


default search action
Peng Jiang 0007
Person information
- affiliation (PhD 2017): Beijing Institute of Technology, School of Cyberspace Science and Technology, Beijing, China
Other persons with the same name
- Peng Jiang — disambiguation page
- Peng Jiang 0001 — Queen Mary University of London, UK
- Peng Jiang 0002
— Kwai Inc. / Kuaishou Inc., Beijing, China (and 3 more) - Peng Jiang 0004
— University of Iowa, Iowa City, IA, USA (and 1 more) - Peng Jiang 0005 — University of Illinois Urbana-Champaign, Department of Computer Science, IL, USA
- Peng Jiang 0006
— National Cancer Institute, Bethesda, MD, USA (and 2 more) - Peng Jiang 0008 — Kuaishou Technology, Beijing, China
- Peng Jiang 0009
— Yiwu Industrial and Commercial College, Jinhua, China (and 1 more) - Peng Jiang 0010
— Kunming Shipborne Equipment Research & Test Center, China - Peng Jiang 0011
— Tsinghua University, Department of Automation, Beijing, China
- Peng Jiang 0012
— Dalian University of Technology, School of Information and Communication Engineering, China - Peng Jiang 0013
— Chinese Academy of Sciences, National Astronomical Observatories, Beijing, China (and 2 more) - Peng Jiang 0014
— China Railway Signal & Communication Metro-Transportation Control Technology Co., Ltd., China - Peng Jiang 0015
— Cleveland State University, Center for Gene Regulation in Health and Disease, OH, USA (and 3 more) - Peng Jiang 0016
— Hangzhou Normal University, School of Information Science and Engineering, China (and 1 more) - Peng Jiang 0017
— Anhui University, School of Resources and Environmental Engineering, Information Materials and Intelligent Sensing Laboratory of Anhui Province, Hefei, China (and 1 more) - Peng Jiang 0018
— Wuhan University of Technology, School of Mechanical and Electrical Engineering, China - Peng Jiang 0019
— Texas A&M University, College Station, TX, USA - Peng Jiang 0020
— Tsinghua University, Department of Precision Instrument, Beijing, China - Peng Jiang 0021
— Liaoning ATS Intelligent Transportation Technology Company Ltd., Shenyang, China - Peng Jiang 0022
— Huazhong University of Science and Technology, School of Mechanical Science & Engineering, Wuhan, China - Peng Jiang 0023
— Shandong University, School of Business, Weihai, China - Peng Jiang 0024
— SurveyMonkey, San Mateo, CA, USA - Peng Jiang 0025
— Wuhan University, Institute of Artificial Intelligence, School of Computer Science, China - Peng Jiang 0026
— Heilongjiang Bayi Agricultural University, College of Information and Electrical Engineering, Daqing, China - Peng Jiang 0027
— Old Dominion University, Department of Electrical and Computer Engineering, School of Cybersecurity, Norfolk, VA, USA - Peng Jiang 0028
— Guilin University of Electronic Technology, School of Information and Communication, China - Peng Jiang 0029
— Hangzhou Normal University, School of Information Science and Technology, China (and 1 more) - Peng Jiang 0030
— Ocean University of China, Network and Information Center, Qingdao, China - Peng Jiang 0031
— Wuhan University, GNSS Research Center, China - Peng Jiang 0032
— Xi'an Jiaotong University, State Key Laboratory for Strength and Vibration of Mechanical Structures, China - Peng Jiang 0033
— Tongji University, College of Surveying and Geo-Informatics, Shanghai, China - Peng Jiang 0034
— Chongqing University of Technology, College of Mechanical Engineering, China - Peng Jiang 0035
— Hohai University, School of Mathematics, Nanjing, China - Peng Jiang 0036
— Sichuan University, Department of Industrial Engineering and Management, Business School, Chengdu, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j48]Chi Zhang, Peng Jiang, Qi Liu, Liehuang Zhu:
Timed-release and partially private access control for decentralized IoT collaboration systems. Future Gener. Comput. Syst. 178: 108300 (2026)- 2025
[b1]Peng Jiang, Liehuang Zhu:
Blockchain Technology - Cross-Chain Regulation and Privacy. Springer 2025, ISBN 978-981-96-4394-3, pp. 1-184
[j47]Xiangbo Yuan
, Peng Jiang
, Zhuo Chen
, Can Zhang
, Feng Gao
, Liehuang Zhu
:
Blockchain-Based Group Covert Communication for IoT Network. IEEE Internet Things J. 12(13): 25633-25650 (2025)
[j46]Ding Li
, Jifan Xiao
, Peng Jiang, Jiaping Gui
, Dongjin Song
, Yun Ma
, Gang Huang
, Xuanzhe Liu
:
ProvAudit: Enhance High-Level Privacy Inference Through System Provenance Data. IEEE Trans. Dependable Secur. Comput. 22(3): 3046-3062 (2025)
[j45]Keke Gai
, Guolei Zhang, Peng Jiang
, Liehuang Zhu
, Kim-Kwang Raymond Choo
:
A Moving Target DDoS Defense Approach in Consortium Blockchain. IEEE Trans. Dependable Secur. Comput. 22(4): 4362-4378 (2025)
[j44]Chaofan Ma
, Peng Jiang
, Keke Gai
, Liehuang Zhu
:
Toward High-Performance Privacy-Preserving Fuzzy Search Over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 22(6): 6610-6621 (2025)
[j43]Xuyang Liu
, Zijian Zhang
, Zhen Li
, Peng Jiang, Yajie Wang
, Meng Li
, Liehuang Zhu
:
The Deferred Byzantine Generals Problem. IEEE Trans. Inf. Forensics Secur. 20: 7777-7792 (2025)
[j42]Keke Gai
, Mohan Wang, Jing Yu, Lei Xu
, Peng Jiang, Liehuang Zhu
, Bin Xiao
:
Differentially Private Vertical Federated Learning With Adaptive Constraints and Dynamic Noise. IEEE Trans. Inf. Forensics Secur. 20: 11150-11164 (2025)
[j41]Zhuo Chen
, Liehuang Zhu
, Peng Jiang
, Jialing He
, Zijian Zhang
:
Tackling Data Mining Risks: A Tripartite Covert Channel Merging Blockchain and IPFS. IEEE Trans. Netw. Sci. Eng. 12(3): 1831-1848 (2025)
[c28]Shaolong Tang, Peng Jiang, Liehuang Zhu:
sfGlitter: A Fully Adaptive and Tightly Secure Threshold Signature. ACISP (1) 2025: 184-204
[c27]Ruizhe Huang, Xinyu Wang, Zhida An, Hanwen Lei, Peng Jiang, Ziqi Zhang, Ding Li, Yao Guo, Xiangqun Chen, Yuntao Liu, Kang Zhou, Yuxin Ren, Ning Jia, Xinwei Hu:
Cost-Efficient Cloud Infrastructure with Hugepage-aware Memory Deduplication. SoCC 2025: 269-282
[c26]Peng Jiang, Hanlin Jiang, Ruizhe Huang, Hanwen Lei, Zhineng Zhong, Shaokun Zhang, Yuxin Ren
, Ning Jia, Xinwei Hu, Yao Guo, Xiangqun Chen, Ding Li:
DPUaudit: DPU-assisted Pull-based Architecture for Near-Zero Cost System Auditing. HPCA 2025: 29-43
[c25]Yimin Liu, Peng Jiang:
Generic Adversarial Attack Framework Against Vertical Federated Learning. IJCAI 2025: 5806-5814
[c24]Yimin Liu, Peng Jiang, Liehuang Zhu:
Preference Profiling Attacks Against Vertical Federated Learning Over Graph Data. INFOCOM 2025: 1-10
[c23]Chi Zhang, Peng Jiang, Zijian Zhang, Liehuang Zhu:
Verifiable Predicate-based Access Control Encryption with Dynamic Revocation. IWCMC 2025: 246-251
[c22]Ziyang Zhou, Lei Xu, Liehuang Zhu, Keke Gai, Peng Jiang:
SIGN-FCF: Sign-based Federated Collaborative Filtering for Privacy-Preserving Personalized Recommendation. SmartCloud 2025: 50-55
[c21]Jifan Xiao, Peng Jiang, Zixi Zhao, Ruizhe Huang, Junlin Liu, Ding Li:
Robust, Efficient, and Widely Available Greybox Fuzzing for COTS Binaries with System Call Pattern Feedback. USENIX Security Symposium 2025: 6239-6258
[c20]Chi Zhang, Peng Jiang, Lei Xu, Liehuang Zhu:
Timed and Decentralized Wireless Broadcasting System. WASA (1) 2025: 170-182
[i5]Xuyang Liu, Zijian Zhang, Zhen Li, Jiahang Sun, Jiamou Liu, Peng Jiang:
Reputation-Based Leader Election under Partial Synchrony: Towards a Protocol-Independent Abstraction with Enhanced Guarantees. CoRR abs/2512.12409 (2025)- 2024
[j40]Peng Jiang
, Jifan Xiao, Ding Li
, Hongyi Yu, Yu Bai
, Yao Guo
, Xiangqun Chen:
Detecting Malicious Websites From the Perspective of System Provenance Analysis. IEEE Trans. Dependable Secur. Comput. 21(3): 1406-1423 (2024)
[j39]Wenze Mao, Peng Jiang
, Liehuang Zhu
:
Locally Verifiable Batch Authentication in IoMT. IEEE Trans. Inf. Forensics Secur. 19: 1001-1014 (2024)
[j38]Peng Jiang
, Qi Liu, Liehuang Zhu
:
SanIdea: Exploiting Secure Blockchain-Based Access Control via Sanitizable Encryption. IEEE Trans. Inf. Forensics Secur. 19: 1589-1600 (2024)
[j37]Zhuo Chen
, Liehuang Zhu
, Peng Jiang
, Can Zhang
, Feng Gao
, Fuchun Guo
:
Exploring Unobservable Blockchain-Based Covert Channel for Censorship-Resistant Systems. IEEE Trans. Inf. Forensics Secur. 19: 3380-3394 (2024)
[j36]Peng Jiang
, Qi Liu, Liehuang Zhu
:
Purified Authorization Service With Encrypted Message Moderation. IEEE Trans. Inf. Forensics Secur. 19: 5196-5206 (2024)
[j35]Peng Jiang
, Jun Zhu, Liehuang Zhu
:
Balancing Privacy and Regulation of Cross-Chain Transaction Systems via SoK-Assisted Policy Enhancement. IEEE Trans. Inf. Forensics Secur. 19: 5620-5629 (2024)
[j34]Zhuo Chen
, Liehuang Zhu
, Peng Jiang
, Zijian Zhang
, Chengxiang Si:
Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement. IEEE Trans. Inf. Forensics Secur. 19: 9698-9713 (2024)
[j33]Yimin Liu
, Peng Jiang
, Liehuang Zhu
:
SecVerGSSL: Proof-Based Verified Computation for Graph Self-Supervised Learning. IEEE Trans. Mob. Comput. 23(12): 13713-13727 (2024)
[c19]Yong Lin, Peng Jiang
, Fuchun Guo, Liehuang Zhu:
CrossAAD: Cross-Chain Abnormal Account Detection. ACISP (3) 2024: 84-104
[c18]Yong Lin, Peng Jiang
, Keke Gai, Liehuang Zhu:
Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification. BigDataSecurity 2024: 58-65
[c17]Weilin Chan
, Yihang Wei
, Peng Jiang
, Lei Xu
, Liehuang Zhu
, Jing Yu
:
CLEAN: Cloud-enabled Scalable Blockchain Outsourcing System Using Dynamic Programming. BSCI 2024: 1-13
[c16]Yong Lin, Peng Jiang
, Liehuang Zhu
:
Cross-chain Abnormal Transaction Detection via Graph-based Multi-model Fusion. BSCI 2024: 1-9
[c15]Jun Zhu, Keke Gai, Peng Jiang
, Liehuang Zhu:
Lightweight Privacy-Preserving Mechanisms for Cross-Chain Transactions. CSCloud 2024: 59-64
[c14]Zhuo Chen, Liehuang Zhu, Peng Jiang
, Jialing He, Zijian Zhang:
A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN. INFOCOM 2024: 241-250- 2023
[j32]Xin Wang, Peng Jiang
, Thar Baker
, Tielei Li, Liehuang Zhu:
Enabling privacy and leakage resistance for dynamic blockchain-based access control systems. Comput. Stand. Interfaces 84: 103690 (2023)
[j31]Wenze Mao, Peng Jiang
, Liehuang Zhu
:
BTAA: Blockchain and TEE-Assisted Authentication for IoT Systems. IEEE Internet Things J. 10(14): 12603-12615 (2023)
[j30]Yimin Liu
, Peng Jiang
, Liehuang Zhu
:
Subject-Level Membership Inference Attack via Data Augmentation and Model Discrepancy. IEEE Trans. Inf. Forensics Secur. 18: 5848-5859 (2023)
[j29]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Chao Lin
, Jiaxi Hu, Zhen Zhao
, Liehuang Zhu
, Debiao He
:
EthereumX: Improving Signature Security With Randomness Preprocessing Module. IEEE Trans. Serv. Comput. 16(5): 3318-3331 (2023)
[c13]Shaolong Tang
, Jie Liu
, Xiaoyao Luo
, Peng Jiang
, Keke Gai
, Lei Xu
, Liehuang Zhu
:
Blockchain-Empowered Search Over Encrypted Data With Forward and Backward Privacy. BSCI 2023: 34-43
[c12]Hanwen Lei
, Ziqi Zhang
, Shaokun Zhang
, Peng Jiang
, Zhineng Zhong
, Ningyu He
, Ding Li
, Yao Guo
, Xiangqun Chen
:
Put Your Memory in Order: Efficient Domain-based Memory Isolation for WASM Applications. CCS 2023: 904-918
[c11]Feng Dong
, Shaofei Li
, Peng Jiang
, Ding Li
, Haoyu Wang
, Liangyi Huang
, Xusheng Xiao
, Jiedong Chen
, Xiapu Luo
, Yao Guo
, Xiangqun Chen
:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410
[c10]Jipeng Hou, Lei Xu, Liehuang Zhu, Peng Jiang
, Shaorui Song:
HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability. CSR 2023: 130-135
[c9]Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu:
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation. USENIX Security Symposium 2023: 355-372
[i4]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CoRR abs/2307.08349 (2023)
[i3]Peng Jiang, Ruizhe Huang, Ding Li, Yao Guo, Xiangqun Chen, Jianhai Luan, Yuxin Ren, Xinwei Hu:
Auditing Frameworks Need Resource Isolation: A Systematic Study on the Super Producer Threat to System Auditing and Its Mitigation. CoRR abs/2307.15895 (2023)
[i2]Fuchun Guo, Willy Susilo, Xiaofeng Chen, Peng Jiang, Jianchang Lai, Zhen Zhao:
Research Philosophy of Modern Cryptography. IACR Cryptol. ePrint Arch. 2023: 715 (2023)- 2022
[j28]Zhuo Chen
, Liehuang Zhu
, Peng Jiang
, Can Zhang
, Feng Gao, Jialing He, Dawei Xu, Yan Zhang
:
Blockchain Meets Covert Communication: A Survey. IEEE Commun. Surv. Tutorials 24(4): 2163-2192 (2022)
[j27]Peng Jiang
, Baoqi Qiu
, Liehuang Zhu
:
FastPRS: Augmenting Fast and Hidden Query in EPR Systems via Online/Offline Puncturable Search. IEEE Internet Things J. 9(2): 1531-1541 (2022)
[j26]Peng Jiang
, Baoqi Qiu
, Liehuang Zhu
:
Toward Reliable and Confidential Release for Smart Contract via ID-Based TRE. IEEE Internet Things J. 9(13): 11422-11433 (2022)
[j25]Peng Jiang
, Chenjie Yang
, Liehuang Zhu
:
RePEL: Blockchain-Empowered Conditional Privacy-Preserving Encrypted Learning. IEEE Internet Things J. 9(14): 12684-12695 (2022)
[j24]Keke Gai
, Zhengkang Fang
, Ruili Wang
, Liehuang Zhu
, Peng Jiang
, Kim-Kwang Raymond Choo
:
Edge Computing and Lightning Network Empowered Secure Food Supply Management. IEEE Internet Things J. 9(16): 14247-14259 (2022)
[j23]Jianchang Lai, Fuchun Guo
, Willy Susilo
, Peng Jiang
, Guomin Yang
, Xinyi Huang:
Generic conversions from CPA to CCA without ciphertext expansion for threshold ABE with constant-size ciphertexts. Inf. Sci. 613: 966-981 (2022)
[j22]Willy Susilo
, Peng Jiang
, Jianchang Lai
, Fuchun Guo
, Guomin Yang
, Robert H. Deng
:
Sanitizable Access Control System for Secure Cloud Storage Against Malicious Data Publishers. IEEE Trans. Dependable Secur. Comput. 19(3): 2138-2148 (2022)
[j21]Peng Jiang
, Baoqi Qiu
, Liehuang Zhu
:
Report When Malicious: Deniable and Accountable Searchable Message-Moderation System. IEEE Trans. Inf. Forensics Secur. 17: 1597-1609 (2022)
[j20]Jianchang Lai
, Fuchun Guo
, Willy Susilo
, Xinyi Huang
, Peng Jiang
, Futai Zhang
:
Data Access Control in Cloud Computing: Flexible and Receiver Extendable. IEEE Trans. Serv. Comput. 15(5): 2658-2670 (2022)
[j19]Chenjie Yang
, Peng Jiang
, Liehuang Zhu
:
Accelerating Decentralized and Partial-Privacy Data Access for VANET via Online/Offline Functional Encryption. IEEE Trans. Veh. Technol. 71(8): 8944-8954 (2022)- 2021
[j18]Peng Jiang
, Baoqi Qiu
, Liehuang Zhu
, Keke Gai
:
SearchBC: A Blockchain-Based PEKS Framework for IoT Services. IEEE Internet Things J. 8(6): 5031-5044 (2021)
[j17]Jianchang Lai, Ge Wu, Peng Jiang
, Zhen Zhao
, Willy Susilo
, Fuchun Guo
:
Generic construction for tightly-secure signatures from discrete log. Theor. Comput. Sci. 888: 13-21 (2021)
[j16]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Man Ho Au
, Xinyi Huang
, Joseph K. Liu
:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021)
[j15]Peng Jiang
, Jianting Ning
, Kaitai Liang
, Changyu Dong
, Jiageng Chen
, Zhenfu Cao
:
Encryption Switching Service: Securely Switch Your Encrypted Data to Another Format. IEEE Trans. Serv. Comput. 14(5): 1357-1369 (2021)
[j14]Peng Jiang
, Fuchun Guo
, Willy Susilo
, Man Ho Au
, Jianchang Lai
, Wenmin Li:
PPFilter: Provider Privacy-Aware Encrypted Filtering System. IEEE Trans. Serv. Comput. 14(5): 1519-1530 (2021)
[c8]Ke Ren, Peng Jiang
, Liehuang Zhu, Keke Gai:
SM9-based Anonymous Search over Encrypted Data. ISPA/BDCloud/SocialCom/SustainCom 2021: 212-219
[c7]Jianyu Chen, Keke Gai, Peng Jiang
, Liehuang Zhu:
Heuristic-based Blockchain Assignment: An Empirical Study. ISPA/BDCloud/SocialCom/SustainCom 2021: 916-923
[c6]Ke Ren, Peng Jiang
, Keke Gai, Liehuang Zhu, Jingjing Huang:
SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud Storage. SmartCloud 2021: 13-18- 2020
[j13]Peng Jiang
, Fuchun Guo
, Kaitai Liang
, Jianchang Lai, Qiaoyan Wen:
Searchain: Blockchain-based private keyword search in decentralized storage. Future Gener. Comput. Syst. 107: 781-792 (2020)
[j12]Xiaoqi Li
, Peng Jiang
, Ting Chen, Xiapu Luo
, Qiaoyan Wen:
A survey on the security of blockchain systems. Future Gener. Comput. Syst. 107: 841-853 (2020)
[c5]Haochen Li
, Keke Gai
, Liehuang Zhu, Peng Jiang
, Meikang Qiu:
Reputation-Based Trustworthy Supply Chain Management Using Smart Contract. ICA3PP (3) 2020: 35-49
2010 – 2019
- 2019
[j11]Peng Jiang
, Jianchang Lai, Fuchun Guo
, Willy Susilo
, Man Ho Au, Guomin Yang
, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019)
[j10]Peng Jiang
, Fuchun Guo
, Yi Mu:
Efficient identity-based broadcast encryption with keyword search against insider attacks for database systems. Theor. Comput. Sci. 767: 51-72 (2019)
[c4]Haochen Li
, Keke Gai, Zhengkang Fang
, Liehuang Zhu, Lei Xu, Peng Jiang:
Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering. BSCI 2019: 47-55
[c3]Yuchen Yan, Keke Gai, Peng Jiang
, Lei Xu, Liehuang Zhu:
Location-based Privacy-preserving Techniques in Connected Environment: A Survey. SmartCloud 2019: 156-162
[r1]Peng Jiang, Fuchun Guo, Willy Susilo
, Jinguang Han
:
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption. Encyclopedia of Big Data Technologies 2019- 2018
[j9]Jianchang Lai, Yi Mu, Fuchun Guo
, Peng Jiang
, Sha Ma:
Identity-Based Broadcast Encryption for Inner Products. Comput. J. 61(8): 1240-1251 (2018)
[j8]Jianchang Lai, Yi Mu, Fuchun Guo
, Peng Jiang
, Willy Susilo
:
Privacy-enhanced attribute-based private information retrieval. Inf. Sci. 454-455: 275-291 (2018)
[i1]Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, Qiaoyan Wen:
A Survey on the Security of Blockchain Systems. CoRR abs/1802.06993 (2018)- 2017
[j7]Peng Jiang
, Yi Mu, Fuchun Guo
, Qiaoyan Wen:
Secure-channel free keyword search with authorization in manager-centric databases. Comput. Secur. 69: 50-64 (2017)
[j6]Jingwei Li
, Adam Bowers, Dan Lin, Peng Jiang
, Wei Jiang:
PAS: policy-based assistance in sensor networks. Computing 99(10): 915-928 (2017)
[j5]Peng Jiang
, Yi Mu, Fuchun Guo
, Qiao-Yan Wen:
Private Keyword-Search for Database Systems Against Insider Attacks. J. Comput. Sci. Technol. 32(3): 599-617 (2017)
[j4]Willy Susilo
, Peng Jiang
, Fuchun Guo
, Guomin Yang
, Yong Yu
, Yi Mu:
EACSIP: Extendable Access Control System With Integrity Protection for Enhancing Collaboration in the Cloud. IEEE Trans. Inf. Forensics Secur. 12(12): 3110-3122 (2017)- 2016
[j3]Peng Jiang
, Yi Mu, Fuchun Guo
, Xiaofen Wang, Qiaoyan Wen:
Online/Offline Ciphertext Retrieval on Resource Constrained Devices. Comput. J. 59(7): 955-969 (2016)
[j2]Peng Jiang
, Yi Mu, Fuchun Guo
, Xiaofen Wang, Jianchang Lai:
Centralized keyword search on encrypted data for cloud applications. Secur. Commun. Networks 9(18): 5064-5084 (2016)
[c2]Peng Jiang
, Yi Mu, Fuchun Guo
, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. ACISP (2) 2016: 170-186
[c1]Peng Jiang
, Xiaofen Wang, Jianchang Lai, Fuchun Guo
, Rongmao Chen:
Oblivious Keyword Search with Authorization. ProvSec 2016: 173-190- 2015
[j1]Peng Jiang
, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang:
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers Comput. Sci. 9(1): 142-156 (2015)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-01-28 02:15 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







