Efficient data access control with fine-grained data protection in cloud-assisted IIoT S Qi, Y Lu, W Wei, X Chen IEEE Internet of Things Journal 8 (4), 2886-2899, 2020 | 94 | 2020 |
Cpds: Enabling compressed and private data sharing for industrial Internet of Things over blockchain S Qi, Y Lu, Y Zheng, Y Li, X Chen IEEE Transactions on Industrial Informatics 17 (4), 2376-2387, 2020 | 84 | 2020 |
Scalable industry data access control in RFID-enabled supply chain S Qi, Y Zheng, M Li, Y Liu, J Qiu IEEE/ACM Transactions on networking 24 (6), 3551-3564, 2016 | 69 | 2016 |
Crypt-DAC: Cryptographically enforced dynamic access control in the cloud S Qi, Y Zheng IEEE Transactions on Dependable and Secure Computing 18 (2), 765-779, 2019 | 37 | 2019 |
Accelerating at the edge: A storage-elastic blockchain for latency-sensitive vehicular edge computing Y Lu, J Zhang, Y Qi, S Qi, Y Zheng, Y Liu, H Song, W Wei IEEE transactions on intelligent transportation systems 23 (8), 11862-11876, 2021 | 34 | 2021 |
Say no to price discrimination: decentralized and automated incentives for price auditing in ride-hailing services Y Lu, Y Qi, S Qi, Y Li, H Song, Y Liu IEEE transactions on Mobile computing 21 (2), 663-680, 2020 | 31 | 2020 |
Secure and private RFID-enabled third-party supply chain systems S Qi, Y Zheng, M Li, L Lu, Y Liu IEEE Transactions on Computers 65 (11), 3413-3426, 2016 | 29 | 2016 |
Mptee: bringing flexible and efficient memory protection to intel sgx W Zhao, K Lu, Y Qi, S Qi Proceedings of the Fifteenth European Conference on Computer Systems, 1-15, 2020 | 24 | 2020 |
COLLECTOR: A secure RFID-enabled batch recall protocol S Qi, Y Zheng, M Li, L Lu, Y Liu IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 1510-1518, 2014 | 22 | 2014 |
Practical volume-hiding encrypted multi-maps with optimal overhead and beyond J Wang, SF Sun, T Li, S Qi, X Chen Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 21 | 2022 |
Semi-supervised two-phase familial analysis of Android malware with normalized graph embedding Q Li, Q Hu, Y Qi, S Qi, X Liu, P Gao Knowledge-Based Systems 218, 106802, 2021 | 19 | 2021 |
Ants can carry cheese: secure and private RFID-enabled third-party distribution S Qi, Y Zheng, X Chen, W Wei IEEE Transactions on Dependable and Secure Computing 19 (3), 1505-1517, 2020 | 18 | 2020 |
Secure deduplication-based storage systems with resistance to side-channel attacks via fog computing Y Lu, Y Qi, S Qi, F Zhang, W Wei, X Yang, J Zhang, X Dong IEEE Sensors Journal 22 (18), 17529-17541, 2021 | 17 | 2021 |
Adversarial adaptive neighborhood with feature importance-aware convex interpolation Q Li, Y Qi, Q Hu, S Qi, Y Lin, JS Dong IEEE Transactions on Information Forensics and Security 16, 2447-2460, 2020 | 17 | 2020 |
Pbsx: A practical private boolean search using Intel SGX Q Jiang, Y Qi, S Qi, W Zhao, Y Lu Information Sciences 521, 174-194, 2020 | 16 | 2020 |
Scalable data access control in RFID-enabled supply chain S Qi, Y Zheng, M Li, Y Liu, J Qiu 2014 IEEE 22nd International Conference on Network Protocols, 71-82, 2014 | 15 | 2014 |
Understanding and defending against White-box membership inference attack in deep learning D Wu, S Qi, Y Qi, Q Li, B Cai, Q Guo, J Cheng Knowledge-Based Systems 259, 110014, 2023 | 13 | 2023 |
Truth: A blockchain-aided secure reputation system with genuine feedbacks S Qi, Y Li, W Wei, Q Li, K Qiao, Y Qi IEEE Transactions on Engineering Management, 2022 | 13 | 2022 |
Rphx: Result pattern hiding conjunctive query over private compressed index using Intel SGX Q Jiang, EC Chang, Y Qi, S Qi, P Wu, J Wang IEEE Transactions on Information Forensics and Security 17, 1053-1068, 2022 | 13 | 2022 |
Safety warning! Decentralised and automated incentives for disqualified drivers auditing in ride-hailing services Y Lu, J Zhang, Y Qi, S Qi, Y Li, H Song, Y Liu IEEE Transactions on Mobile Computing 22 (3), 1748-1762, 2021 | 12 | 2021 |