Calculated based on number of publications stored in Pure and citations from Scopus
20082024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN

    Chen, Z., Zhu, L., Jiang, P., He, J. & Zhang, Z., 2024, IEEE INFOCOM 2024 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 241-250 10 p. (Proceedings - IEEE INFOCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • CrossAAD: Cross-Chain Abnormal Account Detection

    Lin, Y., Jiang, P., Guo, F. & Zhu, L., 2024, Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Proceedings. Zhu, T. & Li, Y. (eds.). Springer Science and Business Media Deutschland GmbH, p. 84-104 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14897 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Exploiting Multi-Model Collaborative Inference for Privacy Enhancement in Text Classification

    Lin, Y., Jiang, P., Gai, K. & Zhu, L., 2024, Proceedings - 2024 IEEE 10th Conference on Big Data Security on Cloud, BigDataSecurity 2024. Institute of Electrical and Electronics Engineers Inc., p. 58-65 8 p. (Proceedings - 2024 IEEE 10th Conference on Big Data Security on Cloud, BigDataSecurity 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Lightweight Privacy-Preserving Mechanisms for Cross-Chain Transactions

    Zhu, J., Gai, K., Jiang, P. & Zhu, L., 2024, Proceedings - 11th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2024. Institute of Electrical and Electronics Engineers Inc., p. 59-64 6 p. (Proceedings - 11th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    HSchain: Anonymous Permissioned Blockchain with Enhanced Auditability

    Hou, J., Xu, L., Zhu, L., Jiang, P. & Song, S., 2023, Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023. Institute of Electrical and Electronics Engineers Inc., p. 130-135 6 p. (Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • 2021

    Dictionary Based Brute Force Attack – Study Case of Montenegro and China

    Djukanovic, M., Novicevic, L., Zhu, L. & Jiang, P., 2021, New Technologies, Development and Application IV. Karabegović, I. (ed.). Springer Science and Business Media Deutschland GmbH, p. 647-652 6 p. (Lecture Notes in Networks and Systems; vol. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Heuristic-based Blockchain Assignment: An Empirical Study

    Chen, J., Gai, K., Jiang, P. & Zhu, L., 2021, 19th IEEE International Symposium on Parallel and Distributed Processing with Applications, 11th IEEE International Conference on Big Data and Cloud Computing, 14th IEEE International Conference on Social Computing and Networking and 11th IEEE International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2021. Institute of Electrical and Electronics Engineers Inc., p. 916-923 8 p. (19th IEEE International Symposium on Parallel and Distributed Processing with Applications, 11th IEEE International Conference on Big Data and Cloud Computing, 14th IEEE International Conference on Social Computing and Networking and 11th IEEE International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Citations (Scopus)
  • SM9-based Anonymous Search over Encrypted Data

    Ren, K., Jiang, P., Zhu, L. & Gai, K., 2021, 19th IEEE International Symposium on Parallel and Distributed Processing with Applications, 11th IEEE International Conference on Big Data and Cloud Computing, 14th IEEE International Conference on Social Computing and Networking and 11th IEEE International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2021. Institute of Electrical and Electronics Engineers Inc., p. 212-219 8 p. (19th IEEE International Symposium on Parallel and Distributed Processing with Applications, 11th IEEE International Conference on Big Data and Cloud Computing, 14th IEEE International Conference on Social Computing and Networking and 11th IEEE International Conference on Sustainable Computing and Communications, ISPA/BDCloud/SocialCom/SustainCom 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)
  • SM9-based Traceable and Accountable Access Control for Secure Multi-user Cloud Storage

    Ren, K., Jiang, P., Gai, K., Zhu, L. & Huang, J., 2021, Proceedings - 2021 IEEE 6th International Conference on Smart Cloud, SmartCloud 2021. Institute of Electrical and Electronics Engineers Inc., p. 13-18 6 p. (Proceedings - 2021 IEEE 6th International Conference on Smart Cloud, SmartCloud 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • 2020

    Reputation-Based Trustworthy Supply Chain Management Using Smart Contract

    Li, H., Gai, K., Zhu, L., Jiang, P. & Qiu, M., 2020, Algorithms and Architectures for Parallel Processing - 20th International Conference, ICA3PP 2020, Proceedings. Qiu, M. (ed.). Springer Science and Business Media Deutschland GmbH, p. 35-49 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12454 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Citations (Scopus)
  • 2019

    Blockchain-enabled Data Provenance in Cloud Datacenter Reengineering

    Li, H., Zhu, L., Gai, K., Xu, L., Fang, Z. & Jiang, P., 2 Jul 2019, BSCI 2019 - Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, co-located with AsiaCCS 2019. Association for Computing Machinery, Inc, p. 47-56 10 p. (BSCI 2019 - Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, co-located with AsiaCCS 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    15 Citations (Scopus)
  • Location-based Privacy-preserving Techniques in Connected Environment: A Survey

    Yan, Y., Gai, K., Jiang, P., Xu, L. & Zhu, L., Dec 2019, Proceedings - 4th IEEE International Conference on Smart Cloud, SmartCloud 2019 and 3rd International Symposium on Reinforcement Learning, ISRL 2019. Institute of Electrical and Electronics Engineers Inc., p. 156-162 7 p. 9091374. (Proceedings - 4th IEEE International Conference on Smart Cloud, SmartCloud 2019 and 3rd International Symposium on Reinforcement Learning, ISRL 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Citations (Scopus)
  • 2016

    Oblivious keyword search with authorization

    Jiang, P., Wang, X., Lai, J., Guo, F. & Chen, R., 2016, Provable Security - 10th International Conference, ProvSec 2016, Proceedings. Chen, L. & Han, J. (eds.). Springer Verlag, p. 173-190 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10005 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Citations (Scopus)
  • Public key encryption with authorized keyword search

    Jiang, P., Mu, Y., Guo, F. & Wen, Q., 2016, Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings. Liu, J. K. & Steinfeld, R. (eds.). Springer Verlag, p. 170-186 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9723).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Citations (Scopus)
  • 2011

    A probability model for related entity retrieval using relation pattern

    Jiang, P., Yang, Q., Zhang, C., Niu, Z. & Fu, H., 2011, Knowledge Science, Engineering and Management - 5th International Conference, KSEM 2011, Proceedings. p. 318-330 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7091 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Citations (Scopus)
  • 2010

    A framework for opinion question answering

    Jiang, P., Fu, H., Zhang, C. & Niu, Z., 2010, Proc. - 6th Intl. Conference on Advanced Information Management and Service, IMS2010, with ICMIA2010 - 2nd International Conference on Data Mining and Intelligent Information Technology Applications. p. 424-427 4 p. 5713487. (Proc. - 6th Intl. Conference on Advanced Information Management and Service, IMS2010, with ICMIA2010 - 2nd International Conference on Data Mining and Intelligent Information Technology Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • An approach based on tree kernels for opinion mining of online product reviews

    Jiang, P., Zhang, C., Fu, H., Niu, Z. & Yang, Q., 2010, Proceedings - 10th IEEE International Conference on Data Mining, ICDM 2010. p. 256-265 10 p. 5693979. (Proceedings - IEEE International Conference on Data Mining, ICDM).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    27 Citations (Scopus)
  • 2009

    A K-means approach based on concept hierarchical tree for search results clustering

    Jiang, P., Zhang, C., Guo, G., Niu, Z. & Gao, D., 2009, 6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009. p. 380-386 7 p. 5358569. (6th International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2009; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Citations (Scopus)
  • Automatic extraction of definitions

    Zhang, C. & Jiang, P., 2009, Proceedings - 2009 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009. p. 364-368 5 p. 5234687. (Proceedings - 2009 2nd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Citations (Scopus)
  • 2008

    Chinese unknown word recognition based on functional applications of type theory

    Gao, D., Niu, Z., Lv, L., Jiang, P., Qin, X. & Guo, J., 2008, Proceedings - 2008 2nd International Symposium on Intelligent Information Technology Application, IITA 2008. p. 498-502 5 p. 4740047. (Proceedings - 2008 2nd International Symposium on Intelligent Information Technology Application, IITA 2008; vol. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Citation (Scopus)