Secure data aggregation in wireless sensor networks: A survey Y Sang, H Shen, Y Inoguchi, Y Tan, N Xiong 2006 Seventh International Conference on Parallel and Distributed Computing …, 2006 | 183 | 2006 |
Efficient protocols for privacy preserving matching against distributed datasets Y Sang, H Shen, Y Tan, N Xiong Information and Communications Security: 8th International Conference, ICICS …, 2006 | 88 | 2006 |
Efficient and secure protocols for privacy-preserving set operations Y Sang, H Shen ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-35, 2009 | 83 | 2009 |
Secure multi-party computation on blockchain: An overview H Zhong, Y Sang, Y Zhang, Z Xi Parallel Architectures, Algorithms and Programming: 10th International …, 2020 | 57 | 2020 |
Privacy-preserving data publishing for multiple numerical sensitive attributes Q Liu, H Shen, Y Sang Tsinghua Science and Technology 20 (3), 246-254, 2015 | 49 | 2015 |
Effective reconstruction of data perturbed by random projections Y Sang, H Shen, H Tian IEEE Transactions on Computers 61 (1), 101-117, 2011 | 48 | 2011 |
Privacy preserving set intersection based on bilinear groups Y Sang, H Shen Proceedings of the thirty-first Australasian conference on Computer science …, 2008 | 44 | 2008 |
Novel impostors detection in keystroke dynamics by support vector machine Y Sang, H Shen, P Fan International Conference on Parallel and Distributed Computing: Applications …, 2004 | 40 | 2004 |
Privacy preserving set intersection protocol secure against malicious behaviors Y Sang, H Shen Eighth International Conference on Parallel and Distributed Computing …, 2007 | 37 | 2007 |
Privacy-preserving tuple matching in distributed databases Y Sang, H Shen, H Tian IEEE Transactions on Knowledge and Data Engineering 21 (12), 1767-1782, 2009 | 31 | 2009 |
Privacy-preserving ranked fuzzy keyword search over encrypted cloud data Q Xu, H Shen, Y Sang, H Tian 2013 International Conference on Parallel and Distributed Computing …, 2013 | 20 | 2013 |
An efficient method for privacy-preserving trajectory data publishing based on data partitioning S Li, H Shen, Y Sang, H Tian The Journal of Supercomputing 76 (7), 5276-5300, 2020 | 14 | 2020 |
Reconstructing data perturbed by random projections when the mixing matrix is known Y Sang, H Shen, H Tian Joint European Conference on Machine Learning and Knowledge Discovery in …, 2009 | 13 | 2009 |
Achieving probabilistic anonymity in a linear and hybrid randomization model Y Sang, H Shen, H Tian, Z Zhang IEEE Transactions on Information Forensics and Security 11 (10), 2187-2202, 2016 | 12 | 2016 |
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection. Z Zhang, H Shen, Y Sang Int. J. Netw. Secur. 4 (3), 292-305, 2007 | 12 | 2007 |
A scheme for testing privacy state in pervasive sensor networks Y Sang, H Shen 19th International Conference on Advanced Information Networking and …, 2005 | 12 | 2005 |
Diffusion wavelets-based analysis on traffic matrices H Tian, M Roughan, Y Sang, H Shen 2011 12th International Conference on Parallel and Distributed Computing …, 2011 | 11 | 2011 |
A privacy-preserving data publishing method for multiple numerical sensitive attributes via clustering and multi-sensitive bucketization Q Liu, H Shen, Y Sang 2014 Sixth International Symposium on Parallel Architectures, Algorithms and …, 2014 | 10 | 2014 |
An efficient protocol for the problem of secure two-party vector dominance Y Sang, H Shen, Z Zhang Sixth International Conference on Parallel and Distributed Computing …, 2005 | 10 | 2005 |
A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems W Lei, Y Li, Y Sang, H Shen 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), 48-55, 2016 | 8 | 2016 |