Securing display path for security-sensitive applications on mobile devices J Cui, Y Zhang, Z Cai, A Liu, Y Li Computers, Materials and Continua 55 (1), 17, 2018 | 83 | 2018 |
RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data J Xiong, Y Zhang, X Li, M Lin, Z Yao, G Liu Mobile Networks and Applications 23, 650-663, 2018 | 49 | 2018 |
ms‐PoSW: A multi‐server aided proof of shared ownership scheme for secure deduplication in cloud J Xiong, Y Zhang, L Lin, J Shen, X Li, M Lin Concurrency and Computation: Practice and Experience 32 (3), e4252, 2020 | 33 | 2020 |
Secure encrypted data with authorized deduplication in cloud J Xiong, Y Zhang, S Tang, X Liu, Z Yao IEEE Access 7, 75090-75104, 2019 | 27 | 2019 |
Achieving privacy-preserving multitask allocation for mobile crowdsensing Y Zhang, Z Ying, CLP Chen IEEE Internet of Things Journal 9 (18), 16795-16806, 2022 | 26 | 2022 |
Secure heterogeneous data deduplication via fog-assisted mobile crowdsensing in 5G-enabled IIoT Y Zhang, CLP Chen IEEE Transactions on Industrial Informatics 18 (4), 2849-2857, 2021 | 22 | 2021 |
Research progress on secure data deduplication in cloud J Xiong, Y Zhang, F Li, S Li, J Ren, Z Yao Journal on Communications 37 (11), 169-180, 2016 | 20 | 2016 |
Outsourced and privacy-preserving collaborative k-prototype clustering for mixed data via additive secret sharing R Bi, D Guo, Y Zhang, R Huang, L Lin, J Xiong IEEE Internet of Things Journal 10 (18), 15810-15821, 2023 | 14 | 2023 |
云环境中数据安全去重研究进展 熊金波, 张媛媛, 李凤华, 李素萍, 任君, 姚志强 通信学报 11, 2016 | 13 | 2016 |
A secure data deduplication scheme based on differential privacy J Ren, Z Yao, J Xiong, Y Zhang, A Ye 2016 IEEE 22nd International Conference on Parallel and Distributed Systems …, 2016 | 12 | 2016 |
A multi-replica associated deleting scheme in cloud Y Zhang, J Xiong, X Li, B Jin, S Li, XA Wang 2016 10th International Conference on complex, Intelligent, and software …, 2016 | 9 | 2016 |
Cloud data secure deduplication scheme via role-based symmetric encryption J Xiong, Y Zhang, Y Tian, Z Ying, Q Li, R Ma Tongxin Xuebao/Journal on Communications 39 (5), 59-73, 2018 | 4 | 2018 |
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions and Perspectives J Xiong, R Bi, Y Zhang, Q Li, L Lin, Y Tian IEEE Network, 2024 | 3 | 2024 |
Achieving proof of shared ownership for the shared file in collaborative cloud applications Y Zhang, J Xiong, M Lin, L Wang, X Li Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017 | 3 | 2017 |
基于角色对称加密的云数据安全去重 熊金波, 张媛媛, 田有亮, 应作斌, 李琦, 马蓉 Journal on Communication/Tongxin Xuebao 39 (5), 2018 | 2 | 2018 |
A novel role symmetric encryption algorithm for authorized deduplication in cloud Y Zhang, J Xiong, J Ren, L Wang, M Lin 10th EAI International Conference on Mobile Multimedia Communications, 104-110, 2017 | 2 | 2017 |
A privacy preserving data aggregation and query for metro passenger flow via mobile crowdsensing Y Zhang, Z Ying, B Zhao, CLP Chen Concurrency and Computation: Practice and Experience 35 (20), e6965, 2023 | 1 | 2023 |
面向社交网络的图片信息隐藏方法与实现 熊金波, 马蓉, 张媛媛, 戴睿煜 信息网络安全, 6-13, 2017 | 1 | 2017 |
Privacy-Preserving Traffic Violation Image Filtering and Searching via Crowdsensing Y Zhang, J Xiong, X Liu Mobile Networks and Applications 27 (6), 2374-2390, 2022 | | 2022 |
A Privacy-Preserving Metro Passenger Flow Acquisition and Query System Based on Crowd-Sensing C Nong, S Tang, Y Zhang 2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018 | | 2018 |