Privacy and security issues in deep learning: A survey X Liu, L Xie, Y Wang, J Zou, J Xiong, Z Ying, AV Vasilakos IEEE Access 9, 4566-4593, 2020 | 213 | 2020 |
Enhancing privacy and availability for data clustering in intelligent electrical service of IoT J Xiong, J Ren, L Chen, Z Yao, M Lin, D Wu, B Niu IEEE Internet of Things Journal 6 (2), 1530-1540, 2018 | 213 | 2018 |
A personalized privacy protection framework for mobile crowdsensing in IIoT J Xiong, R Ma, L Chen, Y Tian, Q Li, X Liu, Z Yao IEEE Transactions on Industrial Informatics 16 (6), 4231-4241, 2019 | 211 | 2019 |
Secure, efficient and revocable multi-authority access control system in cloud storage Q Li, J Ma, R Li, X Liu, J Xiong, D Chen Computers & Security 59, 45-59, 2016 | 134 | 2016 |
A blockchain-based secure key management scheme with trustworthiness in DWSNs Y Tian, Z Wang, J Xiong, J Ma IEEE Transactions on Industrial Informatics 16 (9), 6193-6202, 2020 | 122 | 2020 |
Edge-assisted privacy-preserving raw data sharing framework for connected autonomous vehicles J Xiong, R Bi, M Zhao, J Guo, Q Yang IEEE Wireless Communications 27 (3), 24-30, 2020 | 121 | 2020 |
An AI-enabled three-party game framework for guaranteed data privacy in mobile edge crowdsensing of IoT J Xiong, M Zhao, MZA Bhuiyan, L Chen, Y Tian IEEE Transactions on Industrial Informatics 17 (2), 922-933, 2019 | 113 | 2019 |
A secure data self-destructing scheme in cloud computing J Xiong, X Liu, Z Yao, J Ma, Q Li, K Geng, PS Chen IEEE Transactions on Cloud Computing 2 (4), 448-458, 2014 | 89 | 2014 |
A full lifecycle privacy protection scheme for sensitive data in cloud computing J Xiong, F Li, J Ma, X Liu, Z Yao, PS Chen Peer-to-peer Networking and Applications 8, 1025-1037, 2015 | 88 | 2015 |
A task-oriented user selection incentive mechanism in edge-aided mobile crowdsensing J Xiong, X Chen, Q Yang, L Chen, Z Yao IEEE Transactions on Network Science and Engineering 7 (4), 2347-2360, 2019 | 84 | 2019 |
A blockchain-based machine learning framework for edge services in IIoT Y Tian, T Li, J Xiong, MZA Bhuiyan, J Ma, C Peng IEEE Transactions on Industrial Informatics 18 (3), 1918-1929, 2021 | 83 | 2021 |
Ciphertext-Policy Hierarchical Attribute-based Encryption for Fine-Grained Access Control of Encryption Data. X Liu, J Ma, J Xiong, G Liu Int. J. Netw. Secur. 16 (6), 437-443, 2014 | 59 | 2014 |
Toward lightweight, privacy-preserving cooperative object classification for connected autonomous vehicles J Xiong, R Bi, Y Tian, X Liu, D Wu IEEE Internet of Things Journal 9 (4), 2787-2801, 2021 | 57 | 2021 |
Personal health records integrity verification using attribute based proxy signature in cloud computing X Liu, J Ma, J Xiong, T Zhang, Q Li Internet and Distributed Computing Systems: 6th International Conference …, 2013 | 51 | 2013 |
RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data J Xiong, Y Zhang, X Li, M Lin, Z Yao, G Liu Mobile Networks and Applications 23, 650-663, 2018 | 48 | 2018 |
DPLK-means: A novel Differential Privacy K-means Mechanism J Ren, J Xiong, Z Yao, R Ma, M Lin 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC …, 2017 | 43 | 2017 |
A secure self-destruction scheme with IBE for the internet content privacy J Xiong, Z Yao, J Ma, F Li, X Liu Chinese Journal of Computers 37 (1), 139-150, 2014 | 43 | 2014 |
Large universe decentralized key‐policy attribute‐based encryption Q Li, J Ma, R Li, J Xiong, X Liu Security and communication Networks 8 (3), 501-509, 2015 | 40 | 2015 |
Blockchain-enabled secure and trusted federated data sharing in IIoT Z Zhou, Y Tian, J Xiong, J Ma, C Peng IEEE Transactions on Industrial Informatics 19 (5), 6669-6681, 2022 | 39 | 2022 |
A secure data deletion scheme for IoT devices through key derivation encryption and data analysis J Xiong, L Chen, MZA Bhuiyan, C Cao, M Wang, E Luo, X Liu Future Generation Computer Systems 111, 741-753, 2020 | 35 | 2020 |