关注
Jialu Hao
Jialu Hao
在 nudt.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fine-grained data access control with attribute-hiding policy for cloud-based IoT
J Hao, C Huang, J Ni, H Rong, M Xian, XS Shen
Computer Networks 153, 1-10, 2019
992019
CrowdSFL: A secure crowd computing framework based on blockchain and federated learning
Z Li, J Liu, J Hao, H Wang, M Xian
Electronics 9 (5), 773, 2020
682020
Secure and efficient outsourced k-means clustering using fully homomorphic encryption with ciphertext packing technique
W Wu, J Liu, H Wang, J Hao, M Xian
IEEE Transactions on Knowledge and Data Engineering 33 (10), 3424-3437, 2020
522020
Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT
J Hao, J Liu, W Wu, F Tang, M Xian
IEEE Internet of Things Journal 7 (2), 1140-1153, 2019
322019
An IoT-applicable access control model under double-layer blockchain
Z Li, J Hao, J Liu, H Wang, M Xian
IEEE Transactions on Circuits and Systems II: Express Briefs 68 (6), 2102-2106, 2020
282020
Secure data sharing with flexible user access privilege update in cloud-assisted IoMT
J Hao, W Tang, C Huang, J Liu, H Wang, M Xian
IEEE Transactions on Emerging Topics in Computing 10 (2), 933-947, 2021
232021
Efficient attribute-based access control with authorized search in cloud storage
J Hao, J Liu, H Wang, L Liu, M Xian, X Shen
IEEE Access 7, 182772-182783, 2019
212019
Privacy‐Preserving k‐Means Clustering under Multiowner Setting in Distributed Cloud Environments
H Rong, H Wang, J Liu, J Hao, M Xian
Security and Communication Networks 2017 (1), 3910126, 2017
162017
Smart contract-based access control through off-chain signature and on-chain evaluation
J Hao, C Huang, W Tang, Y Zhang, S Yuan
IEEE Transactions on Circuits and Systems II: Express Briefs 69 (4), 2221-2225, 2021
142021
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment
H Rong, J Liu, W Wu, J Hao, H Wang, M Xian
Computers & Security 98, 101969, 2020
132020
Privacy-preserving interest-ability based task allocation in crowdsourcing
J Hao, C Huang, G Chen, M Xian, X Shen
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
102019
Puncturable key-policy attribute-based encryption scheme for efficient user revocation
D Ghopur, J Ma, X Ma, J Hao, T Jiang, X Wang
IEEE Transactions on Services Computing, 2023
82023
Efficient outsourced data access control with user revocation for cloud-based IoT
J Hao, C Huang, J Liu, M Xian, X Shen
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
72018
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework
H Rong, H Wang, J Liu, J Hao, M Xian
Security and Privacy in Communication Networks: 13th International …, 2018
62018
Mobile cloud computing: the state of art, application scenarios and challenges
J Hao, M Xian, H Wang, F Tang, P Xiao
2018 4th International Conference on Computational Intelligence …, 2018
52018
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
D Ghopur, J Ma, X Ma, Y Miao, J Hao, T Jiang
Science China Information Sciences 66 (7), 172104, 2023
42023
OE-CP-ABE: Over-encryption based CP-ABE scheme for efficient policy updating
J Hao, J Liu, H Rong, H Wang, M Xian
Network and System Security: 11th International Conference, NSS 2017 …, 2017
42017
PFDLIS: privacy-preserving and fair deep learning inference service under publicly verifiable covert security setting
F Tang, J Hao, J Liu, H Wang, M Xian
Electronics 8 (12), 1488, 2019
22019
Secure collaborative outsourced k-nearest neighbor classification with multiple owners in cloud environment
H Rong, H Wang, J Liu, W Wu, J Hao, M Xian
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
22017
A Review on Technologies of Secure Outsourced Association Rule Mining in Cloud Computing Environment
W Wu, J Hao, L Bai
Academic Journal of Computing & Information Science 7 (5), 207-214, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20