Follow
Jian Weng
Jian Weng
Professor, College of Cyber Security, Jinan University
Verified email at jnu.edu.cn
Title
Cited by
Year
(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions.
Y Yu, D Gu, X Li, J Weng
IACR Cryptol. ePrint Arch. 2014, 393, 2014
2014
(Almost) optimal constructions of UOWHFs from 1-to-1, regular one-way functions and beyond
Y Yu, D Gu, X Li, J Weng
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
102015
{CryptoREX}: Large-scale analysis of cryptographic misuse in {IoT} devices
L Zhang, J Chen, W Diao, S Guo, J Weng, K Zhang
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
382019
3d Red Pill: A Guest-to-Host Escape on QEMU/KVM Virtio Devices
Z Shao, J Weng, Y Zhang
Black Hat Asia, 2020
22020
A Blockchain-based copyright protection scheme with proactive defense
X Chen, A Yang, J Weng, Y Tong, C Huang, T Li
IEEE Transactions on Services Computing 16 (4), 2316-2329, 2023
52023
A comprehensive survey on secure outsourced computation and its applications
Y Yang, X Huang, X Liu, H Cheng, J Weng, X Luo, V Chang
IEEE Access 7, 159426-159465, 2019
592019
A data trading scheme with efficient data usage control for industrial IoT
X Zhang, X Li, Y Miao, X Luo, Y Wang, S Ma, J Weng
IEEE Transactions on Industrial Informatics 18 (7), 4456-4465, 2021
202021
A defense method based on attention mechanism against traffic sign adversarial samples
H Li, B Zhang, Y Zhang, X Dang, Y Han, L Wei, Y Mao, J Weng
Information Fusion 76, 55-65, 2021
102021
A dna-based semantic fusion model for remote sensing data
H Sun, J Weng, G Yu, RH Massawe
PloS one 8 (10), e77090, 2013
62013
A Fully Collusion Resistant Public Key Trace and Revoke Scheme with Dynamic Registration and Revocation
S Liu, J Weng, K Chen, X Li
Chinese Journal of Electronics 18 (2), 347-354, 2009
2009
A generic approach for providing revocation support in secret handshake
Y Yang, H Lu, J Weng, X Ding, J Zhou
International Conference on Information and Communications Security, 276-284, 2012
12012
A Geographic Based Multi-Copy Routing for DTNs With Nodal Heterogeneity
Y Cao, K Wei, G Min, J Weng, X Yang, Z Sun
A geographic multicopy routing scheme for DTNs with heterogeneous mobility
Y Cao, K Wei, G Min, J Weng, X Yang, Z Sun
IEEE Systems Journal 12 (1), 790-801, 2016
352016
A hybrid universal blind quantum computation
X Zhang, W Luo, G Zeng, J Weng, Y Yang, M Chen, X Tan
Information Sciences 498, 135-143, 2019
122019
A lightweight and privacy-preserving answer collection scheme for mobile crowdsourcing
Y Dai, J Weng, A Yang, S Yu, RH Deng
KSII Transactions on Internet and Information Systems (TIIS) 15 (8), 2827-2848, 2021
32021
A multisignature-based secure and OBU-friendly emergency reporting scheme in VANET
X Chen, A Yang, Y Tong, J Weng, J Weng, T Li
IEEE Internet of Things Journal 9 (22), 23130-23141, 2022
82022
A new approach for anonymous password authentication
Y Yang, J Zhou, J Weng, F Bao
2009 Annual Computer Security Applications Conference, 199-208, 2009
322009
A new approach for anonymous password authentication.(2009)
Y YANG, J ZHOU, J Weng, F BAO
Proceedings of 25th Annual Computer Security Applications Conference …, 2009
2009
A new varying-parameter recurrent neural-network for online solution of time-varying Sylvester equation
Z Zhang, L Zheng, J Weng, Y Mao, W Lu, L Xiao
IEEE transactions on cybernetics 48 (11), 3135-3148, 2018
1492018
A note on the security of KHL scheme
J Weng, Y Zhao, RH Deng, S Liu, Y Yang, K Sakurai
Theoretical Computer Science 602, 1-6, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20