A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing X Qin, Y Huang, Z Yang, X Li Journal of Systems Architecture 112, 101854, 2021 | 107 | 2021 |
LBAC: A lightweight blockchain-based access control scheme for the internet of things X Qin, Y Huang, Z Yang, X Li Information Sciences 554, 222-235, 2021 | 80 | 2021 |
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing. Z Yang, Y Huang, X Li, W Wang Computers, Materials & Continua 56 (1), 2018 | 27 | 2018 |
Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage YANG Zhen, WANG Wenyu, HUANG Yongfeng, LI Xing Chinese Journal of Electronics 28 (1), 179-187, 2019 | 24 | 2019 |
Protecting world leader using facial speaking pattern against deepfakes B Chu, W You, Z Yang, L Zhou, R Wang IEEE Signal Processing Letters 29, 2078-2082, 2022 | 18 | 2022 |
Fake face images detection and identification of celebrities based on semantic segmentation R Wang, Z Yang, W You, L Zhou, B Chu IEEE Signal Processing Letters 29, 2018-2022, 2022 | 15 | 2022 |
An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor X Qin, Y Huang, Z Yang, X Li 2019 26th International Conference on Telecommunications (ICT), 249-253, 2019 | 14 | 2019 |
Ensuring reliable logging for data accountability in untrusted cloud storage Z Yang, W Wang, Y Huang 2017 IEEE International Conference on Communications (ICC), 1-6, 2017 | 11 | 2017 |
CBFF: A cloud–blockchain fusion framework ensuring data accountability for multi-cloud environments Q Li, Z Yang, X Qin, D Tao, H Pan, Y Huang Journal of Systems Architecture 124, 102436, 2022 | 10 | 2022 |
Protecting personal sensitive data security in the cloud with blockchain Z Yang, Y Chen, Y Huang, X Li Advances in Computers 120, 195-231, 2021 | 10 | 2021 |
An unsupervised sentiment classification method based on multi-level fuzzy computing and multi-criteria fusion B Wang, W He, Z Yang, S Xiong IEEE Access 8, 145422-145434, 2020 | 9 | 2020 |
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices. Y Qi, Z Yang, Y Luo, Y Huang, X Li Computers, Materials & Continua 73 (2), 2022 | 7 | 2022 |
Fast detection of heterogeneous parallel steganography for streaming voice H Wang, Z Yang, Y Hu, Z Yang, Y Huang Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021 | 7 | 2021 |
Digital copyright depository system enhanced by blockchain W Yang, P He, Z Yang, X Yi, C Chen 2020 International Conference on Culture-oriented Science & Technology …, 2020 | 7 | 2020 |
A no-pairing proxy re-encryption scheme for data sharing in untrusted cloud X Qian, Z Yang, S Wang, Y Huang International Conference on Artificial Intelligence and Security, 85-96, 2019 | 6 | 2019 |
New advances in remote heart rate estimation and its application to deepfake detection Y Xu, R Zhang, C Yang, Y Zhang, Z Yang, J Liu 2021 International Conference on Culture-oriented Science & Technology …, 2021 | 5 | 2021 |
A vehicle intrusion detection system based on time interval and data fields X He, Z Yang, Y Huang Artificial Intelligence and Security: 7th International Conference, ICAIS …, 2021 | 5 | 2021 |
A CNN based visual audio steganography model R Zhang, H Dong, Z Yang, W Ying, J Liu International Conference on Adaptive and Intelligent Systems, 431-442, 2022 | 4 | 2022 |
Attribute-based encryption with outsourced computation for access control in IoTs X Qin, Z Yang, Q Li, H Pan, Z Yang, Y Huang 2022 3rd Asia Service Sciences and Software Engineering Conference, 66-73, 2022 | 4 | 2022 |
视觉深度伪造检测技术综述 王任颖, 储贝林, 杨震, 周琳娜 中国图象图形学报, 2022 | 4 | 2022 |