Outsourced decentralized multi-authority attribute based signature and its application in IoT J Sun, Y Su, J Qin, J Hu, J Ma IEEE Transactions on Cloud Computing 9 (3), 1195-1209, 2019 | 41 | 2019 |
Lightweight cloud storage auditing with deduplication supporting strong privacy protection W Shen, Y Su, R Hao IEEE Access 8, 44359-44372, 2020 | 33 | 2020 |
Privacy-preserving outsourced inner product computation on encrypted database H Yang, Y Su, J Qin, H Wang IEEE Transactions on Dependable and Secure Computing 19 (2), 1320-1337, 2020 | 16 | 2020 |
Fedtor: An anonymous framework of federated learning in internet of things Y Chen, Y Su, M Zhang, H Chai, Y Wei, S Yu IEEE Internet of Things Journal 9 (19), 18620-18631, 2022 | 14 | 2022 |
Publicly verifiable shared dynamic electronic health record databases with functional commitment supporting privacy-preserving integrity auditing Y Su, J Sun, J Qin, J Hu IEEE Transactions on Cloud Computing 10 (3), 2050-2065, 2020 | 14 | 2020 |
A dynamic searchable symmetric encryption scheme for multiuser with forward and backward security X Zhang, Y Su, J Qin Security and Communication Networks 2020, 1-13, 2020 | 12 | 2020 |
Practical wildcard searchable encryption with tree‐based index X Zhang, B Zhao, J Qin, W Hou, Y Su, H Yang International Journal of Intelligent Systems 36 (12), 7475-7499, 2021 | 10 | 2021 |
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing H Yang, Y Su, J Qin, H Wang, Y Song Information Sciences 539, 295-311, 2020 | 5 | 2020 |
Divertible searchable symmetric encryption for secure cloud storage X Zhang, C Huang, Y Su, J Qin, X Shen GLOBECOM 2022-2022 IEEE Global Communications Conference, 3785-3790, 2022 | 3 | 2022 |
Efficient and flexible multi-authority attribute-based authentication for IoT devices Y Su, X Zhang, J Qin, J Ma IEEE Internet of Things Journal, 2023 | 2 | 2023 |
Over-threshold multi-party private set operation protocols for lightweight clients L Ma, H Wang, Z Niu, Z Li, L Wu, X Wei, Y Su Computer Standards & Interfaces 88, 103781, 2024 | 1 | 2024 |
Keyword-Based Remote Data Integrity Auditing Supporting Full Data Dynamics W Shen, C Gai, J Yu, Y Su IEEE Transactions on Services Computing, 2023 | 1 | 2023 |
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model H Yang, Y Su, J Qin, J Ma, H Wang International Conference on Machine Learning for Cyber Security, 578-592, 2020 | 1 | 2020 |
SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data X Zhang, Y Su, J Qin, J Sun The Computer Journal, bxae026, 2024 | | 2024 |
Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin Board X Li, H Wang, Z Li, L Wu, X Wei, Y Su, R Lu IEEE Transactions on Services Computing, 2024 | | 2024 |
Privacy-preserving recommendation system based on social relationships S Yu, H Wang, Y Su, Z Niu, Z Li, J Liu, J Wang Journal of King Saud University-Computer and Information Sciences 36 (2), 101923, 2024 | | 2024 |
Secure Multi-party SM2 Signature Based on SPDZ Protocol X Li, H Wang, J Chen, S Li, Y Sun, Y Su International Conference on Information Security and Cryptology, 85-103, 2023 | | 2023 |
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security X Zhang, Y Su, Z Wei, W Shen, J Qin International Conference on Artificial Intelligence Security and Privacy …, 2023 | | 2023 |
Certificateless public auditing with data privacy preserving for cloud-based smart grid data C Gai, W Shen, M Yang, Y Su Frontiers in Energy Research 10, 1058125, 2023 | | 2023 |