D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 40 Citations 7,626 266 World Ranking 5762 National Ranking 552

Overview

What is he best known for?

The fields of study he is best known for:

  • Artificial intelligence
  • Cryptography
  • Computer network

Jian Weng mainly focuses on Computer security, Encryption, Proxy re-encryption, Proxy and Ciphertext. His work on Information privacy as part of general Computer security study is frequently connected to Outsourcing, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. Jian Weng combines subjects such as Cryptographic primitive and Database with his study of Encryption.

His Proxy re-encryption study combines topics from a wide range of disciplines, such as Random oracle and Chosen-ciphertext attack. His Ciphertext research is multidisciplinary, incorporating elements of Plaintext and Verifiable secret sharing. His study on Symmetric-key algorithm is often connected to Pairing as part of broader study in Public-key cryptography.

His most cited work include:

  • Efficient unidirectional proxy re-encryption (277 citations)
  • Attribute-Based Encryption With Verifiable Outsourced Decryption (254 citations)
  • Chosen-Ciphertext Secure Proxy Re-encryption without Pairings (247 citations)

What are the main themes of his work throughout his whole career to date?

Jian Weng spends much of his time researching Computer security, Encryption, Ciphertext, Theoretical computer science and Computer network. The various areas that Jian Weng examines in his Computer security study include Proxy and Server. Within one scientific family, Jian Weng focuses on topics pertaining to Proxy re-encryption under Proxy, and may sometimes address concerns connected to Chosen-ciphertext attack.

He has researched Encryption in several fields, including Verifiable secret sharing and Access control. His work in Ciphertext tackles topics such as Plaintext which are related to areas like Ciphertext indistinguishability. Jian Weng interconnects Information hiding, Quantum computer and Standard model in the investigation of issues within Theoretical computer science.

He most often published in these fields:

  • Computer security (44.20%)
  • Encryption (33.93%)
  • Ciphertext (14.29%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (44.20%)
  • Encryption (33.93%)
  • Artificial intelligence (10.71%)

In recent papers he was focusing on the following fields of study:

Jian Weng mainly investigates Computer security, Encryption, Artificial intelligence, Computer network and Server. As part of one scientific family, Jian Weng deals mainly with the area of Computer security, narrowing it down to issues related to the State, and often Confidentiality. The study incorporates disciplines such as Secret sharing, Access control, Information retrieval, Key and Image retrieval in addition to Encryption.

In his research, Computer security model, Attribute-based encryption and Strong key is intimately related to Ciphertext, which falls under the overarching field of Access control. His work on Deep learning as part of general Artificial intelligence study is frequently linked to Multiple data, bridging the gap between disciplines. His Server research is multidisciplinary, incorporating perspectives in Secure multi-party computation, Computation and Correctness.

Between 2019 and 2021, his most popular works were:

  • An overview on smart contracts: Challenges, advances and platforms (79 citations)
  • Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage (19 citations)
  • Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET (18 citations)

In his most recent research, the most cited papers focused on:

  • Artificial intelligence
  • Computer network
  • Cryptography

His main research concerns Encryption, Computer security, Access control, Server and Combinatorics. His work in the fields of Encryption, such as Cryptosystem, overlaps with other areas such as Grid. Jian Weng has included themes like Wireless ad hoc network, Connection and Robustness in his Computer security study.

Access control connects with themes related to Ciphertext in his study. His Ciphertext study combines topics in areas such as Attribute-based encryption and Strong key. His studies deal with areas such as Security analysis, Location awareness, Information sensitivity and Location-based service as well as Server.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Attribute-Based Encryption With Verifiable Outsourced Decryption

Junzuo Lai;Robert H. Deng;Chaowen Guan;Jian Weng.
IEEE Transactions on Information Forensics and Security (2013)

501 Citations

Efficient unidirectional proxy re-encryption

Sherman S. M. Chow;Jian Weng;Yanjiang Yang;Robert H. Deng.
international conference on cryptology in africa (2010)

388 Citations

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings

Robert H. Deng;Jian Weng;Shengli Liu;Kefei Chen.
cryptology and network security (2008)

347 Citations

CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing

Ming Li;Jian Weng;Anjia Yang;Wei Lu.
IEEE Transactions on Parallel and Distributed Systems (2019)

322 Citations

Verifiable Computation over Large Database with Incremental Updates

Xiaofeng Chen;Jin Li;Jian Weng;Jianfeng Ma.
IEEE Transactions on Computers (2016)

303 Citations

Conditional proxy re-encryption secure against chosen-ciphertext attack

Jian Weng;Robert H. Deng;Xuhua Ding;Cheng-Kang Chu.
computer and communications security (2009)

235 Citations

DeepChain: Auditable and Privacy-Preserving Deep Learning with Blockchain-Based Incentive

Jiasi Weng;Jian Weng;Jilian Zhang;Ming Li.
IEEE Transactions on Dependable and Secure Computing (2021)

218 Citations

Feature selection for text classification: A review

Xuelian Deng;Yuqing Li;Jian Weng;Jilian Zhang.
Multimedia Tools and Applications (2019)

187 Citations

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys

Ximeng Liu;Robert H. Deng;Kim-Kwang Raymond Choo;Jian Weng.
IEEE Transactions on Information Forensics and Security (2016)

184 Citations

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers

Ximeng Liu;Kim-Kwang Raymond Choo;Robert H. Deng;Rongxing Lu.
IEEE Transactions on Dependable and Secure Computing (2018)

163 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Jian Weng

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 75

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 62

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 50

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 48

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 43

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 39

Zhi-Hui Zhan

Zhi-Hui Zhan

South China University of Technology

Publications: 37

Jun Zhang

Jun Zhang

Chinese Academy of Sciences

Publications: 36

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 33

Jian Shen

Jian Shen

Nanjing University of Information Science and Technology

Publications: 32

Liehuang Zhu

Liehuang Zhu

Beijing Institute of Technology

Publications: 30

Yi Mu

Yi Mu

Fujian Normal University

Publications: 27

Ali Asghar Heidari

Ali Asghar Heidari

National University of Singapore

Publications: 26

Huiling Chen

Huiling Chen

Wenzhou University

Publications: 26

Anfeng Liu

Anfeng Liu

Central South University

Publications: 26

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 25

Trending Scientists

J. Ramanujam

J. Ramanujam

Louisiana State University

Roberto Cardenas

Roberto Cardenas

University of Chile

Ryo Yoshida

Ryo Yoshida

University of Tokyo

Venkataraman Thangadurai

Venkataraman Thangadurai

University of Calgary

Mika Lindén

Mika Lindén

University of Ulm

Russell J. Composto

Russell J. Composto

University of Pennsylvania

Gyeong Man Choi

Gyeong Man Choi

Pohang University of Science and Technology

Chris T. Amemiya

Chris T. Amemiya

University of California, Merced

Daniel E. Koshland

Daniel E. Koshland

University of California, Berkeley

Grace John-Stewart

Grace John-Stewart

University of Washington

Jeanne L. Hardebeck

Jeanne L. Hardebeck

United States Geological Survey

Ralf Seppelt

Ralf Seppelt

Helmholtz Centre for Environmental Research

Nicholas J. Clifford

Nicholas J. Clifford

Loughborough University

Syamal K. Datta

Syamal K. Datta

Northwestern University

Neil Marlow

Neil Marlow

University College London

Anna P. Nieboer

Anna P. Nieboer

Erasmus University Rotterdam

Something went wrong. Please try again later.