G
Geng Yang
Researcher at Nanjing University of Posts and Telecommunications
Publications - 102
Citations - 828
Geng Yang is an academic researcher from Nanjing University of Posts and Telecommunications. The author has contributed to research in topics: Encryption & Cloud computing. The author has an hindex of 14, co-authored 84 publications receiving 667 citations. Previous affiliations of Geng Yang include Nanjing University & Beijing University of Posts and Telecommunications.
Papers
More filters
Journal ArticleDOI
Attribute-Based Access Control with Constant-Size Ciphertext in Cloud Computing
TL;DR: The proposed hierarchical attribute-based access control scheme with constant-size ciphertext is efficient, scalable, and fine-grained in dealing with access control for outsourced data in cloud computing.
Journal ArticleDOI
VP2RQ: Efficient verifiable privacy-preserving range query processing in two-tiered wireless sensor networks:
TL;DR: Both the theoretical analysis and experimental results show that verifiable privacy-preserving range query is capable of protecting the privacy sensor data, query result, and query range, which also supports the completeness verification of the query result.
Journal ArticleDOI
Identity-based key agreement and encryption for wireless sensor networks
TL;DR: This article presents an identity-based key agreement and encryption scheme for WSNs that is an elliptic curve cryptography type algorithm and discusses the efficiency and security of this scheme by comparing it with traditional public key technique and symmetric key technique.
Journal ArticleDOI
Collaborative representation based local discriminant projection for feature extraction
TL;DR: Experimental results on ORL, AR and CMU PIE face databases validate the superiority of CRLDP over other state-of-the-art algorithms.
Journal ArticleDOI
Fuzzy Linear Regression Discriminant Projection for Face Recognition
TL;DR: The proposed algorithm FLRDP seeks to generate an efficient subspace for the LRC method and could effectively handle variations between facial images and demonstrates the superiority of the proposed method over other state-of-the-art algorithms.