What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kan Yang
Google Scholar
ORCID:
0000-0003-4234-9596
11
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
Shiyu Li
Yuan Zhang
Yaqing Song
Fan Wu
Feng Lyu
Kan Yang
Qiang Tang
2025
conf/acisp
Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning.
Sheldon C. Ebron Jr.
Meiying Zhang
Kan Yang
2024
journals/tifs
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery.
Shiyu Li
Yuan Zhang
Yaqing Song
Hongbo Liu
Nan Cheng
Dahai Tao
Hongwei Li
Kan Yang
2024
conf/asiaccs
SilentProof: Anonymous Authentication with Blockchain-Backed Offloading.
Jamal Mosakheil
Kan Yang
2023
journals/tifs
Efficient and Provably Secure Data Selective Sharing and Acquisition in Cloud-Based Systems.
Kan Yang
Jiangang Shu
Ruitao Xie
2020
journals/tifs
VerifyNet: Secure and Verifiable Federated Learning.
Guowen Xu
Hongwei Li
Sen Liu
Kan Yang
Xiaodong Lin
2020
conf/acsac
Secure and Verifiable Inference in Deep Neural Networks.
Guowen Xu
Hongwei Li
Hao Ren
Jianfei Sun
Shengmin Xu
Jianting Ning
Haomiao Yang
Kan Yang
Robert H. Deng
2019
journals/tifs
Enabling Efficient and Geometric Range Query With Access Control Over Encrypted Spatial Data.
Guowen Xu
Hongwei Li
Yuanshun Dai
Kan Yang
Xiaodong Lin
2017
journals/compsec
Achieving efficient and privacy-preserving truth discovery in crowd sensing systems.
Guowen Xu
Hongwei Li
Chen Tan
Dongxiao Liu
Yuanshun Dai
Kan Yang
2013
journals/tifs
DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems.
Kan Yang
Xiaohua Jia
Kui Ren
Bo Zhang
Ruitao Xie
2013
conf/ccs
Attribute-based fine-grained access control with efficient revocation in cloud storage systems.
Kan Yang
Xiaohua Jia
Kui Ren
Coauthors
Bo Zhang
(1)
Chen Tan
(1)
Dahai Tao
(1)
Dongxiao Liu
(1)
Fan Wu
(1)
Feng Lyu
(1)
Guowen Xu
(4)
Hao Ren
(1)
Haomiao Yang
(1)
Hongbo Liu
(1)
Hongwei Li
(5)
Jamal Mosakheil
(1)
Jianfei Sun
(1)
Jiangang Shu
(1)
Jianting Ning
(1)
Kan Yang
(11)
Kui Ren
(2)
Meiying Zhang
(1)
Nan Cheng
(1)
Qiang Tang
(1)
Robert H. Deng
(1)
Ruitao Xie
(2)
Sen Liu
(1)
Sheldon C. Ebron Jr.
(1)
Shengmin Xu
(1)
Shiyu Li
(2)
Xiaodong Lin
(2)
Xiaohua Jia
(2)
Yaqing Song
(2)
Yuan Zhang
(2)
Yuanshun Dai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to