Qing Wu

Orcid: 0000-0002-9400-236X

Affiliations:
  • Xi'an University of Posts and Communications, School of Automation, China


According to our database1, Qing Wu authored at least 40 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT.
IEEE Internet Things J., January, 2024

Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle.
IACR Cryptol. ePrint Arch., 2024

2023
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, November, 2023

Application of asymmetric proximal support vector regression based on multitask learning in the stock market.
Expert Syst. Appl., October, 2023

Collusion resistant multi-authority access control scheme with privacy protection for personal health records.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain.
J. King Saud Univ. Comput. Inf. Sci., September, 2023

Accountable multi-authority attribute-based data access control in smart grids.
J. King Saud Univ. Comput. Inf. Sci., July, 2023

Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records.
IEEE Syst. J., June, 2023

C-Loss-Based Doubly Regularized Extreme Learning Machine.
Cogn. Comput., March, 2023

L1-Norm Robust Regularized Extreme Learning Machine with Asymmetric C-Loss for Regression.
Axioms, February, 2023

Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem.
IACR Cryptol. ePrint Arch., 2023

2022
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing.
IEEE Syst. J., 2022

A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth.
J. Syst. Archit., 2022

Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud.
J. Syst. Archit., 2022

A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks.
IEEE Internet Things J., 2022

Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain.
IEEE Internet Things J., 2022

Multitask Learning Based on Least Squares Support Vector Regression for Stock Forecast.
Axioms, 2022

Feature Selection Methods for Extreme Learning Machines.
Axioms, 2022

Application of online multitask learning based on least squares support vector regression in the financial market.
Appl. Soft Comput., 2022

2021
Feature Selection Method for L1-norm Twin Support Vector Regression.
Proceedings of the 2021 International Conference on Control, 2021

2017
Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Adaptively Secure Hierarchical Identity-Based Encryption over Lattice.
Proceedings of the Network and System Security - 11th International Conference, 2017

2016
Privacy-Preserving and Secure Sharing of PHR in the Cloud.
J. Medical Syst., 2016

Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys.
Comput. J., 2016

2015
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
New Efficient Hierarchical Identity-based Signature.
J. Comput., 2013

Anonymous Identity-Based Broadcast Encryption with Adaptive Security.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Hierarchical Identity-Based Signature with Short Public Keys.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups.
Math. Comput. Model., 2012

Direct CCA Secure Identity-Based Broadcast Encryption.
Proceedings of the Network and System Security - 6th International Conference, 2012

2011
New Constructions of Short Signatures in the Standard Model.
J. Softw., 2011

Secure Identity-based Threshold Broadcast Encryption in the Standard Model.
J. Networks, 2011

New Constructions of Identity-based Broadcast Encryption without Random Oracles.
KSII Trans. Internet Inf. Syst., 2011

2010
Particle Swarm Optimization for Semi-supervised Support Vector Machine.
J. Inf. Sci. Eng., 2010

Support Vector Regression Based on Adjustable Entropy Function Approach.
J. Inf. Sci. Eng., 2010

Identity-based Threshold Broadcast Encryption in the Standard Model.
KSII Trans. Internet Inf. Syst., 2010

Short Signature from the Bilinear Pairing.
Proceedings of the Information Computing and Applications - First International Conference, 2010

2009
New Construction of Short Hierarchical ID-Based Signature in the Standard Model.
Fundam. Informaticae, 2009

2006
Hypersphere Support Vector Machines Based on Multiplicative Updates.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006


  Loading...