Haifeng Qian

According to our database1, Haifeng Qian authored at least 116 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Efficient public key encryption with equality test in the standard model.
Theor. Comput. Sci., 2019

A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019

Outage Analysis of Relay-Assisted mmWave Cellular Systems Employing JSDM.
IEEE Access, 2019

FinExpert: domain-specific test generation for FinTech systems.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

L2-Nonexpansive Neural Networks.
Proceedings of the 7th International Conference on Learning Representations, 2019

2018
Buffer-Aided Two-Hop Secure Communications With Power Control and Link Selection.
IEEE Trans. Wireless Communications, 2018

P3GQ: A practical privacy-preserving generic location-based services query scheme.
Pervasive and Mobile Computing, 2018

Simpler CCA Secure PKE from LPN Problem Without Double-Trapdoor.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

CCA Secure Multi-recipient KEM from LPN.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Optimal Power Control and Link Selection Policy for Buffer-Aided Two-Hop Secure Communications.
Proceedings of the 2018 International Conference on Computing, 2018

Validation of GOES-16 ABI infrared spatial response uniformity.
Proceedings of the Earth Observing Systems XXIII, 2018

In-orbit response versus scan-angle (RVS) validation for the GOES-16 ABI solar reflective bands.
Proceedings of the Earth Observing Systems XXIII, 2018

Radiometric quality assessment of GOES-16 ABI L1b images.
Proceedings of the Earth Observing Systems XXIII, 2018

Validation of GOES-16 ABI reflective solar band calibration through reanalysis and comparison with field campaign data.
Proceedings of the Earth Observing Systems XXIII, 2018

Detection and characterization of striping in GOES-16 ABI VNIR/IR bands.
Proceedings of the Earth Observing Systems XXIII, 2018

An Encrypted Database with Enforced Access Control and Blockchain Validation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
Wireless Communications and Mobile Computing, 2017

Machine Learning for Noise Sensor Placement and Full-Chip Voltage Emergency Detection.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2017

Characterizing user behaviors in location-based find-and-flirt services: Anonymity and demographics - A WeChat Case Study.
Peer-to-Peer Networking and Applications, 2017

Buffer-aided secure two-hop communications with adaptive link selection and on/off power control.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Multi-resolution codebook design for two-stage precoding in FDD massive MIMO networks.
Proceedings of the 18th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2017

Unleash the Power for Tensor: A Hybrid Malware Detection System Using Ensemble Classifiers.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Early radiometric calibration performances of GOES-16 advanced baseline imager.
Proceedings of the Earth Observing Systems XXII, 2017

Collaboratively filtering malware infections: a tensor decomposition approach.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Broadbeam for Massive MIMO Systems.
IEEE Trans. Signal Processing, 2016

Privacy-Preserving Public Auditing Protocol for Low-Performance End Devices in Cloud.
IEEE Trans. Information Forensics and Security, 2016

New application of partitioning methodology: identity-based dual receiver encryption.
Security and Communication Networks, 2016

Thwarting location privacy protection in location-based social discovery services.
Security and Communication Networks, 2016

Gate movement for timing improvement on row based Dual-VDD designs.
Proceedings of the 17th International Symposium on Quality Electronic Design, 2016

You Can Yak but You Can't Hide: Localizing Anonymous Social Network Users.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

On the design of broadbeam for massive MIMO systems.
Proceedings of the 2016 International Conference on Computing, 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Signcryption KEM/tag-KEM, revisited.
Security and Communication Networks, 2015

Data-Driven Privacy Analytics: A WeChat Case Study in Location-Based Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

I know where you are: Thwarting privacy protection in location-based social discovery services.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Broadbeam design for massive MIMO systems with uniform rectangular array.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

A statistical methodology for noise sensor placement and full-chip voltage map generation.
Proceedings of the 52nd Annual Design Automation Conference, 2015

2014
Generating signatures with optimal overhead: practical paddings for signature schemes.
Security and Communication Networks, 2014

Robust password changing and DoS resilience for human-centric password authentication.
Security and Communication Networks, 2014

Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014

PWG: Progressive Weight-Growth Algorithm for LDPC Codes.
IEICE Transactions, 2014

Pacman: driving nonuniform clock grid loads for low-skew robust clock network.
Proceedings of the ACM/IEEE International Workshop on System Level Interconnect Prediction, 2014

Bridging high performance and low power in processor design.
Proceedings of the International Symposium on Low Power Electronics and Design, 2014

Row Based Dual-VDD Island Generation and Placement.
Proceedings of the 51st Annual Design Automation Conference 2014, 2014

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

A hybrid random walk algorithm for 3-D thermal analysis of integrated circuits.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014

2013
Fast 3-D Thermal Simulation for Integrated Circuits With Domain Decomposition Method.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2013

Fully secure identity-based signcryption scheme with shorter signcryptext in the standard model.
Mathematical and Computer Modelling, 2013

Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Fast poisson solvers for thermal analysis.
ACM Trans. Design Autom. Electr. Syst., 2012

Subtractive Router for Tree-Driven-Grid Clocks.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2012

Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Security and Communication Networks, 2012

Chosen-ciphertext attack secure public key encryption with auxiliary inputs.
Security and Communication Networks, 2012

Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Security and Communication Networks, 2012

Tightly Secure Non-Interactive Multisignatures in the Plain Public Key Model.
Informatica, Lith. Acad. Sci., 2012

Pitfalls in identity based encryption using an elliptic curve combined public key.
Appl. Math. Lett., 2012

Two-source extractors for leaky sources.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

An information-theoretic framework for optimal temperature sensor allocation and full-chip thermal monitoring.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

An anonymous remote attestation for trusted cloud computing.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Design methodology for the IBM POWER7 microprocessor.
IBM Journal of Research and Development, 2011

Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011

Vicarious calibration of GOES visible channel using GOME-2.
Proceedings of the 2011 IEEE International Geoscience and Remote Sensing Symposium, 2011

Myth busters: Microprocessor clocking is from Mars, ASICs clocking is from Venus.
Proceedings of the 2011 IEEE/ACM International Conference on Computer-Aided Design, 2011

A novel identity-based signature with message recovery from RSA.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Non-interactive editable signatures for assured data provenance.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
Non-interactive multisignatures in the plain public-key model with efficient verification.
Inf. Process. Lett., 2010

Trustworthy Information: Concepts and Mechanisms.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

Fast Poisson solvers for thermal analysis.
Proceedings of the 2010 International Conference on Computer-Aided Design, 2010

Fully-Secure and Practical Sanitizable Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

2009
Provably secure RSA-type signature based on conic curve.
Wireless Communications and Mobile Computing, 2009

Fast and Accurate Statistical Criticality Computation Under Process Variations.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2009

Adaptively Secure Threshold Signature Scheme in the Standard Model.
Informatica, Lith. Acad. Sci., 2009

Toward optimizing cauchy matrix for cauchy reed-solomon code.
IEEE Communications Letters, 2009

An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

Research of Chang'an Street Coordinated Fuzzy Control Based on Traffic Flow Forecasting.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

An Optimal Blind Signature Padding with Message Recovery.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Stochastic Preconditioning for Diagonally Dominant Matrices.
SIAM J. Scientific Computing, 2008

Biased Bit Commitment and Applications.
J. Inf. Sci. Eng., 2008

Efficient public key encryption with smallest ciphertext expansion from factoring.
Des. Codes Cryptogr., 2008

A CDH-Based Multi-Signature Scheme with Tight Security Reduction.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Timing-Aware Power Minimization via Extended Timing Graph Methods.
J. Low Power Electronics, 2007

Hybrid proxy multisignature: A new type multi-party signature.
Inf. Sci., 2007

Simulatability and security of certificateless threshold signatures.
Inf. Sci., 2007

Clustering based pruning for statistical criticality computation under process variations.
Proceedings of the 2007 International Conference on Computer-Aided Design, 2007

A Practical Optimal Padding for Signature Schemes.
Proceedings of the Topics in Cryptology, 2007

A Method and Its Implementation for Constructing Bäcklund Transformations to Nonlinear Evolution Equations.
Proceedings of the Computer Mathematics, 8th Asian Symposium, 2007

2006
Temperature-Aware Placement for SOCs.
Proceedings of the IEEE, 2006

A New Construction of Time Capsule Signature.
IACR Cryptology ePrint Archive, 2006

Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Cryptanalysis of Chang-Lin-Lam's ID-based Multisignature Scheme.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
Power grid analysis using random walks.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2005

Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers.
Informatica, Lith. Acad. Sci., 2005

Security of Pon-Lu-Jeng's Meta-He digital signature schemes.
Applied Mathematics and Computation, 2005

Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms.
Applied Mathematics and Computation, 2005

A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

A hybrid linear equation solver and its application in quadratic placement.
Proceedings of the 2005 International Conference on Computer-Aided Design, 2005

Certificateless Threshold Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

Efficient Non-interactive Deniable Authentication Protocols.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
A new threshold proxy signature scheme from bilinear pairings.
Science in China Series F: Information Sciences, 2004

A Generalized Proxy Signature Scheme Based on the RSA Cryptosystem.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

The Certainty of Uncertainty: Randomness in Nanometer Design.
Proceedings of the Integrated Circuit and System Design, 2004

Early-stage power grid analysis for uncertain working modes.
Proceedings of the 2004 International Symposium on Physical Design, 2004

A chip-level electrostatic discharge simulation strategy.
Proceedings of the 2004 International Conference on Computer-Aided Design, 2004

Hierarchical random-walk algorithms for power grid analysis.
Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, 2004

2003
Random walks in a supply network.
Proceedings of the 40th Design Automation Conference, 2003

1997
Multitriangle: A Constant Node Degree Interconnection Network.
Int. J. Found. Comput. Sci., 1997

1996
Enhanced Fibonacci Cubes.
Comput. J., 1996

1995
A combined functional and object-oriented approach to software design.
Proceedings of the 1st IEEE International Conference on Engineering of Complex Computer Systems (ICECCS '95), 1995

Unicast, Multicast, and Broadcast on Enhanced Fibonacci Cubes.
Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), 1995


  Loading...