A novel variable precision (θ, σ)-fuzzy rough set model based on fuzzy granules Y Yao, J Mi, Z Li Fuzzy Sets and Systems 236, 58-72, 2014 | 100 | 2014 |
Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems YQ Yao, JS Mi, ZJ Li Fuzzy Sets and Systems 170 (1), 64-75, 2011 | 49 | 2011 |
A novel fuzzy identity based signature scheme based on the short integer solution problem Y Yao, Z Li Computers & Electrical Engineering 40 (6), 1930–1939, 2013 | 21 | 2013 |
Privacy with Imperfect Randomness YY 1. Yevgeniy Dodis LNCS 9216, 463-482, 0 | 21* | |
Privacy and Imperfect Randomness Y Dodis, Y Yao IACR Cryptology ePrint Archive 2014: 623 (2014), 0 | 21* | |
Lattice-based key-aggregate (searchable) encryption in cloud storage Y Yao, Z Zhai, J Liu, Z Li IEEE Access 7, 164544-164555, 2019 | 20 | 2019 |
Efficient and dynamic key management for multiple identities in identity-based systems H Guo, C Xu, Z Li, Y Yao, Y Mu Information Sciences 221, 579-590, 2013 | 13 | 2013 |
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes Y Yao, Z Li, H Guo Information Sciences 516, 505-514, 2020 | 8 | 2020 |
Overcoming Weak Expectations via the Rnyi Entropy and the Expanded Computational Entropy Y Yao, Z Li International Conference on Information Theoretic Security, 162-178, 2013 | 7 | 2013 |
The construction of fuzzy concept lattices based on (θ, σ)-fuzzy rough approximation operators Y Yao, J Mi, Z Li, B Xie Fundamenta Informaticae 111 (1), 33-45, 2011 | 7 | 2011 |
Recommender systems with condensed local differential privacy A Liu, Y Yao, X Cheng International Conference on Machine Learning for Cyber Security, 355-365, 2020 | 6 | 2020 |
Robust Secure Aggregation with Lightweight Verification for Federated Learning C Huang, Y Yao, X Zhang, D Teng, Y Wang, L Zhou 2022 IEEE International Conference on Trust, Security and Privacy in …, 2022 | 5 | 2022 |
A Generalized Constraint of Privacy: -Mutual Information Security Y Yao IEEE Access 7, 36122-36131, 2019 | 5 | 2019 |
Security of weak secrets based cryptographic primitives via the Renyi entropy Y Yao, Z Li IET Information Security 10 (6), 442-450, 2016 | 5 | 2016 |
A certificateless ring signature scheme based on lattice SS Dong, YH Zhou, YG Yang, Y Yao Concurrency and Computation: Practice and Experience 34 (28), e7385, 2022 | 4 | 2022 |
Deep learning algorithms design and implementation based on differential privacy X Xu, Y Yao, L Cheng International Conference on Machine Learning for Cyber Security, 317-330, 2020 | 4 | 2020 |
Fuzzy Concept Lattices Determined by (θ,σ)-Fuzzy Rough Approximation Operators YQ Yao, JS Mi Rough Sets and Knowledge Technology: 4th International Conference, RSKT 2009 …, 2009 | 4 | 2009 |
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system S Dong, Y Yao, Y Zhou, Y Yang Peer-to-Peer Networking and Applications 17 (1), 284-296, 2024 | 3 | 2024 |
An SM2-based traceable ring signature scheme for smart grid privacy protection D Teng, Y Yao, Y Wang, L Zhou, C Huang International Conference on Wireless Algorithms, Systems, and Applications …, 2022 | 2 | 2022 |
An improved privacy-preserving stochastic gradient descent algorithm X Cheng, Y Yao, A Liu International Conference on Machine Learning for Cyber Security, 340-354, 2020 | 2 | 2020 |