Follow
Cheng Li
Cheng Li
Verified email at stu.xidian.edu.cn
Title
Cited by
Cited by
Year
Efficient compressed ciphertext length scheme using multi-authority CP-ABE for hierarchical attributes
Z Zhang, C Li, BB Gupta, D Niu
IEEE Access 6, 38273-38284, 2018
292018
A novel authorization scheme for multimedia social networks under cloud storage method by using MA-CP-ABE
C Li, Z Zhang, L Zhang
International Journal of Cloud Applications and Computing (IJCAC) 8 (3), 32-47, 2018
272018
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection
L Yang, C Li, Y Cheng, S Yu, J Ma
Information Sciences 582, 529-546, 2022
72022
A novel attribute-based access control model for multimedia social networks.
Z Zhang, L Han, C Li, J Wang
Neural Network World, 2016
72016
SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things
C Li, L Yang, S Yu, W Qin, J Ma
Information Sciences 612, 151-167, 2022
52022
Vacuum: Efficient and Assured Deletion Scheme for User Sensitive Data on Mobile Devices
L Yang, C Li, T Wei, F Zhang, J Ma, N Xiong
IEEE Internet of Things Journal 9 (12), 10093-10107, 2021
42021
A secure and verifiable outsourcing scheme for assisting mobile device training machine learning model
C Li, L Yang, J Ma
Wireless Communications and Mobile Computing 2020, 1-16, 2020
22020
SEMMI: Multi-party Security Decision-making Scheme Under the Internet of Medical Things
C Li, L Yang, S Yu, W Qin, J Ma
ICC 2022-IEEE International Conference on Communications, 2792-2797, 2022
12022
A Secure and Verifiable Outsourcing Scheme for Machine Learning Data
C Li, L Yang, J Ma
International Conference on Security and Privacy in New Computing …, 2020
12020
Multimedia Social Network Authorization Scheme of Comparison-based Encryption.
C Li, Z Zhang, G Chang
Int. J. Netw. Secur. 21 (1), 137-144, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–10