Meixia Miao
Orcid: 0000-0002-9503-4013
According to our database1,
Meixia Miao
authored at least 39 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
Comput. Stand. Interfaces, 2025
2024
IEEE Trans. Mob. Comput., May, 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting.
IEEE Trans. Cloud Comput., 2023
2022
Int. J. Intell. Syst., December, 2022
Int. J. Intell. Syst., December, 2022
Int. J. Intell. Syst., 2022
Comput. Stand. Interfaces, 2022
Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model.
Int. J. Intell. Syst., 2021
Comput. Stand. Interfaces, 2021
Comput. Stand. Interfaces, 2021
CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated Learning.
Proceedings of the Applied Cryptography and Network Security, 2021
2020
A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed Assumption.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
Soft Comput., 2019
IEEE Access, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018
Int. J. High Perform. Comput. Netw., 2018
2017
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017
J. Comput. Syst. Sci., 2017
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017
Proceedings of the Information Security Practice and Experience, 2017
2016
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016
2015
Pervasive Mob. Comput., 2015
Int. J. Inf. Manag., 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015
2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014