An algorithm for minimizing a linear objective function subject to the fuzzy relation inequalities with addition–min composition SJ Yang Fuzzy Sets and Systems 255, 41-51, 2014 | 105 | 2014 |
Fuzzy relation inequalities about the data transmission mechanism in BitTorrent-like Peer-to-Peer file sharing systems JX Li, SJ Yang 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012 | 89 | 2012 |
Some results of the fuzzy relation inequalities with addition–min composition SJ Yang IEEE Transactions on Fuzzy Systems 26 (1), 239-245, 2018 | 28 | 2018 |
A new design of online/offline signatures based on lattice M Zheng, SJ Yang, W Wu, J Shao, X Huang Information Security Practice and Experience: 14th International Conference …, 2018 | 11 | 2018 |
The relationship between L-subuniverses and L-convexities Y Zhong, SJ Yang, FG Shi Journal of Intelligent and Fuzzy Systems 33 (6), 3363-3372, 2017 | 11 | 2017 |
M-fuzzifying independence spaces SJ Yang, FG Shi Journal of Intelligent and Fuzzy Systems 34 (1), 11-21, 2018 | 10 | 2018 |
M-fuzzifying matroids induced by M-fuzzifying closure operators X Xin, SJ Yang Iranian Journal of Fuzzy Systems 14 (3), 139-149, 2017 | 8 | 2017 |
Linearly homomorphic signatures from lattices CJ Lin, R Xue, SJ Yang, X Huang, S Li The Computer Journal 63 (12), 1871-1885, 2020 | 7 | 2020 |
Universal product learning with errors: A new variant of LWE for lattice-based cryptography S Yang, X Huang Theoretical Computer Science 915, 90-100, 2022 | 6 | 2022 |
Bases and circuits of fuzzifying matroids SJ Yang, FG Shi Iranian Journal of Fuzzy Systems 15 (2), 41-52, 2018 | 6* | 2018 |
Lattice-equivalence of convex spaces C Shen, SJ Yang, D Zhao, FG Shi Algebra universalis 80 (3), 26, 2019 | 5 | 2019 |
Linearly homomorphic signatures with designated entities CJ Lin, X Huang, S Li, W Wu, SJ Yang Information Security Practice and Experience: 13th International Conference …, 2017 | 5 | 2017 |
Certain types ofM-fuzzifying matroids: A fundamental look at the security protocols in RFID and IoT SJ Yang, X Huang Future Generation Computer Systems 86, 582-590, 2018 | 4 | 2018 |
Inner product encryption from ring learning with errors S Fang, S Yang, Y Zhang Cybersecurity 3, 1-11, 2020 | 3 | 2020 |
A lattice-based redactable signature scheme using cryptographic accumulators for trees Y Zhao, S Yang, W Wu, X Huang The Computer Journal 66 (12), 2961-2973, 2023 | 2 | 2023 |
Ring trapdoor redactable signatures from lattice S Yang, X Huang, M Zheng, J Ma Information Security Practice and Experience: 16th International Conference …, 2021 | 2 | 2021 |
Inner product encryption from middle-product learning with errors N Yang, S Yang, Y Zhao, W Wu International Symposium on Security and Privacy in Social Networks and Big …, 2022 | 1 | 2022 |
Lattice-based dynamic universal accumulator: Design and application Y Zhao, S Yang, X Huang Computer Standards & Interfaces 89, 103807, 2024 | | 2024 |
New tag-based signatures and their applications on linearly homomorphic signatures C Lin, R Xue, X Huang, S Yang Computer Standards & Interfaces 88, 103804, 2024 | | 2024 |
A Traceable Universal Designated Verifier Transitive Signature Scheme S Hou, C Lin, S Yang Information 15 (1), 43, 2024 | | 2024 |