default search action
Pu Duan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Yange Chen, Baocang Wang, Hang Jiang, Pu Duan, Yuan Ping, Zhiyong Hong:
PEPFL: A framework for a practical and efficient privacy-preserving federated learning. Digit. Commun. Networks 10(2): 355-368 (2024) - [j20]Wenjing Fang, Shunde Cao, Guojin Hua, Junming Ma, Yongqiang Yu, Qunshan Huang, Jun Feng, Jin Tan, Xiaopeng Zan, Pu Duan, Yang Yang, Li Wang, Ke Zhang, Lei Wang:
SecretFlow-SCQL: A Secure Collaborative Query pLatform. Proc. VLDB Endow. 17(12): 3987-4000 (2024) - [j19]Baocang Wang, Yange Chen, Furong Li, Jian Song, Rongxing Lu, Pu Duan, Zhihong Tian:
Privacy-Preserving Convolutional Neural Network Classification Scheme With Multiple Keys. IEEE Trans. Serv. Comput. 17(1): 322-335 (2024) - [i7]Jiabo Wang, Elmo Xuyun Huang, Pu Duan, Huaxiong Wang, Kwok-Yan Lam:
PSA: Private Set Alignment for Secure and Collaborative Analytics on Large-Scale Data. CoRR abs/2410.04746 (2024) - 2023
- [j18]Wenju Xu, Baocang Wang, Yupu Hu, Pu Duan, Benyu Zhang, Momeng Liu:
Multi-key Fully Homomorphic Encryption from Additive Homomorphism. Comput. J. 66(1): 197-207 (2023) - [j17]Wenju Xu, Baocang Wang, Quanbo Qu, Tanping Zhou, Pu Duan:
Modified Multi-Key Fully Homomorphic Encryption Scheme in the Plain Model. Comput. J. 66(10): 2355-2364 (2023) - [j16]Shilei Li, Peihu Duan, Dawei Shi, Wulin Zou, Pu Duan, Ling Shi:
Compact Maximum Correntropy-Based Error State Kalman Filter for Exoskeleton Orientation Estimation. IEEE Trans. Control. Syst. Technol. 31(2): 913-920 (2023) - 2022
- [j15]Yange Chen, Qingqing Zhao, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
Verifiable privacy-preserving association rule mining using distributed decryption mechanism on the cloud. Expert Syst. Appl. 201: 117086 (2022) - [j14]Furong Li, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Yupu Hu, Baocang Wang:
Privacy-preserving convolutional neural network prediction with low latency and lightweight users. Int. J. Intell. Syst. 37(1): 568-595 (2022) - [j13]Yange Chen, SuYu He, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong, Yuan Ping:
Cryptanalysis and Improvement of DeepPAR: Privacy-Preserving and Asynchronous Deep Learning for Industrial IoT. IEEE Internet Things J. 9(21): 21958-21970 (2022) - [j12]Yu Zhan, Danfeng Shen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
MDOPE: Efficient multi-dimensional data order preserving encryption scheme. Inf. Sci. 595: 334-343 (2022) - [j11]Wenju Xu, Baocang Wang, Jiasen Liu, Yange Chen, Pu Duan, Zhiyong Hong:
Toward practical privacy-preserving linear regression. Inf. Sci. 596: 119-136 (2022) - [j10]Xiaoying Shen, Baocang Wang, Licheng Wang, Pu Duan, Benyu Zhang:
Group public key encryption supporting equality test without bilinear pairings. Inf. Sci. 605: 202-224 (2022) - [j9]Songyang Wu, Wenju Xu, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. Peer-to-Peer Netw. Appl. 15(2): 1076-1089 (2022) - [j8]Shilei Li, Lijing Li, Dawei Shi, Wulin Zou, Pu Duan, Ling Shi:
Multi-Kernel Maximum Correntropy Kalman Filter for Orientation Estimation. IEEE Robotics Autom. Lett. 7(3): 6693-6700 (2022) - [j7]Qinyu Mao, Yange Chen, Pu Duan, Benyu Zhang, Zhiyong Hong, Baocang Wang:
Privacy-Preserving Classification Scheme Based on Support Vector Machine. IEEE Syst. J. 16(4): 5906-5916 (2022) - [j6]Yange Chen, Qinyu Mao, Baocang Wang, Pu Duan, Benyu Zhang, Zhiyong Hong:
Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis. IEEE J. Biomed. Health Informatics 26(7): 3342-3353 (2022) - [j5]Yu Zhan, Liguo Zhou, Baocang Wang, Pu Duan, Benyu Zhang:
Efficient Function Queryable and Privacy Preserving Data Aggregation Scheme in Smart Grid. IEEE Trans. Parallel Distributed Syst. 33(12): 3430-3441 (2022) - [c6]Wulin Zou, Xiang Chen, Shilei Li, Pu Duan, Ningbo Yu, Ling Shi:
Multi-Objective Admittance Control: An LMI-Based Method. ICARM 2022: 754-759 - [c5]Sihui Liu, Pu Duan, Jianda Han, Ningbo Yu:
Design and Evaluation of a Low Friction Rigid-Soft Hybrid Mechanism for Hand Exoskeletons with Finite Element Analysis. ROBIO 2022: 884-889 - [i6]Jian Du, Tianxi Ji, Jamie Cui, Lei Zhang, Yufei Lu, Pu Duan:
DP-PSI: Private and Secure Set Intersection. CoRR abs/2208.13249 (2022) - 2021
- [j4]Zhiyong Hong, Zhili Zhang, Pu Duan, Benyu Zhang, Baocang Wang, Wen Gao, Zhen Zhao:
Secure Privacy-Preserving Association Rule Mining With Single Cloud Server. IEEE Access 9: 165090-165102 (2021) - 2020
- [c4]Pu Duan:
Introduction to Secure Collaborative Intelligence (SCI) Lab. PPMLP@CCS 2020: 1 - [c3]Wulin Zou, Pu Duan, Yawen Chen, Ningbo Yu, Ling Shi:
Variable Stiffness Control with Strict Frequency Domain Constraints for Physical Human-Robot Interaction. IROS 2020: 7146-7151 - [i5]Wulin Zou, Pu Duan, Yawen Chen, Ningbo Yu, Ling Shi:
Variable Stiffness Control with Strict Frequency Domain Constraints for Physical Human-Robot Interaction. CoRR abs/2008.03663 (2020)
2010 – 2019
- 2012
- [j3]Weiqin Ma, Pu Duan, Sanmin Liu, Guofei Gu, Jyh-Charn Liu:
Shadow attacks: automatically evading system-call-behavior based malware detection. J. Comput. Virol. 8(1-2): 1-13 (2012) - 2011
- [i4]Shi Pu, Pu Duan, Jyh-Charn Liu:
Fastplay-A Parallelization Model and Implementation of SMC on CUDA based GPU Cluster Architecture. IACR Cryptol. ePrint Arch. 2011: 97 (2011) - 2010
- [i3]Pu Duan, Sanmin Liu, Weiqin Ma, Guofei Gu, Jyh-Charn Liu:
Privacy-Preserving Matching Protocols for Attributes and Strings. IACR Cryptol. ePrint Arch. 2010: 61 (2010)
2000 – 2009
- 2007
- [j2]Shi Cui, Pu Duan, Choong Wah Chan, Xiangguo Cheng:
An Efficient Identity-based Signature Scheme and Its Applications. Int. J. Netw. Secur. 5(1): 89-98 (2007) - 2006
- [c2]Shi Cui, Pu Duan, Choong Wah Chan:
An efficient identity-based signature scheme with batch verifications. Infoscale 2006: 22 - 2005
- [j1]Shi Cui, Pu Duan, Choong Wah Chan:
A Method for Building More Non-supersingular Elliptic Curves Suitable for Pairing-based Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(9): 2468-2470 (2005) - [c1]Shi Cui, Pu Duan, Choong Wah Chan:
A New Method of Building More Non-supersingular Elliptic Curves. ICCSA (2) 2005: 657-664 - [i2]Pu Duan, Shi Cui, Choong Wah Chan:
Effective Polynomial Families for Generating More Pairing-Friendly Elliptic Curves. IACR Cryptol. ePrint Arch. 2005: 236 (2005) - [i1]Pu Duan, Shi Cui, Choong Wah Chan:
Special Polynomial Families for Generating More Suitable Elliptic Curves for Pairing-Based Cryptosystems. IACR Cryptol. ePrint Arch. 2005: 342 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:53 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint