Fine-grained data access control with attribute-hiding policy for cloud-based IoT J Hao, C Huang, J Ni, H Rong, M Xian, XS Shen Computer Networks 153, 1-10, 2019 | 99 | 2019 |
CrowdSFL: A secure crowd computing framework based on blockchain and federated learning Z Li, J Liu, J Hao, H Wang, M Xian Electronics 9 (5), 773, 2020 | 68 | 2020 |
Secure and efficient outsourced k-means clustering using fully homomorphic encryption with ciphertext packing technique W Wu, J Liu, H Wang, J Hao, M Xian IEEE Transactions on Knowledge and Data Engineering 33 (10), 3424-3437, 2020 | 52 | 2020 |
Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT J Hao, J Liu, W Wu, F Tang, M Xian IEEE Internet of Things Journal 7 (2), 1140-1153, 2019 | 32 | 2019 |
An IoT-applicable access control model under double-layer blockchain Z Li, J Hao, J Liu, H Wang, M Xian IEEE Transactions on Circuits and Systems II: Express Briefs 68 (6), 2102-2106, 2020 | 28 | 2020 |
Secure data sharing with flexible user access privilege update in cloud-assisted IoMT J Hao, W Tang, C Huang, J Liu, H Wang, M Xian IEEE Transactions on Emerging Topics in Computing 10 (2), 933-947, 2021 | 23 | 2021 |
Efficient attribute-based access control with authorized search in cloud storage J Hao, J Liu, H Wang, L Liu, M Xian, X Shen IEEE Access 7, 182772-182783, 2019 | 21 | 2019 |
Privacy‐Preserving k‐Means Clustering under Multiowner Setting in Distributed Cloud Environments H Rong, H Wang, J Liu, J Hao, M Xian Security and Communication Networks 2017 (1), 3910126, 2017 | 16 | 2017 |
Smart contract-based access control through off-chain signature and on-chain evaluation J Hao, C Huang, W Tang, Y Zhang, S Yuan IEEE Transactions on Circuits and Systems II: Express Briefs 69 (4), 2221-2225, 2021 | 14 | 2021 |
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment H Rong, J Liu, W Wu, J Hao, H Wang, M Xian Computers & Security 98, 101969, 2020 | 13 | 2020 |
Privacy-preserving interest-ability based task allocation in crowdsourcing J Hao, C Huang, G Chen, M Xian, X Shen ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019 | 10 | 2019 |
Puncturable key-policy attribute-based encryption scheme for efficient user revocation D Ghopur, J Ma, X Ma, J Hao, T Jiang, X Wang IEEE Transactions on Services Computing, 2023 | 8 | 2023 |
Efficient outsourced data access control with user revocation for cloud-based IoT J Hao, C Huang, J Liu, M Xian, X Shen 2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018 | 7 | 2018 |
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework H Rong, H Wang, J Liu, J Hao, M Xian Security and Privacy in Communication Networks: 13th International …, 2018 | 6 | 2018 |
Mobile cloud computing: the state of art, application scenarios and challenges J Hao, M Xian, H Wang, F Tang, P Xiao 2018 4th International Conference on Computational Intelligence …, 2018 | 5 | 2018 |
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation D Ghopur, J Ma, X Ma, Y Miao, J Hao, T Jiang Science China Information Sciences 66 (7), 172104, 2023 | 4 | 2023 |
OE-CP-ABE: Over-encryption based CP-ABE scheme for efficient policy updating J Hao, J Liu, H Rong, H Wang, M Xian Network and System Security: 11th International Conference, NSS 2017 …, 2017 | 4 | 2017 |
PFDLIS: privacy-preserving and fair deep learning inference service under publicly verifiable covert security setting F Tang, J Hao, J Liu, H Wang, M Xian Electronics 8 (12), 1488, 2019 | 2 | 2019 |
Secure collaborative outsourced k-nearest neighbor classification with multiple owners in cloud environment H Rong, H Wang, J Liu, W Wu, J Hao, M Xian Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017 | 2 | 2017 |
A Review on Technologies of Secure Outsourced Association Rule Mining in Cloud Computing Environment W Wu, J Hao, L Bai Academic Journal of Computing & Information Science 7 (5), 207-214, 2024 | | 2024 |