关注
Yanqing Yao
Yanqing Yao
Beihang University
在 nyu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A novel variable precision (θ, σ)-fuzzy rough set model based on fuzzy granules
Y Yao, J Mi, Z Li
Fuzzy Sets and Systems 236, 58-72, 2014
1002014
Attribute reduction based on generalized fuzzy evidence theory in fuzzy decision systems
YQ Yao, JS Mi, ZJ Li
Fuzzy Sets and Systems 170 (1), 64-75, 2011
492011
A novel fuzzy identity based signature scheme based on the short integer solution problem
Y Yao, Z Li
Computers & Electrical Engineering 40 (6), 1930–1939, 2013
212013
Privacy with Imperfect Randomness
YY 1. Yevgeniy Dodis
LNCS 9216, 463-482, 0
21*
Privacy and Imperfect Randomness
Y Dodis, Y Yao
IACR Cryptology ePrint Archive 2014: 623 (2014), 0
21*
Lattice-based key-aggregate (searchable) encryption in cloud storage
Y Yao, Z Zhai, J Liu, Z Li
IEEE Access 7, 164544-164555, 2019
202019
Efficient and dynamic key management for multiple identities in identity-based systems
H Guo, C Xu, Z Li, Y Yao, Y Mu
Information Sciences 221, 579-590, 2013
132013
A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
Y Yao, Z Li, H Guo
Information Sciences 516, 505-514, 2020
82020
Overcoming Weak Expectations via the Rnyi Entropy and the Expanded Computational Entropy
Y Yao, Z Li
International Conference on Information Theoretic Security, 162-178, 2013
72013
The construction of fuzzy concept lattices based on (θ, σ)-fuzzy rough approximation operators
Y Yao, J Mi, Z Li, B Xie
Fundamenta Informaticae 111 (1), 33-45, 2011
72011
Recommender systems with condensed local differential privacy
A Liu, Y Yao, X Cheng
International Conference on Machine Learning for Cyber Security, 355-365, 2020
62020
Robust Secure Aggregation with Lightweight Verification for Federated Learning
C Huang, Y Yao, X Zhang, D Teng, Y Wang, L Zhou
2022 IEEE International Conference on Trust, Security and Privacy in …, 2022
52022
A Generalized Constraint of Privacy: -Mutual Information Security
Y Yao
IEEE Access 7, 36122-36131, 2019
52019
Security of weak secrets based cryptographic primitives via the Renyi entropy
Y Yao, Z Li
IET Information Security 10 (6), 442-450, 2016
52016
A certificateless ring signature scheme based on lattice
SS Dong, YH Zhou, YG Yang, Y Yao
Concurrency and Computation: Practice and Experience 34 (28), e7385, 2022
42022
Deep learning algorithms design and implementation based on differential privacy
X Xu, Y Yao, L Cheng
International Conference on Machine Learning for Cyber Security, 317-330, 2020
42020
Fuzzy Concept Lattices Determined by (θ,σ)-Fuzzy Rough Approximation Operators
YQ Yao, JS Mi
Rough Sets and Knowledge Technology: 4th International Conference, RSKT 2009 …, 2009
42009
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system
S Dong, Y Yao, Y Zhou, Y Yang
Peer-to-Peer Networking and Applications 17 (1), 284-296, 2024
32024
An SM2-based traceable ring signature scheme for smart grid privacy protection
D Teng, Y Yao, Y Wang, L Zhou, C Huang
International Conference on Wireless Algorithms, Systems, and Applications …, 2022
22022
An improved privacy-preserving stochastic gradient descent algorithm
X Cheng, Y Yao, A Liu
International Conference on Machine Learning for Cyber Security, 340-354, 2020
22020
系统目前无法执行此操作,请稍后再试。
文章 1–20