default search action
Qing Wu 0005
Person information
- affiliation: Xi'an University of Posts and Communications, School of Automation, China
Other persons with the same name
- Qing Wu — disambiguation page
- Qing Wu 0001 — ShanghaiTech University, School of Information Science and Technology, China
- Qing Wu 0002 — Air Force Research Laboratory, Rome, NY, USA (and 1 more)
- Qing Wu 0003 — Wuhan University of Technology, School of Transportation and Logistics Engineering, China
- Qing Wu 0004 — National University of Defense Technology, Science and Technology on Parallel and Distributed Processing Laboratory, College of Computer, Changsha, China
- Qing Wu 0006 — University of Illinois Urbana-Champaign, IL, USA
- Qing Wu 0007 — University of Bonn, Germany
- Qing Wu 0008 — Hangzhou Dianzi University, School of Computer Science and Technology, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Leyou Zhang, Xinmin Li, Qing Wu, Fatemeh Rezaeibagha:
Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT. IEEE Internet Things J. 11(1): 526-542 (2024) - [j35]Leyou Zhang, Shuwei Xie, Qing Wu, Fatemeh Rezaeibagha:
Enhanced Secure Attribute-Based Dynamic Data Sharing Scheme With Efficient Access Policy Hiding and Policy Updating for IoMT. IEEE Internet Things J. 11(16): 27435-27447 (2024) - [j34]Shuwei Xie, Leyou Zhang, Qing Wu, Fatemeh Rezaeibagha:
Flexibly expressive and revocable multi-authority KP-ABE scheme from RLWE for Internet of Medical Things. J. Syst. Archit. 152: 103179 (2024) - [j33]Qing Wu, Guoqiang Meng, Leyou Zhang, Yue Lei:
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage. J. Syst. Archit. 153: 103210 (2024) - [j32]Chuchu Zhao, Leyou Zhang, Qing Wu, Fatemeh Rezaeibagha:
Publicly Accountable Data-Sharing Scheme Supporting Privacy Protection for Fog-Enabled VANETs. IEEE Trans. Veh. Technol. 73(6): 8487-8502 (2024) - [i5]Zhuang Shan, Leyou Zhang, Qing Wu:
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle. IACR Cryptol. ePrint Arch. 2024: 392 (2024) - [i4]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Analysis, modify and apply in IIOT form light-weight PSI in CM20. IACR Cryptol. ePrint Arch. 2024: 969 (2024) - [i3]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem. IACR Cryptol. ePrint Arch. 2024: 1179 (2024) - [i2]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, Fuchun Guo:
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR. IACR Cryptol. ePrint Arch. 2024: 1349 (2024) - 2023
- [j31]Qing Wu, Fan Wang, Yu An, Ke Li:
L1-Norm Robust Regularized Extreme Learning Machine with Asymmetric C-Loss for Regression. Axioms 12(2): 204 (2023) - [j30]Qing Wu, Yanlin Fu, Dongshun Cui, En Wang:
C-Loss-Based Doubly Regularized Extreme Learning Machine. Cogn. Comput. 15(2): 496-519 (2023) - [j29]Qing Wu, Heng-Chang Zhang, Yi-Jui Chiu:
Application of asymmetric proximal support vector regression based on multitask learning in the stock market. Expert Syst. Appl. 227: 120208 (2023) - [j28]Leyou Zhang, Guang Yang, Chao Song, Qing Wu:
Accountable multi-authority attribute-based data access control in smart grids. J. King Saud Univ. Comput. Inf. Sci. 35(7): 101597 (2023) - [j27]Xuanyang Hou, Leyou Zhang, Qing Wu, Fatemeh Rezaeibagha:
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101658 (2023) - [j26]Qing Wu, Guoqiang Meng, Leyou Zhang, Fatemeh Rezaeibagha:
Collusion resistant multi-authority access control scheme with privacy protection for personal health records. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101677 (2023) - [j25]Tianshuai Zhang, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records. IEEE Syst. J. 17(2): 1962-1973 (2023) - [j24]Ruonan Ma, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(11): 10821-10830 (2023) - [c10]Qing Wu, Lu Chen, Fei-Yan Li, Heng-Chang Zhang:
Multitask asymmetric proximal support vector machine for classification. AIPR 2023: 1317-1322 - [c9]Qing Wu, Ming Yu, Lu Chen:
Doubly Regularized Least Squares Twin Extreme Learning Machine for Pattern Classification. AIPR 2023: 1330-1335 - [i1]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem. IACR Cryptol. ePrint Arch. 2023: 1412 (2023) - 2022
- [j23]Heng-Chang Zhang, Qing Wu, Fei-Yan Li:
Application of online multitask learning based on least squares support vector regression in the financial market. Appl. Soft Comput. 121: 108754 (2022) - [j22]Heng-Chang Zhang, Qing Wu, Fei-Yan Li, Hong Li:
Multitask Learning Based on Least Squares Support Vector Regression for Stock Forecast. Axioms 11(6): 292 (2022) - [j21]Yanlin Fu, Qing Wu, Ke Liu, Haotian Gao:
Feature Selection Methods for Extreme Learning Machines. Axioms 11(9): 444 (2022) - [j20]Leyou Zhang, Tianshuai Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain. IEEE Internet Things J. 9(14): 12482-12496 (2022) - [j19]Leyou Zhang, Ye Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks. IEEE Internet Things J. 9(18): 17938-17952 (2022) - [j18]Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu:
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9216-9227 (2022) - [j17]Qing Wu, Taotao Lai, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. J. Syst. Archit. 129: 102569 (2022) - [j16]Leyou Zhang, Chuchu Zhao, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth. J. Syst. Archit. 130: 102654 (2022) - [j15]Qing Wu, Liangjun Li, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing. IEEE Syst. J. 16(4): 5533-5543 (2022) - 2021
- [j14]En Wang, Zi-Yang Wang, Qing Wu:
One novel class of Bézier smooth semi-supervised support vector machines for classification. Neural Comput. Appl. 33(16): 9975-9991 (2021) - [c8]Fan Wang, Qing Wu, Yanlin Fu:
Feature Selection Method for L1-norm Twin Support Vector Regression. ICCAIS 2021: 668-673 - 2020
- [j13]Qing Wu, Rongrong Jing, En Wang:
Improved weighted local linear embedding algorithm based on Laplacian eigenmaps. Int. J. Knowl. Based Intell. Eng. Syst. 24(4): 323-330 (2020)
2010 – 2019
- 2017
- [j12]Qing Wu, Leyou Zhang, Jingxia Zhang:
Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(5): 1257-1261 (2017) - [c7]Leyou Zhang, Qing Wu:
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. NSS 2017: 46-58 - 2016
- [j11]Leyou Zhang, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. Comput. J. 59(4): 452-461 (2016) - [j10]Leyou Zhang, Qing Wu, Yi Mu, Jingxia Zhang:
Privacy-Preserving and Secure Sharing of PHR in the Cloud. J. Medical Syst. 40(12): 267:1-267:13 (2016) - 2015
- [c6]Leyou Zhang, Zhuanning Wang, Qing Wu:
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model. ICA3PP (Workshops and Symposiums) 2015: 201-210 - 2013
- [j9]Qing Wu, Leyou Zhang:
New Efficient Hierarchical Identity-based Signature. J. Comput. 8(3): 803-810 (2013) - [c5]Leyou Zhang, Qing Wu, Yi Mu:
Anonymous Identity-Based Broadcast Encryption with Adaptive Security. CSS 2013: 258-271 - [c4]Qing Wu, Leyou Zhang:
Hierarchical Identity-Based Signature with Short Public Keys. CSS 2013: 272-281 - 2012
- [j8]Leyou Zhang, Yupu Hu, Qing Wu:
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math. Comput. Model. 55(1-2): 12-18 (2012) - [c3]Leyou Zhang, Qing Wu, Yupu Hu:
Direct CCA Secure Identity-Based Broadcast Encryption. NSS 2012: 348-360 - 2011
- [j7]Leyou Zhang, Qing Wu, Yupu Hu:
New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Trans. Internet Inf. Syst. 5(2): 428-439 (2011) - [j6]Leyou Zhang, Qing Wu, Yupu Hu:
Secure Identity-based Threshold Broadcast Encryption in the Standard Model. J. Networks 6(11): 1602-1609 (2011) - [j5]Leyou Zhang, Qing Wu, Yupu Hu:
New Constructions of Short Signatures in the Standard Model. J. Softw. 6(10): 1921-1928 (2011) - 2010
- [j4]Leyou Zhang, Yupu Hu, Qing Wu:
Identity-based Threshold Broadcast Encryption in the Standard Model. KSII Trans. Internet Inf. Syst. 4(3): 400-410 (2010) - [j3]Qing Wu, Sanyang Liu, Leyou Zhang:
Particle Swarm Optimization for Semi-supervised Support Vector Machine. J. Inf. Sci. Eng. 26(5): 1695-1706 (2010) - [j2]Qing Wu, Sanyang Liu, Leyou Zhang:
Support Vector Regression Based on Adjustable Entropy Function Approach. J. Inf. Sci. Eng. 26(6): 2331-2339 (2010) - [c2]Leyou Zhang, Yupu Hu, Qing Wu:
Short Signature from the Bilinear Pairing. ICICA (LNCS) 2010: 111-118
2000 – 2009
- 2009
- [j1]Leyou Zhang, Yupu Hu, Qing Wu:
New Construction of Short Hierarchical ID-Based Signature in the Standard Model. Fundam. Informaticae 90(1-2): 191-201 (2009) - 2006
- [c1]Qing Wu, Sanyang Liu, Leyou Zhang:
Hypersphere Support Vector Machines Based on Multiplicative Updates. ICNC (1) 2006: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint