Prediction of rising stars in the game of cricket H Ahmad, A Daud, L Wang, H Hong, H Dawood, Y Yang IEEE Access 5, 4104-4124, 2017 | 57 | 2017 |
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices M Xie, Y Ruan, H Hong, J Shao Future Generation Computer Systems 121, 114-122, 2021 | 40 | 2021 |
A certificateless verifiable strong designated verifier signature scheme S Han, M Xie, B Yang, R Lu, H Bao, J Lin, HB Hong, MX Gu, S Han IEEE Access 7, 126391-126408, 2019 | 19 | 2019 |
A secure trust-based key distribution with self-healing for internet of things S Han, M Gu, B Yang, J Lin, H Hong, M Kong IEEE Access 7, 114060-114076, 2019 | 18 | 2019 |
Construction of DNA codes by using algebraic number theory H Hong, L Wang, H Ahmad, J Li, Y Yang, C Wu Finite Fields and Their Applications 37, 328-343, 2016 | 17 | 2016 |
A new secure encryption scheme based on group factorization problem Y Cong, H Hong, J Shao, S Han, J Lin, S Zhao IEEE Access 7, 168728-168735, 2019 | 15 | 2019 |
Primitives towards verifiable computation: a survey H Ahmad, L Wang, H Hong, J Li, H Dawood, M Ahmed, Y Yang Frontiers of Computer Science 12, 451-478, 2018 | 14 | 2018 |
A Digital Signature Scheme Based on MST3 Cryptosystems H Hong, J Li, L Wang, Y Yang, X Niu Mathematical Problems in Engineering 2014 (1), 630421, 2014 | 13 | 2014 |
A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices M Xie, Q Zhao, H Hong, C Chen, J Yu Journal of Parallel and Distributed Computing 169, 58-71, 2022 | 12 | 2022 |
Minimal logarithmic signatures for the unitary group H Hong, L Wang, Y Yang Designs, Codes and Cryptography 77, 179-191, 2015 | 8 | 2015 |
All exceptional groups of lie type have minimal logarithmic signatures H Hong, L Wang, Y Yang, H Ahmad Applicable Algebra in Engineering, Communication and Computing 25, 287-296, 2014 | 8 | 2014 |
Cyclic preparation of two-qubit state in two noisy environments YR Sun, XB Chen, J Shao, S Han, H Hong, H Bao, Y Yang Quantum Information Processing 21 (1), 40, 2022 | 7 | 2022 |
Public Key Encryption in Non-Abelian Groups H Hong, J Shao, L Wang, H Ahmad, Y Yang arXiv preprint arXiv:1605.06608, 2016 | 4 | 2016 |
Minimal logarithmic signatures for sporadic groups H Hong, L Wang, H Ahmad, J Li, Y Yang arXiv preprint arXiv:1507.01162, 2015 | 4 | 2015 |
A CCA secure public key encryption scheme based on finite groups of Lie type H Hong, J Shao, L Wang, M Xie, G Wei, Y Yang, S Han, J Lin Information Sciences 65 (119102), 1-119102, 2022 | 3 | 2022 |
Anti-Backdoor Model: A Novel Algorithm To Remove Backdoors in a Non-invasive Way C Chen, H Hong, T Xiang, M Xie IEEE Transactions on Information Forensics and Security, 2024 | 2 | 2024 |
A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments M Xie, X Yang, H Hong, G Wei, Z Zhang Future Generation Computer Systems 153, 287-300, 2024 | 2 | 2024 |
A blockchain-based proxy oriented cloud storage public audit scheme for low-performance terminal devices M Xie, Q Zhao, H Hong International Conference on Algorithms and Architectures for Parallel …, 2021 | 2 | 2021 |
A novel protection method of continuous location sharing based on local differential privacy and conditional random field L Zhu, H Hong, M Xie International Conference on Algorithms and Architectures for Parallel …, 2021 | 2 | 2021 |
A Miniature CCA public key encryption scheme based on non-abelian factorization problem in finite groups of lie type H Hong, L Wang, J Shao, J Yan, H Ahmad, G Wei, M Xie, Y Yang The Computer Journal 62 (12), 1840-1848, 2019 | 2 | 2019 |