochastic Preconditioning for Diagonally Dominant Matrices.
SIAM J. Sci. Comput., 2008

Biased Bit Commitment and Applications.
J. Inf. Sci. Eng., 2008

Efficient public key encryption with smallest ciphertext expansion from factoring.
Des. Codes Cryptogr., 2008

A CDH-Based Multi-Signature Scheme with Tight Security Reduction.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Timing-Aware Power Minimization via Extended Timing Graph Methods.
J. Low Power Electron., 2007

Hybrid proxy multisignature: A new type multi-party signature.
Inf. Sci., 2007

Simulatability and security of certificateless threshold signatures.
Inf. Sci., 2007

Clustering based pruning for statistical criticality computation under process variations.
Proceedings of the 2007 International Conference on Computer-Aided Design, 2007

A Practical Optimal Padding for Signature Schemes.
Proceedings of the Topics in Cryptology, 2007

A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations.
Proceedings of the Computer Mathematics, 8th Asian Symposium, 2007

2006
Temperature-Aware Placement for SOCs.
Proc. IEEE, 2006

A New Construction of Time Capsule Signature.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
Power grid analysis using random walks.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005

Early-stage power grid analysis for uncertain working modes.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005

Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers.
Informatica, 2005

Security of Pon-Lu-Jeng's Meta-He digital signature schemes.
Appl. Math. Comput., 2005

Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Appl. Math. Comput., 2005

A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A hybrid linear equation solver and its application in quadratic placement.
Proceedings of the 2005 International Conference on Computer-Aided Design, 2005

Certificateless Threshold Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Efficient Non-interactive Deniable Authentication Protocols.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
A new threshold proxy signature scheme from bilinear pairings.
Sci. China Ser. F Inf. Sci., 2004

A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

The Certainty of Uncertainty: Randomness in Nanometer Design.
Proceedings of the Integrated Circuit and System Design, 2004

Cryptanalysis of group signature scheme from ID-based signature scheme.
Proceedings of the 3rd International Conference on Information Security, 2004

A chip-level electrostatic discharge simulation strategy.
Proceedings of the 2004 International Conference on Computer-Aided Design, 2004

Hierarchical random-walk algorithms for power grid analysis.
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004

2003
Random walks in a supply network.
Proceedings of the 40th Design Automation Conference, 2003

1997
Multitriangle: A Constant Node Degree Interconnection Network.
Int. J. Found. Comput. Sci., 1997

1996
Enhanced Fibonacci Cubes.
Comput. J., 1996

1995
A combined functional and object-oriented approach to software design.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Unicast, Multicast, and Broadcast on Enhanced Fibonacci Cubes.
Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), 1995


  Loading...