Volgen
Linzhi Jiang
Linzhi Jiang
Geverifieerd e-mailadres voor surrey.ac.uk
Titel
Geciteerd door
Geciteerd door
Jaar
Secure outsourcing SIFT: Efficient and privacy-preserving image feature extraction in the encrypted domain
L Jiang, C Xu, X Wang, B Luo, H Wang
IEEE Transactions on Dependable and Secure Computing 17 (1), 179-193, 2017
562017
Toward practical privacy-preserving processing over encrypted data in IoT: an assistive healthcare use case
L Jiang, L Chen, T Giannetsos, B Luo, K Liang, J Han
IEEE Internet of Things Journal 6 (6), 10177-10190, 2019
502019
Statistical learning based fully homomorphic encryption on encrypted data
L Jiang, C Xu, X Wang, C Lin
Soft Computing 21, 7473-7483, 2017
192017
Generating universal adversarial perturbation with ResNet
J Xu, H Liu, D Wu, F Zhou, C Gao, L Jiang
Information Sciences 537, 302-312, 2020
132020
Application of (fully) homomorphic encryption for encrypted computing models
L Jiang, C Xu, X Wang, KF Chen, B Wang
Journal of Cryptologic Research 4 (6), 596-610, 2017
92017
A new effective shift rule for M-sequences
X Wang, L Zhang, L Jiang
IEEE Access 8, 74957-74964, 2019
62019
Analysis and comparison of the network security protocol with DoS/DDoS attack resistance performance
L Jiang, C Xu, X Wang, Y Zhou
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
62015
(全) 同态加密在基于密文计算模型中的应用
蒋林智, 许春香, 王晓芳, 陈克非, 王保仓
密码学报, 596-610, 2017
52017
Cycle structure and adjacency graphs of a class of LFSRs and a new family of De Bruijn cycles
X Wang, L Jiang
IEEE Access 6, 38770-38779, 2018
32018
同态加密专栏序言
陈克非, 蒋林智
密码学报 4 (6), 558-560, 2017
22017
ID-based deniable threshold ring authentication
C Jin, C Xu, L Jiang, F Li
2015 IEEE 17th International Conference on High Performance Computing and …, 2015
22015
A symmetric authenticated proxy re-encryption scheme with provable security
Z Peng, S Tang, L Jiang
Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017
12017
“单调有界数列必收敛” 的应用综述
蒋林智
皖西学院学报 21 (2), 25-28, 2005
12005
Adversarial Perturbation with ResNet
H Liu, L Jiang, J Xu, D Wu, L Chen
Proceedings of the 2020 on Great Lakes Symposium on VLSI, 549-554, 2020
2020
一种新的基于 Client-puzzle 的 WAPI 认证协议抗拒绝服务攻击方案
蒋林智, 丁勇
桂林电子科技大学学报 32 (1), 35-39, 2012
2012
迫敛性在解决求极限问题中的应用讨论
蒋林智
皖西学院学报 22 (2), 13-15, 2006
2006
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–16