- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Complexity and Algorithms in Graphs
- Cryptography and Residue Arithmetic
- Advanced Authentication Protocols Security
- Chaos-based Image/Signal Encryption
- Coding theory and cryptography
- Blockchain Technology Applications and Security
- graph theory and CDMA systems
- Data Management and Algorithms
- Cryptographic Implementations and Security
- Advanced Steganography and Watermarking Techniques
- Digital Media Forensic Detection
- Access Control and Trust
- Human Mobility and Location-Based Analysis
- Traffic Prediction and Management Techniques
- Security and Verification in Computing
- User Authentication and Security Systems
- Security in Wireless Sensor Networks
- Internet Traffic Analysis and Secure E-voting
- IoT and Edge/Fog Computing
- VLSI and FPGA Design Techniques
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
Fujian Normal University
2016-2025
University of Hong Kong
2023-2025
Hong Kong University of Science and Technology
2023-2025
City University of Hong Kong
2024
Anhui Normal University
2024
Shizuoka University
2024
Chinese Academy of Personnel Science
2023
Sun Yat-sen Memorial Hospital
2021
Sun Yat-sen University
2017-2021
First Research Institute of the Ministry of Public Security
2014-2019
Journal Article Certificateless Signatures: New Schemes and Security Models Get access Xinyi Huang, Huang * 1School of Mathematics Computer Science, Fujian Normal University, Fuzhou, China *Corresponding author: xyhuang81@gmail.com Search for other works by this author on: Oxford Academic Google Scholar Yi Mu, Mu 2Centre Information Research, School Science Software Engineering, University Wollongong, NSW 2522, Australia Willy Susilo, Susilo Duncan S. Wong, Wong 3Department City Hong Kong,...
The MaxBRNN problem finds a region such that setting up new service site within this would guarantee the maximum number of customers by proximity. This assumes each customer only uses provided his/her nearest site. However, in reality, tends to go k sites. To handle this, can be extended MaxBRkNN which an optimal guarantees who consider as one their locations. We further generalize reflect real world scenario where may have different preferences for sites, and at same time, sites preferred...
The implementation of Universal Designated Verifier Signatures Proofs (UDVSP) enhances data privacy and security in various digital communication systems. However, practical applications UDVSP face challenges such as high computational overhead, onerous certificate management, complex public key initialization. These issues hinder the adoption daily life. To improve efficacy existing UDVSP, Lin et al. IEEE TSC’23 designed a bilinear pairing-free system but their proposal still involves...
The implementation of universal designated verifier signatures proofs (UDVSPs) enhances data privacy and security in various digital communication systems. However, practical applications UDVSP face challenges such as high computational overhead, onerous certificate management, complex public key initialization. These issues hinder adoption daily life. To address these limitations, existing solutions attempt to eliminate bilinear pairing operations, but their proposal still involves...
Path prediction is useful in a wide range of applications. Most the existing solutions, however, are based on eager learning methods where models and patterns extracted from historical trajectories then used for future prediction. Since such approaches committed to set statistically significant or patterns, problems can arise dynamic environments underlying change quickly regions not covered with patterns.
The processing of a Continuous Reverse k-Nearest-Neighbor (CRkNN) query on moving objects can be divided into two sub tasks: continuous filter, and refinement. algorithms for the tasks completely independent. Existing CRkNN solutions employ (CkNN) queries both filter We analyze CkNN based solution point out that when k > 1 refinement cost becomes system bottleneck. propose new method called CRange-k. In CRange- k, we transform verification problem Range-k query, which is also defined in this...
Geographic objects associated with descriptive texts are becoming prevalent, justifying the need for spatial-keyword queries that consider both locations and textual descriptions of objects. Specifically, relevance an object to a query is measured by spatial-textual similarity based on spatial proximity similarity. In this article, we introduce Reverse Spatial-Keyword k -Nearest Neighbor (RSK NN) query, which finds those have as one their -nearest The RSK NN numerous applications in online...
In biological systems, the dynamic analysis method has gained increasing attention in past decade. The Boolean network is most common model of a genetic regulatory network. interactions activation and inhibition are modeled as set functions network, while state transitions reflect property A difficult problem for transition finding attractors. this paper, we proposed solving algorithm to tackle attractor problem. algorithm, partitioned into several blocks consisting strongly connected...
Recent advancements in the Internet of Things (IoT) and cloud computing technologies have accelerated development various practical applications, including healthcare systems. Adequately revealing collected data a cloud-assisted IoT system brings huge potential for improving safety, quality, efficiency services. However, often is vital sensitive. The dissemination such also vulnerable to malicious attacks as tampering, eavesdropping, forgery. Thus, disseminated data's integrity,...
Due to the high degree of automation, automated guided vehicles (AGVs) have been widely used in many scenarios for transportation, and traditional computing power is stretched large-scale AGV scheduling. In recent years, quantum has shown incomparable performance advantages solving specific problems, especially Combinatorial optimization problem. this paper, technology introduced into study scheduling Additionally two types quadratic unconstrained binary optimisation (QUBO) models suitable...