关注
Tao Wang
标题
引用次数
引用次数
年份
Naive bayes software defect prediction model
T Wang, W Li
2010 International conference on computational intelligence and software …, 2010
1482010
Software defect prediction based on classifiers ensemble
T Wang, W Li, H Shi, Z Liu
Journal of Information & Computational Science 8 (16), 4241-4254, 2011
1052011
Blockchain-based searchable encryption with efficient result verification and fair payment
H Li, T Wang, Z Qiao, B Yang, Y Gong, J Wang, G Qiu
Journal of Information Security and Applications 58, 102791, 2021
262021
An efficient certificate-based aggregate signature scheme with provable security for Industrial Internet of Things
Z Qiao, Q Yang, Y Zhou, B Yang, Z Xia, M Zhang, T Wang
IEEE Systems Journal 17 (1), 72-82, 2022
172022
A non-interactive attribute-based access control scheme by blockchain for IoT
Q Yang, M Zhang, Y Zhou, T Wang, Z Xia, B Yang
Electronics 10 (15), 1855, 2021
172021
Research on applicability of SVM kernel functions used in binary classification
Y Bao, T Wang, G Qiu
Proceedings of International Conference on Computer Science and Information …, 2014
162014
Secure and efficient certificate-based proxy signature schemes for industrial internet of things
Z Qiao, Y Zhou, B Yang, M Zhang, T Wang, Z Xia
IEEE Systems Journal 16 (3), 4719-4730, 2021
152021
Continuous leakage-resilient identity-based encryption with tight security
Y Zhou, B Yang, H Hou, L Zhang, T Wang, M Hu
The Computer Journal 62 (8), 1092-1105, 2019
142019
An efficient verifiable searchable encryption scheme with aggregating authorization for blockchain-enabled IoT
T Wang, J Wang, Q Yang, B Yang, H Li, F Xu, Z Qiao
IEEE Internet of Things Journal 9 (20), 20666-20680, 2022
92022
PrivCrowd: A Secure BlockchainBased Crowdsourcing Framework with FineGrained Worker Selection
Q Yang, T Wang, W Zhang, B Yang, Y Yu, H Li, J Wang, Z Qiao
Wireless Communications and Mobile Computing 2021 (1), 3758782, 2021
92021
Anonymous and updatable identity-based hash proof system
Y Zhou, B Yang, Z Xia, Y Mu, T Wang
IEEE Systems Journal 13 (3), 2818-2829, 2018
92018
ABCrowdMed: A fine-grained worker selection scheme for crowdsourcing healthcare with privacy-preserving
J Li, T Wang, B Yang, Q Yang, W Zhang, K Hong
IEEE Transactions on Services Computing, 2023
82023
An alternative approach to public cloud data auditing supporting data dynamics
T Wang, B Yang, H Liu, Y Yu, G Qiu, Z Xia
Soft Computing 23, 4939-4953, 2019
72019
Continuous leakage-resilient certificate-based encryption scheme without bilinear pairings
Y Zhou, B Yang, T Wang, Z Xia, H Hou
The Computer Journal 63 (4), 508-524, 2020
52020
Identitybased encryption resilient to continuous key leakage
Y Zhou, B Yang, Y Mu, T Wang, X Wang
IET Information Security 13 (5), 426-434, 2019
52019
RBAC Permission Consistency Static Analysis Framework
T Wang, W Li, Z Liu
2010 International Conference on Multimedia Information Networking and …, 2010
52010
Modularbased secret image sharing in Internet of Things: A global progressiveenabled approach
L Zhang, X Zheng, K Yu, W Li, T Wang, X Dang, B Yang
Concurrency and Computation: Practice and Experience 34 (16), e6000, 2022
42022
Novel updatable identity-based hash proof system and its applications
Y Zhou, B Yang, T Wang, Y Mu
Theoretical Computer Science 804, 1-28, 2020
42020
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records
Z Chen, L Deng, Y Ruan, S Feng, T Wang, B Wang
The Computer Journal 67 (2), 617-631, 2024
32024
An approach enabling various queries on encrypted industrial data stream
T Wang, B Yang, G Qiu, L Zhang, Y Yu, Y Zhou, J Guo
Security and Communication Networks 2019 (1), 6293970, 2019
32019
系统目前无法执行此操作,请稍后再试。
文章 1–20