Huiwen Jia
Orcid: 0000-0002-2633-9278
According to our database1,
Huiwen Jia
authored at least 42 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
Efficient identity-based ring identification scheme and identity-based ring signature scheme on lattices.
Int. J. Secur. Networks, 2023
IACR Cryptol. ePrint Arch., 2023
2022
Verifier-local revocation group signatures with backward unlinkability from lattices.
Frontiers Inf. Technol. Electron. Eng., 2022
The University of Michigan Implements a Hub-and-Spoke Design to Accommodate Social Distancing in the Campus Bus System Under COVID-19 Restrictions.
INFORMS J. Appl. Anal., 2022
IET Inf. Secur., 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Online Learning and Pricing with Reusable Resources: Linear Bandits with Sub-Exponential Rewards.
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
Benders Cut Classification via Support Vector Machines for Solving Two-Stage Stochastic Programs.
INFORMS J. Optim., July, 2021
INFORMS J. Comput., 2021
Int. J. Inf. Sec., 2021
Entropy, 2021
Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018.
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the Network and System Security - 15th International Conference, 2021
Cloud-Aided Scalable Revocable Identity-Based Encryption with Ciphertext Update from Lattices.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from Lattices.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
An Optimization-and-Simulation Framework for Redesigning University Campus Bus System with Social Distancing.
CoRR, 2020
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Context-aware Route Recommendation with Weight Learning through Deep Neural Networks.
Proceedings of the 2020 American Control Conference, 2020
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020
2019
Efficient fuzzy identity-based signature from lattices for identities in a small (or large) universe.
J. Inf. Secur. Appl., 2019
Des. Codes Cryptogr., 2019
Track Occupation Detection Based on a Maximum Posterior Probability Model Using Multisensor Data Fusion.
Comput. Sci. Eng., 2019
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security - 22nd International Conference, 2019
Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Extensional schemes of multipartite non-interactive key exchange from multilinear maps and their applications.
Int. J. High Perform. Comput. Netw., 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
2017
Des. Codes Cryptogr., 2017
2015
Int. J. Inf. Technol. Web Eng., 2015
Extensional Schemes of Multipartite Non-interactive Key Exchange from Multilinear Maps.
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015