Jia Yu

Orcid: 0000-0002-0574-7803

Affiliations:
  • Qingdao University, Qingdao, China
  • Nanjing University of Information Science & Technology, Nanjing, China


According to our database1, Jia Yu authored at least 113 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing fault tolerance of balanced hypercube networks by the edge partition method.
Theor. Comput. Sci., February, 2024

Reliability evaluation for a class of recursive match networks.
Theor. Comput. Sci., January, 2024

Construction algorithms of fault-tolerant paths and disjoint paths in <i>k</i>-ary <i>n</i>-cube networks.
J. Parallel Distributed Comput., January, 2024

2023
Lightweight Secure Deduplication Based on Data Popularity.
IEEE Syst. J., December, 2023

Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023

Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems.
J. Syst. Archit., September, 2023

Reliability of augmented k-ary n-cubes under the extra connectivity condition.
J. Supercomput., August, 2023

Privacy-Preserving Shortest Distance Query for Dynamic Large-Scale Road Network.
IEEE Syst. J., June, 2023

Privacy preserving subgraph isomorphism query for dynamic graph database.
J. Netw. Comput. Appl., February, 2023

DSOS: A Distributed Secure Outsourcing System for Edge Computing Service in IoT.
IEEE Trans. Syst. Man Cybern. Syst., 2023

Privacy-Preserving Parallel Computation of Matrix Determinant With Edge Computing.
IEEE Trans. Serv. Comput., 2023

Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023

PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data.
IEEE Internet Things J., 2023

Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

2022
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022

An Intelligent Fuzzy Phrase Search Scheme Over Encrypted Network Data for IoT.
IEEE Trans. Netw. Sci. Eng., 2022

Node-to-set disjoint paths problem in cross-cubes.
J. Supercomput., 2022

Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System.
IEEE Trans. Ind. Informatics, 2022

Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022

Synchronized Provable Data Possession Based on Blockchain for Digital Twin.
IEEE Trans. Inf. Forensics Secur., 2022

Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Connectivity and constructive algorithms of disjoint paths in dragonfly networks.
Theor. Comput. Sci., 2022

Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022

Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things.
IEEE Internet Things J., 2022

Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT.
IEEE Internet Things J., 2022

Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022

An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022

Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT.
IEEE Internet Things J., 2022

Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data.
Future Gener. Comput. Syst., 2022

Enabling efficient privacy-preserving subgraph isomorphic query over graphs.
Future Gener. Comput. Syst., 2022

Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022

Privacy-Preserving cloud-Aided broad learning system.
Comput. Secur., 2022

Privacy-Preserving Convolution Neural Network Inference with Edge-assistance.
Comput. Secur., 2022

The 3-Extra Connectivity of the Data Center Network BCube.
Comput. J., 2022

The Reliability of <i>k</i>-Ary <i>n</i>-Cube Based on Component Connectivity.
Comput. J., 2022

Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022

Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids.
Proceedings of the 13th Asian Control Conference, 2022

2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Component conditional fault tolerance of hierarchical folded cubic networks.
Theor. Comput. Sci., 2021

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing.
IEEE Syst. J., 2021

RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021

Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021

Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021

Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021

Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data.
IEEE Internet Things J., 2021

Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images.
IEEE Internet Things J., 2021

Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network.
Comput. Secur., 2021

The Conditional Reliability Evaluation of Data Center Network BCDC.
Comput. J., 2021

Modification and Performance Improvement of Paillier Homomorphic Cryptosystem.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020

The reliability analysis of <i>k</i>-ary <i>n</i>-cube networks.
Theor. Comput. Sci., 2020

Secure auditing and deduplication for encrypted cloud data supporting ownership modification.
Soft Comput., 2020

Secure Computation Outsourcing for Inversion in Finite Field.
J. Internet Serv. Inf. Secur., 2020

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020

Blockchain-based two-party fair contract signing scheme.
Inf. Sci., 2020

Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things.
IEEE Internet Things J., 2020

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020

2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019

Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019

Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019

Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018

Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

2017
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

How to securely outsource the inversion modulo a large composite number.
J. Syst. Softw., 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wirel. Networks, 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Inf. Forensics Secur., 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Netw. Comput. Appl., 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016

IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016

A public cloud storage auditing scheme for resource-constrained clients.
Int. J. High Perform. Syst. Archit., 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Inf. Forensics Secur., 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

2014
Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
An ID-Based Short Group Signature Scheme.
J. Softw., 2013

Security analysis and improvement of two verifiable multi-secret sharing schemes.
Int. J. Secur. Networks, 2013

2012
A Practical ID-Based Group Signature Scheme.
J. Comput., 2012

2011
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges.
Theor. Comput. Sci., 2011

ID-Based Sequential Aggregate Signatures.
J. Softw., 2011

A New Approach to Group Signature Schemes.
J. Comput., 2011

Embedding meshes into twisted-cubes.
Inf. Sci., 2011

Efficient unicast in bijective connection networks with the restricted faulty node set.
Inf. Sci., 2011

2007
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
Proceedings of the Theory and Applications of Models of Computation, 2007

Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Identity-Based Blind Signature Scheme with Batch Verifications.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two Threshold Multisignature Schemes from Bilinear Pairings.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Key-Insulated Group Signature Scheme with Selective Revocation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...