An overview on smart contracts: Challenges, advances and platforms Z Zheng, S Xie, HN Dai, W Chen, X Chen, J Weng, M Imran Future Generation Computer Systems 105, 475-491, 2020 | 1074 | 2020 |
Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive J Weng, J Weng, J Zhang, M Li, Y Zhang, W Luo IEEE Transactions on Dependable and Secure Computing 18 (5), 2438-2455, 2019 | 592 | 2019 |
Attribute-based encryption with verifiable outsourced decryption J Lai, RH Deng, C Guan, J Weng IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013 | 577 | 2013 |
CrowdBC: A blockchain-based decentralized framework for crowdsourcing M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng IEEE transactions on parallel and distributed systems 30 (6), 1251-1266, 2018 | 532 | 2018 |
Efficient unidirectional proxy re-encryption SSM Chow, J Weng, Y Yang, RH Deng Progress in Cryptology–AFRICACRYPT 2010: Third International Conference on …, 2010 | 428 | 2010 |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings J Weng, RH Deng, S Liu, K Chen Information Sciences 180 (24), 5077-5089, 2010 | 390* | 2010 |
Feature selection for text classification: A review X Deng, Y Li, J Weng, J Zhang Multimedia Tools and Applications 78 (3), 3797-3816, 2019 | 350 | 2019 |
Verifiable computation over large database with incremental updates X Chen, J Li, J Weng, J Ma, W Lou IEEE transactions on Computers 65 (10), 3184-3195, 2015 | 323 | 2015 |
Conditional proxy re-encryption secure against chosen-ciphertext attack J Weng, RH Deng, X Ding, CK Chu, J Lai Proceedings of the 4th international symposium on information, computer, and …, 2009 | 269 | 2009 |
An efficient privacy-preserving outsourced calculation toolkit with multiple keys X Liu, RH Deng, KKR Choo, J Weng IEEE Transactions on Information Forensics and Security 11 (11), 2401-2414, 2016 | 256 | 2016 |
A two-layer nonlinear combination method for short-term wind speed prediction based on ELM, ENN, and LSTM MR Chen, GQ Zeng, KD Lu, J Weng IEEE Internet of Things Journal 6 (4), 6997-7010, 2019 | 222 | 2019 |
Adaptive population extremal optimization-based PID neural network for multivariable nonlinear control systems GQ Zeng, XQ Xie, MR Chen, J Weng Swarm and evolutionary computation 44, 320-334, 2019 | 199 | 2019 |
Efficient and privacy-preserving outsourced calculation of rational numbers X Liu, KKR Choo, RH Deng, R Lu, J Weng IEEE Transactions on Dependable and Secure Computing 15 (1), 27-39, 2016 | 196 | 2016 |
Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data Z Fu, F Huang, K Ren, J Weng, C Wang IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017 | 179 | 2017 |
An improved deep learning approach for detection of thyroid papillary cancer in ultrasound images H Li, J Weng, Y Shi, W Gu, Y Mao, Y Wang, W Liu, J Zhang Scientific reports 8 (1), 6600, 2018 | 176 | 2018 |
Conditional proxy broadcast re-encryption CK Chu, J Weng, SSM Chow, J Zhou, RH Deng Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009 | 176 | 2009 |
Copy-move forgery detection based on hybrid features F Yang, J Li, W Lu, J Weng Engineering Applications of Artificial Intelligence 59, 73-83, 2017 | 170 | 2017 |
Lightweight fine-grained search over encrypted data in fog computing Y Miao, J Ma, X Liu, J Weng, H Li, H Li IEEE Transactions on Services Computing 12 (5), 772-785, 2018 | 166 | 2018 |
Blockchain enabled trust-based location privacy protection scheme in VANET B Luo, X Li, J Weng, J Guo, J Ma IEEE Transactions on Vehicular Technology 69 (2), 2034-2048, 2019 | 165 | 2019 |
Cloudde: A heterogeneous differential evolution algorithm and its distributed cloud version ZH Zhan, XF Liu, H Zhang, Z Yu, J Weng, Y Li, T Gu, J Zhang IEEE Transactions on Parallel and Distributed Systems 28 (3), 704-716, 2016 | 155 | 2016 |