Qinlong Huang

Orcid: 0000-0002-0378-0941

According to our database1, Qinlong Huang authored at least 29 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cross-Domain Inner-Product Access Control Encryption for Secure EMR Flow in Cloud Edge.
IEEE Trans. Inf. Forensics Secur., 2024

An Efficient and Verifiable Encrypted Data Filtering Framework Over Large-Scale Storage in Cloud Edge.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Attribute-Based Expressive and Ranked Keyword Search Over Encrypted Documents in Cloud Computing.
IEEE Trans. Serv. Comput., 2023

Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services.
IEEE Trans. Serv. Comput., 2023

Secure and Fine-Grained Flow Control for Subscription-Based Data Services in Cloud-Edge Computing.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud.
IEEE Trans. Cloud Comput., 2023

2022
Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services.
IEEE Trans. Serv. Comput., 2022

A Parallel Secure Flow Control Framework for Private Data Sharing in Mobile Edge Cloud.
IEEE Trans. Parallel Distributed Syst., 2022

P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

Unsupervised Inference of Physiologically Meaningful Articulatory Trajectories with VocalTractLab.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

Unsupervised Acoustic-to-Articulatory Inversion with Variable Vocal Tract Anatomy.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022

2021
Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud.
IEEE Trans. Serv. Comput., 2021

Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2021

Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing.
IEEE Trans. Cloud Comput., 2021

AGIMM tracking filter algorithm based on manoeuvring feature correction.
Int. J. Inf. Commun. Technol., 2021

2019
Secure and Privacy-Preserving Warning Message Dissemination in Cloud-Assisted Internet of Vehicles.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices.
World Wide Web, 2018

SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.
Sensors, 2018

Adaptive Secure Cross-Cloud Data Collaboration with Identity-Based Cryptography and Conditional Proxy Re-Encryption.
Secur. Commun. Networks, 2018

Corrigendum to "Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing" [Future Gener. Comput. Syst. 72 (2017) 239-249].
Future Gener. Comput. Syst., 2018

PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks.
Future Gener. Comput. Syst., 2018

Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
IEEE Access, 2018

Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing.
IEEE Access, 2018

DACSC: Dynamic and Fine-Grained Access Control for Secure Data Collaboration in Cloud Computing.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities.
Secur. Commun. Networks, 2017

Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing.
Future Gener. Comput. Syst., 2017

Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things.
IEEE Access, 2017

2013
Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing.
J. Comput., 2013

2010
Implementation of a Suggested E-commerce Model Based on SET Protocol.
Proceedings of the Eighth ACIS International Conference on Software Engineering Research, 2010


  Loading...