Wenfen Liu

Orcid: 0000-0001-5601-8347

According to our database1, Wenfen Liu authored at least 62 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
GA-SCS: Graph-Augmented Source Code Summarization.
ACM Trans. Asian Low Resour. Lang. Inf. Process., January, 2023

AsU-OSum: Aspect-augmented unsupervised opinion summarization.
Inf. Process. Manag., 2023

Blockchain-based Off-chain Extension Model for Geographic Information Data.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

Trajectory Privacy Protection Method Based on Sensitivity Analysis.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

2022
Anomaly detection in images with shared autoencoders.
Frontiers Neurorobotics, September, 2022

FCSF-TABS: two-stage abstractive summarization with fact-aware reinforced content selection and fusion.
Neural Comput. Appl., 2022

MAA-PTG: multimodal aspect-aware product title generation.
J. Intell. Inf. Syst., 2022

Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption.
Comput. Stand. Interfaces, 2022

VAEPass: A lightweight passwords guessing model based on variational auto-encoder.
Comput. Secur., 2022

3FO: The Three-Frame-Only Approach for Fast and Accurate Monocular SLAM Initialization.
IEEE Access, 2022

Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning.
Proceedings of the 47th IEEE Conference on Local Computer Networks, 2022

2021
KI-HABS: Key Information Guided Hierarchical Abstractive Summarization.
KSII Trans. Internet Inf. Syst., 2021

FAR-ASS: Fact-aware reinforced abstractive sentence summarization.
Inf. Process. Manag., 2021

An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications.
CoRR, 2021

Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Outlier Detection Method based on Improved K-means Clustering Algorithm.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2020
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets.
IET Inf. Secur., 2020

Composition of Boolean functions: An application to the secondary constructions of bent functions.
Discret. Math., 2020

Harden Deep Convolutional Classifiers via K-Means Reconstruction.
IEEE Access, 2020

Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
Forward and backward secure fuzzy encryption for data sharing in cloud computing.
Soft Comput., 2019

A Note on Rotation Symmetric S-boxes.
J. Syst. Sci. Complex., 2019

TG-SPSR: A Systematic Targeted Password Attacking Model.
KSII Trans. Internet Inf. Syst., 2019

SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm.
IEEE Access, 2019

An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security.
IEEE Access, 2019

Defence Against Adversarial Attacks Using Clustering Algorithm.
Proceedings of the Data Science, 2019

Differentially Private Graph Clustering Algorithm Based on Structure Similarity.
Proceedings of the ICCNS 2019: The 9th International Conference on Communication and Network Security, 2019

Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption.
IEEE Trans. Cloud Comput., 2018

Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage.
IEEE Syst. J., 2018

Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks.
Inf. Technol. Control., 2018

On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS.
Int. J. Commun. Syst., 2018

A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

2017
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing.
Secur. Commun. Networks, 2017

Compressed constrained spectral clustering framework for large-scale data sets.
Knowl. Based Syst., 2017

Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security.
Int. J. Found. Comput. Sci., 2017

Two-factor authentication scheme using attribute and password.
Int. J. Commun. Syst., 2017

Forward-secure identity-based signature with efficient revocation.
Int. J. Comput. Math., 2017

Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection.
Comput. Intell. Neurosci., 2017

An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model.
Proceedings of the Social Media Processing - 6th National Conference, 2017

An Effective Approach for Chinese News Headline Classification Based on Multi-representation Mixed Model with Attention and Ensemble Learning.
Proceedings of the Natural Language Processing and Chinese Computing, 2017

Universally Composable Three-Party Password Authenticated Key Exchange.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Security pitfalls of "ePASS: An expressive attribute-based signature scheme".
J. Inf. Secur. Appl., 2016

Secure and Efficient Smart Card Based Remote User Password Authentication Scheme.
Int. J. Netw. Secur., 2016

On permutation polynomials of the form <i>x<sup>1+2<sup>k</sup></sup> + L(x)</i>.
Int. J. Comput. Math., 2016

Practical Attribute-based Signature: Traceability and Revocability.
Comput. J., 2016

2015
一种多参量评估的云计算信任模型 (Trust Model of Cloud Computing Based on Multi-parameters Evaluation).
计算机科学, 2015

Secure control protocol for universal serial bus mass storage devices.
IET Comput. Digit. Tech., 2015

Forward-Secure Threshold Attribute-Based Signature Scheme.
Comput. J., 2015

Revocable Threshold Attribute-Based Signature against Signing Key Exposure.
Proceedings of the Information Security Practice and Experience, 2015

2014
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wirel. Pers. Commun., 2014

Traceable attribute-based signcryption.
Secur. Commun. Networks, 2014

BeTrust: A Dynamic Trust Model Based on Bayesian Inference and Tsallis Entropy for Medical Sensor Networks.
J. Sensors, 2014

A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions.
J. Comb. Theory, Ser. A, 2014

Families of rotation symmetric functions with useful cryptographic properties.
IET Inf. Secur., 2014

Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

2012
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions.
IEEE Trans. Inf. Theory, 2012

An Improved Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2012

2011
The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables.
IEEE Trans. Inf. Theory, 2011

2009
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

2006
On the Rate of Coincidence of Two Clock-Controlled Combiners.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006


  Loading...