default search action
Wenfen Liu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Ying Guo, Wenfen Liu, Wen Chen, Qingwen Yan, Yongcan Lu:
ECLBC: A Lightweight Block Cipher With Error Detection and Correction Mechanisms. IEEE Internet Things J. 11(12): 21727-21740 (2024) - [j45]Song Li, Wenfen Liu, Yan Wu, Jie Zhao:
Generative Architecture for Data Imputation in Secure Blockchain-enabled Spatiotemporal Data Management. J. Web Eng. 23(1): 111-164 (2024) - [j44]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks. IEEE Trans. Dependable Secur. Comput. 21(4): 3469-3486 (2024) - 2023
- [j43]Mengli Zhang, Gang Zhou, Ningbo Huang, Peng He, Wanting Yu, Wenfen Liu:
AsU-OSum: Aspect-augmented unsupervised opinion summarization. Inf. Process. Manag. 60(1): 103138 (2023) - [j42]Mengli Zhang, Gang Zhou, Wanting Yu, Ningbo Huang, Wenfen Liu:
GA-SCS: Graph-Augmented Source Code Summarization. ACM Trans. Asian Low Resour. Lang. Inf. Process. 22(2): 53:1-53:19 (2023) - [c18]Jie Zhao, Wenfen Liu, Jing Wang, Song Li, Yongcan Lu:
Blockchain-based Off-chain Extension Model for Geographic Information Data. EITCE 2023: 1036-1041 - [c17]Shu Gao, Wenfen Liu, Yongcan Lu:
Trajectory Privacy Protection Method Based on Sensitivity Analysis. EITCE 2023: 1375-1380 - 2022
- [j41]Peng Zhang, Wenfen Liu:
3FO: The Three-Frame-Only Approach for Fast and Accurate Monocular SLAM Initialization. IEEE Access 10: 108859-108869 (2022) - [j40]Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
VAEPass: A lightweight passwords guessing model based on variational auto-encoder. Comput. Secur. 114: 102587 (2022) - [j39]Hanchao Ku, Willy Susilo, Yudi Zhang, Wenfen Liu, Mingwu Zhang:
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption. Comput. Stand. Interfaces 80: 103583 (2022) - [j38]Haoyang Jia, Wenfen Liu:
Anomaly detection in images with shared autoencoders. Frontiers Neurorobotics 16 (2022) - [j37]Mengli Zhang, Gang Zhou, Wanting Yu, Ningbo Huang, Wenfen Liu:
MAA-PTG: multimodal aspect-aware product title generation. J. Intell. Inf. Syst. 59(1): 213-235 (2022) - [j36]Mengli Zhang, Gang Zhou, Wanting Yu, Wenfen Liu, Ningbo Huang, Ze Yu:
FCSF-TABS: two-stage abstractive summarization with fact-aware reinforced content selection and fusion. Neural Comput. Appl. 34(13): 10547-10560 (2022) - [c16]Ji Li, Chunxiang Gu, Luan Luan, Fushan Wei, Wenfen Liu:
Few-Shot Open-Set Traffic Classification Based on Self-Supervised Learning. LCN 2022: 371-374 - 2021
- [j35]Mengli Zhang, Gang Zhou, Wanting Yu, Wenfen Liu:
FAR-ASS: Fact-aware reinforced abstractive sentence summarization. Inf. Process. Manag. 58(3): 102478 (2021) - [j34]Mengli Zhang, Gang Zhou, Wanting Yu, Wenfen Liu:
KI-HABS: Key Information Guided Hierarchical Abstractive Summarization. KSII Trans. Internet Inf. Syst. 15(12): 4275-4291 (2021) - [c15]Wenfen Liu, Nan Wang, Yuehua Huang:
Outlier Detection Method based on Improved K-means Clustering Algorithm. EITCE 2021: 1350-1355 - [c14]Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution. ICICS (1) 2021: 153-168 - [i1]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications. CoRR abs/2105.05525 (2021) - 2020
- [j33]Fu Wang, Liu He, Wenfen Liu, Yanbin Zheng:
Harden Deep Convolutional Classifiers via K-Means Reconstruction. IEEE Access 8: 168210-168218 (2020) - [j32]Guangpu Gao, Dongdai Lin, Wenfen Liu, Yongjuan Wang:
Composition of Boolean functions: An application to the secondary constructions of bent functions. Discret. Math. 343(3): 111711 (2020) - [j31]Ji Li, Jianghong Wei, Mao Ye, Wenfen Liu, Xuexian Hu:
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets. IET Inf. Secur. 14(3): 321-331 (2020) - [c13]Ming Yang, Xuexian Hu, Jianghong Wei, Qihui Zhang, Wenfen Liu:
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain. ICCNS 2020: 60-69
2010 – 2019
- 2019
- [j30]Chun Liu, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security. IEEE Access 7: 105363-105375 (2019) - [j29]Mengli Zhang, Gang Zhou, Muhammad Khurram Khan, Saru Kumari, Xuexian Hu, Wenfen Liu:
SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm. IEEE Access 7: 155107-155119 (2019) - [j28]Mengli Zhang, Qihui Zhang, Wenfen Liu, Xuexian Hu, Jianghong Wei:
TG-SPSR: A Systematic Targeted Password Attacking Model. KSII Trans. Internet Inf. Syst. 13(5): 2674-2697 (2019) - [j27]Guangpu Gao, Dongdai Lin, Wenfen Liu:
A Note on Rotation Symmetric S-boxes. J. Syst. Sci. Complex. 32(5): 1460-1472 (2019) - [j26]Jianghong Wei, Xuexian Hu, Wenfen Liu, Qihui Zhang:
Forward and backward secure fuzzy encryption for data sharing in cloud computing. Soft Comput. 23(2): 497-506 (2019) - [c12]Qihui Zhang, Wenfen Liu, Kang Yang, Xuexian Hu, Ying Mei:
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model. Inscrypt 2019: 499-516 - [c11]Zijie Lin, Liangliang Gao, Xuexian Hu, Yuxuan Zhang, Wenfen Liu:
Differentially Private Graph Clustering Algorithm Based on Structure Similarity. ICCNS 2019: 63-68 - [c10]Yanbin Zheng, Hongxu Yun, Fu Wang, Yong Ding, Yongzhong Huang, Wenfen Liu:
Defence Against Adversarial Attacks Using Clustering Algorithm. ICPCSEE (1) 2019: 323-333 - 2018
- [j25]Jianghong Wei, Wenfen Liu, Xuexian Hu:
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS. Int. J. Commun. Syst. 31(15) (2018) - [j24]Wenfen Liu, Gang Zhou, Jianghong Wei, Xuexian Hu, Saru Kumari:
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks. Inf. Technol. Control. 47(2): 275-294 (2018) - [j23]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage. IEEE Syst. J. 12(2): 1731-1742 (2018) - [j22]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption. IEEE Trans. Cloud Comput. 6(4): 1136-1148 (2018) - [c9]Mengli Zhang, Qihui Zhang, Xuexian Hu, Wenfen Liu:
A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network. ICCNS 2018: 79-83 - [c8]Yuxuan Zhang, Jianghong Wei, Xiaojian Zhang, Xuexian Hu, Wenfen Liu:
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy. ICCNS 2018: 84-89 - 2017
- [j21]Wenfen Liu, Mao Ye, Jianghong Wei, Xuexian Hu:
Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection. Comput. Intell. Neurosci. 2017: 2658707:1-2658707:14 (2017) - [j20]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Forward-secure identity-based signature with efficient revocation. Int. J. Comput. Math. 94(7): 1390-1411 (2017) - [j19]Jianghong Wei, Xuexian Hu, Wenfen Liu:
Two-factor authentication scheme using attribute and password. Int. J. Commun. Syst. 30(1) (2017) - [j18]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. Int. J. Found. Comput. Sci. 28(7): 843-868 (2017) - [j17]Wenfen Liu, Mao Ye, Jianghong Wei, Xuexian Hu:
Compressed constrained spectral clustering framework for large-scale data sets. Knowl. Based Syst. 135: 77-88 (2017) - [j16]Ji Li, Jianghong Wei, Wenfen Liu, Xuexian Hu:
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. Secur. Commun. Networks 2017: 6097253:1-6097253:14 (2017) - [c7]Qihui Zhang, Xuexian Hu, Jianghong Wei, Wenfen Liu:
Universally Composable Three-Party Password Authenticated Key Exchange. ICCCS (2) 2017: 123-137 - [c6]Zhonglei Lu, Wenfen Liu, Yanfang Zhou, Xuexian Hu, Binyu Wang:
An Effective Approach for Chinese News Headline Classification Based on Multi-representation Mixed Model with Attention and Ensemble Learning. NLPCC 2017: 339-350 - [c5]Zhonglei Lu, Wenfen Liu, Yanfang Zhou, Xuexian Hu, Binyu Wang:
An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model. SMP 2017: 129-140 - 2016
- [j15]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Practical Attribute-based Signature: Traceability and Revocability. Comput. J. 59(11): 1714-1734 (2016) - [j14]Xin Gong, Guangpu Gao, Wenfen Liu:
On permutation polynomials of the form x1+2k + L(x). Int. J. Comput. Math. 93(10): 1715-1722 (2016) - [j13]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme. Int. J. Netw. Secur. 18(4): 782-792 (2016) - [j12]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Security pitfalls of "ePASS: An expressive attribute-based signature scheme". J. Inf. Secur. Appl. 30: 40-45 (2016) - 2015
- [j11]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Forward-Secure Threshold Attribute-Based Signature Scheme. Comput. J. 58(10): 2492-2506 (2015) - [j10]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure control protocol for universal serial bus mass storage devices. IET Comput. Digit. Tech. 9(6): 321-327 (2015) - [j9]Jun Wang, Wenfen Liu, Yan Gao:
一种多参量评估的云计算信任模型 (Trust Model of Cloud Computing Based on Multi-parameters Evaluation). 计算机科学 42(Z6): 315-320 (2015) - [c4]Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure. ISPEC 2015: 316-330 - 2014
- [j8]Guangpu Gao, Thomas W. Cusick, Wenfen Liu:
Families of rotation symmetric functions with useful cryptographic properties. IET Inf. Secur. 8(6): 297-302 (2014) - [j7]Claude Carlet, Guangpu Gao, Wenfen Liu:
A secondary construction and a transformation on rotation symmetric functions, and their action on bent and semi-bent functions. J. Comb. Theory A 127: 161-175 (2014) - [j6]Yan Gao, Wenfen Liu:
BeTrust: A Dynamic Trust Model Based on Bayesian Inference and Tsallis Entropy for Medical Sensor Networks. J. Sensors 2014: 649392:1-649392:10 (2014) - [j5]Jianghong Wei, Xuexian Hu, Wenfen Liu:
Traceable attribute-based signcryption. Secur. Commun. Networks 7(12): 2302-2317 (2014) - [j4]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture. Wirel. Pers. Commun. 77(3): 2255-2269 (2014) - [c3]Claude Carlet, Guangpu Gao, Wenfen Liu:
Results on Constructions of Rotation Symmetric Bent and Semi-bent Functions. SETA 2014: 21-33 - 2012
- [j3]Jianghong Wei, Xuexian Hu, Wenfen Liu:
An Improved Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 36(6): 3597-3604 (2012) - [j2]Guangpu Gao, Xiyong Zhang, Wenfen Liu, Claude Carlet:
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions. IEEE Trans. Inf. Theory 58(7): 4908-4913 (2012) - 2011
- [j1]Guangpu Gao, Wenfen Liu, Xiyong Zhang:
The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables. IEEE Trans. Inf. Theory 57(7): 4822-4825 (2011)
2000 – 2009
- 2009
- [c2]Xuexian Hu, Wenfen Liu:
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework. Inscrypt 2009: 144-153 - 2006
- [c1]Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li:
On the Rate of Coincidence of Two Clock-Controlled Combiners. Inscrypt 2006: 54-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-25 20:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint