Follow
YE SU
YE SU
Shandong University
Verified email at uts.edu.au
Title
Cited by
Cited by
Year
Outsourced decentralized multi-authority attribute based signature and its application in IoT
J Sun, Y Su, J Qin, J Hu, J Ma
IEEE Transactions on Cloud Computing 9 (3), 1195-1209, 2019
412019
Lightweight cloud storage auditing with deduplication supporting strong privacy protection
W Shen, Y Su, R Hao
IEEE Access 8, 44359-44372, 2020
332020
Privacy-preserving outsourced inner product computation on encrypted database
H Yang, Y Su, J Qin, H Wang
IEEE Transactions on Dependable and Secure Computing 19 (2), 1320-1337, 2020
162020
Fedtor: An anonymous framework of federated learning in internet of things
Y Chen, Y Su, M Zhang, H Chai, Y Wei, S Yu
IEEE Internet of Things Journal 9 (19), 18620-18631, 2022
142022
Publicly verifiable shared dynamic electronic health record databases with functional commitment supporting privacy-preserving integrity auditing
Y Su, J Sun, J Qin, J Hu
IEEE Transactions on Cloud Computing 10 (3), 2050-2065, 2020
142020
A dynamic searchable symmetric encryption scheme for multiuser with forward and backward security
X Zhang, Y Su, J Qin
Security and Communication Networks 2020, 1-13, 2020
122020
Practical wildcard searchable encryption with tree‐based index
X Zhang, B Zhao, J Qin, W Hou, Y Su, H Yang
International Journal of Intelligent Systems 36 (12), 7475-7499, 2021
102021
Verifiable inner product computation on outsourced database for authenticated multi-user data sharing
H Yang, Y Su, J Qin, H Wang, Y Song
Information Sciences 539, 295-311, 2020
52020
Divertible searchable symmetric encryption for secure cloud storage
X Zhang, C Huang, Y Su, J Qin, X Shen
GLOBECOM 2022-2022 IEEE Global Communications Conference, 3785-3790, 2022
32022
Efficient and flexible multi-authority attribute-based authentication for IoT devices
Y Su, X Zhang, J Qin, J Ma
IEEE Internet of Things Journal, 2023
22023
Over-threshold multi-party private set operation protocols for lightweight clients
L Ma, H Wang, Z Niu, Z Li, L Wu, X Wei, Y Su
Computer Standards & Interfaces 88, 103781, 2024
12024
Keyword-Based Remote Data Integrity Auditing Supporting Full Data Dynamics
W Shen, C Gai, J Yu, Y Su
IEEE Transactions on Services Computing, 2023
12023
An Efficient Public Batch Auditing Scheme for Data Integrity in Standard Model
H Yang, Y Su, J Qin, J Ma, H Wang
International Conference on Machine Learning for Cyber Security, 578-592, 2020
12020
SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data
X Zhang, Y Su, J Qin, J Sun
The Computer Journal, bxae026, 2024
2024
Publicly Verifiable Secure Multi-Party Computation Framework Based on Bulletin Board
X Li, H Wang, Z Li, L Wu, X Wei, Y Su, R Lu
IEEE Transactions on Services Computing, 2024
2024
Privacy-preserving recommendation system based on social relationships
S Yu, H Wang, Y Su, Z Niu, Z Li, J Liu, J Wang
Journal of King Saud University-Computer and Information Sciences 36 (2), 101923, 2024
2024
Secure Multi-party SM2 Signature Based on SPDZ Protocol
X Li, H Wang, J Chen, S Li, Y Sun, Y Su
International Conference on Information Security and Cryptology, 85-103, 2023
2023
Efficient Wildcard Searchable Symmetric Encryption with Forward and Backward Security
X Zhang, Y Su, Z Wei, W Shen, J Qin
International Conference on Artificial Intelligence Security and Privacy …, 2023
2023
Certificateless public auditing with data privacy preserving for cloud-based smart grid data
C Gai, W Shen, M Yang, Y Su
Frontiers in Energy Research 10, 1058125, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–19