Secure multi-party computation: theory, practice and applications C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan Information Sciences 476, 357-372, 2019 | 356 | 2019 |
Forward private searchable symmetric encryption with optimized I/O efficiency X Song, C Dong, D Yuan, Q Xu, M Zhao IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018 | 159 | 2018 |
Blockchain-based fair payment smart contract for public cloud storage auditing H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo Information Sciences 519, 348-362, 2020 | 154 | 2020 |
Rational protocols and attacks in blockchain system T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang Security and communication networks 2020 (1), 8839047, 2020 | 76 | 2020 |
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing H Wang, D He, J Shen, Z Zheng, C Zhao, M Zhao Soft Computing 21, 7325-7335, 2017 | 56 | 2017 |
Randomness invalidates criminal smart contracts Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao Information Sciences 477, 291-301, 2019 | 49 | 2019 |
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions Z Liu, KKR Choo, M Zhao Computers & Security 69, 97-113, 2017 | 45 | 2017 |
Secure computation protocols under asymmetric scenarios in enterprise information system Y Wang, M Zhao, Y Hu, Y Gao, X Cui Enterprise Information Systems 15 (4), 492-512, 2021 | 29 | 2021 |
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang, ASV Koe Information Sciences 601, 1-17, 2022 | 24 | 2022 |
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage C Hu, Y Xu, P Liu, J Yu, S Guo, M Zhao Information Sciences 520, 15-30, 2020 | 22 | 2020 |
Efficient and secure outsourced approximate pattern matching protocol X Wei, M Zhao, Q Xu Soft Computing 22, 1175-1187, 2018 | 17 | 2018 |
Multi-user searchable encryption with a designated server Z Li, M Zhao, H Jiang, Q Xu Annals of Telecommunications 72, 617-629, 2017 | 17 | 2017 |
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems Y Wang, Z Wang, G Yang, S Ai, X Xiang, C Chen, M Zhao Digital Communications and Networks 9 (5), 1053-1060, 2023 | 15 | 2023 |
An ORAM-based privacy preserving data sharing scheme for cloud storage D Yuan, X Song, Q Xu, M Zhao, X Wei, H Wang, H Jiang Journal of information security and applications 39, 1-9, 2018 | 15 | 2018 |
Memory-efficient Transformer-based network model for Traveling Salesman Problem H Yang, M Zhao, L Yuan, Y Yu, Z Li, M Gu Neural Networks 161, 589-597, 2023 | 14 | 2023 |
Label‐only membership inference attacks on machine unlearning without dependence of posteriors Z Lu, H Liang, M Zhao, Q Lv, T Liang, Y Wang International Journal of Intelligent Systems 37 (11), 9424-9441, 2022 | 13 | 2022 |
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial M Zhao, C Hu, X Song, C Zhao Journal of Network and Computer Applications 131, 55-65, 2019 | 12 | 2019 |
Cut-and-choose bilateral oblivious transfer and its application C Zhao, H Jiang, X Wei, Q Xu, M Zhao 2015 IEEE Trustcom/BigDataSE/ISPA 1, 384-391, 2015 | 12 | 2015 |
Keyword guessing on multi-user searchable encryption Z Li, M Zhao, H Jiang, Q Xu International Journal of High Performance Computing and Networking 14 (1), 60-68, 2019 | 11 | 2019 |
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer X Wei, L Xu, M Zhao, H Wang Information Sciences 529, 132-140, 2020 | 10 | 2020 |