Public-key authenticated encryption with keyword search revisited: Security model and constructions B Qin, Y Chen, Q Huang, X Liu, D Zheng Information Sciences 516, 515-528, 2020 | 122 | 2020 |
Programmable hash functions from lattices: short signatures and IBEs with small key sizes J Zhang, Y Chen, Z Zhang Annual international cryptology conference, 303-332, 2016 | 82 | 2016 |
Bioartificial liver system based on choanoid fluidized bed bioreactor improve the survival time of fulminant hepatic failure pigs G Lv, L Zhao, A Zhang, W Du, Y Chen, C Yu, X Pan, Y Zhang, T Song, ... Biotechnology and bioengineering 108 (9), 2229-2236, 2011 | 67 | 2011 |
A lightweight blockchain-based privacy protection for smart surveillance at the edge A Fitwi, Y Chen, S Zhu 2019 IEEE International Conference on Blockchain (Blockchain), 552-555, 2019 | 65 | 2019 |
PGC: Decentralized confidential payment system with auditability Y Chen, X Ma, C Tang, MH Au Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 53 | 2020 |
Smart city surveillance at the network edge in the era of iot: opportunities and challenges N Chen, Y Chen Smart cities: development and governance frameworks, 153-176, 2018 | 52 | 2018 |
Evaluation of a bioartificial liver based on a nonwoven fabric bioreactor with porcine hepatocytes in pigs LJ Li, WB Du, YM Zhang, J Li, XP Pan, JJ Chen, HC Cao, Y Chen, ... Journal of hepatology 44 (2), 317-324, 2006 | 52 | 2006 |
Smart city surveillance in fog computing N Chen, Y Chen, X Ye, H Ling, S Song, CT Huang Advances in mobile cloud computing and big data in the 5G era, 203-226, 2017 | 51 | 2017 |
Blendsm-ddm: Blockchain-enabled secure microservices for decentralized data marketplaces R Xu, GS Ramachandran, Y Chen, B Krishnamachari 2019 IEEE international smart cities conference (ISC2), 14-17, 2019 | 49 | 2019 |
Efficacy of coupled low-volume plasma exchange with plasma filtration adsorption in treating pigs with acute liver failure: a randomised study N Zhou, J Li, Y Zhang, J Lu, E Chen, W Du, J Wang, X Pan, D Zhu, Y Yang, ... Journal of Hepatology 63 (2), 378-387, 2015 | 42 | 2015 |
Bridging the missing link of cloud data storage security in AWS J Feng, Y Chen, P Liu 2010 7th IEEE Consumer communications and Networking Conference, 1-2, 2010 | 41 | 2010 |
Generic constructions of integrated PKE and PEKS Y Chen, J Zhang, D Lin, Z Zhang Designs, Codes and Cryptography 78, 493-526, 2016 | 37 | 2016 |
Privacy-preserving surveillance as an edge service based on lightweight video protection schemes using face de-identification and window masking A Fitwi, Y Chen, S Zhu, E Blasch, G Chen Electronics 10 (3), 236, 2021 | 36 | 2021 |
An experimental study on microservices based edge computing platforms Q Qu, R Xu, SY Nikouei, Y Chen IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 36 | 2020 |
Neuronet: An adaptive infrastructure for network security Y Chen, H Chen International Journal of Information, Intelligence and Knowledge 1 (2), 143-168, 2009 | 28 | 2009 |
Generalized (identity‐based) hash proof system and its applications Y Chen, Z Zhang, D Lin, Z Cao Security and Communication Networks 9 (12), 1698-1716, 2016 | 27 | 2016 |
Anonymous identity-based hash proof system and its applications Y Chen, Z Zhang, D Lin, Z Cao Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012 | 27 | 2012 |
A novel PMU fog based early anomaly detection for an efficient wide area PMU network Z Yang, N Chen, Y Chen, N Zhou 2018 IEEE 2nd International Conference on Fog and Edge Computing (ICFEC), 1-10, 2018 | 26 | 2018 |
A study of entropy sources in cloud computers: random number generation on cloud hosts B Kerrigan, Y Chen International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 26 | 2012 |
Distributed change-point detection of DDoS attacks over multiple network domains Y Chen, K Hwang, WS Ku Int. Symp. on Collaborative Technologies and Systems, 543-550, 2006 | 24 | 2006 |