Certificateless public key encryption with keyword search P Yanguo, C Jiangtao, P Changgen, Y Zuobin China Communications 11 (11), 100-113, 2014 | 108 | 2014 |
ADFL: A poisoning attack defense framework for horizontal federated learning J Guo, H Li, F Huang, Z Liu, Y Peng, X Li, J Ma, VG Menon, KK Igorevich IEEE Transactions on Industrial Informatics 18 (10), 6526-6536, 2022 | 24 | 2022 |
SCALE: An efficient framework for secure dynamic skyline query processing in the cloud W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui Database Systems for Advanced Applications: 25th International Conference …, 2020 | 17 | 2020 |
A control-chart-based detector for small-amount electricity theft (SET) attack in smart grids X Xia, J Lin, Y Xiao, J Cui, Y Peng, Y Ma IEEE Internet of Things Journal 9 (9), 6745-6762, 2021 | 16 | 2021 |
LS-RQ: A lightweight and forward-secure range query on geographically encrypted data Y Peng, L Wang, J Cui, X Liu, H Li, J Ma IEEE Transactions on Dependable and Secure Computing 19 (1), 388-401, 2020 | 16 | 2020 |
SecureNearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments W Xue, H Li, Y Peng, J Cui, Y Shi IEEE Transactions on Big Data 4 (4), 586-599, 2017 | 12 | 2017 |
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts Y Peng, H Li, J Cui, J Zhang, J Ma, C Peng Science China Information Sciences 60, 1-17, 2017 | 12 | 2017 |
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud Y Peng, J Cui, H Li, J Ma Information Sciences 387, 146-164, 2017 | 12 | 2017 |
Image analysis using modified exponent-Fourier moments B He, J Cui, B Xiao, Y Peng EURASIP Journal on Image and Video Processing 2019, 1-27, 2019 | 10 | 2019 |
Towards Secure Approximate-Nearest Neighbor Query Over Encrypted High-Dimensional Data Y Peng, H Li, J Cui, J Ma, Y Liu IEEE Access 6, 23137-23151, 2018 | 8 | 2018 |
Quaternion fractional-order color orthogonal moment-based image representation and recognition B He, J Liu, T Yang, B Xiao, Y Peng EURASIP Journal on Image and Video Processing 2021 (1), 17, 2021 | 7 | 2021 |
Secsky: A secure dynamic skyline query scheme with data privacy J Zhao, Y Ma, J Cui, Y Peng, K Li, T Wang IEEE Access 9, 5690-5703, 2020 | 5 | 2020 |
An efficient range query model over encrypted outsourced data using secure kd tree Y Peng, H Li, J Cui, Y Zhu, C Peng 2016 International Conference on Networking and Network Applications (NaNA …, 2016 | 5 | 2016 |
An efficient secure dynamic skyline query model W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui arXiv preprint arXiv:2002.07511, 2020 | 4 | 2020 |
Adagt: An adaptive group testing method for improving efficiency and sensitivity of large-scale screening against covid-19 X Xia, Y Liu, Y Xiao, J Cui, B Yang, Y Peng IEEE Transactions on Automation Science and Engineering 19 (2), 646-662, 2021 | 3 | 2021 |
Image analysis by fast improved radial harmonic‐Fourier moments algorithm B He, J Cui, Y Peng, T Yang International Journal of Imaging Systems and Technology 30 (4), 1033-1045, 2020 | 3 | 2020 |
PvCT: A publicly verifiable contact tracing algorithm in cloud computing Y Zhu, W Ma, J Cui, X Xia, Y Peng, J Ning Security and Communication Networks 2021 (1), 5514137, 2021 | 2 | 2021 |
VeriRange: A Verifiable Range Query Model on Encrypted Geographic Data for loT Environment W Ma, Y Peng, X Liu, J Cui IEEE Internet of Things Journal, 2023 | 1 | 2023 |
RASK: Range spatial keyword queries on massive encrypted geo-textual data Z Lv, K Shang, H Huo, X Liu, Y Peng, X Wang, Y Tan IEEE Transactions on Services Computing 16 (5), 3621-3635, 2023 | 1 | 2023 |
A rational exchange protocol under asymmetric information in wireless sensor networks Z Lv, C Peng, Y Peng, J Zhang Wireless Communications and Mobile Computing 2018 (1), 9437936, 2018 | 1 | 2018 |