Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud Z Mei, H Zhu, Z Cui, Z Wu, G Peng, B Wu, C Zhang Information Sciences 432, 79-96, 2018 | 42 | 2018 |
Secure multi-dimensional data retrieval with access control and range query in the cloud Z Mei, J Yu, C Zhang, B Wu, S Yao, J Shi, Z Wu Information Systems 122, 102343, 2024 | 21 | 2024 |
Privacy‐Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario B Wu, X Chen, Z Wu, Z Zhao, Z Mei, C Zhang Wireless Communications and Mobile Computing 2021 (1), 6617959, 2021 | 17 | 2021 |
Fuzzy keyword search and access control over ciphertexts in cloud computing H Zhu, Z Mei, B Wu, H Li, Z Cui Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 16 | 2017 |
Visual object tracking with discriminative correlation filtering and hybrid color feature Y Huang, Z Zhao, B Wu, Z Mei, Z Cui, G Gao Multimedia Tools and Applications 78, 34725-34744, 2019 | 15 | 2019 |
An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing S Yao, RVJ Dayot, IH Ra, L Xu, Z Mei, J Shi IEEE Transactions on Information Forensics and Security 18, 3833-3848, 2023 | 12 | 2023 |
PLDANet: reasonable combination of PCA and LDA convolutional networks C Zhang, M Mei, Z Mei, J Zhang, A Deng, C Lu International Journal of Computers Communications & Control 17 (2), 2022 | 6 | 2022 |
Secure and efficient adjacency search supporting synonym query on encrypted graph in the cloud B Wu, Z Zhao, Z Cui, Z Mei, Z Wu IEEE Access 7, 133716-133724, 2019 | 5 | 2019 |
Fuzzy keyword search method over ciphertexts supporting access control Z Mei, B Wu, S Tian, Y Ruan, Z Cui KSII Transactions on Internet and Information Systems (TIIS) 11 (11), 5671-5693, 2017 | 5 | 2017 |
Identity‐based key management for cloud computing H Zhu, Z Mei, M Xie Security and Communication Networks 9 (13), 2143-2156, 2016 | 4 | 2016 |
Privacy-protection path finding supporting the ranked order on encrypted graph in big data environment B Wu, X Chen, C Zhang, Z Mei, Z Zhao, Z Wu, T Yan IEEE Access 8, 214596-214604, 2020 | 3 | 2020 |
Query with assumptions for probabilistic relational databases C Zhang, Z Mei, B Wu, Z Zhao, J Yu, Q Wang Tehnički vjesnik 27 (3), 923-932, 2020 | 3 | 2020 |
Efficient Q-Value Zero-Leakage Protection Scheme in SRS Regularly Publishing Private Data Z Cui, L Zhang, B Wu, Z Zhao, Z Mei, Z Wu Tehnički vjesnik 26 (3), 695-702, 2019 | 3 | 2019 |
Robust object tracking based on ridge regression and multi-scale local sparse coding Z Zhao, L Xiong, Z Mei, B Wu, Z Cui, T Wang, Z Zhao Multimedia Tools and Applications 79, 785-804, 2020 | 2 | 2020 |
Privacy-Preserving Multi-Keyword Fuzzy Adjacency Search Strategy for Encrypted Graph in Cloud Environment. B Wu, X Chen, J Huang, C Zhang, J Wang, J Yu, Z Zhao, Z Mei Computers, Materials & Continua 78 (3), 2024 | 1 | 2024 |
A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter C Luo, J Shi, M Xie, C Hu, L Wang, Z Mei, S Yao, H Li International Conference on Information Security and Cryptology, 433-451, 2023 | 1 | 2023 |
HMGR: a hybrid model for geolocation recommendation R Wen, Z Cheng, W Mao, Z Mei, J Shi, X Cheng International Conference on Big Data, 48-62, 2023 | 1 | 2023 |
An efficient top-K query scheme based on multilayer grouping Z Cui, Y Gao, C Zhou, G Gao, Z Mei, Z Wu Tehnički vjesnik 26 (5), 1339-1345, 2019 | 1 | 2019 |
On efficient expanding training datasets of breast tumor ultrasound segmentation model C Zhang, M Mei, Z Mei, B Wu, S Chen, M Lu, C Lu Computers in Biology and Medicine 183, 109274, 2024 | | 2024 |
An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems. J Shi, C Hu, S Zhang, Q Zhou, Z Mei, S Yao, A Deng ISPRS International Journal of Geo-Information 13 (9), 2024 | | 2024 |