Jianfeng Wang
Orcid: 0000-0001-5297-0293Affiliations:
- Xidian University, School of Cyber Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
According to our database1,
Jianfeng Wang
authored at least 98 papers
between 2012 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2026
Future Gener. Comput. Syst., 2026
2025
IEEE Trans. Knowl. Data Eng., May, 2025
Reducing Paging and Exit Overheads in Intel SGX for Oblivious Conjunctive Keyword Search.
IEEE Trans. Computers, March, 2025
Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size.
IEEE Trans. Dependable Secur. Comput., 2025
Inf. Sci., 2025
Inf. Sci., 2025
2024
IEEE Trans. Mob. Comput., April, 2024
Research on a hierarchical feature-based contour extraction method for spatial complex truss-like structures in aerial images.
Eng. Appl. Artif. Intell., January, 2024
Multi-Client Verifiable Encrypted Keyword Search Scheme With Authorization Over Outsourced Encrypted Data.
IEEE Trans. Netw. Sci. Eng., 2024
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application.
IEEE Trans. Dependable Secur. Comput., 2024
Self-sovereign identity management in ciphertext policy attribute based encryption for IoT protocols.
J. Inf. Secur. Appl., 2024
Xproofs: New Aggregatable and Maintainable Matrix Commitment with Optimal Proof Size.
IACR Cryptol. ePrint Arch., 2024
Compressed Cookies: Practical Wildcard Symmetric Searchable Encryption with Optimized Storage.
Proceedings of the Provable and Practical Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Less payment and higher efficiency: A verifiable, fair and forward-secure range query scheme using blockchain.
Comput. Networks, December, 2023
One for all: Efficient verifiable dynamic multi-user searchable encryption in the presence of corrupted users.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis.
J. King Saud Univ. Comput. Inf. Sci., September, 2023
Towards secure asynchronous messaging with forward secrecy and mutual authentication.
Inf. Sci., May, 2023
IEEE Trans. Parallel Distributed Syst., February, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting.
IEEE Trans. Cloud Comput., 2023
A Practical Heartbeat-based Defense Scheme Against Cloning Attacks in PoA Blockchain.
Comput. Stand. Interfaces, 2023
EPPVChain: An Efficient Privacy-Preserving Verifiable Query Scheme for Blockchain Databases.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Rphx: Result Pattern Hiding Conjunctive Query Over Private Compressed Index Using Intel SGX.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Int. J. Comput. Sci. Eng., 2022
New Unbounded Verifiable Data Streaming for Batch Query with Almost Optimal Overhead.
IACR Cryptol. ePrint Arch., 2022
Verifiable searchable symmetric encryption for conjunctive keyword queries in cloud storage.
Frontiers Comput. Sci., 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Utilizing QR codes to verify the visual fidelity of image datasets for machine learning.
J. Netw. Comput. Appl., 2021
Comput. Stand. Interfaces, 2021
Comput. Stand. Interfaces, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
J. Netw. Comput. Appl., 2020
Inf. Sci., 2020
Int. J. Comput. Sci. Eng., 2020
Efficient self-adaptive access control for personal medical data in emergency setting.
Int. J. Comput. Sci. Eng., 2020
Sci. China Inf. Sci., 2020
2019
Soft Comput., 2019
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
J. Univers. Comput. Sci., 2019
Int. J. Comput. Sci. Eng., 2019
IEEE Access, 2019
Revocable Attribute-Based Encryption Scheme With Efficient Deduplication for Ehealth Systems.
IEEE Access, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Verifiable privacy-preserving single-layer perceptron training scheme in cloud computing.
Soft Comput., 2018
EPSLP: Efficient and privacy-preserving single-layer perceptron learning in cloud computing.
J. High Speed Networks, 2018
J. High Speed Networks, 2018
Int. J. High Perform. Comput. Netw., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018
2017
Soft Comput., 2017
Pervasive Mob. Comput., 2017
J. Comput. Syst. Sci., 2017
TrDup: enhancing secure data deduplication with user traceability in cloud computing.
Int. J. Web Grid Serv., 2017
Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare".
IACR Cryptol. ePrint Arch., 2017
Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Gener. Comput. Syst., 2017
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017
2016
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
IEEE Trans. Computers, 2015
Pervasive Mob. Comput., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014
J. Internet Serv. Inf. Secur., 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
2013
Comput. Sci. Inf. Syst., 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
J. Internet Serv. Inf. Secur., 2012