default search action
Haiyong Bao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j38]Qinglei Kong, Jian Liu, Xiaodong Qu, Bo Chen, Haiyong Bao, Lexi Xu:
Security in data-driven satellite applications: An overview and new perspectives. Signal Process. 228: 109755 (2025) - 2024
- [j37]Zian Zhang, Haiyong Bao, Rongxing Lu, Cheng Huang, Beibei Li:
KMSQ: Efficient and Privacy-Preserving Keyword-Oriented Multidimensional Similarity Query in eHealthcare. IEEE Internet Things J. 11(5): 7918-7934 (2024) - [j36]Xinqi Tu, Haiyong Bao, Rongxing Lu, Cheng Huang, Hong-Ning Dai:
PMRK: Privacy-Preserving Multidimensional Range Query With Keyword Search Over Spatial Data. IEEE Internet Things J. 11(6): 10464-10478 (2024) - [j35]Qinglei Kong, Yifan Wang, Songnian Zhang, Bo Chen, Sudong Xiao, Haiyong Bao, Jun Shao:
Achieving Secure On-Orbit Comparison in LEO-Satellite-Enabled Offshore Wind Farm Surveillance. IEEE Internet Things J. 11(23): 38790-38802 (2024) - [j34]Menghong Guan, Haiyong Bao, Zhiqiang Li, Hao Pan, Cheng Huang, Hong-Ning Dai:
SAMFL: Secure Aggregation Mechanism for Federated Learning with Byzantine-robustness by functional encryption. J. Syst. Archit. 157: 103304 (2024) - [j33]Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao:
A secure location management scheme in an LEO-satellite network with dual-mobility. Peer Peer Netw. Appl. 17(5): 3146-3158 (2024) - [j32]Zhusen Liu, Luyao Wang, Haiyong Bao, Zhenfu Cao, Lu Zhou, Zhe Liu:
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks. IEEE Trans. Ind. Informatics 20(5): 8007-8018 (2024) - 2023
- [j31]Haiyong Bao, Zheng Xu, Haibo Hong, Qinglei Kong, Haifeng Qian:
NLSP: A novel lattice-based secure primitive for privacy-preserving smart grid communications. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j30]Menghong Guan, Subrota Kumar Mondal, Hong-Ning Dai, Haiyong Bao:
Reinforcement learning-driven deep question generation with rich semantics. Inf. Process. Manag. 60(2): 103232 (2023) - 2022
- [j29]Chunxiao Liu, Shuangshuang Ye, Lideng Zhang, Haiyong Bao, Xun Wang, Fanding Wu:
Non-homogeneous haze data synthesis based real-world image dehazing with enhancement-and-restoration fused CNNs. Comput. Graph. 106: 45-57 (2022) - [j28]Zhusen Liu, Zhenfu Cao, Xiaolei Dong, Xiaopeng Zhao, Haiyong Bao, Jiachen Shen:
A verifiable privacy-preserving data collection scheme supporting multi-party computation in fog-based smart grid. Frontiers Comput. Sci. 16(3): 161810 (2022) - [j27]Zhusen Liu, Zhenfu Cao, Xiaolei Dong, Xiaopeng Zhao, Tian Liu, Haiyong Bao, Jiachen Shen:
EPMDA-FED: Efficient and Privacy-Preserving Multidimensional Data Aggregation Scheme With Fast Error Detection in Smart Grid. IEEE Internet Things J. 9(9): 6922-6933 (2022) - [j26]Haiyong Bao, Binbin Ren, Beibei Li, Qinglei Kong:
BBNP: A Blockchain-Based Novel Paradigm for Fair and Secure Smart Grid Communications. IEEE Internet Things J. 9(15): 12984-12996 (2022) - [j25]Yi-Ru Sun, Xiu-Bo Chen, Jun Shao, Song Han, Haibo Hong, Haiyong Bao, Yixian Yang:
Cyclic preparation of two-qubit state in two noisy environments. Quantum Inf. Process. 21(1): 40 (2022) - 2021
- [j24]Haiyong Bao, Beibei Li:
A novel privacy preserving data aggregation scheme with data integrity and fault tolerance for smart grid communications. Frontiers Comput. Sci. 15(5): 155812 (2021) - [j23]Shuai Zhao, Fenghua Li, Hongwei Li, Rongxing Lu, Siqi Ren, Haiyong Bao, Jianhong Lin, Song Han:
Smart and Practical Privacy-Preserving Data Aggregation for Fog-Based Smart Grids. IEEE Trans. Inf. Forensics Secur. 16: 521-536 (2021) - 2020
- [j22]Beibei Li, Yue Xiao, Yaxin Shi, Qinglei Kong, Yuhao Wu, Haiyong Bao:
Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems. IEEE Open J. Comput. Soc. 1: 250-261 (2020) - [j21]Beibei Li, Gaoxi Xiao, Rongxing Lu, Ruilong Deng, Haiyong Bao:
On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices. IEEE Trans. Ind. Informatics 16(2): 854-864 (2020)
2010 – 2019
- 2019
- [j20]Shu Han, Mande Xie, Bailin Yang, Rongxing Lu, Haiyong Bao, Jianhong Lin, Haibo Hong, Mianxue Gu, Song Han:
A Certificateless Verifiable Strong Designated Verifier Signature Scheme. IEEE Access 7: 126391-126408 (2019) - [j19]Qinglei Kong, Rongxing Lu, Maode Ma, Haiyong Bao:
A privacy-preserving sensory data sharing scheme in Internet of Vehicles. Future Gener. Comput. Syst. 92: 644-655 (2019) - [j18]Beibei Li, Rongxing Lu, Gaoxi Xiao, Haiyong Bao, Ali A. Ghorbani:
Towards insider threats detection in smart grid communication systems. IET Commun. 13(12): 1728-1736 (2019) - [j17]Qinglei Kong, Rongxing Lu, Maode Ma, Haiyong Bao:
A Privacy-Preserving and Verifiable Querying Scheme in Vehicular Fog Data Dissemination. IEEE Trans. Veh. Technol. 68(2): 1877-1887 (2019) - 2017
- [j16]Haiyong Bao, Rongxing Lu:
A lightweight data aggregation scheme achieving privacy preservation and data integrity with differential privacy and fault tolerance. Peer-to-Peer Netw. Appl. 10(1): 106-121 (2017) - [j15]Qinglei Kong, Rongxing Lu, Maode Ma, Haiyong Bao:
Achieve Location Privacy-Preserving Range Query in Vehicular Sensing. Sensors 17(8): 1829 (2017) - 2016
- [j14]Haiyong Bao, Le Chen:
A lightweight privacy-preserving scheme with data integrity for smart grid communications. Concurr. Comput. Pract. Exp. 28(4): 1094-1110 (2016) - [j13]Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, Haiyong Bao:
Efficient and privacy-preserving skyline computation framework across domains. Future Gener. Comput. Syst. 62: 161-174 (2016) - [j12]Haiyong Bao, Rongxing Lu, Beibei Li, Ruilong Deng:
BLITHE: Behavior Rule-Based Insider Threat Detection for Smart Grid. IEEE Internet Things J. 3(2): 190-205 (2016) - [j11]Haiyong Bao, Rongxing Lu:
Comment on "Privacy-Enhanced Data Aggregation Scheme Against Internal Attackers in Smart Grid". IEEE Trans. Ind. Informatics 12(1): 2-5 (2016) - 2015
- [j10]Haiyong Bao, Rongxing Lu:
A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications. IEEE Internet Things J. 2(3): 248-258 (2015) - [c8]Haiyong Bao, Rongxing Lu:
DDPFT: Secure data aggregation scheme with differential privacy and fault tolerance. ICC 2015: 7240-7245 - 2013
- [j9]Haiyong Bao, Zhenfu Cao:
Group-Proxy Signature Scheme: A Novel Solution to Electronic Cash. J. Intell. Syst. 22(2): 95-110 (2013) - 2011
- [c7]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Efficient and secure electronic resume using smart cards. FSKD 2011: 2271-2274 - [c6]Haiyong Bao, Guiyi Wei, Jun Shao, Zhenfu Cao:
Novel conic-based group signature scheme with revocation. FSKD 2011: 2623-2627
2000 – 2009
- 2008
- [j8]Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing. Int. J. Netw. Secur. 7(3): 342-347 (2008) - [j7]Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian, Haiyong Bao:
Biased Bit Commitment and Applications. J. Inf. Sci. Eng. 24(2): 441-452 (2008) - 2007
- [j6]Rongxing Lu, Zhenfu Cao, Shengbao Wang, Haiyong Bao:
A New ID-Based Deniable Authentication Protocol. Informatica 18(1): 67-78 (2007) - 2006
- [c5]Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Two-Pass ID-Based Authenticated Key Agreement Protocol with Key Confirmation Using Pairings. IMSCCS (2) 2006: 109-112 - [c4]Haiyong Bao, Zhenfu Cao, Shengbao Wang:
Identity-Based Threshold Proxy Signature Scheme with Known Signers. TAMC 2006: 538-546 - 2005
- [j5]Haifeng Qian, Zhenfu Cao, Haiyong Bao:
Cryptanalysis of Li-Tzeng-Hwang's improved signature schemes based on factoring and discrete logarithms. Appl. Math. Comput. 166(3): 501-505 (2005) - [j4]Haiyong Bao, Zhenfu Cao, Rongxing Lu:
Proxy signature scheme using self-certified public keys. Appl. Math. Comput. 169(2): 1380-1389 (2005) - [j3]Haiyong Bao, Zhenfu Cao, Shengbao Wang:
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification. Appl. Math. Comput. 169(2): 1419-1430 (2005) - [j2]Haifeng Qian, Zhenfu Cao, Haiyong Bao:
Security of Pon-Lu-Jeng's Meta-He digital signature schemes. Appl. Math. Comput. 170(1): 724-730 (2005) - [j1]Haiyong Bao, Zhenfu Cao, Shengbao Wang:
Remarks on Wu-Hsu's threshold signature scheme using self-certified public keys. J. Syst. Softw. 78(1): 56-59 (2005) - [c3]Haiyong Bao, Zhenfu Cao, Haifeng Qian:
On the Security of a Group Signcryption Scheme from Distributed Signcryption Scheme. CANS 2005: 26-34 - [c2]Shengbao Wang, Zhenfu Cao, Haiyong Bao:
Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. ISPA Workshops 2005: 342-349 - 2004
- [c1]Haiyong Bao, Zhenfu Cao, Haifeng Qian:
Cryptanalysis of group signature scheme from ID-based signature scheme. InfoSecu 2004: 115-118
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint