default search action
Liming Fang 0001
Person information
- affiliation: Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, Nanjing, China
Other persons with the same name
- Liming Fang — disambiguation page
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j49]Qiannan Wang, Changchun Yin, Liming Fang, Zhe Liu, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning. Comput. Secur. 142: 103855 (2024) - [j48]Ruoxia Li, Zengxiang Wang, Liming Fang, Changgen Peng, Weizheng Wang, Hu Xiong:
Efficient Blockchain-Assisted Distributed Identity-Based Signature Scheme for Integrating Consumer Electronics in Metaverse. IEEE Trans. Consumer Electron. 70(1): 3770-3780 (2024) - [j47]Yi Zhang, Xiaofeng Jia, Bianjing Pan, Jun Shao, Liming Fang, Rongxing Lu, Guiyi Wei:
Anonymous Multi-Hop Payment for Payment Channel Networks. IEEE Trans. Dependable Secur. Comput. 21(1): 476-485 (2024) - [j46]Chunpeng Ge, Zhe Liu, Willy Susilo, Liming Fang, Hao Wang:
Attribute-Based Encryption With Reliable Outsourced Decryption in Cloud Computing Using Smart Contract. IEEE Trans. Dependable Secur. Comput. 21(2): 937-948 (2024) - [j45]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 21(2): 949-960 (2024) - [c44]Ke Liang, Sihang Zhou, Meng Liu, Yue Liu, Wenxuan Tu, Yi Zhang, Liming Fang, Zhe Liu, Xinwang Liu:
Hawkes-Enhanced Spatial-Temporal Hypergraph Contrastive Learning Based on Criminal Correlations. AAAI 2024: 8733-8741 - [c43]Shengju Yu, Siwei Wang, Pei Zhang, Miao Wang, Ziming Wang, Zhe Liu, Liming Fang, En Zhu, Xinwang Liu:
DVSAI: Diverse View-Shared Anchors Based Incomplete Multi-View Clustering. AAAI 2024: 16568-16577 - [c42]Mengjie Wu, Jingui Ma, Run Wang, Sidan Zhang, Ziyou Liang, Boheng Li, Chenhao Lin, Liming Fang, Lina Wang:
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution. AAAI 2024: 19965-19973 - [c41]Li Liu, Haiyan Chen, Changchun Yin, Liming Fang:
Adversarial Attack and Defense for Transductive Support Vector Machine. IJCNN 2024: 1-8 - [i13]Qiannan Wang, Changchun Yin, Liming Fang, Lu Zhou, Zhe Liu, Run Wang, Chenhao Lin:
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection. CoRR abs/2401.00137 (2024) - 2023
- [j44]Aiping Zhang, Liming Fang, Chunpeng Ge, Piji Li, Zhe Liu:
Efficient transformer with code token learner for code clone detection. J. Syst. Softw. 197: 111557 (2023) - [c40]Xihong Yang, Yue Liu, Sihang Zhou, Siwei Wang, Wenxuan Tu, Qun Zheng, Xinwang Liu, Liming Fang, En Zhu:
Cluster-Guided Contrastive Graph Clustering Network. AAAI 2023: 10834-10842 - [c39]Chunpeng Ge, Willy Susilo, Zhe Liu, Joonsang Baek, Xiapu Luo, Liming Fang:
Attribute-based Proxy Re-encryption with Direct Revocation Mechanism for Data Sharing in Clouds. ACM TUR-C 2023: 164-165 - [c38]Zikang Jin, Changchun Yin, Piji Li, Lu Zhou, Liming Fang, Xiangmao Chang, Zhe Liu:
Multi-Layer Feature Division Transferable Adversarial Attack. ICASSP 2023: 1-5 - [c37]Bo Zhao, Tao Wang, Liming Fang:
FedCom: Byzantine-Robust Federated Learning Using Data Commitment. ICC 2023: 33-38 - [c36]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks. ICCV 2023: 4986-4996 - [c35]Mengxin Wang, Liming Fang, Kuiqi Chen:
FedNAT: Byzantine-robust Federated Learning through Activation-based Attention Transfer. ICDM (Workshops) 2023: 1005-1012 - [c34]Jiacheng Luo, Xuhao Li, Hao Wang, Dongwan Lan, Xiaofei Wu, Lu Zhou, Liming Fang:
An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV. ICICS 2023: 383-395 - [c33]Zhen Xia, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
Mining for Better: An Energy-Recycling Consensus Algorithm to Enhance Stability with Deep Learning. ISPEC 2023: 579-594 - [c32]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Wenhui Zhang, Liming Fang, Jing Chen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. ACM Multimedia 2023: 8463-8474 - [c31]Panyu Wu, Zhenfu Cao, Jiachen Shen, Xiaolei Dong, Yihao Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su:
MMDSSE: Multi-client and Multi-keyword Dynamic Searchable Symmetric Encryption for Cloud Storage. PST 2023: 1-11 - [c30]Yihao Yang, Xiaolei Dong, Jiachen Shen, Zhenfu Cao, Yunbo Yang, Jun Zhou, Liming Fang, Zhe Liu, Chunpeng Ge, Chunhua Su, Zongyang Hou:
MDPPC: Efficient Scalable Multiparty Delegated PSI and PSI Cardinality. PST 2023: 1-7 - [c29]Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu, Liming Fang:
Practical Single-Round Secure Wildcard Pattern Matching. SEC 2023: 87-101 - [c28]Guodong Huang, Chuan Ma, Ming Ding, Yuwen Qian, Chunpeng Ge, Liming Fang, Zhe Liu:
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic. WWW 2023: 1991-1999 - [i12]Xihong Yang, Yue Liu, Sihang Zhou, Siwei Wang, Wenxuan Tu, Qun Zheng, Xinwang Liu, Liming Fang, En Zhu:
Cluster-guided Contrastive Graph Clustering Network. CoRR abs/2301.01098 (2023) - [i11]Guodong Huang, Chuan Ma, Ming Ding, Yuwen Qian, Chunpeng Ge, Liming Fang, Zhe Liu:
Efficient and Low Overhead Website Fingerprinting Attacks and Defenses based on TCP/IP Traffic. CoRR abs/2302.13763 (2023) - [i10]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network. CoRR abs/2307.15860 (2023) - [i9]Chenhao Lin, Xiang Ji, Yulong Yang, Qian Li, Chao Shen, Run Wang, Liming Fang:
Hard Adversarial Example Mining for Improving Robust Fairness. CoRR abs/2308.01823 (2023) - [i8]Xiaobei Li, Changchun Yin, Liming Fang, Run Wang, Chenhao Lin:
SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning. CoRR abs/2308.04673 (2023) - [i7]Qiannan Wang, Changchun Yin, Zhe Liu, Liming Fang, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning. CoRR abs/2310.00626 (2023) - 2022
- [j43]Weiting Zhang, Hanyi Zhang, Liming Fang, Zhe Liu, Chunpeng Ge:
A Secure Revocable Fine-Grained Access Control and Data Sharing Scheme for SCADA in IIoT Systems. IEEE Internet Things J. 9(3): 1976-1984 (2022) - [j42]Zhuo Su, Dongyan Wang, Yixiao Yang, Yu Jiang, Wanli Chang, Liming Fang, Wen Li, Jia-Guang Sun:
Code Synthesis for Dataflow-Based Embedded Software Design. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(1): 49-61 (2022) - [j41]Binbin Zhao, Shouling Ji, Wei-Han Lee, Changting Lin, Haiqin Weng, Jingzheng Wu, Pan Zhou, Liming Fang, Raheem Beyah:
A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices. IEEE Trans. Dependable Secur. Comput. 19(3): 1826-1840 (2022) - [j40]Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang:
Revocable Attribute-Based Encryption With Data Integrity in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2864-2872 (2022) - [j39]Chunpeng Ge, Willy Susilo, Joonsang Baek, Zhe Liu, Jinyue Xia, Liming Fang:
A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 19(5): 2907-2919 (2022) - [j38]Xinyu Wang, Yuefeng Du, Cong Wang, Qian Wang, Liming Fang:
WebEnclave: Protect Web Secrets From Browser Extensions With Software Enclave. IEEE Trans. Dependable Secur. Comput. 19(5): 3055-3070 (2022) - [j37]Liming Fang, Minghui Li, Zhe Liu, Changting Lin, Shouling Ji, Anni Zhou, Willy Susilo, Chunpeng Ge:
A Secure and Authenticated Mobile Payment Protocol Against Off-Site Attack Strategy. IEEE Trans. Dependable Secur. Comput. 19(5): 3564-3578 (2022) - [c27]Tao Wang, Bo Zhao, Liming Fang:
FLForest: Byzantine-robust Federated Learning through Isolated Forest. ICPADS 2022: 296-303 - [c26]Run Wang, Haoxuan Li, Lingzhou Mu, Jixing Ren, Shangwei Guo, Li Liu, Liming Fang, Jing Chen, Lina Wang:
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations? ACM Multimedia 2022: 1808-1818 - [c25]Wei-Yang Chiu, Weizhi Meng, Wenjuan Li, Liming Fang:
FolketID: A Decentralized Blockchain-Based NemID Alternative Against DDoS Attacks. ProvSec 2022: 210-227 - [c24]Sihan He, Weibin Wu, Yanbin Li, Lu Zhou, Liming Fang, Zhe Liu:
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis. WASA (2) 2022: 93-104 - [c23]Fengyuan Qiu, Hao Yang, Lu Zhou, Chuan Ma, Liming Fang:
Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption. WASA (1) 2022: 427-440 - [i6]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. CoRR abs/2210.07809 (2022) - 2021
- [j36]Yang Li, Xinyu Yun, Liming Fang, Chunpeng Ge:
An Efficient Login Authentication System against Multiple Attacks in Mobile Devices. Symmetry 13(1): 125 (2021) - [j35]Chunpeng Ge, Zhe Liu, Jinyue Xia, Liming Fang:
Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds. IEEE Trans. Dependable Secur. Comput. 18(3): 1214-1226 (2021) - [j34]Chunpeng Ge, Willy Susilo, Zhe Liu, Jinyue Xia, Pawel Szalachowski, Liming Fang:
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing. IEEE Trans. Dependable Secur. Comput. 18(6): 2787-2800 (2021) - [j33]Liming Fang, Xinyu Yun, Changchun Yin, Weiping Ding, Lu Zhou, Zhe Liu, Chunhua Su:
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning. IEEE Trans. Fuzzy Syst. 29(4): 742-756 (2021) - [j32]Liming Fang, Yang Li, Zhe Liu, Changchun Yin, Minghui Li, Zehong Cao:
A Practical Model Based on Anomaly Detection for Protecting Medical IoT Control Services Against External Attacks. IEEE Trans. Ind. Informatics 17(6): 4260-4269 (2021) - [j31]Chunpeng Ge, Zhe Liu, Liming Fang, Huading Ling, Aiping Zhang, Changchun Yin:
A Hybrid Fuzzy Convolutional Neural Network Based Mechanism for Photovoltaic Cell Defect Detection With Electroluminescence Images. IEEE Trans. Parallel Distributed Syst. 32(7): 1653-1664 (2021) - [c22]Aiping Zhang, Kui Liu, Liming Fang, Qianjun Liu, Xinyu Yun, Shouling Ji:
Learn To Align: A Code Alignment Network For Code Clone Detection. APSEC 2021: 1-11 - [c21]Sihao Hu, Xuhong Zhang, Junfeng Zhou, Shouling Ji, Jiaqi Yuan, Zhao Li, Zhipeng Wang, Qi Chen, Qinming He, Liming Fang:
Turbo: Fraud Detection in Deposit-free Leasing Service via Real-Time Behavior Network Mining. ICDE 2021: 2583-2594 - [i5]Bo Zhao, Peng Sun, Liming Fang, Tao Wang, Keyu Jiang:
FedCom: A Byzantine-Robust Local Model Aggregation Rule Using Data Commitment for Federated Learning. CoRR abs/2104.08020 (2021) - 2020
- [j30]Simin Hu, Liang Liu, Liming Fang, Fangzhou Zhou, Renjun Ye:
A Novel Energy-Efficient and Privacy-Preserving Data Aggregation for WSNs. IEEE Access 8: 802-813 (2020) - [j29]Chunpeng Ge, Changchun Yin, Zhe Liu, Liming Fang, Juncen Zhu, Huading Ling:
A privacy preserve big data analysis system for wearable wireless sensor network. Comput. Secur. 96: 101887 (2020) - [j28]Liming Fang, Yang Li, Xinyu Yun, Zhenyu Wen, Shouling Ji, Weizhi Meng, Zehong Cao, Muhammad Tanveer:
THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network. IEEE Internet Things J. 7(7): 5745-5759 (2020) - [j27]Liming Fang, Hanyi Zhang, Minghui Li, Chunpeng Ge, Liang Liu, Zhe Liu:
A Secure and Fine-Grained Scheme for Data Security in Industrial IoT Platforms for Smart City. IEEE Internet Things J. 7(9): 7982-7990 (2020) - [j26]Liming Fang, Changchun Yin, Lu Zhou, Yang Li, Chunhua Su, Jinyue Xia:
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine. Inf. Sci. 507: 143-160 (2020) - [j25]Chunpeng Ge, Zhe Liu, Liming Fang:
A blockchain based decentralized data security mechanism for the Internet of Things. J. Parallel Distributed Comput. 141: 1-9 (2020) - [j24]Liming Fang, Bo Zhao, Yang Li, Zhe Liu, Chunpeng Ge, Weizhi Meng:
Countermeasure Based on Smart Contracts and AI against DoS/DDoS Attack in 5G Circumstances. IEEE Netw. 34(6): 54-61 (2020) - [j23]Liming Fang, Hongwei Zhu, Boqing Lv, Zhe Liu, Weizhi Meng, Yu Yu, Shouling Ji, Zehong Cao:
HandiText: Handwriting Recognition Based on Dynamic Characteristics with Incremental LSTM. Trans. Data Sci. 1(4): 25:1-25:18 (2020) - [j22]Yushu Zhang, Ping Wang, Liming Fang, Xing He, Hao Han, Bing Chen:
Secure Transmission of Compressed Sampling Data Using Edge Clouds. IEEE Trans. Ind. Informatics 16(10): 6641-6651 (2020) - [j21]Liming Fang, Changchun Yin, Juncen Zhu, Chunpeng Ge, Muhammad Tanveer, Alireza Jolfaei, Zehong Cao:
Privacy Protection for Medical Data Sharing in Smart Healthcare. ACM Trans. Multim. Comput. Commun. Appl. 16(3s): 100:1-100:18 (2020) - [c20]Hanyi Zhang, Liming Fang, Keyu Jiang, Weiting Zhang, Minghui Li, Lu Zhou:
Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data. ICPADS 2020: 406-413 - [c19]Changchun Yin, Hao Wang, Lu Zhou, Liming Fang:
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data. TrustCom 2020: 277-284 - [c18]Minghui Li, Yang Li, Liming Fang:
ELPPS: An Enhanced Location Privacy Preserving Scheme in Mobile Crowd-Sensing Network Based on Edge Computing. TrustCom 2020: 475-482
2010 – 2019
- 2019
- [j20]Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang:
Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing. Int. J. Embed. Syst. 11(2): 115-124 (2019) - [j19]Liang Liu, Zhaoyang Han, Liming Fang, Zuchao Ma:
Tell the Device Password: Smart Device Wi-Fi Connection Based on Audio Waves. Sensors 19(3): 618 (2019) - [j18]Liming Fang, Minghui Li, Lu Zhou, Hanyi Zhang, Chunpeng Ge:
A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch. Sensors 19(9): 2109 (2019) - [j17]Bo Zhao, Liming Fang, Hanyi Zhang, Chunpeng Ge, Weizhi Meng, Liang Liu, Chunhua Su:
Y-DWMS: A Digital Watermark Management System Based on Smart Contracts. Sensors 19(14): 3091 (2019) - 2018
- [j16]Liming Fang, Chunpeng Ge, Zhiqiu Huang, Jiandong Wang:
Privacy preserving cloud data sharing system with flexible control. Comput. Electr. Eng. 70: 978-986 (2018) - [j15]Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi:
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des. Codes Cryptogr. 86(11): 2587-2603 (2018) - [j14]Maosheng Sun, Chunpeng Ge, Liming Fang, Jiandong Wang:
A proxy broadcast re-encryption for cloud data sharing. Multim. Tools Appl. 77(9): 10455-10469 (2018) - [j13]Liming Fang, Liang Liu, Jinyue Xia, Maosheng Sun:
A Secure Multimedia Data Sharing Scheme for Wireless Network. Secur. Commun. Networks 2018: 5037892:1-5037892:10 (2018) - 2017
- [j12]Chunpeng Ge, Willy Susilo, Jiandong Wang, Liming Fang:
Identity-based conditional proxy re-encryption with fine grain policy. Comput. Stand. Interfaces 52: 1-9 (2017) - [j11]Qi Xie, Duncan S. Wong, Guilin Wang, Xiao Tan, Kefei Chen, Liming Fang:
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model. IEEE Trans. Inf. Forensics Secur. 12(6): 1382-1392 (2017) - 2016
- [j10]Chunpeng Ge, Willy Susilo, Jiandong Wang, Zhiqiu Huang, Liming Fang, Yongjun Ren:
A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles. Comput. J. 59(7): 970-982 (2016) - 2015
- [j9]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds. Concurr. Comput. Pract. Exp. 27(8): 2004-2027 (2015) - [j8]Liming Fang, Zhiqiu Huang, Jiandong Wang:
标准模型下增强的无需安全信道的带关键词搜索的公钥加密 (Secure Channel Free Searchable Encryption in Standard Model). 计算机科学 42(11): 197-202 (2015) - [c17]Yongjun Ren, Yaping Cheng, Jin Wang, Liming Fang:
Data protection based on multifunction digital watermark in wireless sensor network. ICCST 2015: 37-41 - [c16]Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang:
Reliable access control for multi-authority in cloud storage. ICCST 2015: 113-116 - [c15]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Outsourced data tagging via authority and delegable auditing for cloud storage. ICCST 2015: 131-134 - [c14]Yongjun Ren, Jin Han, Jin Wang, Liming Fang:
Privacy-preserving proof of storage in large group. ICCST 2015: 269-272 - 2014
- [c13]Yongjun Ren, Yaping Chen, Jin Wang, Liming Fang:
Leakage Resilient Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 706-709 - [c12]Yongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang:
Attributed Based Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 710-713 - [c11]Yongjun Ren, Jiang Xu, Jin Wang, Liming Fang:
Oriented Group Provable Data Possession in Public Cloud. IIH-MSP 2014: 775-778 - [c10]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Analysis of Delegable and Proxy Provable Data Possession for Cloud Storage. IIH-MSP 2014: 779-782 - [c9]Yongjun Ren, Jian Shen, Jin Wang, Liming Fang:
Security Analysis of Delegable and Proxy Provable Data Possession in Public Cloud Storage. IIH-MSP 2014: 795-798 - 2013
- [j7]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Fuzzy conditional proxy re-encryption. Sci. China Inf. Sci. 56(5): 1-13 (2013) - [j6]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Public key encryption with keyword search secure against keyword guessing attacks without random oracle. Inf. Sci. 238: 221-241 (2013) - [c8]Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong:
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security. INCoS 2013: 552-559 - [i4]Kaitai Liang, Liming Fang, Duncan S. Wong, Willy Susilo:
A Ciphertext-Policy Attribute-Based Proxy Re-Encryption with Chosen-Ciphertext Security. IACR Cryptol. ePrint Arch. 2013: 236 (2013) - 2012
- [j5]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Hierarchical conditional proxy re-encryption. Comput. Stand. Interfaces 34(4): 380-389 (2012) - [j4]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor. Comput. Sci. 462: 39-58 (2012) - 2011
- [j3]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
Interactive conditional proxy re-encryption with fine grain policy. J. Syst. Softw. 84(12): 2293-2302 (2011) - 2010
- [j2]Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Decryptable Public Key Encryption with Keyword Search Schemes. J. Digit. Content Technol. its Appl. 4(9): 141-150 (2010) - [j1]Liming Fang, Willy Susilo, Yongjun Ren, Chunpeng Ge, Jiandong Wang:
Chosen Public Key and Ciphertext Secure Proxy Re-encryption Schemes. J. Digit. Content Technol. its Appl. 4(9): 151-160 (2010) - [c7]Guoan Zhao, Liming Fang, Jiandong Wang, Chunpeng Ge, Yongjun Ren:
Improved unidirectional chosen-ciphertext secure proxy re-encryption. WCNIS 2010: 476-480 - [c6]Guoan Zhao, Canghai Tan, Yongjun Ren, Liming Fang:
An efficient unlinkable secret handshake protocol without ROM. WCNIS 2010: 486-490
2000 – 2009
- 2009
- [c5]Liming Fang, Willy Susilo, Chunpeng Ge, Jiandong Wang:
A Secure Channel Free Public Key Encryption with Keyword Search Scheme without Random Oracle. CANS 2009: 248-258 - [c4]Liming Fang, Willy Susilo, Jiandong Wang:
Anonymous Conditional Proxy Re-encryption without Random Oracle. ProvSec 2009: 47-60 - 2008
- [c3]Yuan Yuan, Bing Chen, Jiandong Wang, Liming Fang, Tao Xu:
Weighted Margin Multi-Class Core Vector Machines. CIS (1) 2008: 235-239 - [c2]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM. CIS (1) 2008: 326-330 - [i3]Liming Fang, Jiandong Wang, Yongjun Ren, Jinyue Xia, Shizhu Bian:
Chosen-Ciphertext Secure Fuzzy Identity-Based Key Encapsulation without ROM. IACR Cryptol. ePrint Arch. 2008: 139 (2008) - [i2]Liming Fang, Jinyue Xia:
Full Security: Fuzzy Identity Based Encryption. IACR Cryptol. ePrint Arch. 2008: 307 (2008) - [i1]Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian:
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols. IACR Cryptol. ePrint Arch. 2008: 479 (2008) - 2007
- [c1]Yongjun Ren, Jiandong Wang, Youdong Zhang, Liming Fang:
Identity-Based Key Issuing Protocol for Ad Hoc Networks. CIS 2007: 917-921
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-09 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint