Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive J Weng, J Weng, J Zhang, M Li, Y Zhang, W Luo IEEE Transactions on Dependable and Secure Computing 18 (5), 2438-2455, 2019 | 681 | 2019 |
BDFL: A byzantine-fault-tolerance decentralized federated learning method for autonomous vehicle JH Chen, MR Chen, GQ Zeng, JS Weng IEEE Transactions on Vehicular Technology 70 (9), 8639-8652, 2021 | 96 | 2021 |
Deep manifold learning combined with convolutional neural networks for action recognition X Chen, J Weng, W Lu, J Xu, J Weng IEEE transactions on neural networks and learning systems 29 (9), 3938-3952, 2017 | 89 | 2017 |
BENBI: Scalable and dynamic access control on the northbound interface of SDN-based VANET JS Weng, J Weng, Y Zhang, W Luo, W Lan IEEE Transactions on Vehicular Technology 68 (1), 822-831, 2018 | 68 | 2018 |
Attribute-based hybrid boolean keyword search over outsourced encrypted data K He, J Guo, J Weng, J Weng, JK Liu, X Yi IEEE Transactions on Dependable and Secure Computing 17 (6), 1207-1217, 2018 | 66 | 2018 |
Fedserving: A federated prediction serving framework based on incentive mechanism J Weng, J Weng, H Huang, C Cai, C Wang IEEE INFOCOM 2021-IEEE Conference on Computer Communications, 1-10, 2021 | 43 | 2021 |
Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero Y Li, J Weng, M Li, W Wu, J Weng, JN Liu, S Hu Journal of Parallel and Distributed Computing 169, 301-316, 2022 | 34 | 2022 |
pvcnn: Privacy-preserving and verifiable convolutional neural network testing J Weng, J Weng, G Tang, A Yang, M Li, JN Liu IEEE Transactions on Information Forensics and Security 18, 2218-2233, 2023 | 31 | 2023 |
Secure software-defined networking based on blockchain W Jiasi, W Jian, L Jia-Nan, Z Yue arXiv preprint arXiv:1906.04342, 2019 | 27 | 2019 |
Golden grain: Building a secure and decentralized model marketplace for MLaaS J Weng, J Weng, C Cai, H Huang, C Wang IEEE Transactions on Dependable and Secure Computing 19 (5), 3149-3167, 2021 | 24 | 2021 |
Scalable revocable identity-based signature over lattices in the standard model C Xie, J Weng, J Weng, L Hou Information Sciences 518, 29-38, 2020 | 21 | 2020 |
Proof of unlearning: Definitions and instantiation J Weng, S Yao, Y Du, J Huang, J Weng, C Wang IEEE Transactions on Information Forensics and Security, 2024 | 13 | 2024 |
Onionchain: Towards balancing privacy and traceability of blockchain-based applications Y Zhang, J Weng, J Weng, M Li, W Luo arXiv preprint arXiv:1909.03367, 2019 | 13 | 2019 |
A multisignature-based secure and OBU-friendly emergency reporting scheme in VANET X Chen, A Yang, Y Tong, J Weng, J Weng, T Li IEEE Internet of Things Journal 9 (22), 23130-23141, 2022 | 12 | 2022 |
Ivycross: A privacy-preserving and concurrency control framework for blockchain interoperability M Li, J Weng, Y Li, Y Wu, J Weng, D Li, G Xu, R Deng Cryptology ePrint Archive, 2021 | 10 | 2021 |
HRA-secure attribute-based threshold proxy re-encryption from lattices F Zhao, J Weng, W Xie, M Li, J Weng Information Sciences 655, 119900, 2024 | 6 | 2024 |
Method and system for secure blockchain-based vehicular digital forensics J Weng, M Li, W Jiasi, Y Zhang, A Yang, LUO Weiqi US Patent 11,223,487, 2022 | 6 | 2022 |
Peripheral-free device pairing by randomly switching power Z Shao, J Weng, Y Zhang, Y Wu, M Li, J Weng, W Luo, S Yu IEEE Transactions on Dependable and Secure Computing 19 (6), 4240-4254, 2021 | 5 | 2021 |
Looking back! using early versions of android apps as attack vectors Y Zhang, J Weng, J Weng, L Hou, A Yang, M Li, Y Xiang, RH Deng IEEE Transactions on Dependable and Secure Computing 18 (2), 652-666, 2019 | 5 | 2019 |
Towards interpreting smart contract against contract fraud: A practical and automatic realization M Li, J Weng, A Yang, J Weng, Y Zhang Cryptology ePrint Archive, 2020 | 4 | 2020 |