Significant permission identification for machine-learning-based android malware detection J Li, L Sun, Q Yan, Z Li, W Srisa-An, H Ye IEEE Transactions on Industrial Informatics 14 (7), 3216-3225, 2018 | 658 | 2018 |
Privacy-preserving machine learning with multiple data providers P Li, T Li, H Ye, J Li, X Chen, Y Xiang Future Generation Computer Systems 87, 341-350, 2018 | 103 | 2018 |
Efficient and secure outsourcing of differentially private data publishing with multiple evaluators J Li, H Ye, T Li, W Wang, W Lou, YT Hou, J Liu, R Lu IEEE Transactions on Dependable and Secure Computing 19 (1), 67-76, 2020 | 74* | 2020 |
Secure and efficient outsourcing differential privacy data release scheme in cyber–physical system H Ye, J Liu, W Wang, P Li, T Li, J Li Future Generation Computer Systems 108, 1314-1323, 2020 | 26 | 2020 |
VREFL: Verifiable and reconnection-efficient federated learning in IoT scenarios H Ye, J Liu, H Zhen, W Jiang, B Wang, W Wang Journal of Network and Computer Applications 207, 103486, 2022 | 10 | 2022 |
Easy peasy: A new handy method for pairing multiple cots IoT devices H Ye, Q Zeng, J Liu, X Du, W Wang IEEE Transactions on Dependable and Secure Computing 20 (4), 3483-3494, 2022 | 3 | 2022 |