Jia Yu
Orcid: 0000-0002-0574-7803Affiliations:
- Qingdao University, Qingdao, China
- Nanjing University of Information Science & Technology, Nanjing, China
According to our database1,
Jia Yu
authored at least 113 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Enhancing fault tolerance of balanced hypercube networks by the edge partition method.
Theor. Comput. Sci., February, 2024
Theor. Comput. Sci., January, 2024
Construction algorithms of fault-tolerant paths and disjoint paths in <i>k</i>-ary <i>n</i>-cube networks.
J. Parallel Distributed Comput., January, 2024
2023
IEEE Syst. J., December, 2023
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023
Verifiable fuzzy keyword search supporting sensitive information hiding for data sharing in cloud-assisted e-healthcare systems.
J. Syst. Archit., September, 2023
J. Supercomput., August, 2023
IEEE Syst. J., June, 2023
J. Netw. Comput. Appl., February, 2023
IEEE Trans. Syst. Man Cybern. Syst., 2023
IEEE Trans. Serv. Comput., 2023
Designated-Verifier Aggregate Signature Scheme With Sensitive Data Privacy Protection for Permissioned Blockchain-Assisted IIoT.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Identity-Based Data Integrity Auditing With Key-Exposure Resistance for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023
Privacy-Preserving Face Recognition With Multi-Edge Assistance for Intelligent Security Systems.
IEEE Internet Things J., 2023
PPADT: Privacy-Preserving Identity-Based Public Auditing With Efficient Data Transfer for Cloud-Based IoT Data.
IEEE Internet Things J., 2023
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
2022
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022
IEEE Trans. Serv. Comput., 2022
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Ind. Informatics, 2022
Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Inf. Forensics Secur., 2022
Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Comput. Soc. Syst., 2022
Theor. Comput. Sci., 2022
Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data.
Future Gener. Comput. Syst., 2022
Future Gener. Comput. Syst., 2022
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022
Comput. Secur., 2022
Comput. J., 2022
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 13th Asian Control Conference, 2022
2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
Theor. Comput. Sci., 2021
IEEE Trans. Cloud Comput., 2021
IEEE Syst. J., 2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021
Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021
Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Comput. Secur., 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020
Theor. Comput. Sci., 2020
Secure auditing and deduplication for encrypted cloud data supporting ownership modification.
Soft Comput., 2020
J. Internet Serv. Inf. Secur., 2020
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020
2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019
Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019
Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019
Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019
Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
J. Syst. Softw., 2017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017
Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017
2016
Wirel. Pers. Commun., 2016
Wirel. Networks, 2016
IEEE Trans. Inf. Forensics Secur., 2016
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016
J. Netw. Comput. Appl., 2016
Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016
Int. J. High Perform. Syst. Archit., 2016
A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Int. J. Secur. Networks, 2013
2012
2011
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges.
Theor. Comput. Sci., 2011
Efficient unicast in bijective connection networks with the restricted faulty node set.
Inf. Sci., 2011
2007
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
2006
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006