I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Weng, Jiasi
28
results:
Search for persons
X
Format
Online (28)
Mediatypes
Articles (Online) (15)
Bookchapter (Online) (1)
OpenAccess-fulltext (12)
Sorted by: Relevance
Sorted by: Year
?
1
HRA-secure attribute-based threshold proxy re-encryption fr..:
Zhao, Feixiang
;
Weng, Jian
;
Xie, Wenli
..
Information Sciences. 655 (2024) - p. 119900 , 2024
Link:
https://doi.org/10.1016/..
?
2
Proof of Unlearning: Definitions and Instantiation:
Weng, Jiasi
;
Yao, Shenglong
;
Du, Yuefeng
...
IEEE Transactions on Information Forensics and Security. 19 (2024) - p. 3309-3323 , 2024
Link:
https://doi.org/10.1109/..
?
3
WVFL: Weighted Verifiable Secure Aggregation in Federated L..:
Zhong, Yijian
;
Tan, Wuzheng
;
Xu, Zhifeng
...
IEEE Internet of Things Journal. 11 (2024) 11 - p. 19926-19936 , 2024
Link:
https://doi.org/10.1109/..
?
4
IvyRedaction: Enabling Atomic, Consistent and Accountable C..:
Hu, Shun
;
Li, Ming
;
Weng, Jiasi
...
IEEE Transactions on Dependable and Secure Computing. 21 (2024) 4 - p. 3883-3900 , 2024
Link:
https://doi.org/10.1109/..
?
5
pvCNN: Privacy-Preserving and Verifiable Convolutional Neur..:
Weng, Jiasi
;
Weng, Jian
;
Tang, Gui
...
IEEE Transactions on Information Forensics and Security. 18 (2023) - p. 2218-2233 , 2023
Link:
https://doi.org/10.1109/..
?
6
ZeroCross: A sidechain-based privacy-preserving Cross-chain..:
Li, Yuxian
;
Weng, Jian
;
Li, Ming
...
Journal of Parallel and Distributed Computing. 169 (2022) - p. 301-316 , 2022
Link:
https://doi.org/10.1016/..
?
7
Golden Grain: Building a Secure and Decentralized Model Mar..:
Weng, Jiasi
;
Weng, Jian
;
Cai, Chengjun
..
IEEE Transactions on Dependable and Secure Computing. 19 (2022) 5 - p. 3149-3167 , 2022
Link:
https://doi.org/10.1109/..
?
8
Peripheral-Free Device Pairing by Randomly Switching Power:
Shao, Zhijian
;
Weng, Jian
;
Zhang, Yue
...
IEEE Transactions on Dependable and Secure Computing. 19 (2022) 6 - p. 4240-4254 , 2022
Link:
https://doi.org/10.1109/..
?
9
A General Framework for Matching Pattern Hiding in Deep Pac..:
, In:
Information Security Applications; Lecture Notes in Computer Science
,
Wen, Jinghang
;
Liu, Jia-Nan
;
Wu, Axin
. - p. 243-254 , 2021
Link:
https://doi.org/10.1007/..
?
10
Looking Back! Using Early Versions of Android Apps as Attac..:
Zhang, Yue
;
Weng, Jian
;
Weng, Jiasi
...
IEEE Transactions on Dependable and Secure Computing. 18 (2021) 2 - p. 652-666 , 2021
Link:
https://doi.org/10.1109/..
?
11
BDFL: A Byzantine-Fault-Tolerance Decentralized Federated L..:
Chen, Jin-Hua
;
Chen, Min-Rong
;
Zeng, Guo-Qiang
.
IEEE Transactions on Vehicular Technology. 70 (2021) 9 - p. 8639-8652 , 2021
Link:
https://doi.org/10.1109/..
?
12
Scalable revocable identity-based signature over lattices i..:
Xie, Congge
;
Weng, Jian
;
Weng, Jiasi
.
Information Sciences. 518 (2020) - p. 29-38 , 2020
Link:
https://doi.org/10.1016/..
?
13
Attribute-Based Hybrid Boolean Keyword Search over Outsourc..:
He, Kai
;
Guo, Jun
;
Weng, Jian
...
IEEE Transactions on Dependable and Secure Computing. 17 (2020) 6 - p. 1207-1217 , 2020
Link:
https://doi.org/10.1109/..
?
14
DeepChain: Auditable and Privacy-Preserving Deep Learning w..:
Weng, Jiasi
;
Weng, Jian
;
Zhang, Jilian
...
IEEE Transactions on Dependable and Secure Computing. , 2019
Link:
https://doi.org/10.1109/..
?
15
BENBI: Scalable and Dynamic Access Control on the Northboun..:
Weng, Jia-Si
;
Weng, Jian
;
Zhang, Yue
..
IEEE Transactions on Vehicular Technology. 68 (2019) 1 - p. 822-831 , 2019
Link:
https://doi.org/10.1109/..
1-15