Hierarchical attribute-based encryption for fine-grained access control in cloud storage services G Wang, Q Liu, J Wu Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 913 | 2010 |
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers G Wang, Q Liu, J Wu, M Guo computers & security 30 (5), 320-331, 2011 | 325 | 2011 |
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Q Liu, G Wang, J Wu Information sciences 258, 355-370, 2014 | 319 | 2014 |
Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks Z Zhou, M Dong, K Ota, G Wang, LT Yang IEEE Internet of Things Journal 3 (3), 428-438, 2015 | 288 | 2015 |
Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems E Luo, MZA Bhuiyan, G Wang, MA Rahman, J Wu, M Atiquzzaman IEEE Communications Magazine 56 (2), 163-168, 2018 | 266 | 2018 |
Deploying wireless sensor networks with fault-tolerance for structural health monitoring MZA Bhuiyan, G Wang, J Cao, J Wu IEEE Transactions on Computers 64 (2), 382-395, 2013 | 241 | 2013 |
A blockchain-based nonrepudiation network computing service scheme for industrial IoT Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019 | 240 | 2019 |
Dependable structural health monitoring using wireless sensor networks MZA Bhuiyan, G Wang, J Wu, J Cao, X Liu, T Wang IEEE Transactions on Dependable and Secure Computing 14 (4), 363-376, 2015 | 233 | 2015 |
A survey on security attacks in VANETs: Communication, applications and challenges M Arif, G Wang, MZA Bhuiyan, T Wang, J Chen Vehicular Communications 19, 100179, 2019 | 220 | 2019 |
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges W Jiang, G Wang, MZA Bhuiyan, J Wu Acm Computing Surveys (Csur) 49 (1), 1-35, 2016 | 211 | 2016 |
OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city M Gheisari, HE Najafabadi, JA Alzubi, J Gao, G Wang, AA Abbasi, ... Future Generation Computer Systems 123, 1-13, 2021 | 196 | 2021 |
Secure and privacy preserving keyword searching for cloud storage services Q Liu, G Wang, J Wu Journal of network and computer applications 35 (3), 927-933, 2012 | 195 | 2012 |
Generating trusted graphs for trust evaluation in online social networks W Jiang, G Wang, J Wu Future generation computer systems 31, 48-58, 2014 | 189 | 2014 |
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services S Zhang, X Li, Z Tan, T Peng, G Wang Future Generation Computer Systems 94, 40-50, 2019 | 188 | 2019 |
Collaborative trajectory privacy preserving scheme in location-based services T Peng, Q Liu, D Meng, G Wang Information Sciences 387, 165-179, 2017 | 187 | 2017 |
A survey on deep learning in big data M Gheisari, G Wang, MZA Bhuiyan 2017 IEEE international conference on computational science and engineering …, 2017 | 183 | 2017 |
Fog-based computing and storage offloading for data synchronization in IoT T Wang, J Zhou, A Liu, MZA Bhuiyan, G Wang, W Jia IEEE Internet of Things Journal 6 (3), 4272-4282, 2018 | 181 | 2018 |
An efficient privacy preserving keyword search scheme in cloud computing Q Liu, G Wang, J Wu 2009 International Conference on Computational Science and Engineering 2 …, 2009 | 169 | 2009 |
A dual privacy preserving scheme in continuous location-based services S Zhang, G Wang, MZA Bhuiyan, Q Liu IEEE Internet of Things Journal 5 (5), 4191-4200, 2018 | 162 | 2018 |
Social influence analysis in social networking big data: Opportunities and challenges S Peng, G Wang, D Xie IEEE network 31 (1), 11-17, 2016 | 158 | 2016 |