default search action
Liqiang Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j13]Dong Chen, Tanping Zhou, Wenchao Liu, Ruifeng Li, Liqiang Wu, Xiaoyuan Yang:
MDA-FLH: Multidimensional Data Aggregation Scheme With Fine-Grained Linear Homomorphism for Smart Grid. IEEE Internet Things J. 11(2): 3524-3538 (2024) - [j12]Tanping Zhou, Shuo Chen, Huiyu Xie, Liqiang Wu, Xiaoyuan Yang:
SFPDA: Secure Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme for Smart Grid Without TA. IEEE Internet Things J. 11(21): 35669-35680 (2024) - [j11]Liqiang Wu, Shaojing Fu, Yuchuan Luo, Hongyang Yan, Heyuan Shi, Ming Xu:
A Robust and Lightweight Privacy-Preserving Data Aggregation Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(1): 270-283 (2024) - [j10]Liqiang Wu, Shaojing Fu, Yuchuan Luo, Ming Xu:
SecTCN: Privacy-Preserving Short-Term Residential Electrical Load Forecasting. IEEE Trans. Ind. Informatics 20(2): 2508-2518 (2024) - 2023
- [j9]Liqiang Wu, Heyuan Shi, Shaojing Fu, Yuchuan Luo, Ming Xu:
p2Detect: Electricity Theft Detection With Privacy Preservation for Both Data and Model in Smart Grid. IEEE Trans. Smart Grid 14(3): 2301-2312 (2023) - 2022
- [j8]Liqiang Wu, Ming Xu, Shaojing Fu, Yuchuan Luo, Yuechuan Wei:
FPDA: Fault-Tolerant and Privacy-Enhanced Data Aggregation Scheme in Fog-Assisted Smart Grid. IEEE Internet Things J. 9(7): 5254-5265 (2022) - [j7]Liqiang Wu, Xiaoyuan Yang, Minqing Zhang, Xu An Wang:
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability. J. Ambient Intell. Humaniz. Comput. 13(1): 469-482 (2022) - [j6]Liqiang Wu, Yiliang Han, Xiaoyuan Yang, Minqing Zhang:
Identity-based threshold proxy re-encryption scheme from lattices and its applications. Frontiers Inf. Technol. Electron. Eng. 23(2): 258-277 (2022) - [j5]Weidong Du, Min Li, Xiaoyuan Yang, Liqiang Wu, Tanping Zhou:
VCFL: A verifiable and collusion attack resistant privacy preserving framework for cross-silo federated learning. Pervasive Mob. Comput. 86: 101697 (2022) - 2018
- [j4]Longfei Liu, Xiaoyuan Yang, Bin Wei, Liqiang Wu:
A new class of quaternary generalized cyclotomic sequences of order 2d and length 2pm with high linear complexity. Int. J. Wavelets Multiresolution Inf. Process. 16(1): 1850006:1-1850006:11 (2018) - 2016
- [j3]Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient fully homomorphic encryption with circularly secure key switching process. Int. J. High Perform. Comput. Netw. 9(5/6): 417-422 (2016) - [j2]Minqing Zhang, Liqiang Wu, Xu An Wang, Xiaoyuan Yang:
Unidirectional IBPRE scheme from lattice for cloud computation. J. Ambient Intell. Humaniz. Comput. 7(5): 623-631 (2016) - 2013
- [j1]Xiaoyuan Yang, Liqiang Wu, Minqing Zhang, Xiaofeng Chen:
An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption. Comput. Math. Appl. 65(9): 1254-1263 (2013)
Conference and Workshop Papers
- 2018
- [c2]Yang Zhao, Liqiang Wu, Yu Zhao, Xini Yuan:
What Factors Will Determine Users' Knowledge Payment Decision? An Theoretical and Empirical Research. WHICEB 2018: 52 - 2012
- [c1]Xu An Wang, Liqiang Wu, Jinting Nie, Wei Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. CIS 2012: 469-472
Informal and Other Publications
- 2015
- [i2]Tanping Zhou, Xiaoyuan Yang, Wei Zhang, Liqiang Wu:
Efficient Fully Homomorphic Encryption with Circularly Secure Key Switching Process. IACR Cryptol. ePrint Arch. 2015: 466 (2015) - 2011
- [i1]Xu An Wang, Liqiang Wu, Xiaoyuan Yang, Huaqun Wang:
Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme. IACR Cryptol. ePrint Arch. 2011: 224 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint