Yilei Wang

According to our database1, Yilei Wang authored at least 61 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Rational adversary with flexible utility in secure two-party computation.
J. Ambient Intelligence and Humanized Computing, 2019

A game-theoretic method based on Q-learning to invalidate criminal smart contracts.
Inf. Sci., 2019

Randomness invalidates criminal smart contracts.
Inf. Sci., 2019

Thermodynamic Entropy in Quantum Statistics for Stock Market Networks.
Complexity, 2019

2018
Demographic Information Prediction: A Portrait of Smartphone Application Users.
IEEE Trans. Emerging Topics Comput., 2018

Incentive-driven attacker for corrupting two-party protocols.
Soft Comput., 2018

2017
A Key-insulated Proxy Re-encryption Scheme for Data Sharing in a Cloud Environment.
I. J. Network Security, 2017

Cloud-aided online/offline ciphertext-policy attribute-based encryption in the standard model.
IJGUC, 2017

Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
Rational computing protocol based on fuzzy theory.
Soft Comput., 2016

Fairness in secure computing protocols based on incentives.
Soft Comput., 2016

Public-key encryption for protecting data in cloud system with intelligent agents against side-channel attacks.
Soft Comput., 2016

Corrigendum to "New Rational Parties Relying on Reputation".
Security and Communication Networks, 2016

An image segmentation algorithm based on improved multiscale random field model in wavelet domain.
J. Ambient Intelligence and Humanized Computing, 2016

On the security of two identity-based signature schemes based on pairings.
Inf. Process. Lett., 2016

An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment.
I. J. Network Security, 2016

Effective algorithms for vertical mining probabilistic frequent patterns in uncertain mobile environments.
IJAHUC, 2016

Social rational secure multi-party computation.
Concurrency and Computation: Practice and Experience, 2016

A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage.
Concurrency and Computation: Practice and Experience, 2016

Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

2015
Fair two-party computation with rational parties holding private types.
Security and Communication Networks, 2015

Achieving fairness by sequential equilibrium in rational two-party computation under incomplete information.
Security and Communication Networks, 2015

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks.
Mobile Information Systems, 2015

The impact of social cloud reputation and structure on rational computation.
J. High Speed Networks, 2015

A brief survey on secure multi-party computing in the presence of rational parties.
J. Ambient Intelligence and Humanized Computing, 2015

An adaptive texture-preserved image denoising model.
J. Ambient Intelligence and Humanized Computing, 2015

Cloud data integrity checking protocol from lattice.
IJHPCN, 2015

File sharing in cloud computing using win stay lose shift strategy.
IJHPCN, 2015

Multi-tenants Data Duplication Secure Storage in SaaS.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

SHAFT: Supporting Transactions with Serializability and Fault-Tolerance in Highly-Available Datastores.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Provable Data Possession Supporting Secure Data Transfer for Cloud Storage.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Improving transaction processing performance by consensus reduction.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

Gender Prediction Based on Data Streams of Smartphone Applications.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Server Aided Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Secure Two-Party Computation in Social Cloud Based on Reputation.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Anonymous Identity-Based Encryption with Bounded Leakage Resilience.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

The Electronic Voting in the Presence of Rational Voters.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

2014
New rational parties relying on reputation.
Security and Communication Networks, 2014

Social rational secure multi-party computation.
Concurrency and Computation: Practice and Experience, 2014

Demographic information prediction based on smartphone application usage.
Proceedings of the International Conference on Smart Computing, 2014

Rational Secure Two-party Computation in Social Cloud.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Limited Proxy Re-encryption with Keyword Search for Data Access Control in Cloud Computing.
Proceedings of the Network and System Security - 8th International Conference, 2014

A PID-based quality control algorithm for SVC video streaming.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Short Convertible Undeniable Signature From Pairing.
JSW, 2013

Identity-Based Key-Encapsulation Mechanism from Multilinear Maps.
IACR Cryptology ePrint Archive, 2013

A New Privacy-Preserving Broadcast Encryption Scheme from DPVS.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fair Computation with Tit-for-Tat Strategy.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Identity-Based Authenticate Key Exchange Protocol from Lattice.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
An Efficient Certificateless Threshold Decryption Schemes Based On Pairings.
JCP, 2012

Rational secret sharing with semi-rational players.
IJGUC, 2012

Repeated rational secret sharing, revisited.
IJGUC, 2012

Multi-party Computation with Social Rational Parties.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

A novel local patch framework for fixing supervised learning models.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Fairness with Semi-rational Players in Standard Communication Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

2-out-of-2 Rational Secret Sharing in Extensive Form.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2009
A Dynamic Programming Model about Optimized Port Transport Expense Paper.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

The Application of Saftey Audit and Monitor Technology in Power Management.
Proceedings of the 2009 IITA International Conference on Services Science, 2009

The Application of EDI Technology in Electronic Commerce System.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

2008
An Improved K-Means Clustering Algorithm Based on Spectral Method.
Proceedings of the Advances in Computation and Intelligence, Third International Symposium, 2008

2007
A New BP Neural Network Model Based on the Random Fuzzy Theory.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007


  Loading...