Follow
Yanqing Yao
Yanqing Yao
Beihang University
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
A novel variable precision (θ, σ)-fuzzy rough set model based on fuzzy granules
Y Yao, J Mi, Z Li
Fuzzy Sets and Systems 236, 58-72, 2014
962014
Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems
YQ Yao, JS Mi, ZJ Li
Fuzzy Sets and Systems 170 (1), 64-75, 2011
492011
A novel fuzzy identity based signature scheme based on the short integer solution problem
Y Yao, Z Li
Computers & Electrical Engineering 40 (6), 1930–1939, 2013
212013
Privacy with Imperfect Randomness
YY 1. Yevgeniy Dodis
LNCS 9216, 463-482, 0
20*
Privacy and Imperfect Randomness
Y Dodis, Y Yao
IACR Cryptology ePrint Archive 2014: 623 (2014), 0
20*
Lattice-based key-aggregate (searchable) encryption in cloud storage
Y Yao, Z Zhai, J Liu, Z Li
IEEE Access 7, 164544-164555, 2019
192019
Efficient and dynamic key management for multiple identities in identity-based systems
H Guo, C Xu, Z Li, Y Yao, Y Mu
Information Sciences 221, 579-590, 2013
132013
Overcoming Weak Expectations via the Rnyi Entropy and the Expanded Computational Entropy
Y Yao, Z Li
International Conference on Information Theoretic Security, 162-178, 2013
82013
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
Y Yao, Z Li, H Guo
Information Sciences 516, 505-514, 2020
72020
The construction of fuzzy concept lattices based on (θ, σ)-fuzzy rough approximation operators
Y Yao, J Mi, Z Li, B Xie
Fundamenta Informaticae 111 (1), 33-45, 2011
72011
Recommender systems with condensed local differential privacy
A Liu, Y Yao, X Cheng
International Conference on Machine Learning for Cyber Security, 355-365, 2020
52020
A Generalized Constraint of Privacy: -Mutual Information Security
Y Yao
IEEE Access 7, 36122-36131, 2019
52019
Security of weak secrets based cryptographic primitives via the Renyi entropy
Y Yao, Z Li
IET Information Security 10 (6), 442-450, 2016
52016
Deep learning algorithms design and implementation based on differential privacy
X Xu, Y Yao, L Cheng
International Conference on Machine Learning for Cyber Security, 317-330, 2020
42020
Fuzzy Concept Lattices Determined by (θ,σ)-Fuzzy Rough Approximation Operators
YQ Yao, JS Mi
Rough Sets and Knowledge Technology: 4th International Conference, RSKT 2009 …, 2009
42009
A certificateless ring signature scheme based on lattice
SS Dong, YH Zhou, YG Yang, Y Yao
Concurrency and Computation: Practice and Experience 34 (28), e7385, 2022
32022
Robust Secure Aggregation with Lightweight Verification for Federated Learning
C Huang, Y Yao, X Zhang, D Teng, Y Wang, L Zhou
2022 IEEE International Conference on Trust, Security and Privacy in …, 2022
22022
An improved privacy-preserving stochastic gradient descent algorithm
X Cheng, Y Yao, A Liu
International Conference on Machine Learning for Cyber Security, 340-354, 2020
22020
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system
S Dong, Y Yao, Y Zhou, Y Yang
Peer-to-Peer Networking and Applications 17 (1), 284-296, 2024
12024
An improved stochastic gradient descent algorithm based on Rényi differential privacy
XF Cheng, YQ Yao, L Zhang, A Liu, Z Li
International Journal of Intelligent Systems 37 (12), 10694-10714, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20