Secure outsourcing of modular exponentiations under single untrusted programme model Y Ding, Z Xu, J Ye, KKR Choo Journal of Computer and System Sciences 90, 1-13, 2017 | 48 | 2017 |
Efficient and secure encrypted image search in mobile cloud computing Q Zou, J Wang, J Ye, J Shen, X Chen Soft Computing 21, 2959-2969, 2017 | 37 | 2017 |
Fine-grained searchable encryption in multi-user setting J Ye, J Wang, J Zhao, J Shen, KC Li Soft Computing 21, 6201-6212, 2017 | 28 | 2017 |
Controllable keyword search scheme supporting multiple users J Ye, Y Ding Future Generation Computer Systems 81, 433-442, 2018 | 27 | 2018 |
Secure and efficient fine-grained data access control scheme in cloud computing1 C Yang, J Ye Journal of High Speed Networks 21 (4), 259-271, 2015 | 26 | 2015 |
An improved algorithm for secure outsourcing of modular exponentiations J Ye, X Chen, J Ma 2015 IEEE 29th International Conference on Advanced Information Networking …, 2015 | 21 | 2015 |
Verifiable delegation of polynomials. J Ye, H Zhang, C Fu Int. J. Netw. Secur. 18 (2), 283-290, 2016 | 17 | 2016 |
A novel video copyright protection scheme based on blockchain and double watermarking J Zheng, S Teng, P Li, W Ou, D Zhou, J Ye Security and communication networks 2021 (1), 6493306, 2021 | 14 | 2021 |
Attribute-based fine-grained access control with user revocation J Ye, W Zhang, SL Wu, YY Gao, JT Qiu Information and Communication Technology: Second IFIP TC5/8 International …, 2014 | 14 | 2014 |
Efficient request-based comparable encryption scheme based on sliding window method P Chen, J Ye, X Chen Soft Computing 20, 4589-4596, 2016 | 13 | 2016 |
Research on improved YOLOv3 fire detection based on enlarged feature map resolution and cluster analysis C Yue, J Ye Journal of Physics: Conference Series 1757 (1), 012094, 2021 | 11 | 2021 |
Image search scheme over encrypted database J Ye, Z Xu, Y Ding Future Generation Computer Systems 87, 251-258, 2018 | 11 | 2018 |
Secure outsourcing of modular exponentiation with single untrusted server J Ye, J Wang 2015 18th International Conference on Network-Based Information Systems, 643-645, 2015 | 11 | 2015 |
ZeroTrustBased Protection Scheme for Users in Internet of Vehicles L Fang, C Wu, Y Kang, W Ou, D Zhou, J Ye Security and Communication Networks 2022 (1), 9896689, 2022 | 9 | 2022 |
Computation offloading based on improved glowworm swarm optimization algorithm in mobile edge computing K Fu, J Ye Journal of Physics: Conference Series 1757 (1), 012195, 2021 | 7 | 2021 |
Research on the security technology of federated learning privacy preserving J Mao, C Cao, LJ Wang, J Ye, WJ Zhong Journal of Physics: Conference Series 1757 (1), 012192, 2021 | 7 | 2021 |
Identity-based re-encryption scheme with lightweight re-encryption key generation L Liu, J Ye Journal of Discrete Mathematical Sciences and Cryptography 21 (1), 41-57, 2018 | 7 | 2018 |
Tor hidden services discovery and analysis: A literature survey J Bian, C Cao, L Wang, J Ye, Y Zhao, C Tang Journal of Physics: Conference Series 1757 (1), 012162, 2021 | 6 | 2021 |
Comparable encryption scheme supporting multiple users in cloud computing J Ye, M Miao, P Chen, X Chen International Journal of High Performance Computing and Networking 11 (1), 24-33, 2018 | 5 | 2018 |
Group signature scheme based on verifiable random number J Ye, L Li Journal of Discrete Mathematical Sciences and Cryptography 20 (2), 525-533, 2017 | 5 | 2017 |