Follow
Anjia Yang
Anjia Yang
Professor, College of Cyber Security, Jinan University
Verified email at my.cityu.edu.hk - Homepage
Title
Cited by
Cited by
Year
CrowdBC: A blockchain-based decentralized framework for crowdsourcing
M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng
IEEE transactions on parallel and distributed systems 30 (6), 1251-1266, 2018
5662018
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1912015
Lightweight and privacy-preserving delegatable proofs of storage with data dynamics in cloud storage
A Yang, J Xu, J Weng, J Zhou, DS Wong
IEEE Transactions on Cloud Computing 9 (1), 212-225, 2018
1252018
A new ADS-B authentication framework based on efficient hierarchical identity-based signature with batch verification
A Yang, X Tan, J Baek, DS Wong
IEEE Transactions on Services Computing 10 (2), 165-175, 2015
972015
Delegating authentication to edge: A decentralized authentication architecture for vehicular networks
A Yang, J Weng, K Yang, C Huang, X Shen
IEEE Transactions on Intelligent Transportation Systems 23 (2), 1284-1298, 2020
962020
Enabling efficient and privacy-preserving aggregation communication and function query for fog computing-based smart grid
JN Liu, J Weng, A Yang, Y Chen, X Lin
IEEE Transactions on Smart Grid 11 (1), 247-257, 2019
922019
Toward blockchain-based fair and anonymous ad dissemination in vehicular networks
M Li, J Weng, A Yang, JN Liu, X Lin
IEEE Transactions on Vehicular Technology 68 (11), 11248-11259, 2019
892019
DeQoS attack: Degrading quality of service in VANETs and its mitigation
A Yang, J Weng, N Cheng, J Ni, X Lin, X Shen
IEEE Transactions on Vehicular Technology 68 (5), 4834-4845, 2019
612019
Decentralized anonymous authentication with fair billing for space-ground integrated networks
X Liu, A Yang, C Huang, Y Li, T Li, M Li
IEEE Transactions on Vehicular Technology 70 (8), 7764-7777, 2021
292021
pvcnn: Privacy-preserving and verifiable convolutional neural network testing
J Weng, J Weng, G Tang, A Yang, M Li, JN Liu
IEEE Transactions on Information Forensics and Security 18, 2218-2233, 2023
282023
DAMIA: Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks
H Huang, W Luo, G Zeng, J Weng, Y Zhang, A Yang
IEEE Transactions on Dependable and Secure Computing 19 (5), 3183-3199, 2021
252021
Multi-client secure and efficient dpf-based keyword search for cloud storage
C Huang, D Liu, A Yang, R Lu, X Shen
IEEE Transactions on Dependable and Secure Computing 21 (1), 353-371, 2023
232023
Privacy-preserving group authentication for RFID tags using bit-collision patterns
A Yang, D Boshoff, Q Hu, GP Hancke, X Luo, J Weng, K Mayes, ...
IEEE Internet of Things Journal 8 (14), 11607-11620, 2021
232021
Attribute-based conditional proxy re-encryption in the standard model under LWE
X Liang, J Weng, A Yang, L Yao, Z Jiang, Z Wu
Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021
222021
Two-hop distance-bounding protocols: Keep your friends close
A Yang, E Pagnin, A Mitrokotsa, GP Hancke, DS Wong
IEEE Transactions on Mobile Computing 17 (7), 1723-1736, 2017
222017
Lightweight delegatable proofs of storage
J Xu, A Yang, J Zhou, DS Wong
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
222016
An efficient single-slow-phase mutually authenticated RFID distance bounding protocol with tag privacy
A Yang, Y Zhuang, DS Wong
Information and Communications Security: 14th International Conference …, 2012
222012
Scalable CCA-secure public-key authenticated encryption with keyword search from ideal lattices in cloud computing
L Yao, J Weng, A Yang, X Liang, Z Wu, Z Jiang, L Hou
Information Sciences 624, 777-795, 2023
202023
HB+ DB: Distance bounding meets human based authentication
E Pagnin, A Yang, Q Hu, G Hancke, A Mitrokotsa
Future Generation Computer Systems 80, 627-639, 2018
202018
Security analysis of some diffusion mechanisms used in chaotic ciphers
LY Zhang, Y Zhang, Y Liu, A Yang, G Chen
International Journal of Bifurcation and Chaos 27 (10), 1750155, 2017
202017
The system can't perform the operation now. Try again later.
Articles 1–20