Skip to main content

and
  1. No Access

    Article

    An identity-based traceable ring signatures based on lattice

    While ring signatures can provide unconditional anonymity to the signing user, they are vulnerable to malicious signers in certain scenarios, for example, in electronic voting, malicious users will vote multip...

    Junbin Liang, Qiong Huang, Jianye Huang in Peer-to-Peer Networking and Applications (2023)

  2. No Access

    Chapter and Conference Paper

    Optimization and Verification of Artificial Intelligence Image Recognition Algorithm for Transmission Line Defects

    With the continuous improvement of intelligent operation and inspection requirements of transmission lines in power system, the popularization of online monitoring of transmission lines and uav inspection, a l...

    Shuang Lin, Jianye Huang, Yongqian Liu in Tenth International Conference on Applicat… (2023)

  3. No Access

    Chapter and Conference Paper

    A Novel Approach to Analyzing Defects: Enhancing Knowledge Graph Embedding Models for Main Electrical Equipment

    The safety of electric power grids can be threatened by defects in main electrical equipment, creating significant risks and pressures for dispatching operations. To analyze defects in main electrical equipmen...

    Yanyu Chen, Jianye Huang, Jian Qian in Advanced Intelligent Computing Technology … (2023)

  4. No Access

    Chapter and Conference Paper

    Improve Knowledge Graph Completion for Diagnosing Defects in Main Electrical Equipment

    Defects in main electrical equipment can potentially cause power grid collapses, leading to catastrophic risks and immense pressure on dispatch operations. We adopt a Knowledge Graph Completion (KGC) approach ...

    Jianye Huang, Jian Qian, Yanyu Chen, Rui Lin in Advanced Intelligent Computing Technology … (2023)

  5. No Access

    Chapter and Conference Paper

    Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search

    Public-key Authenticated Encryption with Keyword Search (PAEKS) is a cryptographic primitive that can resist inside keyword guessing attack (KGA). However, most of the previously proposed PAEKS frameworks suff...

    Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au in Provable and Practical Security (2022)

  6. No Access

    Chapter and Conference Paper

    A Novel Certificateless Multi-signature Scheme over NTRU Lattices

    With the help of multi-signature technology, multiple signatures on the same message could be compressed into one compact signature, which is efficient for financial applications such as blockchain for saving ...

    **njian Chen, Qiong Huang, Jianye Huang in Information Security Practice and Experience (2021)

  7. No Access

    Chapter and Conference Paper

    Public Key Encryption with Fuzzy Matching

    The rise of cloud computing is driving the development in various fields and becoming one of the hot topics in recent years. To solve the problem of comparing ciphertexts between different users in cloud stora...

    Yuanhao Wang, Qiong Huang, Hongbo Li, Meiyan **ao in Provable and Practical Security (2021)

  8. No Access

    Chapter and Conference Paper

    Outsourced Ciphertext-Policy Attribute-Based Encryption with Equality Test

    In the cloud era people get used to store their data to the cloud server, and would use encryption technique to protect their sensitive data from leakage. However, encrypted data management is a challenging pr...

    Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li in Information Security and Cryptology (2019)

  9. No Access

    Article

    Ein Fels in der Brandung in der Chinesischen Medizin Deutschlands

    Jianshan Han, Jianye Huang, Dunyan Han in Chinesische Medizin / Chinese Medicine (2018)

  10. No Access

    Chapter and Conference Paper

    Self-Repairing of Damaged Rust Layers on Carbon Steel and Weathering Steel

    Rust layer damage of the weathering steel is almost inevitable during its service and new rusts will form to fill the damage. This study focused on the rust self-repairing behavior of the weathering steel in t...

    Xu Zhang, Shanwu Yang, Jianye Huang, Yu He in Proceedings of the 8th Pacific Rim Interna… (2016)

  11. No Access

    Chapter and Conference Paper

    A Black-Box Construction of Strongly Unforgeable Signature Schemes in the Bounded Leakage Model

    Due to the imperfect implementation of cryptosystems, adversaries are able to obtain secret state of the systems via side-channel attacks which are not considered in the traditional security notions of cryptograp...

    Jianye Huang, Qiong Huang, Chunhua Pan in Provable Security (2016)

  12. Article

    Open Access

    Immunohistochemical detection of S100A1 in the postmortem diagnosis of acute myocardial infarction

    Sudden cardiac death resulting from acute myocardial infarction (AMI) constitutes a significant percentage of the caseload for forensic and clinical pathologists. When sudden death occurs at an early stage (<6...

    Haitao Bi, Ying Yang, Jianye Huang, Yingmin Li, Chunling Ma in Diagnostic Pathology (2013)