Public-key encryption with fuzzy keyword search: A provably secure scheme under keyword guessing attack P Xu, H Jin, Q Wu, W Wang IEEE Transactions on computers 62 (11), 2266-2277, 2012 | 331 | 2012 |
Conditional identity-based broadcast proxy re-encryption and its application to cloud email P Xu, T Jiao, Q Wu, W Wang, H Jin IEEE Transactions on Computers 65 (1), 66-79, 2015 | 164 | 2015 |
A distributed HOSVD method with its incremental computation for big data in cyber-physical-social systems X Wang, W Wang, LT Yang, S Liao, D Yin, MJ Deen IEEE Transactions on Computational Social Systems 5 (2), 481-492, 2018 | 128 | 2018 |
Lightweight searchable public-key encryption for cloud-assisted wireless sensor networks P Xu, S He, W Wang, W Susilo, H Jin IEEE Transactions on Industrial Informatics 14 (8), 3712-3723, 2017 | 97 | 2017 |
Secure data collection, storage and access in cloud-assisted IoT W Wang, P Xu, LT Yang IEEE cloud computing 5 (4), 77-88, 2018 | 87 | 2018 |
Generating searchable public-key ciphertexts with hidden structures for fast keyword search P Xu, Q Wu, W Wang, W Susilo, J Domingo-Ferrer, H Jin IEEE Transactions on Information Forensics and Security 10 (9), 1993-2006, 2015 | 71 | 2015 |
Lightweighted secure searching over public-key ciphertexts for edge-cloud-assisted industrial IoT devices W Wang, P Xu, D Liu, LT Yang, Z Yan IEEE Transactions on Industrial Informatics 16 (6), 4221-4230, 2019 | 49 | 2019 |
A secure high-order Lanczos-based orthogonal tensor SVD for big data reduction in cloud environment J Feng, LT Yang, G Dai, W Wang, D Zou IEEE Transactions on Big Data 5 (3), 355-367, 2018 | 35 | 2018 |
Bestie: Very practical searchable encryption with forward and backward security T Chen, P Xu, W Wang, Y Zheng, W Susilo, H Jin European Symposium on Research in Computer Security, 3-23, 2021 | 32 | 2021 |
ROSE: Robust searchable encryption with forward and backward security P Xu, W Susilo, W Wang, T Chen, Q Wu, K Liang, H Jin IEEE transactions on information forensics and security 17, 1115-1130, 2022 | 31 | 2022 |
LaF: Lattice-based and communication-efficient federated learning P Xu, M Hu, T Chen, W Wang, H Jin IEEE Transactions on Information Forensics and Security 17, 2483-2496, 2022 | 21 | 2022 |
Dynamic searchable symmetric encryption with physical deletion and small leakage P Xu, S Liang, W Wang, W Susilo, Q Wu, H Jin Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 21 | 2017 |
Anonymous identity-based broadcast encryption with constant decryption complexity and strong security P Xu, J Li, W Wang, H Jin Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 20 | 2016 |
Secure hybrid-indexed search for high efficiency over keyword searchable ciphertexts W Wang, P Xu, H Li, LT Yang Future Generation Computer Systems 55, 353-361, 2016 | 20 | 2016 |
Bandwidth efficient and rate-adaptive video delivery in TV white space L Yu, C Liu, W Zhu, S Hua, W Wang IEEE Transactions on Circuits and Systems for Video Technology 24 (9), 1605-1619, 2014 | 19 | 2014 |
Fast and parallel keyword search over public-key ciphertexts for cloud-assisted IoT P Xu, X Tang, W Wang, H Jin, LT Yang IEEE Access 5, 24775-24784, 2017 | 18 | 2017 |
High recovery with fewer injections: Practical binary volumetric injection attacks against dynamic searchable encryption X Zhang, W Wang, P Xu, LT Yang, K Liang 32nd USENIX Security Symposium (USENIX Security 23), 5953-5970, 2023 | 17 | 2023 |
Using sparse representation to detect anomalies in complex WSNs X Li, G Xu, X Zheng, K Liang, E Panaousis, T Li, W Wang, C Shen ACM Transactions on Intelligent Systems and Technology (TIST) 10 (6), 1-18, 2019 | 13 | 2019 |
Generally hybrid proxy re-encryption: a secure data sharing among cryptographic clouds P Xu, J Xu, W Wang, H Jin, W Susilo, D Zou Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 11 | 2016 |
Cloud-assisted key distribution in batch for secure real-time mobile services W Wang, P Xu, LT Yang, J Chen IEEE Transactions on Services Computing 11 (5), 850-863, 2016 | 10 | 2016 |