Decentralized and privacy-preserving public auditing for cloud storage based on blockchain Y Miao, Q Huang, M Xiao, H Li IEEE Access 8, 139813-139826, 2020 | 37 | 2020 |
Blockchain assisted multi-copy provable data possession with faults localization in multi-cloud storage Y Miao, Q Huang, M Xiao, W Susilo IEEE Transactions on Information Forensics and Security 17, 3663-3676, 2022 | 35 | 2022 |
Attribute-based hierarchical access control with extendable policy M Xiao, H Li, Q Huang, S Yu, W Susilo IEEE Transactions on Information Forensics and Security 17, 1868-1883, 2022 | 25 | 2022 |
Private set intersection with authorization over outsourced encrypted datasets Y Wang, Q Huang, H Li, M Xiao, S Ma, W Susilo IEEE Transactions on Information Forensics and Security 16, 4050-4062, 2021 | 25 | 2021 |
Blockchain based multi-authority fine-grained access control system with flexible revocation M Xiao, Q Huang, Y Miao, S Li, W Susilo IEEE Transactions on Services Computing 15 (6), 3143-3155, 2021 | 18 | 2021 |
Broiler growth performance analysis: from correlation analysis, multiple linear regression, to neural network M Xiao, P Huang, P Lin, S Yan 2010 4th International Conference on Bioinformatics and Biomedical …, 2010 | 12 | 2010 |
Plaintext-verifiably-checkable encryption S Ma, Q Huang, X Li, M Xiao International Conference on Provable Security, 149-166, 2019 | 7 | 2019 |
Seasonal Broiler Growth Performance Prediction Based on Observational Study. P Huang, P Lin, S Yan, M Xiao J. Comput. 7 (8), 1895-1902, 2012 | 7 | 2012 |
Public key encryption with fuzzy matching Y Wang, Q Huang, H Li, M Xiao, J Huang, G Yang International Conference on Provable Security, 39-62, 2021 | 5 | 2021 |
基于 CDIO 理念的数据结构教学模式创新与实践 肖媚燕, 徐东风, 周运华 中国现代教育装备, 89-91, 2012 | 4 | 2012 |
Functional signatures: new definition and constructions Q Guo, Q Huang, S Ma, M Xiao, G Yang, W Susilo Science China Information Sciences 64, 1-13, 2021 | 3 | 2021 |
Signature Scheme from Trapdoor Functions. Y Wang, M Xiao, Y Miao, W Liu, Q Huang J. Internet Serv. Inf. Secur. 9 (2), 31-41, 2019 | 3 | 2019 |
地理信息科学专业的数据结构课程教学 肖媚燕 计算机教育, 87-89, 2015 | 2 | 2015 |
Identity-Based Encryption with Disjunctive, Conjunctive and Range Keyword Search from Lattices Z Lin, H Li, X Chen, M Xiao, Q Huang IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Domain-Specific Fine-Grained Access Control for Cloud-Edge Collaborative IoT M Xiao, Q Huang, W Chen, C Lyu, W Susilo IEEE Transactions on Information Forensics and Security, 2024 | 1 | 2024 |
Revocable and verifiable weighted attribute-based encryption with collaborative access for electronic health record in cloud X Li, H Wang, S Ma, M Xiao, Q Huang Cybersecurity 7 (1), 18, 2024 | 1 | 2024 |
IPAPA: Incentive Public Auditing Scheme against Procrastinating Auditor Y Miao, Q Huang, M Xiao, W Susilo Journal of Internet Technology 23 (7), 1505-1517, 2022 | 1 | 2022 |
Data Mining for seasonal influences in broiler breeding based on observational study P Huang, P Lin, S Yan, M Xiao Information Computing and Applications: Second International Conference …, 2011 | 1 | 2011 |
神经网络结构优化在肉鸡生长性能预测中的应用 吴广发, 林丕源, 黄沛杰, 肖媚燕, 张键锋 广东农业科学 38 (22), 126-129, 2011 | | 2011 |
Multi-meteorological factors-based neural network model for broiler growth performance prediction P Huang, M Xiao, P Lin, S Yan 2010 International Conference on Bioinformatics and Biomedical Technology …, 2010 | | 2010 |