2025
Privacy-Preserving and Traceable Functional Encryption for Inner Product in Cloud Computing.
IEEE Trans. Cloud Comput., 2025
2024
IoT Privacy-Preserving Data Mining With Dynamic Incentive Mechanism.
IEEE Internet Things J., January, 2024
Blockchain-based privacy-preserving public key searchable encryption with strong traceability.
J. Syst. Archit., 2024
Efficient Certificateless Aggregate Designated Verifier Signature With Conditional Privacy Preserving in VANETs.
IEEE Internet Things J., 2024
Privacy-Preserving Confidential Reporting System With Designated Reporters.
Comput. J., 2024
2023
DFE-IP: Delegatable functional encryption for inner product.
Inf. Sci., November, 2023
Similarity-based deduplication and secure auditing in IoT decentralized storage.
J. Syst. Archit., September, 2023
A Game Theory Study of Big Data Analytics in Internet of Things.
IEEE Trans. Netw. Serv. Manag., June, 2023
Data release for machine learning via correlated differential privacy.
Inf. Process. Manag., May, 2023
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing.
Comput. Secur., May, 2023
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry.
IEEE Trans. Serv. Comput., 2023
Blockchain-Backed Searchable Proxy Signcryption for Cloud Personal Health Records.
IEEE Trans. Serv. Comput., 2023
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
IEEE Trans. Inf. Forensics Secur., 2023
Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data.
IEEE Access, 2023
2022
An Anonymous Authentication System for Pay-As-You-Go Cloud Computing$^*$*.
IEEE Trans. Dependable Secur. Comput., 2022
PKE-MET: Public-Key Encryption With Multi-Ciphertext Equality Test in Cloud Computing.
IEEE Trans. Cloud Comput., 2022
Secure Infectious Diseases Detection System With IoT-Based e-Health Platforms.
IEEE Internet Things J., 2022
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost.
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Generic construction for tightly-secure signatures from discrete log.
Theor. Comput. Sci., 2021
ERGA: An Effective Region Gradient Algorithm for Adversarial Example Generation.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021
2020
Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs.
IEEE Syst. J., 2020
Certificateless aggregate signature scheme secure against fully chosen-key attacks.
Inf. Sci., 2020
Black-Box Accountable Authority Identity-Based Revocation System.
Comput. J., 2020
On the General Construction of Tightly Secure Identity-Based Signature Schemes.
Comput. J., 2020
2019
Privacy-Preserving Certificateless Cloud Auditing with Multiple Users.
Wirel. Pers. Commun., 2019
Tightly Secure Public-Key Cryptographic Schemes from One-More Assumptions.
J. Comput. Sci. Technol., 2019
Accountable identity-based encryption with distributed private key generators.
Inf. Sci., 2019
Generalized public-key cryptography with tight security.
Inf. Sci., 2019
Threshold privacy-preserving cloud auditing with multiple uploaders.
Int. J. Inf. Sec., 2019
2016
Privacy-Preserving Cloud Auditing with Multiple Uploaders.
Proceedings of the Information Security Practice and Experience, 2016
2015
Software Defined Intelligent Building.
Int. J. Inf. Secur. Priv., 2015
2014
Notes on the security of certificateless aggregate signature schemes.
Inf. Sci., 2014