Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Predicate Aggregate Signatures and Applications

    Motivated by applications in anonymous reputation systems and blockchain governance, we initiate the study of predicate aggregate signatures (PAS), which is a new primitive that enables users to sign multiple mes...

    Tian Qiu, Qiang Tang in Advances in Cryptology – ASIACRYPT 2023 (2023)

  2. No Access

    Chapter and Conference Paper

    A Shallow Convolution Network Based Contextual Attention for Human Activity Recognition

    Human activity recognition (HAR) is increasingly important in ubiquitous computing applications. Recently, attention mechanism are extensively used in sensor-based HAR tasks, which is capable of focusing the n...

    Chenyang Xu, Zhihong Mao, Feiyi Fan in Mobile and Ubiquitous Systems: Computing, … (2023)

  3. No Access

    Chapter and Conference Paper

    Design and Application of Endangered Animal Monitoring System Based on Mobile APP

    In view of the wide distribution area of Yangtze finless porpoise, the small number of existing population and the insufficient number of professional monitors, a mobile app-based finless porpoise information ...

    Tian Qiu, Huanshan Wang, Lin lin, Cong Chen in Artificial Intelligence in China (2022)

  4. No Access

    Chapter

    Magnetic Micro-/Nanopropellers for Biomedicine

    In nature, many bacteria swim by rotating their helical flagella. A particularly promising class of artificial micro- and nanorobots mimic this propeller-like propulsion mechanism to move through fluids and ti...

    Tian Qiu, Moonkwang Jeong, Rahul Goyal in Field-Driven Micro and Nanorobots for Biol… (2022)

  5. No Access

    Chapter and Conference Paper

    A Multi-Group Signature Scheme from Lattices

    Group signature allows group members to sign on behalf of the group anonymously, and incorporate some tracing mechanism to identify the actual signer. Multi-group signature (MGS), introduced by Ateniese and Tsudi...

    Tian Qiu, Lin Hou, Dongdai Lin in Information and Communications Security (2020)

  6. No Access

    Chapter and Conference Paper

    Lattice HIBE with Faster Trapdoor Delegation and Applications

    In this paper, we propose a lattice-based HIBE scheme in the standard model with faster trapdoor delegation. It is proven secure under the Learning With Errors assumption. Inspired by Canetti et al.’s transformat...

    Guofeng Tang, Tian Qiu in Information and Communications Security (2020)

  7. Chapter and Conference Paper

    Hierarchical Group Signatures with Verifier-Local Revocation

    Group signatures are important when it comes to authentication with privacy. Hierarchical group signatures, as a proper generalization of group signatures, have splendid applications in e-commerce. One key iss...

    Lin Hou, Renzhang Liu, Tian Qiu, Dongdai Lin in Information and Communications Security (2018)

  8. No Access

    Chapter and Conference Paper

    From Nanohelices to Magnetically Actuated Microdrills: A Universal Platform for Some of the Smallest Untethered Microrobotic Systems for Low Reynolds Number and Biological Environments

    Building, powering, and operating structures that can navigate complex fluidic environments at the sub-mm scale are challenging. We discuss some of the limitations encountered when translating actuation mechan...

    Tian Qiu, John G. Gibbs, Debora Schamel in Small-Scale Robotics. From Nano-to-Millime… (2014)

  9. No Access

    Chapter and Conference Paper

    Analysis of Zipper as a Hash Function

    At CRYPTO 2005, Coron etc. proposed several modified methods to make the usual hash functions based on MD method indifferentiable from random oracles. However, the compression functions used in Coron’s schemes...

    Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu in Information Security Practice and Experience (2008)

  10. No Access

    Chapter

    Use of Data Mining in System Development Life Cycle

    During the life cycle of a software development project, many problems arise. Resolutions to these problems are time consuming and expensive. This paper discusses the use of data mining in solving some of thes...

    Richi Nayak, Tian Qiu in Data Mining (2006)