A blockchain-based decentralized federated learning framework with committee consensus Y Li, C Chen, N Liu, H Huang, Z Zheng, Q Yan IEEE Network 35 (1), 234-241, 2020 | 554 | 2020 |
Privacy leakage analysis in online social networks Y Li, Y Li, Q Yan, RH Deng Computers & Security 49, 239-254, 2015 | 108 | 2015 |
Communication-efficient and cross-chain empowered federated learning for artificial intelligence of things J Kang, X Li, J Nie, Y Liu, M Xu, Z Xiong, D Niyato, Q Yan IEEE Transactions on Network Science and Engineering 9 (5), 2966-2977, 2022 | 89 | 2022 |
Understanding OSN-based facial disclosure against face authentication systems Y Li, K Xu, Q Yan, Y Li, RH Deng Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 87 | 2014 |
On limitations of designing leakage-resilient password systems: Attacks, principles and usability Q Yan, J Han, Y Li, RH Deng Proceedings of the 19th Annual Network & Distributed System Security Symposium, 2012 | 84* | 2012 |
Comparing mobile privacy protection through cross-platform applications J Han, Q Yan, D Gao, J Zhou, RH Deng Proceedings of the 20th Annual Network & Distributed System Security Symposium, 2013 | 74 | 2013 |
Designing leakage-resilient password entry on touchscreen mobile devices Q Yan, J Han, Y Li, J Zhou, RH Deng Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 68 | 2013 |
Seeing your face is not enough: An inertial sensor-based liveness detection for face authentication Y Li, Y Li, Q Yan, H Kong, RH Deng Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 64 | 2015 |
Empirical study of face authentication systems under OSNFD attacks Y Li, Y Li, K Xu, Q Yan, RH Deng IEEE Transactions on Dependable and Secure Computing 15 (2), 231-245, 2016 | 36 | 2016 |
ModCon: A model-based testing platform for smart contracts Y Liu, Y Li, SW Lin, Q Yan Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020 | 35 | 2020 |
Towards semantically secure outsourcing of association rule mining on categorical data J Lai, Y Li, RH Deng, J Weng, C Guan, Q Yan Information Sciences 267, 267-286, 2014 | 35 | 2014 |
Launching generic attacks on ios with approved third-party applications J Han, SM Kywe, Q Yan, F Bao, R Deng, D Gao, Y Li, J Zhou Applied Cryptography and Network Security: 11th International Conference …, 2013 | 35 | 2013 |
Secure and reliable transfer learning framework for 6G-enabled Internet of Vehicles M Xu, DT Hoang, J Kang, D Niyato, Q Yan, DI Kim IEEE Wireless Communications 29 (4), 132-139, 2022 | 33 | 2022 |
A software-based root-of-trust primitive on multicore platforms Q Yan, J Han, Y Li, RH Deng, T Li Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 26 | 2011 |
Insights into malware detection and prevention on mobile phones Q Yan, Y Li, T Li, R Deng Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009 | 25 | 2009 |
Leakage-resilient password entry: challenges, design, and evaluation Q Yan, J Han, Y Li, J Zhou, RH Deng Computers & Security 48, 196-211, 2015 | 21 | 2015 |
FL-market: Trading private models in federated learning S Zheng, Y Cao, M Yoshikawa, H Li, Q Yan 2022 IEEE International Conference on Big Data (Big Data), 1525-1534, 2022 | 20 | 2022 |
Semi-supervised federated learning with non-iid data: Algorithm and system design Z Zhang, S Ma, J Nie, Y Wu, Q Yan, X Xu, D Niyato 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th …, 2021 | 20 | 2021 |
Decentralized Incentive-based multi-energy trading mechanism for CCHP-based MG cluster J Guo, J Tan, Y Li, H Gu, X Liu, Y Cao, Q Yan, D Xu International Journal of Electrical Power & Energy Systems 133, 107138, 2021 | 18 | 2021 |
DVREI: Dynamic verifiable retrieval over encrypted images Y Li, J Ma, Y Miao, H Li, Q Yan, Y Wang, X Liu, KKR Choo IEEE Transactions on Computers 71 (8), 1755-1769, 2021 | 18 | 2021 |