Jiawei Yuan

According to our database1, Jiawei Yuan authored at least 39 papers between 2012 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized k-d Forest.
EAI Endorsed Trans. Security Safety, 2020

Low Latency Privacy-preserving Outsourcing of Deep Neural Network Inference.
IACR Cryptol. ePrint Arch., 2020

2019
Practical Privacy-Preserving MapReduce Based K-Means Clustering Over Large-Scale Dataset.
IEEE Trans. Cloud Comput., 2019

Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones.
J. Inf. Secur. Appl., 2019

Optimizing the energy-spectrum efficiency of cellular systems by evolutionary multi-objective algorithm.
Integr. Comput. Aided Eng., 2019

LEP-CNN: A Lightweight Edge Device Assisted Privacy-preserving CNN Inference Solution for IoT.
CoRR, 2019

Edge-Assisted CNN Inference over Encrypted Data for Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2019

Workload-Aware Task Placement in Edge-Assisted Human Re-identification.
Proceedings of the 16th Annual IEEE International Conference on Sensing, 2019

PDF-DS: Privacy-Preserving Data Filtering for Distributed Data Streams in Cloud.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Edge-Assisted Image Processing with Joint Optimization of Responding and Placement Strategy.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Analysis of Rogue Access Points Using SDR.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Blockchain-based Secure Routing Strategy for Airborne Mesh Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Edge-Assisted Learning for Real-Time UAV Imagery via Predictive Offloading.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Secure and Reliable Decentralized Truth Discovery Using Blockchain.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
A parameterised model order reduction method for parametric systems based on Laguerre polynomials.
Int. J. Control, 2018

CPAR: Cloud-Assisted Privacy-preserving Image Annotation with Randomized KD-Forest.
CoRR, 2018

Fountain Code Enabled ADS-B for Aviation Security and Safety Enhancement.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

A Cost Value Based Evolutionary Many-Objective Optimization Algorithm with Neighbor Selection Strategy.
Proceedings of the 2018 IEEE Congress on Evolutionary Computation, 2018

2017
Towards a privacy preserving cohort discovery framework for clinical research networks.
J. Biomed. Informatics, 2017

Population Decomposition-Based Greedy Approach Algorithm for the Multi-Objective Knapsack Problems.
Int. J. Pattern Recognit. Artif. Intell., 2017

CAPIA: Cloud assisted privacy-preserving image annotation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Examining Healthcare Utilization Patterns of Elderly and Middle-Aged Adults in the United States.
Proceedings of the Twenty-Ninth International Florida Artificial Intelligence Research Society Conference, 2016

SBPA: Social behavior based cross Social Network phishing attacks.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A New Dominance Relation Based on Simplex for Many Objective Optimization Problems.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

2015
Public Integrity Auditing for Dynamic Data Sharing With Multiuser Modification.
IEEE Trans. Inf. Forensics Secur., 2015

Structure-preserving model order reduction by general orthogonal polynomials for integral-differential systems.
J. Frankl. Inst., 2015

PCPOR: Public and constant-cost proofs of retrievability in cloud.
J. Comput. Secur., 2015

MASK-BAN: Movement-Aided Authenticated Secret Key Extraction Utilizing Channel Characteristics in Body Area Networks.
IEEE Internet Things J., 2015

SEISA: Secure and efficient encrypted image search with access control.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Privacy Preserving Back-Propagation Neural Network Learning Made Practical with Cloud Computing.
IEEE Trans. Parallel Distributed Syst., 2014

Efficient public integrity checking for cloud data sharing with multi-user modification.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
BANA: Body Area Network Authentication Exploiting Channel Characteristics.
IEEE J. Sel. Areas Commun., 2013

Flexible and Publicly Verifiable Aggregation Query for Outsourced Databases in Cloud.
IACR Cryptol. ePrint Arch., 2013

Secure and Constant Cost Public Cloud Storage Auditing with Deduplication.
IACR Cryptol. ePrint Arch., 2013

ASK-BAN: authenticated secret key extraction utilizing channel characteristics for body area networks.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Efficient privacy-preserving biometric identification in cloud computing.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Proofs of Retrievability with Public Verifiability and Constant Communication Cost in Cloud.
IACR Cryptol. ePrint Arch., 2012

Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing.
Proceedings of the Security and Privacy in Communication Networks, 2012

Authenticated secret key extraction using channel characteristics for body area networks.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...