Certificateless public key encryption with keyword search P Yanguo, C Jiangtao, P Changgen, Y Zuobin China Communications 11 (11), 100-113, 2014 | 106 | 2014 |
ADFL: A poisoning attack defense framework for horizontal federated learning J Guo, H Li, F Huang, Z Liu, Y Peng, X Li, J Ma, VG Menon, KK Igorevich IEEE Transactions on Industrial Informatics 18 (10), 6526-6536, 2022 | 21 | 2022 |
SCALE: An efficient framework for secure dynamic skyline query processing in the cloud W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui Database Systems for Advanced Applications: 25th International Conference …, 2020 | 17 | 2020 |
A control-chart-based detector for small-amount electricity theft (SET) attack in smart grids X Xia, J Lin, Y Xiao, J Cui, Y Peng, Y Ma IEEE Internet of Things Journal 9 (9), 6745-6762, 2021 | 16 | 2021 |
LS-RQ: A lightweight and forward-secure range query on geographically encrypted data Y Peng, L Wang, J Cui, X Liu, H Li, J Ma IEEE Transactions on Dependable and Secure Computing 19 (1), 388-401, 2020 | 14 | 2020 |
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts Y Peng, H Li, J Cui, J Zhang, J Ma, C Peng Science China Information Sciences 60, 1-17, 2017 | 12 | 2017 |
SecureNearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments W Xue, H Li, Y Peng, J Cui, Y Shi IEEE Transactions on Big Data 4 (4), 586-599, 2017 | 11 | 2017 |
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud Y Peng, J Cui, H Li, J Ma Information Sciences 387, 146-164, 2017 | 11 | 2017 |
Image analysis using modified exponent-Fourier moments B He, J Cui, B Xiao, Y Peng EURASIP Journal on Image and Video Processing 2019, 1-27, 2019 | 10 | 2019 |
Quaternion fractional-order color orthogonal moment-based image representation and recognition B He, J Liu, T Yang, B Xiao, Y Peng EURASIP Journal on Image and Video Processing 2021 (1), 17, 2021 | 7 | 2021 |
Towards Secure Approximate-Nearest Neighbor Query Over Encrypted High-Dimensional Data Y Peng, H Li, J Cui, J Ma, Y Liu IEEE Access 6, 23137-23151, 2018 | 6 | 2018 |
Secsky: A secure dynamic skyline query scheme with data privacy J Zhao, Y Ma, J Cui, Y Peng, K Li, T Wang IEEE Access 9, 5690-5703, 2020 | 5 | 2020 |
An efficient range query model over encrypted outsourced data using secure kd tree Y Peng, H Li, J Cui, Y Zhu, C Peng 2016 International Conference on Networking and Network Applications (NaNA …, 2016 | 5 | 2016 |
An efficient secure dynamic skyline query model W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui arXiv preprint arXiv:2002.07511, 2020 | 4 | 2020 |
Adagt: An adaptive group testing method for improving efficiency and sensitivity of large-scale screening against covid-19 X Xia, Y Liu, Y Xiao, J Cui, B Yang, Y Peng IEEE Transactions on Automation Science and Engineering 19 (2), 646-662, 2021 | 3 | 2021 |
Image analysis by fast improved radial harmonic‐Fourier moments algorithm B He, J Cui, Y Peng, T Yang International Journal of Imaging Systems and Technology 30 (4), 1033-1045, 2020 | 3 | 2020 |
PvCT: A publicly verifiable contact tracing algorithm in cloud computing Y Zhu, W Ma, J Cui, X Xia, Y Peng, J Ning Security and Communication Networks 2021, 1-18, 2021 | 2 | 2021 |
A rational exchange protocol under asymmetric information in wireless sensor networks Z Lv, C Peng, Y Peng, J Zhang Wireless Communications and Mobile Computing 2018, 2018 | 1 | 2018 |
Certificateless public key broadcast encryption based on Huffman tree L Feng, C Peng, Y Peng Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) 48 (24), 2012 | 1 | 2012 |
Quartet: A Query Aware Database Adaptive Compilation Decision System Z Wang, J Cui, X Gao, H Li, Y Peng, Z Liu, H Zhang, K Zhao Expert Systems with Applications 244, 122841, 2024 | | 2024 |