default search action
Xuexian Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
SDIM: A Subtly Designed Invertible Matrix for Enhanced Privacy-Preserving Outsourcing Matrix Multiplication and Related Tasks. IEEE Trans. Dependable Secur. Comput. 21(4): 3469-3486 (2024) - 2023
- [j33]Dongmei Yang, Jianghong Wei, Xuexian Hu, Kuiwu Yang, Yue Chen:
System-widely and fine-grained forward secure identity-based signature scheme. J. Inf. Secur. Appl. 79: 103659 (2023) - [j32]Yang Xu, Xuexian Hu, Jianghong Wei, Hongjian Yang, Kejia Li:
VF-CART: A communication-efficient vertical federated framework for the CART algorithm. J. King Saud Univ. Comput. Inf. Sci. 35(1): 237-249 (2023) - 2022
- [j31]Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
VAEPass: A lightweight passwords guessing model based on variational auto-encoder. Comput. Secur. 114: 102587 (2022) - [j30]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Enabling (End-to-End) Encrypted Cloud Emails With Practical Forward Secrecy. IEEE Trans. Dependable Secur. Comput. 19(4): 2318-2332 (2022) - 2021
- [j29]Jianghong Wei, Xiaofeng Chen, Xinyi Huang, Xuexian Hu, Willy Susilo:
RS-HABE: Revocable-Storage and Hierarchical Attribute-Based Access Scheme for Secure Sharing of e-Health Records in Public Cloud. IEEE Trans. Dependable Secur. Comput. 18(5): 2301-2315 (2021) - [j28]Jianghong Wei, Xiaofeng Chen, Jianfeng Ma, Xuexian Hu, Kui Ren:
Communication-Efficient and Fine-Grained Forward-Secure Asynchronous Messaging. IEEE/ACM Trans. Netw. 29(5): 2242-2253 (2021) - [c19]Kunyu Yang, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
Studies of Keyboard Patterns in Passwords: Recognition, Characteristics and Strength Evolution. ICICS (1) 2021: 153-168 - [c18]Chun Liu, Lin Yang, LinRu Ma, LiuCheng Shi, Xuexian Hu, Weipeng Cao, JingJing Zhang:
PEBIID: Privacy-preserving and Efficient Biometric Identification for IoV DApp. ISPA/BDCloud/SocialCom/SustainCom 2021: 63-72 - [i1]Chun Liu, Xuexian Hu, Xiaofeng Chen, Jianghong Wei, Wenfen Liu:
An Efficient Matrix Multiplication with Enhanced Privacy Protection in Cloud Computing and Its Applications. CoRR abs/2105.05525 (2021) - 2020
- [j27]Ji Li, Jianghong Wei, Mao Ye, Wenfen Liu, Xuexian Hu:
Privacy-preserving constrained spectral clustering algorithm for large-scale data sets. IET Inf. Secur. 14(3): 321-331 (2020) - [c17]Ming Yang, Xuexian Hu, Jianghong Wei, Qihui Zhang, Wenfen Liu:
Outsourced Secure ID3 Decision Tree Algorithm over Horizontally Partitioned Datasets with Consortium Blockchain. ICCNS 2020: 60-69
2010 – 2019
- 2019
- [j26]Chun Liu, Xuexian Hu, Qihui Zhang, Jianghong Wei, Wenfen Liu:
An Efficient Biometric Identification in Cloud Computing With Enhanced Privacy Security. IEEE Access 7: 105363-105375 (2019) - [j25]Mengli Zhang, Gang Zhou, Muhammad Khurram Khan, Saru Kumari, Xuexian Hu, Wenfen Liu:
SPSR-FSPG: A Fast Simulative Password Set Generation Algorithm. IEEE Access 7: 155107-155119 (2019) - [j24]Mengli Zhang, Qihui Zhang, Wenfen Liu, Xuexian Hu, Jianghong Wei:
TG-SPSR: A Systematic Targeted Password Attacking Model. KSII Trans. Internet Inf. Syst. 13(5): 2674-2697 (2019) - [j23]Jianghong Wei, Xuexian Hu, Wenfen Liu, Qihui Zhang:
Forward and backward secure fuzzy encryption for data sharing in cloud computing. Soft Comput. 23(2): 497-506 (2019) - [c16]Qihui Zhang, Wenfen Liu, Kang Yang, Xuexian Hu, Ying Mei:
Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard Model. Inscrypt 2019: 499-516 - [c15]Jianghong Wei, Xiaofeng Chen, Jianfeng Wang, Xuexian Hu, Jianfeng Ma:
Forward-Secure Puncturable Identity-Based Encryption for Securing Cloud Emails. ESORICS (2) 2019: 134-150 - [c14]Zijie Lin, Liangliang Gao, Xuexian Hu, Yuxuan Zhang, Wenfen Liu:
Differentially Private Graph Clustering Algorithm Based on Structure Similarity. ICCNS 2019: 63-68 - 2018
- [j22]Jianghong Wei, Wenfen Liu, Xuexian Hu:
On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS. Int. J. Commun. Syst. 31(15) (2018) - [j21]Wenfen Liu, Gang Zhou, Jianghong Wei, Xuexian Hu, Saru Kumari:
Security Enhanced and Cost-effective User Authentication Scheme for Wireless Sensor Networks. Inf. Technol. Control. 47(2): 275-294 (2018) - [j20]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure and Efficient Attribute-Based Access Control for Multiauthority Cloud Storage. IEEE Syst. J. 12(2): 1731-1742 (2018) - [j19]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption. IEEE Trans. Cloud Comput. 6(4): 1136-1148 (2018) - [c13]Mengli Zhang, Qihui Zhang, Xuexian Hu, Wenfen Liu:
A Password Cracking Method Based On Structure Partition and BiLSTM Recurrent Neural Network. ICCNS 2018: 79-83 - [c12]Yuxuan Zhang, Jianghong Wei, Xiaojian Zhang, Xuexian Hu, Wenfen Liu:
A Two-Phase Algorithm for Generating Synthetic Graph Under Local Differential Privacy. ICCNS 2018: 84-89 - 2017
- [j18]Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Jing Xu:
Universally composable anonymous password authenticated key exchange. Sci. China Inf. Sci. 60(5): 52107 (2017) - [j17]Wenfen Liu, Mao Ye, Jianghong Wei, Xuexian Hu:
Fast Constrained Spectral Clustering and Cluster Ensemble with Random Projection. Comput. Intell. Neurosci. 2017: 2658707:1-2658707:14 (2017) - [j16]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Forward-secure identity-based signature with efficient revocation. Int. J. Comput. Math. 94(7): 1390-1411 (2017) - [j15]Jianghong Wei, Xuexian Hu, Wenfen Liu:
Two-factor authentication scheme using attribute and password. Int. J. Commun. Syst. 30(1) (2017) - [j14]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security. Int. J. Found. Comput. Sci. 28(7): 843-868 (2017) - [j13]Wenfen Liu, Mao Ye, Jianghong Wei, Xuexian Hu:
Compressed constrained spectral clustering framework for large-scale data sets. Knowl. Based Syst. 135: 77-88 (2017) - [j12]Ji Li, Jianghong Wei, Wenfen Liu, Xuexian Hu:
PMDP: A Framework for Preserving Multiparty Data Privacy in Cloud Computing. Secur. Commun. Networks 2017: 6097253:1-6097253:14 (2017) - [j11]Xuexian Hu, Jiang Zhang, Zhenfeng Zhang, Fengmei Liu:
Anonymous Password Authenticated Key Exchange Protocol in the Standard Model. Wirel. Pers. Commun. 96(1): 1451-1474 (2017) - [c11]Qihui Zhang, Xuexian Hu, Jianghong Wei, Wenfen Liu:
Universally Composable Three-Party Password Authenticated Key Exchange. ICCCS (2) 2017: 123-137 - [c10]Zhonglei Lu, Wenfen Liu, Yanfang Zhou, Xuexian Hu, Binyu Wang:
An Effective Approach for Chinese News Headline Classification Based on Multi-representation Mixed Model with Attention and Ensemble Learning. NLPCC 2017: 339-350 - [c9]Zhonglei Lu, Wenfen Liu, Yanfang Zhou, Xuexian Hu, Binyu Wang:
An Effective Approach of Sentence Compression Based on "Re-read" Mechanism and Bayesian Combination Model. SMP 2017: 129-140 - 2016
- [j10]Jianghong Wei, Xinyi Huang, Wenfen Liu, Xuexian Hu:
Practical Attribute-based Signature: Traceability and Revocability. Comput. J. 59(11): 1714-1734 (2016) - [j9]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure and Efficient Smart Card Based Remote User Password Authentication Scheme. Int. J. Netw. Secur. 18(4): 782-792 (2016) - [j8]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Security pitfalls of "ePASS: An expressive attribute-based signature scheme". J. Inf. Secur. Appl. 30: 40-45 (2016) - [c8]Lin Zhang, Zhenfeng Zhang, Xuexian Hu:
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications. AsiaCCS 2016: 153-164 - [c7]Zhenfeng Zhang, Kang Yang, Xuexian Hu, Yuchen Wang:
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication. CCS 2016: 1179-1191 - 2015
- [j7]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Forward-Secure Threshold Attribute-Based Signature Scheme. Comput. J. 58(10): 2492-2506 (2015) - [j6]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Secure control protocol for universal serial bus mass storage devices. IET Comput. Digit. Tech. 9(6): 321-327 (2015) - [j5]Xuexian Hu, Zhenfeng Zhang, Qihui Zhang:
Universally composable three-party password-authenticated key exchange with contributiveness. Int. J. Commun. Syst. 28(6): 1100-1111 (2015) - [c6]Jing Xu, Xuexian Hu, Zhenfeng Zhang:
Round-Optimal Password-Based Group Key Exchange Protocols in the Standard Model. ACNS 2015: 42-61 - [c5]Jianghong Wei, Xinyi Huang, Xuexian Hu, Wenfen Liu:
Revocable Threshold Attribute-Based Signature against Signing Key Exposure. ISPEC 2015: 316-330 - 2014
- [j4]Jianghong Wei, Xuexian Hu, Wenfen Liu:
Traceable attribute-based signcryption. Secur. Commun. Networks 7(12): 2302-2317 (2014) - [j3]Jianghong Wei, Wenfen Liu, Xuexian Hu:
Cryptanalysis and Improvement of a Robust Smart Card Authentication Scheme for Multi-server Architecture. Wirel. Pers. Commun. 77(3): 2255-2269 (2014) - [c4]Yanfei Guo, Zhenfeng Zhang, Jiang Zhang, Xuexian Hu:
Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model. ICICS 2014: 305-320 - 2013
- [j2]Xiaocheng Hu, Weiming Zhang, Xuexian Hu, Nenghai Yu, Xianfeng Zhao, Fenghua Li:
Fast Estimation of Optimal Marked-Signal Distribution for Reversible Data Hiding. IEEE Trans. Inf. Forensics Secur. 8(5): 779-788 (2013) - 2012
- [j1]Jianghong Wei, Xuexian Hu, Wenfen Liu:
An Improved Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 36(6): 3597-3604 (2012)
2000 – 2009
- 2009
- [c3]Xuexian Hu, Wenfen Liu:
Efficient Password-Based Authenticated Key Exchange Protocol in the UC Framework. Inscrypt 2009: 144-153 - [c2]Qingfeng Cheng, Chuangui Ma, Xuexian Hu:
A New Strongly Secure Authenticated Key Exchange Protocol. ISA 2009: 135-144 - 2006
- [c1]Xuexian Hu, Yongtao Ming, Wenfen Liu, Shiqu Li:
On the Rate of Coincidence of Two Clock-Controlled Combiners. Inscrypt 2006: 54-65
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint