-
1تقرير
المؤلفون: Jiasi, Weng, Jian, Weng, Jia-Nan, Liu, Yue, Zhang
مصطلحات موضوعية: Computer Science - Cryptography and Security
URL الوصول: http://arxiv.org/abs/1906.04342
-
2
المؤلفون: Xiaohu Chen, Anjia Yang, Yao Tong, Jian Weng, Jiasi Weng, Tao Li
المصدر: IEEE Internet of Things Journal. 9:23130-23141
مصطلحات موضوعية: Computer Networks and Communications, Hardware and Architecture, Signal Processing, Computer Science Applications, Information Systems
-
3
المؤلفون: Yuxian Li, Jian Weng, Ming Li, Wei Wu, Jiasi Weng, Jia-Nan Liu, Shun Hu
المصدر: Journal of Parallel and Distributed Computing. 169:301-316
مصطلحات موضوعية: Artificial Intelligence, Computer Networks and Communications, Hardware and Architecture, Software, Theoretical Computer Science
-
4
-
5
المؤلفون: Jun Guo, Kai He, Jian Weng, Joseph K. Liu, Jiasi Weng, Xun Yi
المصدر: IEEE Transactions on Dependable and Secure Computing. 17:1207-1217
مصطلحات موضوعية: 021110 strategic, defence & security studies, Information privacy, Information retrieval, business.industry, Computer science, Data_MISCELLANEOUS, 0211 other engineering and technologies, Access control, Cloud computing, Cryptography, 02 engineering and technology, Computer security model, Encryption, Server, Ciphertext, Electrical and Electronic Engineering, business
-
6
المؤلفون: Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Machine Learning, Computer Science - Cryptography and Security, Computer Networks and Communications, Safety, Risk, Reliability and Quality, Cryptography and Security (cs.CR), Machine Learning (cs.LG)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6a60d27b6128af00472704fcc787eb30
http://arxiv.org/abs/2201.09186 -
7
المؤلفون: Lin Hou, Jiasi Weng, Jian Weng, Congge Xie
المصدر: Information Sciences. 518:29-38
مصطلحات موضوعية: Information Systems and Management, Theoretical computer science, Cryptographic primitive, Revocation, business.industry, Computer science, 05 social sciences, 050301 education, Cryptography, 02 engineering and technology, Computer Science Applications, Theoretical Computer Science, Random oracle, Public-key cryptography, Artificial Intelligence, Control and Systems Engineering, Scalability, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, business, 0503 education, Software, Computer Science::Cryptography and Security, Quantum computer
-
8
المؤلفون: Jian Weng, Cong Wang, Chengjun Cai, Jiasi Weng, Hongwei Huang
المصدر: INFOCOM
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Boosting (machine learning), Computer science, business.industry, Posterior probability, Inference attack, Machine learning, computer.software_genre, Data modeling, Bayesian game, symbols.namesake, Incentive, Nash equilibrium, Component (UML), symbols, Artificial intelligence, business, Cryptography and Security (cs.CR), computer
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a91bbc76c67218206d6538ebae695d50
https://doi.org/10.1109/infocom42981.2021.9488807 -
9
المؤلفون: Jiasi Weng, Weiming Lan, Weiqi Luo, Jian Weng, Yue Zhang
المصدر: IEEE Transactions on Vehicular Technology. 68:822-831
مصطلحات موضوعية: Vehicular ad hoc network, Northbound interface, Computer Networks and Communications, Computer science, business.industry, Aerospace Engineering, 020302 automobile design & engineering, Access control, 02 engineering and technology, Encryption, 0203 mechanical engineering, Automotive Engineering, Scalability, Electrical and Electronic Engineering, business, Broadcast encryption, Computer network
-
10
المؤلفون: Axin Wu, Jia-Nan Liu, Jiasi Weng, Jinghang Wen
المصدر: Information Security Applications ISBN: 9783030894313
WISAمصطلحات موضوعية: Scheme (programming language), Matching (statistics), business.industry, Computer science, Process (computing), Deep packet inspection, Construct (python library), Encryption, computer.software_genre, Cardinality, Data mining, business, computer, Private set intersection, computer.programming_language
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::8268a336411eb1294ba21f2c3bb90d91
https://doi.org/10.1007/978-3-030-89432-0_20