Hierarchical attribute-based encryption for fine-grained access control in cloud storage services G Wang, Q Liu, J Wu Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 894 | 2010 |
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers G Wang, Q Liu, J Wu, M Guo computers & security 30 (5), 320-331, 2011 | 309 | 2011 |
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Q Liu, G Wang, J Wu Information sciences 258, 355-370, 2014 | 298 | 2014 |
Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks Z Zhou, M Dong, K Ota, G Wang, LT Yang IEEE Internet of Things Journal 3 (3), 428-438, 2015 | 273 | 2015 |
Deploying wireless sensor networks with fault-tolerance for structural health monitoring MZA Bhuiyan, G Wang, J Cao, J Wu IEEE Transactions on Computers 64 (2), 382-395, 2013 | 224 | 2013 |
Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems E Luo, MZA Bhuiyan, G Wang, MA Rahman, J Wu, M Atiquzzaman IEEE Communications Magazine 56 (2), 163-168, 2018 | 218 | 2018 |
Dependable structural health monitoring using wireless sensor networks MZA Bhuiyan, G Wang, J Wu, J Cao, X Liu, T Wang IEEE Transactions on Dependable and Secure Computing 14 (4), 363-376, 2015 | 217 | 2015 |
A blockchain-based nonrepudiation network computing service scheme for industrial IoT Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019 | 199 | 2019 |
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges W Jiang, G Wang, MZA Bhuiyan, J Wu Acm Computing Surveys (Csur) 49 (1), 1-35, 2016 | 185 | 2016 |
Secure and privacy preserving keyword searching for cloud storage services Q Liu, G Wang, J Wu Journal of network and computer applications 35 (3), 927-933, 2012 | 185 | 2012 |
Generating trusted graphs for trust evaluation in online social networks W Jiang, G Wang, J Wu Future generation computer systems 31, 48-58, 2014 | 183 | 2014 |
Collaborative trajectory privacy preserving scheme in location-based services T Peng, Q Liu, D Meng, G Wang Information Sciences 387, 165-179, 2017 | 172 | 2017 |
An efficient privacy preserving keyword search scheme in cloud computing Q Liu, G Wang, J Wu 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 165 | 2009 |
Fog-based computing and storage offloading for data synchronization in IoT T Wang, J Zhou, A Liu, MZA Bhuiyan, G Wang, W Jia IEEE Internet of Things Journal 6 (3), 4272-4282, 2018 | 157 | 2018 |
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services S Zhang, X Li, Z Tan, T Peng, G Wang Future Generation Computer Systems 94, 40-50, 2019 | 153 | 2019 |
Preserving privacy with probabilistic indistinguishability in weighted social networks Q Liu, G Wang, F Li, S Yang, J Wu IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016 | 149 | 2016 |
Local area prediction-based mobile target tracking in wireless sensor networks MZA Bhuiyan, G Wang, AV Vasilakos IEEE Transactions on Computers 64 (7), 1968-1982, 2014 | 139 | 2014 |
A survey on security attacks in VANETs: Communication, applications and challenges M Arif, G Wang, MZA Bhuiyan, T Wang, J Chen Vehicular Communications 19, 100179, 2019 | 138 | 2019 |
A dual privacy preserving scheme in continuous location-based services S Zhang, G Wang, MZA Bhuiyan, Q Liu IEEE Internet of Things Journal 5 (5), 4191-4200, 2018 | 137 | 2018 |
Adaptive location updates for mobile sinks in wireless sensor networks G Wang, T Wang, W Jia, M Guo, J Li The Journal of Supercomputing 47, 127-145, 2009 | 137 | 2009 |