DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive
Weng, Jiasi, Weng, Jian, Zhang, Jilian, Li, Ming, Zhang, Yue, Luo, Weiqi
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Deep Manifold Learning Combined With Convolutional Neural Networks for Action Recognition
Chen, Xin, Weng, Jian, Lu, Wei, Xu, Jiaming, Weng, Jiasi
Published in IEEE transaction on neural networks and learning systems (01.09.2018)
Published in IEEE transaction on neural networks and learning systems (01.09.2018)
Get full text
Journal Article
HRA-secure attribute-based threshold proxy re-encryption from lattices
Zhao, Feixiang, Weng, Jian, Xie, Wenli, Li, Ming, Weng, Jiasi
Published in Information sciences (01.01.2024)
Published in Information sciences (01.01.2024)
Get full text
Journal Article
Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS
Weng, Jiasi, Weng, Jian, Cai, Chengjun, Huang, Hongwei, Wang, Cong
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Attribute-Based Hybrid Boolean Keyword Search over Outsourced Encrypted Data
He, Kai, Guo, Jun, Weng, Jian, Weng, Jiasi, Liu, Joseph K., Yi, Xun
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Published in IEEE transactions on dependable and secure computing (01.11.2020)
Get full text
Journal Article
ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero
Li, Yuxian, Weng, Jian, Li, Ming, Wu, Wei, Weng, Jiasi, Liu, Jia-Nan, Hu, Shun
Published in Journal of parallel and distributed computing (01.11.2022)
Published in Journal of parallel and distributed computing (01.11.2022)
Get full text
Journal Article
Proof of Unlearning: Definitions and Instantiation
Weng, Jiasi, Yao, Shenglong, Du, Yuefeng, Huang, Junjie, Weng, Jian, Wang, Cong
Published in IEEE transactions on information forensics and security (2024)
Published in IEEE transactions on information forensics and security (2024)
Get full text
Journal Article
IvyRedaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting
Hu, Shun, Li, Ming, Weng, Jiasi, Liu, Jia-Nan, Weng, Jian, Li, Zhi
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Published in IEEE transactions on dependable and secure computing (01.07.2024)
Get full text
Journal Article
I vy R edaction: Enabling Atomic, Consistent and Accountable Cross-Chain Rewriting
Hu, Shun, Li, Ming, Weng, Jiasi, Jia-Nan, Liu, Weng, Jian, Li, Zhi
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Published in IEEE transactions on dependable and secure computing (01.01.2024)
Get full text
Journal Article
FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism
Weng, Jiasi, Weng, Jian, Huang, Hongwei, Cai, Chengjun, Wang, Cong
Published in IEEE INFOCOM 2021 - IEEE Conference on Computer Communications (10.05.2021)
Published in IEEE INFOCOM 2021 - IEEE Conference on Computer Communications (10.05.2021)
Get full text
Conference Proceeding
pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing
Weng, Jiasi, Weng, Jian, Tang, Gui, Yang, Anjia, Li, Ming, Liu, Jia-Nan
Published in IEEE transactions on information forensics and security (01.01.2023)
Published in IEEE transactions on information forensics and security (01.01.2023)
Get full text
Journal Article
Peripheral-Free Device Pairing by Randomly Switching Power
Shao, Zhijian, Weng, Jian, Zhang, Yue, Wu, Yongdong, Li, Ming, Weng, Jiasi, Luo, Weiqi, Yu, Shui
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Published in IEEE transactions on dependable and secure computing (01.11.2022)
Get full text
Journal Article
WVFL: Weighted Verifiable Secure Aggregation in Federated Learning
Zhong, Yijian, Tan, Wuzheng, Xu, Zhifeng, Chen, Shixin, Weng, Jiasi, Weng, Jian
Published in IEEE internet of things journal (01.06.2024)
Published in IEEE internet of things journal (01.06.2024)
Get full text
Journal Article
A Multisignature-Based Secure and OBU-Friendly Emergency Reporting Scheme in VANET
Chen, Xiaohu, Yang, Anjia, Tong, Yao, Weng, Jian, Weng, Jiasi, Li, Tao
Published in IEEE internet of things journal (15.11.2022)
Published in IEEE internet of things journal (15.11.2022)
Get full text
Journal Article
Looking Back! Using Early Versions of Android Apps as Attack Vectors
Zhang, Yue, Weng, Jian, Weng, Jiasi, Hou, Lin, Yang, Anjia, Li, Ming, Xiang, Yang, Deng, Robert H.
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Published in IEEE transactions on dependable and secure computing (01.03.2021)
Get full text
Journal Article
Proof of Unlearning: Definitions and Instantiation
Weng, Jiasi, Yao, Shenglong, Du, Yuefeng, Huang, Junjie, Weng, Jian, Wang, Cong
Year of Publication 20.10.2022
Year of Publication 20.10.2022
Get full text
Journal Article