default search action
Haiyan Wang 0009
Person information
- affiliation: Peng Cheng Laboratory, Shenzhen, China
Other persons with the same name
- Haiyan Wang (aka: Hai-yan Wang, Hai-Yan Wang) — disambiguation page
- Haiyan Wang 0001 — Arizona State University, School of Mathematical and Natural Sciences, Phoenix, AZ, USA
- Haiyan Wang 0002 (aka: Hai-Yan Wang 0002) — Northwestern Polytechnical University, Xi'an, China
- Haiyan Wang 0003 — Hitachi Industrial AI Lab, Santa Clara, CA, USA
- Haiyan Wang 0004 — Southeast University, School of Mechanical Engineering, Nanjing, China
- Haiyan Wang 0005 — South China University of Technology, Guangdong, China
- Haiyan Wang 0006 — Zhejiang Wanli University, Ningbo, China
- Haiyan Wang 0007 — Nanjing University of Posts and Telecommunications, School of Computer Science, China
- Haiyan Wang 0008 — Kansas State University, Manhattan, KS, USA
- Haiyan Wang 0010 — De Beers Inc.
- Haiyan Wang 0011 — Haiyan Consulting, Ottawa, ON, Canada
- Haiyan Wang 0012 — Changchun University, Changchun, China
- Haiyan Wang 0013 — Shanghai Dianji University, Shanghai, China
- Haiyan Wang 0014 — Beijing Forestry University, Beijing, China
- Haiyan Wang 0015 — Jilin University, Changchun, China
- Haiyan Wang 0016 — China Electric Power Research Institute, Wuhan, China
- Haiyan Wang 0017 — Jiaxing University, Jiaxing, China
- Haiyan Wang 0018 — Imperial College London, Biomedical Image Analysis Group, London, UK
- Haiyan Wang 0019 — City University of New York, New York, USA
- Haiyan Wang 0020 — Southeast University, School of Economics and Management, Nanjing, China
- Haiyan Wang 0021 — Zhengzhou University of Aeronautics, Simulation Experiment Centre, China (and 1 more)
- Haiyan Wang 0022 — Maanshan University, School of Osaka Medical Engineering, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Haiyan Wang, Weimin Yang, Wenying Feng, Liyi Zeng, Zhaoquan Gu:
Threat intelligence named entity recognition techniques based on few-shot learning. Array 23: 100364 (2024) - [j12]Fucai Luo, Saif Al-Kuwari, Haiyan Wang, Xingfu Yan:
Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities. Theor. Comput. Sci. 987: 114368 (2024) - [j11]Fucai Luo, Haiyan Wang, Xingfu Yan:
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning". IEEE Trans. Dependable Secur. Comput. 21(1): 499-500 (2024) - [j10]Fucai Luo, Haiyan Wang, Willy Susilo, Xingfu Yan, Xiaofan Zheng:
Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds. IEEE Trans. Inf. Forensics Secur. 19: 2919-2934 (2024) - [j9]Fucai Luo, Haiyan Wang, Xingfu Yan, Jiahui Wu:
Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data. IEEE Trans. Inf. Forensics Secur. 19: 7245-7258 (2024) - [j8]Fucai Luo, Haiyan Wang, Xingfu Yan:
Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search. IEEE Trans. Mob. Comput. 23(10): 10077-10092 (2024) - [c7]Yushun Xie, Zhaoquan Gu, Runnan Tan, Cui Luo, Xiangyu Song, Haiyan Wang:
Generating Adversarial Texts by the Universal Tail Word Addition Attack. APWeb/WAIM (1) 2024: 310-326 - [c6]Yushun Xie, Haiyan Wang, Le Wang, Lei Luo, Jianxin Li, Zhaoquan Gu:
Reinforced Negative Sampling for Knowledge Graph Embedding. DASFAA (4) 2024: 358-374 - 2023
- [j7]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Fuqun Wang, Kefei Chen:
Revocable attribute-based encryption from standard lattices. Comput. Stand. Interfaces 84: 103698 (2023) - [j6]Fucai Luo, Haiyan Wang, Saif M. Al-Kuwari, Weihong Han:
Multi-key Fully Homomorphic Encryption without CRS from RLWE. Comput. Stand. Interfaces 86: 103742 (2023) - [j5]Fucai Luo, Haiyan Wang, Changlu Lin, Xingfu Yan:
ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data. IEEE Trans. Inf. Forensics Secur. 18: 4970-4983 (2023) - [c5]Angxiao Zhao, Haiyan Wang, Junjian Zhang, Yunhui Liu, Changchang Ma, Zhaoquan Gu:
TSKE: Two-Stream Knowledge Embedding for Cyberspace Security. APWeb-WAIM (2) 2023: 132-146 - [c4]Zhaoquan Gu, Haiyan Wang, Xiayu Xiang, Ke Zhou, Wenying Feng, Jianxin Li:
CY-Apollo: A Multi-view Profile System for Complicated Network Attacks. APWeb/WAIM (4) 2023: 489-495 - [i2]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Xingfu Yan:
FSSA: Efficient 3-Round Secure Aggregation for Privacy-Preserving Federated Learning. CoRR abs/2305.12950 (2023) - 2022
- [j4]Haiyan Wang, Yuan Li, Willy Susilo, Dung Hoang Duong, Fucai Luo:
A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing. Comput. Stand. Interfaces 82: 103635 (2022) - [j3]Ying He, Haiyan Wang, Yuan Li, Ke Huang, Victor C. M. Leung, F. Richard Yu, Zhong Ming:
An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain. IEEE Internet Things J. 9(4): 2722-2733 (2022) - [c3]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Weihong Han:
Generic Construction of Trace-and-Revoke Inner Product Functional Encryption. ESORICS (1) 2022: 259-282 - [i1]Fucai Luo, Saif M. Al-Kuwari, Haiyan Wang, Xingfu Yan:
Fully Collusion Resistant Trace-and-Revoke Functional Encryption for Arbitrary Identities. IACR Cryptol. ePrint Arch. 2022: 1152 (2022) - 2021
- [c2]Yuan Li, Haiyan Wang, Shulan Wang, Yong Ding:
Attribute-Based Searchable Encryption Scheme Supporting Efficient Range Search in Cloud Computing. DSC 2021: 1-8 - 2020
- [c1]Shulan Wang, Yuan Li, Haiyan Wang, Xi Zhang, Jianyong Chen:
Attribute-Based Weighted Keyword Search Scheme Supporting Multi-Search Mechanism in Fog Computing. CSCloud/EdgeCom 2020: 23-28
2010 – 2019
- 2019
- [j2]Haiyan Wang, Qiuzhen Lin, Jianyong Chen, Jianqiang Li, Jianghua Zhong, Dongdai Lin, Jia Wang, Lijia Ma:
On Stability of Multi-Valued Nonlinear Feedback Shift Registers. Complex. 2019: 8765970:1-8765970:11 (2019) - [j1]Jianqiang Li, Shulan Wang, Yuan Li, Haiyan Wang, Huiwen Wang, Huihui Wang, Jianyong Chen, Zhuhong You:
An Efficient Attribute-Based Encryption Scheme With Policy Update and File Update in Cloud Computing. IEEE Trans. Ind. Informatics 15(12): 6500-6509 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint