A Blockchain-Integrated Divided-Block Sparse Matrix Transformation Differential Privacy Data Publishing Model Y Hong, X Zhao, H Zhu, H Li Security and Communication Networks 2021, 1-15, 2021 | | 2021 |
A collaboration‐based scheme for location‐based services with incentive mechanism S Wan, J Hua, H Zhu, H Wang, F Li Chinese Journal of Electronics 27 (2), 310-317, 2018 | 6 | 2018 |
A lightweight anonymous authentication scheme for VANET based on bilinear pairing H Zhu, W Pan, B Liu, H Li 2012 Fourth International Conference on Intelligent Networking and …, 2012 | 22 | 2012 |
A New Efficient Verifiable Fuzzy Keyword Search Scheme. J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (4), 61-71, 2012 | 33 | 2012 |
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search. Y Zhao, X Chen, H Ma, Q Tang, H Zhu J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 72-81, 2012 | 62 | 2012 |
A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent F Wang, H Zhu, R Lu, Y Zheng, H Li Information Sciences 552, 183-200, 2021 | 55 | 2021 |
A secure and privacy-preserving incentive framework for vehicular cloud on the road Q Kong, R Lu, H Zhu, A Alamer, X Lin 2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016 | 21 | 2016 |
A Stream Pattern Matching Method for Traffic Analysis Z Hui, L Hui, M Can CHINA COMMUNICATIONS 7 (6), 86-93, 2010 | | 2010 |
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data. J Wang, X Chen, H Ma, Q Tang, J Li, H Zhu J. Internet Serv. Inf. Secur. 2 (1/2), 49-58, 2012 | 24 | 2012 |
ACCEL: An efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data J Zhao, H Zhu, F Wang, R Lu, H Li, Z Zhou, H Wan Science China. Information Sciences 65 (7), 170307, 2022 | 6 | 2022 |
Achieve efficient and privacy-preserving disease risk assessment over multi-outsourced vertical datasets F Wang, H Zhu, R Lu, Y Zheng, H Li IEEE Transactions on Dependable and Secure Computing 19 (3), 1492-1504, 2020 | 19 | 2020 |
Achieve efficient and privacy-preserving medical primary diagnosis based on kNN D Zhu, H Zhu, X Liu, H Li, F Wang, H Li 2018 27th International Conference on Computer Communication and Networks …, 2018 | 12 | 2018 |
Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data Q Wei, H Zhu, R Lu, H Li 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 3 | 2017 |
Achieve efficient and privacy-preserving proximity detection scheme for social applications F Wang, H Zhu, R Lu, F Liu, C Huang, H Li Security and Privacy in Communication Networks: 13th International …, 2018 | 1 | 2018 |
Achieve secure and efficient skyline computation for worker selection in mobile crowdsensing X Zhang, R Lu, J Shao, H Zhu, AA Ghorbani 2019 11th International Conference on Wireless Communications and Signal …, 2019 | 5 | 2019 |
Achieve secure handover session key management via mobile relay in LTE-advanced networks Q Kong, R Lu, S Chen, H Zhu IEEE internet of things journal 4 (1), 29-39, 2016 | 45 | 2016 |
Achieving efficient and privacy-preserving exact set similarity search over encrypted data Y Zheng, R Lu, Y Guan, J Shao, H Zhu IEEE Transactions on Dependable and Secure Computing 19 (2), 1090-1103, 2020 | 33 | 2020 |
Achieving efficient and privacy-preserving set containment search over encrypted data Y Zheng, R Lu, Y Guan, J Shao, H Zhu IEEE Transactions on Services Computing 15 (5), 2604-2618, 2021 | 13 | 2021 |
Achieving Practical and Privacy-Preserving kNN Query over Encrypted Data Y Zheng, R Lu, S Zhang, J Shao, H Zhu IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |
Achieving practical symmetric searchable encryption with search pattern privacy over cloud Y Zheng, R Lu, J Shao, F Yin, H Zhu IEEE Transactions on Services Computing 15 (3), 1358-1370, 2020 | 19 | 2020 |