Haiyan Wang

Orcid: 0000-0002-5702-9897

Affiliations:
  • Peng Cheng Laboratory, Shenzhen, China


According to our database1, Haiyan Wang authored at least 33 papers between 2019 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
PAC-MC: An Efficient Password-Based Access Control Framework for Time Sequence Aware Media Cloud.
IEEE Trans. Mob. Comput., July, 2025

Privacy-Preserving Federated Learning Scheme with Mitigating Model Poisoning Attacks: Vulnerabilities and Countermeasures.
CoRR, June, 2025

Secure Multi-Key Homomorphic Encryption with Application to Privacy-Preserving Federated Learning.
CoRR, June, 2025

Enhanced small-scale APT knowledge graph embedding via spatio-temporal attribute reasoning and adversarial negative sampling.
Array, 2025

Few-shot relation extraction approach for threat intelligence based on multi-level attention mechanism and hybrid prototypical network.
Array, 2025

Adaptive Incremental Provenance Analysis for Trustworthy Federated Learning.
Proceedings of the Advanced Data Mining and Applications - 21st International Conference, 2025

SemantiHunt: A New Behavioral Semantics-Driven Method for Network Threat Hunting.
Proceedings of the Advanced Data Mining and Applications - 21st International Conference, 2025

2024
Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search.
IEEE Trans. Mob. Comput., October, 2024

Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2024

Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2024

Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024

Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities.
Theor. Comput. Sci., 2024

Threat intelligence named entity recognition techniques based on few-shot learning.
Array, 2024

P-I2Prange: An Automatic Construction Architecture for Scenarios in I2P Ranges.
Proceedings of the International Joint Conference on Neural Networks, 2024

A novel method of cybersecurity knowledge graph construction and storage optimization based on cyber range.
Proceedings of the 9th IEEE International Conference on Data Science in Cyberspace, 2024

Reinforced Negative Sampling for Knowledge Graph Embedding.
Proceedings of the Database Systems for Advanced Applications, 2024

Generating Adversarial Texts by the Universal Tail Word Addition Attack.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

CDGM: Controllable Dataset Generation Method for Cybersecurity.
Proceedings of the Advanced Data Mining and Applications - 20th International Conference, 2024

Semantic-Integrated Online Audit Log Reduction for Efficient Forensic Analysis.
Proceedings of the Advanced Data Mining and Applications - 20th International Conference, 2024

2023
Multi-key Fully Homomorphic Encryption without CRS from RLWE.
Comput. Stand. Interfaces, August, 2023

ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

Revocable attribute-based encryption from standard lattices.
Comput. Stand. Interfaces, 2023

FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning.
CoRR, 2023

TSKE: Two-Stream Knowledge Embedding for Cyberspace Security.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

CY-Apollo: A Multi-view Profile System for Complicated Network Attacks.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

2022
An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain.
IEEE Internet Things J., 2022

A Password-Based Access Control Framework for Time-Sequence Aware Media Cloudization.
IACR Cryptol. ePrint Arch., 2022

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing.
Comput. Stand. Interfaces, 2022

Generic Construction of Trace-and-Revoke Inner Product Functional Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

2019
An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing.
IEEE Trans. Ind. Informatics, 2019

On Stability of Multi-Valued Nonlinear Feedback Shift Registers.
Complex., 2019


  Loading...