Wei Wu

ORCID: 0000-0003-0343-4632
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Complexity and Algorithms in Graphs
  • Cryptography and Residue Arithmetic
  • Advanced Authentication Protocols Security
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Blockchain Technology Applications and Security
  • graph theory and CDMA systems
  • Data Management and Algorithms
  • Cryptographic Implementations and Security
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Access Control and Trust
  • Human Mobility and Location-Based Analysis
  • Traffic Prediction and Management Techniques
  • Security and Verification in Computing
  • User Authentication and Security Systems
  • Security in Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • VLSI and FPGA Design Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Network Security and Intrusion Detection

Fujian Normal University
2016-2025

University of Hong Kong
2023-2025

Hong Kong University of Science and Technology
2023-2025

City University of Hong Kong
2024

Anhui Normal University
2024

Shizuoka University
2024

Chinese Academy of Personnel Science
2023

Sun Yat-sen Memorial Hospital
2021

Sun Yat-sen University
2017-2021

First Research Institute of the Ministry of Public Security
2014-2019

Journal Article Certificateless Signatures: New Schemes and Security Models Get access Xinyi Huang, Huang * 1School of Mathematics Computer Science, Fujian Normal University, Fuzhou, China *Corresponding author: xyhuang81@gmail.com Search for other works by this author on: Oxford Academic Google Scholar Yi Mu, Mu 2Centre Information Research, School Science Software Engineering, University Wollongong, NSW 2522, Australia Willy Susilo, Susilo Duncan S. Wong, Wong 3Department City Hong Kong,...

10.1093/comjnl/bxr097 article EN The Computer Journal 2011-09-29

The MaxBRNN problem finds a region such that setting up new service site within this would guarantee the maximum number of customers by proximity. This assumes each customer only uses provided his/her nearest site. However, in reality, tends to go k sites. To handle this, can be extended MaxBRkNN which an optimal guarantees who consider as one their locations. We further generalize reflect real world scenario where may have different preferences for sites, and at same time, sites preferred...

10.1109/icde.2011.5767892 article EN 2011-04-01

The implementation of Universal Designated Verifier Signatures Proofs (UDVSP) enhances data privacy and security in various digital communication systems. However, practical applications UDVSP face challenges such as high computational overhead, onerous certificate management, complex public key initialization. These issues hinder the adoption daily life. To improve efficacy existing UDVSP, Lin et al. IEEE TSC’23 designed a bilinear pairing-free system but their proposal still involves...

10.20944/preprints202501.1409.v1 preprint EN 2025-01-20

The implementation of universal designated verifier signatures proofs (UDVSPs) enhances data privacy and security in various digital communication systems. However, practical applications UDVSP face challenges such as high computational overhead, onerous certificate management, complex public key initialization. These issues hinder adoption daily life. To address these limitations, existing solutions attempt to eliminate bilinear pairing operations, but their proposal still involves...

10.3390/math13050743 article EN cc-by Mathematics 2025-02-25

10.1007/s11390-024-3726-z article EN Journal of Computer Science and Technology 2025-01-01

Path prediction is useful in a wide range of applications. Most the existing solutions, however, are based on eager learning methods where models and patterns extracted from historical trajectories then used for future prediction. Since such approaches committed to set statistically significant or patterns, problems can arise dynamic environments underlying change quickly regions not covered with patterns.

10.1145/2487575.2487609 article EN 2013-08-11

The processing of a Continuous Reverse k-Nearest-Neighbor (CRkNN) query on moving objects can be divided into two sub tasks: continuous filter, and refinement. algorithms for the tasks completely independent. Existing CRkNN solutions employ (CkNN) queries both filter We analyze CkNN based solution point out that when k > 1 refinement cost becomes system bottleneck. propose new method called CRange-k. In CRange- k, we transform verification problem Range-k query, which is also defined in this...

10.1109/mdm.2008.31 article EN 2008-04-01

Geographic objects associated with descriptive texts are becoming prevalent, justifying the need for spatial-keyword queries that consider both locations and textual descriptions of objects. Specifically, relevance an object to a query is measured by spatial-textual similarity based on spatial proximity similarity. In this article, we introduce Reverse Spatial-Keyword k -Nearest Neighbor (RSK NN) query, which finds those have as one their -nearest The RSK NN numerous applications in online...

10.1145/2576232 article EN ACM Transactions on Database Systems 2014-05-01

In biological systems, the dynamic analysis method has gained increasing attention in past decade. The Boolean network is most common model of a genetic regulatory network. interactions activation and inhibition are modeled as set functions network, while state transitions reflect property A difficult problem for transition finding attractors. this paper, we proposed solving algorithm to tackle attractor problem. algorithm, partitioned into several blocks consisting strongly connected...

10.1371/journal.pone.0094258 article EN cc-by PLoS ONE 2014-04-09

Recent advancements in the Internet of Things (IoT) and cloud computing technologies have accelerated development various practical applications, including healthcare systems. Adequately revealing collected data a cloud-assisted IoT system brings huge potential for improving safety, quality, efficiency services. However, often is vital sensitive. The dissemination such also vulnerable to malicious attacks as tampering, eavesdropping, forgery. Thus, disseminated data's integrity,...

10.1109/tc.2022.3207138 article EN IEEE Transactions on Computers 2022-09-15

Due to the high degree of automation, automated guided vehicles (AGVs) have been widely used in many scenarios for transportation, and traditional computing power is stretched large-scale AGV scheduling. In recent years, quantum has shown incomparable performance advantages solving specific problems, especially Combinatorial optimization problem. this paper, technology introduced into study scheduling Additionally two types quadratic unconstrained binary optimisation (QUBO) models suitable...

10.1038/s41598-024-62821-6 article EN cc-by Scientific Reports 2024-05-28

10.1007/s10207-007-0021-2 article EN International Journal of Information Security 2007-04-04
Coming Soon ...