• 103 Citations
  • 6 h-Index
20102021
If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Qiang Tang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 6 Similar Profiles
Cryptography Engineering & Materials Science
Encryption Mathematics
Servers Engineering & Materials Science
Electronic document identification systems Engineering & Materials Science
Keyword Search Mathematics
Data Sharing Mathematics
Exponentiation Mathematics
Access control Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2018 2021

Research Output 2010 2019

  • 103 Citations
  • 6 h-Index
  • 19 Conference contribution
  • 2 Article
  • 1 Chapter

Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog

Chow, S. S. M., Russell, A., Tang, Q., Yung, M., Zhao, Y. & Zhou, H. S., Jan 1 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Lin, D. & Sako, K. (eds.). Springer Verlag, p. 221-251 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11442 LNCS).

New Jersey Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Black-box testing

On enabling machine learning tasks atop public blockchains: A crowdsourcing approach

Lu, Y., Tang, Q. & Wang, G., Feb 7 2019, Proceedings - 18th IEEE International Conference on Data Mining Workshops, ICDMW 2018. Zhu, F., Li, Z., Yu, J. & Tong, H. (eds.). IEEE Computer Society, p. 81-88 8 p. 8637413. (IEEE International Conference on Data Mining Workshops, ICDMW; vol. 2018-November).

New Jersey Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning systems
Network protocols
Subroutines
Ecosystems

Censorship resistant decentralized IoT management systems

He, S., Tang, Q. & Wu, C., Nov 5 2018, Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Mobiquitous 2018. Association for Computing Machinery, p. 454-459 6 p. (ACM International Conference Proceeding Series).

New Jersey Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Servers
Network protocols
Communication
Processing
2 Citations (Scopus)

Correcting subverted random oracles

Russell, A., Tang, Q., Yung, M. & Zhou, H. S., Jan 1 2018, Advances in Cryptology – CRYPTO 2018 - 38th Annual International Cryptology Conference, 2018, Proceedings. Boldyreva, A. & Shacham, H. (eds.). Springer Verlag, p. 241-271 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10992 LNCS).

New Jersey Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sampling
Testing

Enabling efficient and fine-grained DNA similarity search with access control over encrypted cloud data

Li, H., Xu, G., Tang, Q., Lin, X. & Shen, X. S., Jan 1 2018, Wireless Algorithms, Systems, and Applications - 13th International Conference, WASA 2018, Proceedings. Cheng, W., Li, W. & Chellappan, S. (eds.). Springer Verlag, p. 236-248 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10874 LNCS).

New Jersey Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
DNA
DNA sequences
Genes
Approximation algorithms