Books/Chapters

[B1] Anjia Yang, Gerhard P. Hancke. RFID and Contactless Technology, Smart Cards, Tokens, Security and Applications, Springer International Publishing, ISBN 978-3-319-50500-8, pp. 351-385, 2017


(* Corresponding author)

Journals

[J54] Axin Wu, Dengguo Feng, Min Zhang, Anjia Yang, and Jialin Chi. Privacy-Preserving Bilateral Multi-receiver Matching with Revocability for Mobile Social Networks, IEEE Transactions on Mobile Computing, in press, 2024

[J53] Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin (Sherman) Shen. PPRP: Preserving Location Privacy for Range-based Positioning in Mobile Networks, IEEE Transactions on Mobile Computing, in press, 2024

[J52] Zhengyan Ding, Lu Han, Chao Zhang, Xizhao Luo∗, Bo Qin∗, Anjia Yang. An Identity-Based Strong Designated Verifier Dual Signature Scheme with Constrained-Delegatability, IEEE Internet of Things Journal, in press, 2024

[J51] Yuan Chen(研究生), Jia-Nan Liu, Anjia Yang*, Jian Weng, Min-Rong Chen, Zilin Liu, Ming Li. PACDAM: Privacy-Preserving and Adaptive Cross-Chain Digital Asset Marketplace, IEEE Internet of Things Journal, vol. 11(8), pp. 13424-13436, 2024

[J50] Axin Wu, Weiqi Luo, Jian Weng, Anjia Yang, Jinghang Wen. Fuzzy Identity-based Matchmaking Encryption and Its Application, IEEE Transactions on Information Forensics and Security, vol. 18, pp. 5592-5607, 2023

[J49] Axin Wu, Weiqi Luo, Anjia Yang, Yinghui Zhang, Jianhao Zhu. Efficient Bilateral Privacy-Preserving Data Collection for Mobile Crowdsensing, IEEE Transactions on Services Computing, in press, 2023

[J48] Tao Li(研究生), Anjia Yang*, Jian Weng, Min-Rong Chen, Xizhao Luo, Xiaohu Chen, and Changkun Jiang. Enabling Secure and Flexible Streaming Media with Blockchain Incentive, IEEE Internet of Things Journal, in press, 2023

[J47] Shuyuan Lin, Anjia Yang, Taotao Lai, Jian Weng, and Hanzi Wang. Multi-motion Segmentation via Co-attention Induced Heterogeneous Model Fitting, IEEE Transactions on Circuits and Systems for Video Technology, in press, 2023

[J46] Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li. VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder, IEEE Transactions on Dependable and Secure Computing, in press, 2023

[J45] Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen. Backdoor-Resistant Public Data Integrity Verification Scheme based on Smart Contracts, IEEE Internet of Things Journal, vol. 10(16), pp. 14269-14284, 2023

[J44] Lulu Han, Weiqi Luo, Yaxi Yang, Anjia Yang, Rongxing Lu, Junzuo Lai, Yandong Zheng. PPOLQ: Privacy-Preserving Optimal Location Query with Multiple-Condition Filter in Outsourced Environments, IEEE Transactions on Services Computing, vol. 16(5), pp. 3564-3577, 2023

[J43] Yaxi Yang, Jian Weng, Yao Tong, Jia-Nan Liu, Zhenghao Wu, Leo Yu Zhang, Anjia Yang. PriGenX: Privacy-preserving Query With Anonymous Access Control for Genomic Data, IEEE Transactions on Dependable and Secure Computing, in press, 2023

[J42] Yaqing Song, Yuan Zhang, Chunxiang Xu, Shiyu Li, Anjia Yang, Nan Cheng, Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution against Irresponsible Service Providers, IEEE Internet of Things Journal, vol. 10(17), pp. 15563-15580, 2023

[J41] Jiasi Weng, Jian Weng, Gui Tang, Anjia Yang, Ming Li, Jia-Nan Liu. pvCNN: Privacy-Preserving and Verifiable Convolutional Neural Network Testing, IEEE Transactions on Information Forensics and Security, vol. 18, pp. 2218-2233, 2023

[J40] Cheng Huang, Dongxiao Liu, Anjia Yang, Rongxing Lu, Xuemin (Sherman) Shen. Multi-client Secure and Efficient DPF-based Keyword Search for Cloud Storage, IEEE Transactions on Dependable and Secure Computing, in press, 2023

[J39] Xiaohu Chen(研究生), Anjia Yang*, Jian Weng, Yao Tong, Cheng Huang, Tao Li, A Blockchain-based Copyright Protection Scheme with Proactive Defense, IEEE Transactions on Services Computing, vol. 16(4), pp. 2316-2329, 2023

[J38] Zilin Liu(研究生), Anjia Yang*, Huang Zeng, Changkun Jiang, and Li Ma, A Generalized Blockchain-Based Government Data Sharing Protocol, Security and Communication Networks, in press, 2023/1/17

[J37] Lisha Yao, Jian Weng, Anjia Yang, Xiaojian Liang, Zhenghao Wu, Zike Jiang, Lin Hou, Scalable CCA-Secure Public-Key Authenticated Encryption with Keyword Search from Ideal Lattices in Cloud Computing, Information Sciences, vol. 624, pp. 777-795, 2023

[J36] Lulu Han, Weiqi Luo, Anjia Yang, Yandong Zheng, Rongxing Lu, Junzuo Lai, Yudan Cheng, Fully Privacy-preserving Location Recommendation in Outsourced Environments, Ad Hoc Networks, vol. 141, pp. 1-12, 2023

[J35] Tao Li(研究生), Anjia Yang*, Jian Weng, Yao Tong, Qingfu Pei. Concurrent and Efficient IoT Data Trading Based on Probabilistic Micropayments, Wireless Networks, vol. 29, pp.607–622, 2023

[J34] 李涛(研究生), 杨安家*, 翁健, 郭梓繁. 基于智能合约的工业互联网数据公开审计方案, 软件学报, 2023, 34(3): 1491-1511

(Tao Li (研究生), Anjia Yang*, Jian Weng, Zifan Guo. Public Auditing Scheme for Industrial Internet Data Based on Smart Contracts. Journal of Software, vol. 34(3), pp. 1491-1511(in Chinese), 2023)

[J33] Xiaohu Chen(研究生), Anjia Yang*, Yao Tong*, Jian Weng, Jiasi Weng, and Tao Li, A Multisignature-based Secure and OBU-Friendly Emergency Reporting Scheme in VANET, IEEE Internet of Things Journal, vol. 9(22), pp. 23130-23141, 2022

[J32] Axin Wu, Anjia Yang*, Weiqi Luo* and Jinghang Wen, Enabling Traceable and Verifiable Multi-user Forward Secure Searchable Encryption in Hybrid Cloud, IEEE Transactions on Cloud Computing, vol. 11(2), pp. 1886-1898, 2023

[J31] Xizhao Luo, Feng Zhou, Chongben Tao, Anjia Yang, Peiyun Zhang and Yonghua Chen. Dynamic Multitarget Detection Algorithm of Voxel Point Cloud Fusion Based on PointRCNN, IEEE Transactions on Intelligent Transportation Systems, vol. 23(11), pp. 20707-20720, 2022

[J30] Caiqin Dong, Jian Weng, Jia-Nan Liu, Anjia Yang, Zhiquan Liu, Yaxi Yang and Jianfeng Ma, Maliciously Secure and Efficient Large-Scale Genome-Wide Association Study with Multi-party Computation, IEEE Transactions on Dependable and Secure Computing, vol. 20(2), pp. 1243-1257, 2023

[J29] Jingyi Zhang, Anjia Yang*,  Qiao Hu, Gerhard P. Hancke and Zhe Liu, Revisiting Error-Correction in Pre-Commitment Distance-Bounding Protocols, IEEE Transactions on Industrial Informatics, vol. 18(10), pp. 7097-7106, 2022

[J28] Yingling Dai, Jian Weng, Anjia Yang, Shui Yu, Robert Deng, A Lightweight and Privacy-Preserving Answer Collection Scheme for Mobile Crowdsourcing, KSII Transactions on Internet and Information Systems, vol. 15(8), pp. 2827-2848, 2021

[J27] Xiang Liu, Anjia Yang*,  Cheng Huang, Yuxian Li, Tao Li, and Ming Li, Decentralized Anonymous Authentication with Fair Billing for Space-Ground Integrated Networks, IEEE Transactions on Vehicular Technology, vol. 70(8), pp. 7764-7777, 2021

[J26] Hongwei Huang, Weiqi Luo, Guoqiang Zeng, Jian Weng, Yue Zhang, and Anjia Yang, DAMIA: Leveraging Domain Adaptation as a Defense against Membership Inference Attacks, IEEE Transactions on Dependable and Secure Computing, vol. 19(5), pp.3183-3199, 2022

[J25] Anjia Yang, Dutliff Boshoff, Qiao Hu, Gerhard Hancke, Xizhao Luo, Jian Weng, Keith Mayes, and Konstantinos Markantonakis, Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns, IEEE Internet of Things Journal, vol. 8(14), pp. 11607-11620, 2021

[J24] Anjia Yang, Jian Weng, Kan Yang, Cheng Huang and Xuemin (Sherman) Shen, Delegating Authentication to Edge: A Decentralized Authentication Architecture for Vehicular Networks, IEEE Transactions on Intelligent Transportation Systems, vol. 23(2), pp. 1284-1298, 2022 (Highly Cited Paper)

[J23] Anjia Yang, Jia Xu, Jian Weng, Jianying Zhou and Duncan S. Wong, Lightweight and Privacy-Preserving Delegatable Proofs of Storage with Data Dynamics in Cloud Storage, IEEE Transactions on Cloud Computing, vol. 9(1), pp. 212-225, 2021 (Highly Cited Paper)

[J22] Qiao Hu, Yuanzhen Liu, Anjia Yang* and Gerhard Hancke, Preventing Overshadowing Attacks in Self-Jamming Audio Channels, IEEE Transactions on Dependable and Secure Computing, vol. 18(1), pp. 45-57, 2021

[J21] Yue Zhang, Jian Weng, Jiasi Weng, Lin Hou, Anjia Yang, Ming Li, Yang Xiang and Robert H. Deng, Looking Back! Using Early Versions of Android Apps as Attack Vectors, IEEE Transactions on Dependable and Secure Computing, vol. 18(2), pp. 652-666, 2021

[J20] Yunhui Zhuang, Anjia Yang*, Gerhard P. Hancke, Duncan S. Wong, Guomin Yang. Energy-Efficient Distance-Bounding with Residual Charge Computation, IEEE Transactions on Emerging Topics in Computing, vol. 8(2), pp. 365-376, 2020

[J19] Jia-Nan Liu, Xizhao Luo, Jian Weng, Anjia Yang, Xu An Wang, Ming Li and Xiaodong Lin, Enabling Efficient, Secure and Privacy-preserving Mobile Cloud Storage, IEEE Transactions on Dependable and Secure Computing, vol. 19(3), pp. 1518-1531, 2022

[J18] Jia-Nan Liu, Jian Weng, Anjia Yang, Yizhao Chen and Xiaodong Lin, Enabling Efficient and Privacy-Preserving Aggregation Communication and Function Query for Fog Computing based Smart Grid, IEEE Transactions on Smart Grid, vol. 11(1), pp. 247-257, 2020

[J17] Wenjie Yang, Jian Weng,  Xinyi Huang, and Anjia Yang, A provably secure certificateless proxy signature scheme against malicious-but-passive KGC attacks, The Computer Journal, vol. 63(8), pp. 1139–1147, 2020

[J16] Ming Li, Jian Weng, Anjia Yang, Jia-Nan Liu and Xiaodong Lin, Towards Blockchain-based Fair and Anonymous Ad Dissemination in Vehicular Networks, IEEE Transactions on Vehicular Technology, vol. 68(11), pp. 11248-11259, 2019

[J15] Anjia Yang, Jian Weng, Nan Cheng, Jianbing Ni, Xiaodong Lin and Xuemin (Sherman) Shen, DeQoS Attack: Degrading Quality of Service in VANETs and its Mitigation, IEEE Transactions on Vehicular Technology,  vol. 68(5), pp. 4834-4845, 2019

[J14] Ming Li, Jian Weng, Anjia Yang, Wei Lu, Yue Zhang, Lin Hou, Liu Jia-Nan, Yang Xiang, Robert Deng. CrowdBC: A blockchain-based decentralized framework for crowdsourcing. IEEE Transactions on Parallel and Distributed Systems, vol. 30(6), pp. 1251-1266, 2019 (Highly Cited Paper)

[J13] Wenjie Yang, Jian Weng, Anjia Yang, Congge Xie, Yaxi Yang, Notes on a provably-secure certificate-based encryption against malicious CA attacks, Information Sciences, vol. 463-464, pp. 86-91, 2018

[J12]  Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani, OTP-IoT: An ownership transfer protocol for the Internet of Things, Journal of Information Security and Applications, vol. 43, pp. 73-82, 2018

[J11] Jiajie Zhang, Jian Weng, Weiqi Luo, Jia-Nan Liu, Anjia Yang, Jiancheng Lin, Zhijun Zhang and Hailiang Li, REMT: A Real-Time End-to-End Media Data Transmission Mechanism in UAV-Aided Networks, IEEE NETWORK,  vol. 32(5), pp. 118-123, 2018

[J10] Anjia Yang, Elena Pagnin, Aikaterini Mitrokotsa, Gerhard P. Hancke, Duncan S. Wong. Two-hop Distance-Bounding Protocols: Keep your Friends Close, IEEE Transactions on Mobile Computing, vol. 17(7), pp. 1723-1736 , 2018

[J9] Anjia Yang, Yunhui Zhuang, Jian Weng*, Gerhard Hancke, Duncan S. Wong and Guomin Yang, Exploring Relationship between Indistinguishability-based and Unpredictability-Based RFID Privacy Models, Future Generation Computer Systems, vol. 82, pp. 315-326, 2018

[J8] Elena Pagnin, Anjia Yang*, Qiao Hu, Gerhard Hancke, Aikaterina Mitrokotsa, HB+DB: Distance Bounding Meets Human Based Authentication, Future Generation Computer Systems,  vol. 80, pp. 627-639, 2018

[J7] Wenjie Yang, Weiqi Luo, Xizhao Luo, Jian Weng, and Anjia Yang, Fully distributed certificateless threshold signature without random oracles, SCIENCE CHINA Information Sciences, Vol. 61, pp. 098101:1–098101:3, 2018

[J6] Wenjie Yang, Jian Weng, Weiqi Luo, Anjia Yang. Strongly unforgeable certificateless signature resisting attacks from malicious-but-passive KGC, Security and Communication Networks, pp. 1-8, 2017

[J5] Leo Yu Zhang, Yushu Zhang, Yuansheng Liu, Anjia Yang, Guanrong Chen. Security analysis of some diffusion mechanisms used in chaotic ciphers,  International Journal of Bifurcation and Chaos , vol 27(10), pp. 1750155-1:13, 2017

[J4] Anjia Yang*, Xiao Tan, Joonsang Baek, Duncan S. Wong, A New ADS-B Authentication Framework based on Efficient Hierarchical Identity-Based Signature with Batch Verification, IEEE Transactions on Services Computing, vol. 10(2), pp. 165-175, 2017

[J3] Qiao Hu, Lavinia Mihaela Dinca, Anjia Yang, Gerhard Hancke, Practical Limitation of Co-Operative RFID Jamming Methods in Environments without Accurate Signal Synchronization, Computer Networks, vol. 105, pp.224-236, 2016

[J2] Anjia Yang*, Kaitai Liang, Yunhui Zhuang, Duncan S. Wong, Xiaohua Jia, A New Unpredictability-Based RFID Forward Privacy Model and a Provably Secure Construction, Secure and Communication Networks, 2015, 8(16):2836-2849

[J1] Kaitai Liang, Man Ho Au, Joseph K Liu, Willy Susilo, Duncan S Wong, Guomin Yang, Yong Yu,  Anjia Yang, A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing, Future Generation Computer Systems, vol.52, pp.95-108, 2014 

Conferences

[C14] Huang Zeng, Anjia Yang*, Jian Weng, Minrong Chen, Fengjun Xiao*, Yi Liu, Ye Yao. Enabling Privacy-Preserving and Publicly Auditable Federated Learning, IEEE International Conference on Communications (ICC 2024), Denver, CO, USA, 9–13 June 2024 

[C13] Yi Liu, Junzuo Lai, Qi Wang, Xianrui Qin, Anjia Yang, Jian Weng. Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead, the 29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT 2023), Guangzhou, December 4-8, 2023

[C12] Cheng Huang, Anjia Yang, Dongxiao Liu, Rongxing Lu, Sherman Shen. Two-Server Private Information Retrieval with High Throughput and Logarithmic Bandwidth, IEEE/CIC International Conference on Communications in China (ICCC) , 10-12 August, Dalian, China, 2023 (best paper award)

[C11] Yuan Chen(研究生), Anjia Yang, Zilin Liu, Qingfu Pei, Li Ma, A Crosschain-based Fair Exchange of Products for Poverty Alleviation, 19th International Computer Conference on Wavelet Active Media Technology and Information Processing, Chengdu, China, 2022

[C10] Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, and Shun Hu, Fusion: Efficient and Secure Inference Resilient to Malicious Servers, Network and Distributed System Security  Symposium (NDSS 2023), 2023

[C9] Xiaojian Liang, Jian Weng, Anjia Yang, Lisha Yao, Zike Jiang, Zhenghao Wu, Attribute-Based Conditional Proxy Re-Encryption in the Standard Model under LWE, The 26st European Symposium on Research in Computer Security (ESORICS 2021),  LNCS 12973, pp. 147-168, Darmstadt, Germany, 2021

[C8] Zhenghao Wu, Jian Weng, Anjia Yang, Lisha Yao, Xiaojian Liang, Zike Jiang, Jinghang Wen, Efficient and Fully Secure Lattice-based IBE with Equality Test, Proceedings of the 23th International Conference on Information and Communications Security (ICICS 2021), LNCS 12919, pp. 301–318, Chongqing, China, 2021

[C7] Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen, Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors, 16th International Conference on Information Security and Cryptology (Inscrypt 2020), LNCS 12612, pp. 202-220, Guangzhou, China, 2020

[C6] Jingyi Zhang, Anjia Yang, Qiao Hu and Gerhard P. Hancke, Security Implications of Implementing Multistate Distance-Bounding Protocols, ACM Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC '19), in conjunction with ACM CCS'19

[C5] Jia Xu*, Anjia Yang*, Jianying Zhou, Duncan S. Wong, Lightweight Delegatable Proofs of Storage, 21st European Symposium on Research in Computer Security (ESORICS 2016), 324-343, Heraklion, Greece, 2016 

[C4] Elena Pagnin, Anjia Yang, Gerhard Hancke, Katerina Mitrokotsa, Short: HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding, 8th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2015), 3:1-3:6, New York, USA, 2015

[C3] Yunhui Zhuang, Anjia Yang, Duncan S. Wong, Guomin Yang, Qi Xie, A Highly Efficient RFID Distance Bounding Protocol Without Real-time PRF Evaluation, Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 451-464 Madrid, Spain, 2013

[C2] Anjia Yang*,Yunhui Zhuang,Duncan S. Wong,Guomin Yang,A New Unpredictability-Based RFID Privacy Model,Proceedings of the 7th International Conference on Network and System Security (NSS 2013), 479-492, Madrid, Spain, 2013

[C1] Anjia Yang*, Yunhui Zhuang, Duncan S. Wong, An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy, Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012), 285-292, Hong Kong, 2012