Multi-key privacy-preserving deep learning in cloud computing P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen Future Generation Computer Systems 74, 76-85, 2017 | 512 | 2017 |
Privacy-preserving outsourced classification in cloud computing P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen Cluster Computing 21, 277-286, 2018 | 398 | 2018 |
Differentially private Naive Bayes learning over multiple data sources T Li, J Li, Z Liu, P Li, C Jia Information Sciences 444, 89-104, 2018 | 236 | 2018 |
Verifiable searchable encryption with aggregate keys for data sharing system Z Liu, T Li, P Li, C Jia, J Li Future Generation Computer Systems 78, 778-788, 2018 | 136 | 2018 |
Privacy-preserving machine learning with multiple data providers P Li, T Li, H Ye, J Li, X Chen, Y Xiang Future Generation Computer Systems 87, 341-350, 2018 | 107 | 2018 |
New directly revocable attribute-based encryption scheme and its application in cloud storage environment H Wang, Z Zheng, L Wu, P Li Cluster Computing 20, 2385-2392, 2017 | 104 | 2017 |
Generating stable biometric keys for flexible cloud computing authentication using finger vein Z Wu, L Tian, P Li, T Wu, M Jiang, C Wu Information Sciences 433, 431-447, 2018 | 94 | 2018 |
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice Y Zhang, J Li, D Zheng, P Li, Y Tian Journal of Network and Computer Applications 122, 50-60, 2018 | 88 | 2018 |
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions Z Cai, H Yan, P Li, Z Huang, C Gao Cluster Computing 20, 2415-2422, 2017 | 87 | 2017 |
Outsourced privacy-preserving classification service over encrypted data T Li, Z Huang, P Li, Z Liu, C Jia Journal of Network and Computer Applications 106, 100-110, 2018 | 77 | 2018 |
A QDCT-and SVD-based color image watermarking scheme using an optimized encrypted binary computer-generated hologram J Li, Q Lin, C Yu, X Ren, P Li Soft Computing 22, 47-65, 2018 | 49 | 2018 |
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia Z Wu, B Liang, L You, Z Jian, J Li Soft Computing 20, 4907-4918, 2016 | 31 | 2016 |
Secure and efficient outsourcing differential privacy data release scheme in cyber–physical system H Ye, J Liu, W Wang, P Li, T Li, J Li Future Generation Computer Systems 108, 1314-1323, 2020 | 29 | 2020 |
Privacy-preserving outsourcing of image feature extraction in cloud computing P Li, T Li, ZA Yao, CM Tang, J Li Soft Computing 21, 4349-4359, 2017 | 27 | 2017 |
A finger vein recognition algorithm based on deep learning C Chen, Z Wu, J Zhang, P Li, F Azmat International Journal of Embedded Systems 9 (3), 220-228, 2017 | 15 | 2017 |
Face recognition based on the fusion of wavelet packet sub-images and fisher linear discriminant T Wenjing, G Fei, D Renren, S Yujuan, L Ping Multimedia Tools and Applications 76, 22725-22740, 2017 | 14 | 2017 |
Privacy-preserving multikey computing framework for encrypted data in the cloud J Zhang, ZL Jiang, P Li, SM Yiu Information Sciences 575, 217-230, 2021 | 11 | 2021 |
Rational computing protocol based on fuzzy theory Y Wang, T Li, L Chen, P Li, H Leung, Z Liu, Q Xu Soft Computing 20, 429-438, 2016 | 11 | 2016 |
A finger vein recognition algorithm using feature block fusion and depth neural network C Chen, Z Wu, P Li, J Zhang, Y Wang, H Li Computational Intelligence and Intelligent Systems: 7th International …, 2016 | 5 | 2016 |
Linear Codes from Two Weakly Regular Plateaued Balanced Functions S Yang, T Zhang, P Li Entropy 25 (2), 369, 2023 | 3 | 2023 |