关注
Meiyan Xiao
Meiyan Xiao
在 scau.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Decentralized and privacy-preserving public auditing for cloud storage based on blockchain
Y Miao, Q Huang, M Xiao, H Li
IEEE Access 8, 139813-139826, 2020
372020
Blockchain assisted multi-copy provable data possession with faults localization in multi-cloud storage
Y Miao, Q Huang, M Xiao, W Susilo
IEEE Transactions on Information Forensics and Security 17, 3663-3676, 2022
352022
Attribute-based hierarchical access control with extendable policy
M Xiao, H Li, Q Huang, S Yu, W Susilo
IEEE Transactions on Information Forensics and Security 17, 1868-1883, 2022
252022
Private set intersection with authorization over outsourced encrypted datasets
Y Wang, Q Huang, H Li, M Xiao, S Ma, W Susilo
IEEE Transactions on Information Forensics and Security 16, 4050-4062, 2021
252021
Blockchain based multi-authority fine-grained access control system with flexible revocation
M Xiao, Q Huang, Y Miao, S Li, W Susilo
IEEE Transactions on Services Computing 15 (6), 3143-3155, 2021
182021
Broiler growth performance analysis: from correlation analysis, multiple linear regression, to neural network
M Xiao, P Huang, P Lin, S Yan
2010 4th International Conference on Bioinformatics and Biomedical …, 2010
122010
Plaintext-verifiably-checkable encryption
S Ma, Q Huang, X Li, M Xiao
International Conference on Provable Security, 149-166, 2019
72019
Seasonal Broiler Growth Performance Prediction Based on Observational Study.
P Huang, P Lin, S Yan, M Xiao
J. Comput. 7 (8), 1895-1902, 2012
72012
Public key encryption with fuzzy matching
Y Wang, Q Huang, H Li, M Xiao, J Huang, G Yang
International Conference on Provable Security, 39-62, 2021
52021
基于 CDIO 理念的数据结构教学模式创新与实践
肖媚燕, 徐东风, 周运华
中国现代教育装备, 89-91, 2012
42012
Functional signatures: new definition and constructions
Q Guo, Q Huang, S Ma, M Xiao, G Yang, W Susilo
Science China Information Sciences 64, 1-13, 2021
32021
Signature Scheme from Trapdoor Functions.
Y Wang, M Xiao, Y Miao, W Liu, Q Huang
J. Internet Serv. Inf. Secur. 9 (2), 31-41, 2019
32019
地理信息科学专业的数据结构课程教学
肖媚燕
计算机教育, 87-89, 2015
22015
Identity-Based Encryption with Disjunctive, Conjunctive and Range Keyword Search from Lattices
Z Lin, H Li, X Chen, M Xiao, Q Huang
IEEE Transactions on Information Forensics and Security, 2024
12024
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT
M Xiao, Q Huang, W Chen, C Lyu, W Susilo
IEEE Transactions on Information Forensics and Security, 2024
12024
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud
X Li, H Wang, S Ma, M Xiao, Q Huang
Cybersecurity 7 (1), 18, 2024
12024
IPAPA: Incentive Public Auditing Scheme against Procrastinating Auditor
Y Miao, Q Huang, M Xiao, W Susilo
Journal of Internet Technology 23 (7), 1505-1517, 2022
12022
Data Mining for seasonal influences in broiler breeding based on observational study
P Huang, P Lin, S Yan, M Xiao
Information Computing and Applications: Second International Conference …, 2011
12011
神经网络结构优化在肉鸡生长性能预测中的应用
吴广发, 林丕源, 黄沛杰, 肖媚燕, 张键锋
广东农业科学 38 (22), 126-129, 2011
2011
Multi-meteorological factors-based neural network model for broiler growth performance prediction
P Huang, M Xiao, P Lin, S Yan
2010 International Conference on Bioinformatics and Biomedical Technology …, 2010
2010
系统目前无法执行此操作,请稍后再试。
文章 1–20