Weng, Jiasi
28  results:
Search for persons X
?
2

Proof of Unlearning: Definitions and Instantiation:

Weng, Jiasi ; Yao, Shenglong ; Du, Yuefeng...
IEEE Transactions on Information Forensics and Security.  19 (2024)  - p. 3309-3323 , 2024
 
?
3

WVFL: Weighted Verifiable Secure Aggregation in Federated L..:

Zhong, Yijian ; Tan, Wuzheng ; Xu, Zhifeng...
IEEE Internet of Things Journal.  11 (2024)  11 - p. 19926-19936 , 2024
 
?
4

IvyRedaction: Enabling Atomic, Consistent and Accountable C..:

Hu, Shun ; Li, Ming ; Weng, Jiasi...
IEEE Transactions on Dependable and Secure Computing.  21 (2024)  4 - p. 3883-3900 , 2024
 
?
5

pvCNN: Privacy-Preserving and Verifiable Convolutional Neur..:

Weng, Jiasi ; Weng, Jian ; Tang, Gui...
IEEE Transactions on Information Forensics and Security.  18 (2023)  - p. 2218-2233 , 2023
 
?
6

ZeroCross: A sidechain-based privacy-preserving Cross-chain..:

Li, Yuxian ; Weng, Jian ; Li, Ming...
Journal of Parallel and Distributed Computing.  169 (2022)  - p. 301-316 , 2022
 
?
7

Golden Grain: Building a Secure and Decentralized Model Mar..:

Weng, Jiasi ; Weng, Jian ; Cai, Chengjun..
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  5 - p. 3149-3167 , 2022
 
?
8

Peripheral-Free Device Pairing by Randomly Switching Power:

Shao, Zhijian ; Weng, Jian ; Zhang, Yue...
IEEE Transactions on Dependable and Secure Computing.  19 (2022)  6 - p. 4240-4254 , 2022
 
?
9

A General Framework for Matching Pattern Hiding in Deep Pac..:

, In: Information Security Applications; Lecture Notes in Computer Science,
Wen, Jinghang ; Liu, Jia-Nan ; Wu, Axin. - p. 243-254 , 2021
 
?
10

Looking Back! Using Early Versions of Android Apps as Attac..:

Zhang, Yue ; Weng, Jian ; Weng, Jiasi...
IEEE Transactions on Dependable and Secure Computing.  18 (2021)  2 - p. 652-666 , 2021
 
?
11

BDFL: A Byzantine-Fault-Tolerance Decentralized Federated L..:

Chen, Jin-Hua ; Chen, Min-Rong ; Zeng, Guo-Qiang.
IEEE Transactions on Vehicular Technology.  70 (2021)  9 - p. 8639-8652 , 2021
 
?
13

Attribute-Based Hybrid Boolean Keyword Search over Outsourc..:

He, Kai ; Guo, Jun ; Weng, Jian...
IEEE Transactions on Dependable and Secure Computing.  17 (2020)  6 - p. 1207-1217 , 2020
 
?
14

DeepChain: Auditable and Privacy-Preserving Deep Learning w..:

Weng, Jiasi ; Weng, Jian ; Zhang, Jilian...
IEEE Transactions on Dependable and Secure Computing.  , 2019
 
?
15

BENBI: Scalable and Dynamic Access Control on the Northboun..:

Weng, Jia-Si ; Weng, Jian ; Zhang, Yue..
IEEE Transactions on Vehicular Technology.  68 (2019)  1 - p. 822-831 , 2019
 
1-15