Naive bayes software defect prediction model T Wang, W Li 2010 International conference on computational intelligence and software …, 2010 | 148 | 2010 |
Software defect prediction based on classifiers ensemble T Wang, W Li, H Shi, Z Liu Journal of Information & Computational Science 8 (16), 4241-4254, 2011 | 105 | 2011 |
Blockchain-based searchable encryption with efficient result verification and fair payment H Li, T Wang, Z Qiao, B Yang, Y Gong, J Wang, G Qiu Journal of Information Security and Applications 58, 102791, 2021 | 26 | 2021 |
An efficient certificate-based aggregate signature scheme with provable security for Industrial Internet of Things Z Qiao, Q Yang, Y Zhou, B Yang, Z Xia, M Zhang, T Wang IEEE Systems Journal 17 (1), 72-82, 2022 | 17 | 2022 |
A non-interactive attribute-based access control scheme by blockchain for IoT Q Yang, M Zhang, Y Zhou, T Wang, Z Xia, B Yang Electronics 10 (15), 1855, 2021 | 17 | 2021 |
Research on applicability of SVM kernel functions used in binary classification Y Bao, T Wang, G Qiu Proceedings of International Conference on Computer Science and Information …, 2014 | 16 | 2014 |
Secure and efficient certificate-based proxy signature schemes for industrial internet of things Z Qiao, Y Zhou, B Yang, M Zhang, T Wang, Z Xia IEEE Systems Journal 16 (3), 4719-4730, 2021 | 15 | 2021 |
Continuous leakage-resilient identity-based encryption with tight security Y Zhou, B Yang, H Hou, L Zhang, T Wang, M Hu The Computer Journal 62 (8), 1092-1105, 2019 | 14 | 2019 |
An efficient verifiable searchable encryption scheme with aggregating authorization for blockchain-enabled IoT T Wang, J Wang, Q Yang, B Yang, H Li, F Xu, Z Qiao IEEE Internet of Things Journal 9 (20), 20666-20680, 2022 | 9 | 2022 |
PrivCrowd: A Secure BlockchainBased Crowdsourcing Framework with FineGrained Worker Selection Q Yang, T Wang, W Zhang, B Yang, Y Yu, H Li, J Wang, Z Qiao Wireless Communications and Mobile Computing 2021 (1), 3758782, 2021 | 9 | 2021 |
Anonymous and updatable identity-based hash proof system Y Zhou, B Yang, Z Xia, Y Mu, T Wang IEEE Systems Journal 13 (3), 2818-2829, 2018 | 9 | 2018 |
ABCrowdMed: A fine-grained worker selection scheme for crowdsourcing healthcare with privacy-preserving J Li, T Wang, B Yang, Q Yang, W Zhang, K Hong IEEE Transactions on Services Computing, 2023 | 8 | 2023 |
An alternative approach to public cloud data auditing supporting data dynamics T Wang, B Yang, H Liu, Y Yu, G Qiu, Z Xia Soft Computing 23, 4939-4953, 2019 | 7 | 2019 |
Continuous leakage-resilient certificate-based encryption scheme without bilinear pairings Y Zhou, B Yang, T Wang, Z Xia, H Hou The Computer Journal 63 (4), 508-524, 2020 | 5 | 2020 |
Identitybased encryption resilient to continuous key leakage Y Zhou, B Yang, Y Mu, T Wang, X Wang IET Information Security 13 (5), 426-434, 2019 | 5 | 2019 |
RBAC Permission Consistency Static Analysis Framework T Wang, W Li, Z Liu 2010 International Conference on Multimedia Information Networking and …, 2010 | 5 | 2010 |
Modularbased secret image sharing in Internet of Things: A global progressiveenabled approach L Zhang, X Zheng, K Yu, W Li, T Wang, X Dang, B Yang Concurrency and Computation: Practice and Experience 34 (16), e6000, 2022 | 4 | 2022 |
Novel updatable identity-based hash proof system and its applications Y Zhou, B Yang, T Wang, Y Mu Theoretical Computer Science 804, 1-28, 2020 | 4 | 2020 |
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records Z Chen, L Deng, Y Ruan, S Feng, T Wang, B Wang The Computer Journal 67 (2), 617-631, 2024 | 3 | 2024 |
An approach enabling various queries on encrypted industrial data stream T Wang, B Yang, G Qiu, L Zhang, Y Yu, Y Zhou, J Guo Security and Communication Networks 2019 (1), 6293970, 2019 | 3 | 2019 |