Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure J Wang, L Wu, KKR Choo, D He IEEE Transactions on Industrial Informatics 16 (3), 1984-1992, 2019 | 297 | 2019 |
Secure key agreement and key protection for mobile device user authentication L Wu, J Wang, KKR Choo, D He IEEE Transactions on Information Forensics and Security 14 (2), 319-330, 2018 | 149 | 2018 |
An efficient and privacy-preserving outsourced support vector machine training for internet of medical things J Wang, L Wu, H Wang, KKR Choo, D He IEEE Internet of Things Journal 8 (1), 458-473, 2020 | 75 | 2020 |
LSFL: A lightweight and secure federated learning scheme for edge computing Z Zhang, L Wu, C Ma, J Li, J Wang, Q Wang, S Yu IEEE Transactions on Information Forensics and Security 18, 365-379, 2022 | 65 | 2022 |
Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid J Wang, L Wu, S Zeadally, MK Khan, D He ACM Transactions on Sensor Networks (TOSN) 17 (3), 1-25, 2021 | 63 | 2021 |
A secure and efficient multiserver authentication and key agreement protocol for internet of vehicles J Wang, L Wu, H Wang, KKR Choo, L Wang, D He IEEE Internet of Things Journal 9 (23), 24398-24416, 2022 | 53 | 2022 |
Anonymous and efficient message authentication scheme for smart grid L Wu, J Wang, S Zeadally, D He Security and Communication Networks 2019 (1), 4836016, 2019 | 37 | 2019 |
PCNNCEC: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration J Wang, D He, A Castiglione, BB Gupta, M Karuppiah, L Wu IEEE Transactions on Network Science and Engineering 10 (5), 2906-2923, 2022 | 32 | 2022 |
White-box implementation of the identity-based signature scheme in the IEEE P1363 standard for public key cryptography Y Zhang, D He, X Huang, D Wang, KKR Choo, J Wang IEICE TRANSACTIONS on Information and Systems 103 (2), 188-195, 2020 | 28 | 2020 |
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network L Wu, J Wang, KKR Choo, Y Li, D He Journal of information security and applications 37, 112-121, 2017 | 21 | 2017 |
Privacy-preserving auditing scheme for shared data in public clouds L Wu, J Wang, S Zeadally, D He The Journal of Supercomputing 74, 6156-6183, 2018 | 18 | 2018 |
Secure public data auditing scheme for cloud storage in smart city L Wu, J Wang, N Kumar, D He Personal and Ubiquitous Computing 21, 949-962, 2017 | 16 | 2017 |
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber–physical systems J Zhao, Y Zheng, H Huang, J Wang, X Zhang, D He Journal of Systems Architecture 138, 102860, 2023 | 13 | 2023 |
Cryptanalysis of an identity-based public auditing protocol for cloud storage L Wu, J Wang, D He, MK Khan Frontiers of Information Technology & Electronic Engineering 18 (12), 1972-1977, 2017 | 8 | 2017 |
Libras: a fair, secure, verifiable and scalable outsourcing computation scheme based on blockchain L Huo, L Wu, Z Zhang, C Li, D He, J Wang IEEE Transactions on Information Forensics and Security, 2024 | 3 | 2024 |
安全高效的两方协同 ECDSA 签名方案 王婧, 吴黎兵, 罗敏, 何德彪 通信学报 42 (2), 12-25, 2021 | 3 | 2021 |
EPDR: An Efficient and Privacy-Preserving Disease Research System with Horizontal Federated Learning in the Internet of Medical Things Y Yang, D He, J Wang, Q Feng, M Luo HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 14, 2024 | | 2024 |
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain‐Based LLMs J Wang, X Yuan, Y Xu, Y Zhang IET Information Security 2024 (1), 2252865, 2024 | | 2024 |
On the Security of a Certificateless Public Verification Scheme for Cloud-Based Cyber-Physical-Social Systems J Wang, H Zhang, L Shao, L Li, M Luo Security and Privacy in Social Networks and Big Data: 6th International …, 2020 | | 2020 |