default search action
Huiyong Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Huiyong Wang, Tengfei Yang, Yong Ding, Shijie Tang, Yujue Wang:
VPPFL: Verifiable Privacy-Preserving Federated Learning in Cloud Environment. IEEE Access 12: 151998-152008 (2024) - [j25]Huiyong Wang, Tianming Chen, Yong Ding, Yujue Wang, Changsong Yang:
Privacy-preserving multi-party logistic regression in cloud computing. Comput. Stand. Interfaces 90: 103857 (2024) - [j24]Tong Zhang, Yujue Wang, Yong Ding, Xuhang Jiang, Hai Liang, Huiyong Wang:
Privacy-preserving blockchain-based contract signing with multi-party supervision. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [j23]Xiaoming Zhang, Kaikai Meng, Huiyong Wang:
TRAFMEL: Multimodal Entity Linking Based on Transformer Reranking and Multimodal Co-Attention Fusion. Int. J. Softw. Eng. Knowl. Eng. 34(6): 973-997 (2024) - [j22]Xiaoming Zhang, Xinrui Li, Huiyong Wang:
Fine-Grained Entity-Type Completion Based on Neighborhood-Attention and Cartesian-Polar Coordinates Mapping. Int. J. Softw. Eng. Knowl. Eng. 34(8): 1339-1366 (2024) - [j21]Huiyong Wang, Qi Wang, Yong Ding, Shijie Tang, Yujue Wang:
Privacy-preserving federated learning based on partial low-quality data. J. Cloud Comput. 13(1): 62 (2024) - [j20]Xuhang Jiang, Yujue Wang, Yong Ding, Zhenyu Li, Huiyong Wang, Hai Liang:
Semi-shadow file system: An anonymous files storage solution. Peer Peer Netw. Appl. 17(1): 18-32 (2024) - [j19]Shijie Tang, Yong Ding, Meng Zhao, Huiyong Wang:
SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning. Peer Peer Netw. Appl. 17(2): 612-623 (2024) - [c21]Lipan Chen, Yujue Wang, Yong Ding, Hai Liang, Changsong Yang, Huiyong Wang:
Blockchain-based UAV-assisted Forest Fire Detection and Monitoring System. CSCWD 2024: 2128-2133 - [c20]Changsong Yang, Ping Li, Yong Ding, Xiaoling Tao, Huiyong Wang, Ruwen Zhao:
A new SM2-based ring signature scheme with revocability and anonymity. CSCWD 2024: 2454-2459 - 2023
- [j18]Huiyong Wang, Jialing Liang, Yong Ding, Shijie Tang, Yujue Wang:
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health. Comput. Stand. Interfaces 84: 103696 (2023) - [j17]Xiaoming Zhang, Shan Liu, Huiyong Wang:
Personalized Learning Path Recommendation for E-Learning Based on Knowledge Graph and Graph Convolutional Network. Int. J. Softw. Eng. Knowl. Eng. 33(1): 109-131 (2023) - [j16]Xiaoming Zhang, Xin Yang, Huiyong Wang:
Person Event Detection Method in Computer Discipline Domain Based on BiGRU and CNN in Series. Int. J. Softw. Eng. Knowl. Eng. 33(4): 487-512 (2023) - [j15]Yong Ding, Peixiong Huang, Hai Liang, Fang Yuan, Huiyong Wang:
Output regeneration defense against membership inference attacks for protecting data privacy. Int. J. Web Inf. Syst. 19(2): 61-79 (2023) - [j14]Huiyong Wang, Liang Guo, Ding Yang, Xiaoming Zhang:
Data Augmentation Method for Pedestrian Dress Recognition in Road Monitoring and Pedestrian Multiple Information Recognition Model. Inf. 14(2): 125 (2023) - [j13]Meng Zhao, Yong Ding, Shijie Tang, Hai Liang, Changsong Yang, Huiyong Wang:
Dual-server certificateless public key encryption with authorized equality test for outsourced IoT data. J. Inf. Secur. Appl. 73: 103441 (2023) - [j12]Meng Zhao, Yong Ding, Shijie Tang, Hai Liang, Huiyong Wang:
A blockchain-based framework for privacy-preserving and verifiable billing in smart grid. Peer Peer Netw. Appl. 16(1): 142-155 (2023) - [j11]Weiyou Liang, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient blockchain-based anonymous authentication and supervision system. Peer Peer Netw. Appl. 16(5): 2492-2511 (2023) - [j10]Huiyong Wang, Ding Yang, Liang Guo, Xiaoming Zhang:
Joint modeling method of question intent detection and slot filling for domain-oriented question answering system. Data Technol. Appl. 57(5): 696-718 (2023) - [c19]Weiyou Liang, Yujue Wang, Yong Ding, Hai Liang, Changsong Yang, Huiyong Wang:
Efficient and Revocable Anonymous Account Guarantee System Based on Blockchain. CollaborateCom (1) 2023: 167-186 - [c18]Yilin Liu, Yujue Wang, Chen Yi, Yong Ding, Changsong Yang, Huiyong Wang:
Secure Traffic Data Sharing in UAV-Assisted VANETs. CollaborateCom (2) 2023: 301-320 - [c17]Lipan Chen, Yujue Wang, Yong Ding, Hai Liang, Changsong Yang, Huiyong Wang:
IoT-Assisted Blockchain-Based Car Rental System Supporting Traceability. DASFAA (4) 2023: 712-718 - [c16]Haosong Huang, Yong Ding, Yujue Wang, Changsong Yang, Hai Liang, Huiyong Wang:
Blockchain-based Secure Key Distribution for WSNs in Soil Monitoring. ICBCT 2023: 29-35 - [c15]Shangru Yang, Yong Ding, Yujue Wang, Hai Liang, Changsong Yang, Huiyong Wang:
Secure Multi-Keyword Retrieval with Integrity Guarantee for Outsourced ADS-B Data in Clouds. ICPADS 2023: 1777-1784 - 2022
- [j9]Tong Zhang, Yujue Wang, Yong Ding, Qianhong Wu, Hai Liang, Huiyong Wang:
Multi-Party Electronic Contract Signing Protocol Based on Blockchain. IEICE Trans. Inf. Syst. 105-D(2): 264-271 (2022) - [c14]Weiyou Liang, Yujue Wang, Yong Ding, Haibin Zheng, Hai Liang, Huiyong Wang:
An efficient anonymous authentication and supervision system based on blockchain. DSC 2022: 306-313 - [c13]Lemei Da, Yujue Wang, Yong Ding, Bo Qin, Xiaochun Zhou, Hai Liang, Huiyong Wang:
Cloud-assisted Road Condition Monitoring with Privacy Protection in VANETs. MSN 2022: 304-311 - 2021
- [j8]Yong Ding, Xiaoqing Cui, Huiyong Wang, Kun Zhang:
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model. Mob. Networks Appl. 26(4): 1514-1522 (2021) - [j7]Jingyi Li, Yujue Wang, Yong Ding, Wanqing Wu, Chunhai Li, Huiyong Wang:
A Certificateless Pairing-Free Authentication Scheme for Unmanned Aerial Vehicle Networks. Secur. Commun. Networks 2021: 9463606:1-9463606:10 (2021) - [c12]Xuhang Jiang, Yujue Wang, Yong Ding, Hai Liang, Huiyong Wang, Zhenyu Li:
An Anti-forensic Method Based on RS Coding and Distributed Storage. ICA3PP (2) 2021: 240-254 - [c11]Ya-Nan Cao, Yujue Wang, Yong Ding, Haibin Zheng, Zhenyu Guan, Huiyong Wang:
A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid. ISPA/BDCloud/SocialCom/SustainCom 2021: 876-883 - [c10]Lemei Da, Yujue Wang, Yong Ding, Wanjun Xiong, Huiyong Wang, Hai Liang:
An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network. ISPA/BDCloud/SocialCom/SustainCom 2021: 884-891 - 2020
- [j6]Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang:
Secure Metering Data Aggregation With Batch Verification in Industrial Smart Grid. IEEE Trans. Ind. Informatics 16(10): 6607-6616 (2020) - [c9]Lingang Liu, Meng Zhao, Yong Ding, Yujue Wang, Hua Deng, Huiyong Wang:
Privacy-Preserving Multi-keyword Search over Outsourced Data for Resource-Constrained Devices. BlockSys 2020: 282-294 - [c8]Meng Zhao, Yong Ding, Yujue Wang, Huiyong Wang, Bo Han:
Verifiable and Privacy-Preserving Outsourcing of Matrix Multiplications. CyberC 2020: 72-75
2010 – 2019
- 2019
- [j5]Huiyong Wang, Yong Feng, Yong Ding, Shijie Tang:
A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE. Soft Comput. 23(5): 1735-1744 (2019) - [j4]Yujue Wang, Yong Ding, Qianhong Wu, Yongzhuang Wei, Bo Qin, Huiyong Wang:
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs. IEEE Trans. Inf. Forensics Secur. 14(7): 1779-1790 (2019) - [c7]Yong Ding, Bingyao Wang, Yujue Wang, Kun Zhang, Huiyong Wang:
Privacy and Integrity Protection of Metering Data in Smart Grid. AsiaJCIS 2019: 40-47 - [c6]Meng Zhao, Yong Ding, Yujue Wang, Huiyong Wang, Bingyao Wang, Lingang Liu:
A Privacy-Preserving TPA-aided Remote Data Integrity Auditing Scheme in Clouds. ICPCSEE (1) 2019: 334-345 - 2018
- [j3]Xiaoming Zhang, Zhishen Zhang, Huiyong Wang, Mingming Meng, Dongyu Pan:
Metallic materials ontology population from LOD based on conditional random field. Comput. Ind. 99: 140-155 (2018) - [j2]Yong Ding, Bo Han, Huiyong Wang, Xiumin Li:
Ciphertext retrieval via attribute-based FHE in cloud computing. Soft Comput. 22(23): 7753-7761 (2018) - 2017
- [c5]Zhiqiang Gao, Yong Ding, Huiyong Wang, Jilin Wang:
A New Way for Extracting Region of Interest from Palmprint by Detecting Key Points. CSS 2017: 442-451 - [c4]Huiyong Wang, Yong Ding, Shijie Tang, Jilin Wang:
An Efficient Privacy-Preserving Palmprint Authentication Scheme Based on Homomorphic Encryption. CSS 2017: 503-512 - 2014
- [c3]Xiang Sui, Huiyong Wang, Lan Wang:
A general framework for multi-accent Mandarin speech recognition using adaptive neural networks. ISCSLP 2014: 118-122 - 2013
- [j1]Jingyang Wang, Huiyong Wang, Dongwen Zhang, Wanzhen Zhou, Pengpeng Zhang:
Research on Frequent Itemsets Mining Algorithm based on Relational Database. J. Softw. 8(8): 1843-1850 (2013)
2000 – 2009
- 2009
- [c2]Huiyong Wang, Shijie Tang:
Analysis and Modification on Existing Objective Weighting Methods in MADM. WGEC 2009: 162-165 - [c1]Xin Zhang, Pin Liao, Huiyong Wang:
A New Association Rules Mining Algorithm Based on Vector. WGEC 2009: 429-432
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint