Personal information

Verified email domains

cryptography
China

Activities

Employment (2)

Peng Cheng Laboratory: Shenzhen, CN

2019-09-10 to present
Employment
Source: Self-asserted source
Haiyan Wang

Shenzhen University: Shenzhen, CN

2017-09-10 to 2019-09-09 (College of Computer Science and Software Engineering)
Employment
Source: Self-asserted source
Haiyan Wang

Education and qualifications (2)

Chinese Academy of Sciences: Beijing, CN

2013-09-01 to 2017-07-01 (Institute of Information Engineering, State Key Laboratory of Information Security)
Education
Source: Self-asserted source
Haiyan Wang

Dalian University of Technology: Dalian, CN

2008-09-01 to 2011-07-01
Education
Source: Self-asserted source
Haiyan Wang

Works (12)

PAC-MC: An Efficient Password-Based Access Control Framework for Time Sequence Aware Media Cloud

IEEE Transactions on Mobile Computing
2025 | Journal article
Contributors: Haiyan Wang; Penghui Liu; Xiaoxiong Zhong; Fucai Luo; Bin Xiao; Yuanyuan Yang
Source: check_circle
Crossref

Key-Policy Attribute-Based Encryption With Switchable Attributes for Fine-Grained Access Control of Encrypted Data

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Fucai Luo; Haiyan Wang; Xingfu Yan; Jiahui Wu
Source: check_circle
Crossref

Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds

IEEE Transactions on Information Forensics and Security
2024 | Journal article
Contributors: Fucai Luo; Haiyan Wang; Willy Susilo; Xingfu Yan; Xiaofan Zheng
Source: check_circle
Crossref

Re-PAEKS: Public-Key Authenticated Re-Encryption With Keyword Search

IEEE Transactions on Mobile Computing
2024-10 | Journal article
Contributors: Fucai Luo; Haiyan Wang; Xingfu Yan
Source: check_circle
Crossref

Threat intelligence named entity recognition techniques based on few-shot learning

Array
2024-09 | Journal article
Contributors: Haiyan Wang; Weimin Yang; Wenying Feng; Liyi Zeng; Zhaoquan Gu
Source: check_circle
Crossref

Fully collusion resistant trace-and-revoke functional encryption for arbitrary identities

Theoretical Computer Science
2024-03 | Journal article
Contributors: Fucai Luo; Saif Al-Kuwari; Haiyan Wang; Xingfu Yan
Source: check_circle
Crossref

Comments on “VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning”

IEEE Transactions on Dependable and Secure Computing
2024-01 | Journal article
Contributors: Fucai Luo; Haiyan Wang; Xingfu Yan
Source: check_circle
Crossref

ABAEKS: Attribute-Based Authenticated Encryption With Keyword Search Over Outsourced Encrypted Data

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Fucai Luo; Haiyan Wang; Changlu Lin; Xingfu Yan
Source: check_circle
Crossref

Multi-key Fully Homomorphic Encryption without CRS from RLWE

Computer Standards & Interfaces
2023-08 | Journal article
Contributors: Fucai Luo; Haiyan Wang; Al-Kuwari Saif; Weihong Han
Source: check_circle
Crossref

Revocable attribute-based encryption from standard lattices

Computer Standards & Interfaces
2023-03 | Journal article
Contributors: Fucai Luo; Saif Al-Kuwari; Haiyan Wang; Fuqun Wang; Kefei Chen
Source: check_circle
Crossref

A fast and flexible attribute-based searchable encryption scheme supporting multi-search mechanism in cloud computing

Computer Standards & Interfaces
2022-08 | Journal article
Contributors: Haiyan Wang; Yuan Li; Willy Susilo; Dung Hoang Duong; Fucai Luo
Source: check_circle
Crossref

An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Collaborative Decryption With Blockchain

IEEE Internet of Things Journal
2022-02-15 | Journal article
Contributors: Ying He; Haiyan Wang; Yuan Li; Ke Huang; Victor C. M. Leung; F. Richard Yu; Zhong Ming
Source: check_circle
Crossref

Peer review (2 reviews for 2 publications/grants)

Review activity for Neural computing & applications. (1)
Review activity for The journal of supercomputing. (1)