关注
Yanguo Peng
Yanguo Peng
在 xidian.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Certificateless public key encryption with keyword search
P Yanguo, C Jiangtao, P Changgen, Y Zuobin
China Communications 11 (11), 100-113, 2014
1082014
ADFL: A poisoning attack defense framework for horizontal federated learning
J Guo, H Li, F Huang, Z Liu, Y Peng, X Li, J Ma, VG Menon, KK Igorevich
IEEE Transactions on Industrial Informatics 18 (10), 6526-6536, 2022
242022
SCALE: An efficient framework for secure dynamic skyline query processing in the cloud
W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui
Database Systems for Advanced Applications: 25th International Conference …, 2020
172020
A control-chart-based detector for small-amount electricity theft (SET) attack in smart grids
X Xia, J Lin, Y Xiao, J Cui, Y Peng, Y Ma
IEEE Internet of Things Journal 9 (9), 6745-6762, 2021
162021
LS-RQ: A lightweight and forward-secure range query on geographically encrypted data
Y Peng, L Wang, J Cui, X Liu, H Li, J Ma
IEEE Transactions on Dependable and Secure Computing 19 (1), 388-401, 2020
162020
SecureNearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments
W Xue, H Li, Y Peng, J Cui, Y Shi
IEEE Transactions on Big Data 4 (4), 586-599, 2017
122017
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts
Y Peng, H Li, J Cui, J Zhang, J Ma, C Peng
Science China Information Sciences 60, 1-17, 2017
122017
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud
Y Peng, J Cui, H Li, J Ma
Information Sciences 387, 146-164, 2017
122017
Image analysis using modified exponent-Fourier moments
B He, J Cui, B Xiao, Y Peng
EURASIP Journal on Image and Video Processing 2019, 1-27, 2019
102019
Towards Secure Approximate-Nearest Neighbor Query Over Encrypted High-Dimensional Data
Y Peng, H Li, J Cui, J Ma, Y Liu
IEEE Access 6, 23137-23151, 2018
82018
Quaternion fractional-order color orthogonal moment-based image representation and recognition
B He, J Liu, T Yang, B Xiao, Y Peng
EURASIP Journal on Image and Video Processing 2021 (1), 17, 2021
72021
Secsky: A secure dynamic skyline query scheme with data privacy
J Zhao, Y Ma, J Cui, Y Peng, K Li, T Wang
IEEE Access 9, 5690-5703, 2020
52020
An efficient range query model over encrypted outsourced data using secure kd tree
Y Peng, H Li, J Cui, Y Zhu, C Peng
2016 International Conference on Networking and Network Applications (NaNA …, 2016
52016
An efficient secure dynamic skyline query model
W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui
arXiv preprint arXiv:2002.07511, 2020
42020
Adagt: An adaptive group testing method for improving efficiency and sensitivity of large-scale screening against covid-19
X Xia, Y Liu, Y Xiao, J Cui, B Yang, Y Peng
IEEE Transactions on Automation Science and Engineering 19 (2), 646-662, 2021
32021
Image analysis by fast improved radial harmonic‐Fourier moments algorithm
B He, J Cui, Y Peng, T Yang
International Journal of Imaging Systems and Technology 30 (4), 1033-1045, 2020
32020
PvCT: A publicly verifiable contact tracing algorithm in cloud computing
Y Zhu, W Ma, J Cui, X Xia, Y Peng, J Ning
Security and Communication Networks 2021 (1), 5514137, 2021
22021
VeriRange: A Verifiable Range Query Model on Encrypted Geographic Data for loT Environment
W Ma, Y Peng, X Liu, J Cui
IEEE Internet of Things Journal, 2023
12023
RASK: Range spatial keyword queries on massive encrypted geo-textual data
Z Lv, K Shang, H Huo, X Liu, Y Peng, X Wang, Y Tan
IEEE Transactions on Services Computing 16 (5), 3621-3635, 2023
12023
A rational exchange protocol under asymmetric information in wireless sensor networks
Z Lv, C Peng, Y Peng, J Zhang
Wireless Communications and Mobile Computing 2018 (1), 9437936, 2018
12018
系统目前无法执行此操作,请稍后再试。
文章 1–20