Jun Shao
Orcid: 0000-0001-8352-0973Affiliations:
- Zhejiang Gongshang University, Hangzhou, China
According to our database1,
Jun Shao
authored at least 157 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Big Data, April, 2024
EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data.
IEEE Trans. Serv. Comput., 2024
Secure Similarity Queries Over Vertically Distributed Data via TEE-Enhanced Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
Performance Enhanced Secure Spatial Keyword Similarity Query With Arbitrary Spatial Ranges.
IEEE Trans. Inf. Forensics Secur., 2024
PHRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over High-Dimensional Data in Cloud.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
The Potential Harm of Email Delivery: Investigating the HTTPS Configurations of Webmail Services.
IEEE Trans. Dependable Secur. Comput., 2024
$k$kTCQ: Achieving Privacy-Preserving $k$k-Truss Community Queries Over Outsourced Data.
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the ACM on Web Conference 2024, 2024
Bounce in the Wild: A Deep Dive into Email Delivery Failures from a Large Email Service Provider.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024
2023
IEEE/ACM Trans. Netw., December, 2023
Public key encryption with public-verifiable decryption delegation and its application.
J. Inf. Secur. Appl., June, 2023
Peer Peer Netw. Appl., March, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Serv. Comput., 2023
Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023
PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Towards Efficient and Privacy-Preserving Interval Skyline Queries Over Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2023
Towards Efficient and Privacy-Preserving User-Defined Skyline Query Over Single Cloud.
IEEE Trans. Dependable Secur. Comput., 2023
Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Achieving Efficient and Privacy-Preserving ($\alpha,\beta$α,β)-Core Query Over Bipartite Graphs in Cloud.
IEEE Trans. Dependable Secur. Comput., 2023
2022
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud.
IEEE Trans. Serv. Comput., 2022
Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare.
IEEE Trans. Serv. Comput., 2022
Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2022
Achieve Efficient and Verifiable Conjunctive and Fuzzy Queries over Encrypted Data in Cloud.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Quantum Inf. Process., 2022
Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud.
IEEE Internet Things J., 2022
PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare.
IEEE Internet Things J., 2022
PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks.
IEEE Internet Things J., 2022
Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis.
IEEE Internet Things J., 2022
FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing.
IEEE Internet Things J., 2022
EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks.
IEEE Internet Things J., 2022
Sci. China Inf. Sci., 2022
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
2021
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2021
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing.
IEEE Internet Things J., 2021
Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing.
IEEE Internet Things J., 2021
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2021
Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.
IACR Cryptol. ePrint Arch., 2021
Future Gener. Comput. Syst., 2021
Des. Codes Cryptogr., 2021
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud.
Comput. Secur., 2021
Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Spatio-Temporal Similarity based Privacy-Preserving Worker Selection in Mobile Crowdsensing.
Proceedings of the IEEE Global Communications Conference, 2021
2020
IEEE Syst. J., 2020
Peer-to-Peer Netw. Appl., 2020
IEEE Internet Things J., 2020
Achieving O(log³n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT.
IEEE Internet Things J., 2020
Forward and Backward Private Dynamic Searchable Symmetric Encryption for Conjunctive Queries.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
Achieving Efficient and Privacy-Preserving Max Aggregation Query for Time-Series Data.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Achieving Privacy-Preserving Vehicle Selection for Effective Content Dissemination in Smart Cities.
Proceedings of the IEEE Global Communications Conference, 2020
2019
Achieving Efficient and Privacy-Preserving k-NN Query for Outsourced eHealthcare Data.
J. Medical Syst., 2019
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019
IEEE Internet Things J., 2019
IACR Cryptol. ePrint Arch., 2019
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward/Backward Privacy.
CoRR, 2019
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019
IEEE Access, 2019
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Netw., 2018
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
Dynamic Searchable Symmetric Encryption Schemes Supporting Range Queries with Forward (and Backward) Security.
Proceedings of the Computer Security, 2018
2017
IEEE Trans. Veh. Technol., 2017
Pers. Ubiquitous Comput., 2017
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.
Inf. Sci., 2017
IEEE Internet Things J., 2017
Appl. Algebra Eng. Commun. Comput., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Information Security Practice and Experience, 2017
2016
IEEE Trans. Veh. Technol., 2016
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Inf. Forensics Secur., 2016
Pervasive Mob. Comput., 2016
Mob. Inf. Syst., 2016
EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Obtain confidentiality or/and authenticity in Big Data by ID-based generalized signcryption.
Inf. Sci., 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015
2014
EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption.
J. Comput. Syst. Sci., 2014
Proceedings of the Provable Security - 8th International Conference, 2014
FINE: A fine-grained privacy-preserving location-based service framework for mobile devices.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014
2013
IEEE Trans. Inf. Forensics Secur., 2013
Inf. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Internet and Distributed Computing Systems, 2013
2012
J. Syst. Softw., 2012
KSII Trans. Internet Inf. Syst., 2012
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption.
Inf. Sci., 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption.
Secur. Commun. Networks, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
Secure threshold multi authority attribute based encryption without a central authority.
Inf. Sci., 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
Proceedings of the Intelligent Information and Database Systems, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Inf. Sci., 2008
2007
On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification.
Int. J. Netw. Secur., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Progress in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Comput. Secur., 2006
2005
IACR Cryptol. ePrint Arch., 2005
Appl. Math. Comput., 2005