Jianfeng Wang

Orcid: 0000-0001-5297-0293

Affiliations:
  • Xidian University, School of Cyber Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China


According to our database1, Jianfeng Wang authored at least 98 papers between 2012 and 2026.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Verifiable multi-client blockchain-based dynamic data retrieval.
Future Gener. Comput. Syst., 2026

2025
Practical Equi-Join Over Encrypted Database With Reduced Leakage.
IEEE Trans. Knowl. Data Eng., May, 2025

Reducing Paging and Exit Overheads in Intel SGX for Oblivious Conjunctive Keyword Search.
IEEE Trans. Computers, March, 2025

Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size.
IEEE Trans. Dependable Secur. Comput., 2025

Practical searchable encryption scheme against response identity attacks.
Inf. Sci., 2025

Towards forward secure verifiable data streaming with support for keyword query.
Inf. Sci., 2025

2024
Secure Data Deduplication With Dynamic Access Control for Mobile Cloud Storage.
IEEE Trans. Mob. Comput., April, 2024

Research on a hierarchical feature-based contour extraction method for spatial complex truss-like structures in aerial images.
Eng. Appl. Artif. Intell., January, 2024

Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data.
IEEE Trans. Netw. Sci. Eng., 2024

Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application.
IEEE Trans. Dependable Secur. Comput., 2024

Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024

Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
IACR Cryptol. ePrint Arch., 2024

Scalable Equi-Join Queries over Encrypted Database.
IACR Cryptol. ePrint Arch., 2024

Lightweight verifiable blockchain top-k queries.
Future Gener. Comput. Syst., 2024

Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage.
Proceedings of the Provable and Practical Security, 2024

Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain.
Comput. Networks, December, 2023

One for all: Efficient verifiable dynamic multi-user searchable encryption in the presence of corrupted users.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023

Securing Fine-Grained Data Sharing and Erasure in Outsourced Storage Systems.
IEEE Trans. Parallel Distributed Syst., February, 2023

TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support.
IEEE Trans. Dependable Secur. Comput., 2023

Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting.
IEEE Trans. Cloud Comput., 2023

A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain.
Comput. Stand. Interfaces, 2023

EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

2022
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput., 2022

Achieving Searchable Encryption Scheme With Search Pattern Hidden.
IEEE Trans. Serv. Comput., 2022

Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022

Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and non-interactive ciphertext range query based on differential privacy.
Int. J. Comput. Sci. Eng., 2022

New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
IACR Cryptol. ePrint Arch., 2022

Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022

Efficient Volume-Hiding Encrypted Multi-Maps with Support for Conjunctive Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2022

Publicly Verifiable Conjunctive Keyword Search with Balanced Verification Overhead.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

Practical Volume-Hiding Encrypted Multi-Maps with Optimal Overhead and Beyond.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Efficient Verifiable Boolean Range Query for Light Clients on Blockchain Database.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021

Secure deduplication with efficient user revocation in cloud storage.
Comput. Stand. Interfaces, 2021

Verifiable database supporting keyword searches with forward security.
Comput. Stand. Interfaces, 2021

Efficient Multi-client Order-Revealing Encryption and Its Applications.
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Secure multiparty learning from the aggregation of locally trained models.
J. Netw. Comput. Appl., 2020

Blockchain-based public auditing and secure deduplication with fair arbitration.
Inf. Sci., 2020

Client-side ciphertext deduplication scheme with flexible access control.
Int. J. Comput. Sci. Eng., 2020

Efficient self-adaptive access control for personal medical data in emergency setting.
Int. J. Comput. Sci. Eng., 2020

Blockchain-based multiple groups data sharing with anonymity and traceability.
Sci. China Inf. Sci., 2020

2019
Towards efficient privacy-preserving encrypted image search in cloud computing.
Soft Comput., 2019

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

Multi-device anonymous authentication.
Int. J. Inf. Sec., 2019

Large universe multi-authority attribute-based PHR sharing with user revocation.
Int. J. Comput. Sci. Eng., 2019

Toward Forward Secure SSE Supporting Conjunctive Keyword Search.
IEEE Access, 2019

Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing.
IEEE Access, 2019

Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access, 2019

Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy: A Survey.
Proceedings of the Network and System Security - 13th International Conference, 2019

Secure Multiparty Learning from Aggregation of Locally Trained Models.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Protecting the Visual Fidelity of Machine Learning Datasets Using QR Codes.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption.
Proceedings of the Computer Security - ESORICS 2019, 2019

Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018

EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing.
J. High Speed Networks, 2018

Verifiable memory leakage-resilient dynamic searchable encryption.
J. High Speed Networks, 2018

An efficient traceable data sharing scheme in cloud computing for mobile devices.
Int. J. High Perform. Comput. Netw., 2018

Efficient VLR group signatures for smart cards.
Int. J. Embed. Syst., 2018

Position Paper on Blockchain Technology: Smart Contract and Applications.
Proceedings of the Network and System Security - 12th International Conference, 2018

An Almost Non-interactive Order Preserving Encryption Scheme.
Proceedings of the Information Security Practice and Experience, 2018

Publicly Verifiable Data Transfer and Deletion Scheme for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

An Associated Deletion Scheme for Multi-copy in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018

2017
Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

Fine-grained searchable encryption in multi-user setting.
Soft Comput., 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive Mob. Comput., 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017

Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare".
IACR Cryptol. ePrint Arch., 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

2016
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016

Secure searchable encryption: a survey.
J. Commun. Inf. Networks, 2016

Efficient and Secure Storage for Outsourced Data: A Survey.
Data Sci. Eng., 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Secure multi-server-aided data deduplication in cloud computing.
Pervasive Mob. Comput., 2015

Secure Outsourcing of Modular Exponentiation with Single Untrusted Server.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Secure Encrypted Image Search in Mobile Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

An Effective Cloud-Based Active Defense System against Malicious Codes.
Proceedings of the Information and Communication Technology, 2014

Online/Offline Attribute Based Signature.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Secure Approximate Nearest Neighbor Search over Encrypted Data.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

2012
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012


  Loading...