Jia Yu

Affiliations:
  • Qingdao University, Qingdao, China
  • Nanjing University of Information Science & Technology, Nanjing, China


According to our database1, Jia Yu authored at least 93 papers between 2006 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
DSOS: A Distributed Secure Outsourcing System for Edge Computing Service in IoT.
IEEE Trans. Syst. Man Cybern. Syst., 2023

2022
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022

An Intelligent Fuzzy Phrase Search Scheme Over Encrypted Network Data for IoT.
IEEE Trans. Netw. Sci. Eng., 2022

Achieving Privacy-Preserving DSSE for Intelligent IoT Healthcare System.
IEEE Trans. Ind. Informatics, 2022

Verifiable Keyword Search Supporting Sensitive Information Hiding for the Cloud-Based Healthcare Sharing System.
IEEE Trans. Ind. Informatics, 2022

Synchronized Provable Data Possession Based on Blockchain for Digital Twin.
IEEE Trans. Inf. Forensics Secur., 2022

Checking Only When It Is Necessary: Enabling Integrity Auditing Based on the Keyword With Sensitive Information Privacy for Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Privacy-Preserving and Verifiable Cloud-Aided Disease Diagnosis and Prediction With Hyperplane Decision-Based Classifier.
IEEE Internet Things J., 2022

Secure Outsourcing of Large-Scale Convex Optimization Problem in Internet of Things.
IEEE Internet Things J., 2022

Blockchain-Based Privacy-Preserving and Rewarding Private Data Sharing for IoT.
IEEE Internet Things J., 2022

Secure Outsourcing for Normalized Cuts of Large-Scale Dense Graph in Internet of Things.
IEEE Internet Things J., 2022

An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022

Enabling Privacy-Preserving Parallel Outsourcing Matrix Inversion in IoT.
IEEE Internet Things J., 2022

Towards fully verifiable forward secure privacy preserving keyword search for IoT outsourced data.
Future Gener. Comput. Syst., 2022

Enabling efficient privacy-preserving subgraph isomorphic query over graphs.
Future Gener. Comput. Syst., 2022

Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022

Privacy-Preserving cloud-Aided broad learning system.
Comput. Secur., 2022

Privacy-Preserving Convolution Neural Network Inference with Edge-assistance.
Comput. Secur., 2022

The Reliability of <i>k</i>-Ary <i>n</i>-Cube Based on Component Connectivity.
Comput. J., 2022

2021
Comments on "SEPDP: Secure and Efficient Privacy Preserving Provable Data Possession in Cloud Storage".
IEEE Trans. Serv. Comput., 2021

Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Component conditional fault tolerance of hierarchical folded cubic networks.
Theor. Comput. Sci., 2021

Data Integrity Auditing without Private Key Storage for Secure Cloud Storage.
IEEE Trans. Cloud Comput., 2021

PP-CSA: A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing.
IEEE Syst. J., 2021

RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021

Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021

Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021

Permissioned Blockchain-Based Anonymous and Traceable Aggregate Signature Scheme for Industrial Internet of Things.
IEEE Internet Things J., 2021

Toward Verifiable Phrase Search Over Encrypted Cloud-Based IoT Data.
IEEE Internet Things J., 2021

Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images.
IEEE Internet Things J., 2021

Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network.
Comput. Secur., 2021

The Conditional Reliability Evaluation of Data Center Network BCDC.
Comput. J., 2021

Modification and Performance Improvement of Paillier Homomorphic Cryptosystem.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data.
IEEE Trans. Dependable Secur. Comput., 2020

The reliability analysis of <i>k</i>-ary <i>n</i>-cube networks.
Theor. Comput. Sci., 2020

Secure auditing and deduplication for encrypted cloud data supporting ownership modification.
Soft Comput., 2020

Secure Computation Outsourcing for Inversion in Finite Field.
J. Internet Serv. Inf. Secur., 2020

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020

Blockchain-based two-party fair contract signing scheme.
Inf. Sci., 2020

Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things.
IEEE Internet Things J., 2020

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020

2019
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession.
IEEE Trans. Serv. Comput., 2019

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2019

Cloud storage auditing with deduplication supporting different security levels according to data popularity.
J. Netw. Comput. Appl., 2019

Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019

Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
Int. J. Netw. Secur., 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018

Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

2017
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017

How to securely outsource the inversion modulo a large composite number.
J. Syst. Softw., 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wirel. Pers. Commun., 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wirel. Networks, 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Inf. Forensics Secur., 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
J. Syst. Softw., 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Netw. Comput. Appl., 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
KSII Trans. Internet Inf. Syst., 2016

IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016

A public cloud storage auditing scheme for resource-constrained clients.
Int. J. High Perform. Syst. Archit., 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Inf. Forensics Secur., 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

2014
Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
An ID-Based Short Group Signature Scheme.
J. Softw., 2013

Security analysis and improvement of two verifiable multi-secret sharing schemes.
Int. J. Secur. Networks, 2013

2012
A Practical ID-Based Group Signature Scheme.
J. Comput., 2012

2011
An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges.
Theor. Comput. Sci., 2011

ID-Based Sequential Aggregate Signatures.
J. Softw., 2011

A New Approach to Group Signature Schemes.
J. Comput., 2011

Embedding meshes into twisted-cubes.
Inf. Sci., 2011

Efficient unicast in bijective connection networks with the restricted faulty node set.
Inf. Sci., 2011

2007
Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
Proceedings of the Theory and Applications of Models of Computation, 2007

Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Identity-Based Blind Signature Scheme with Batch Verifications.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two Threshold Multisignature Schemes from Bilinear Pairings.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Key-Insulated Group Signature Scheme with Selective Revocation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

2006
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...