A secure cloud-assisted urban data sharing framework for ubiquitous-cities J Shen, D Liu, J Shen, Q Liu, X Sun Pervasive and mobile Computing 41, 219-230, 2017 | 126 | 2017 |
Secure real-time traffic data aggregation with batch verification for vehicular cloud in VANETs J Shen, D Liu, X Chen, J Li, N Kumar, P Vijayakumar IEEE Transactions on Vehicular Technology 69 (1), 807-817, 2019 | 107 | 2019 |
Toward secure distributed data storage with error locating in blockchain enabled edge computing D Liu, Y Zhang, D Jia, Q Zhang, X Zhao, H Rong Computer Standards & Interfaces 79, 103560, 2022 | 53 | 2022 |
Secure authentication in cloud big data with hierarchical attribute authorization structure J Shen, D Liu, Q Liu, X Sun, Y Zhang IEEE Transactions on Big Data 7 (4), 668-677, 2017 | 52 | 2017 |
Flexible data integrity checking with original data recovery in IoT-enabled maritime transportation systems D Liu, Y Zhang, W Wang, K Dev, SA Khowaja IEEE Transactions on Intelligent Transportation Systems 24 (2), 2618-2629, 2021 | 45 | 2021 |
Secure verifiable database supporting efficient dynamic operations in cloud computing J Shen, D Liu, MZA Bhuiyan, J Shen, X Sun, A Castiglione IEEE Transactions on Emerging Topics in Computing 8 (2), 280-290, 2017 | 38 | 2017 |
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security D Liu, J Shen, P Vijayakumar, A Wang, T Zhou Multimedia Tools and Applications 79, 10851-10870, 2020 | 31 | 2020 |
Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks J Shen, C Wang, A Castiglione, D Liu, C Esposito IEEE Transactions on Big Data 8 (1), 48-59, 2017 | 30 | 2017 |
Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing J Shen, D Liu, D He, X Huang, Y Xiang IEEE Transactions on Sustainable Computing 5 (2), 161-173, 2017 | 29 | 2017 |
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks D Liu, J Shen, A Wang, C Wang International Journal of Sensor Networks 27 (2), 95-102, 2018 | 23 | 2018 |
Evidential quality preserving of electronic record in cloud storage Y Ren, J Shen, D Liu, J Wang, JU Kim 網際網路技術學刊 17 (6), 1125-1132, 2016 | 23 | 2016 |
Secure real-time image protection scheme with near-duplicate detection in cloud computing D Liu, J Shen, A Wang, C Wang Journal of Real-Time Image Processing 17 (1), 175-184, 2020 | 22 | 2020 |
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing D Liu, Z Li, D Jia Cyber Security and Applications 1, 100004, 2023 | 18 | 2023 |
A secure identity-based dynamic group data sharing scheme for cloud computing J Shen, DZ Liu, CF Lai, YJ Ren, XM Sun 網際網路技術學刊, 2016 | 18 | 2016 |
Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities J Shen, D Liu, X Sun, F Wei, Y Xiang Future Generation Computer Systems 109, 450-456, 2020 | 17 | 2020 |
A survey on the research of indoor RFID positioning system J Shen, C Jin, D Liu Cloud Computing and Security: Second International Conference, ICCCS 2016 …, 2016 | 14 | 2016 |
Anonymous data collection scheme for cloud-aided mobile edge networks A Wang, J Shen, C Wang, H Yang, D Liu Digital Communications and Networks 6 (2), 223-228, 2020 | 13 | 2020 |
An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City. J Shen, D Liu, Q Liu, D He, X Sun Journal of Information Science & Engineering 33 (4), 2017 | 13 | 2017 |
An authorized identity authentication-based data access control scheme in cloud J Shen, D Liu, Q Liu, B Wang, Z Fu 2016 18th International Conference on Advanced Communication Technology …, 2016 | 13 | 2016 |
Distributed computation offloading with low latency for artificial intelligence in vehicular networking D Liu, F Sun, W Wang, K Dev IEEE Communications Standards Magazine 7 (1), 74-80, 2023 | 11 | 2023 |