Blockchain-based privacy-preserving remote data integrity checking scheme for IoT information systems Q Zhao, S Chen, Z Liu, T Baker, Y Zhang Information Processing & Management 57 (6), 102355, 2020 | 186 | 2020 |
Privacy-preserving data aggregation in mobile phone sensing Y Zhang, Q Chen, S Zhong IEEE Transactions on Information Forensics and Security 11 (5), 980-992, 2016 | 95 | 2016 |
On Designing Satisfaction-Ratio-Aware Truthful Incentive Mechanisms for-Anonymity Location Privacy Y Zhang, W Tong, S Zhong IEEE Transactions on Information Forensics and Security 11 (11), 2528-2541, 2016 | 67 | 2016 |
Efficient and privacy-preserving min and th min computations in mobile sensing systems Y Zhang, Q Chen, S Zhong IEEE Transactions on Dependable and Secure Computing 14 (1), 9-21, 2017 | 49 | 2017 |
FIWEX: Compressive sensing based cost-efficient indoor white space exploration D Liu, Z Wu, F Wu, Y Zhang, G Chen Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc …, 2015 | 27 | 2015 |
Towards thwarting template side-channel attacks in secure cloud deduplications Y Zhang, Y Mao, M Xu, F Xu, S Zhong IEEE Transactions on Dependable and Secure Computing 18 (3), 1008-1018, 2021 | 26 | 2021 |
On repeated stackelberg security game with the cooperative human behavior model for wildlife protection B Wang, Y Zhang, ZH Zhou, S Zhong Applied Intelligence 49, 1002-1015, 2019 | 24 | 2019 |
Privacy-preserving network functionality outsourcing J Shi, Y Zhang, S Zhong arXiv preprint arXiv:1502.00389, 2015 | 24 | 2015 |
Mobile payments in global markets using biometrics and cloud D Pal, P Khethavath, T Chen, Y Zhang International Journal of Communication Systems 30 (14), e3293, 2017 | 21 | 2017 |
A privacy-preserving algorithm for distributed training of neural network ensembles Y Zhang, S Zhong Neural Computing and Applications 22, 269-282, 2013 | 21 | 2013 |
Designing secure and dependable mobile sensing mechanisms with revenue guarantees Y Zhang, H Zhang, S Tang, S Zhong IEEE Transactions on Information Forensics and Security 11 (1), 100-113, 2016 | 19 | 2016 |
Secure deep neural network models publishing against membership inference attacks via training task parallelism Y Mao, W Hong, B Zhu, Z Zhu, Y Zhang, S Zhong IEEE Transactions on Parallel and Distributed Systems 33 (11), 3079-3091, 2022 | 17 | 2022 |
Joint differentially private Gale–Shapley mechanisms for location privacy protection in mobile traffic offloading systems Y Zhang, Y Mao, S Zhong IEEE Journal on Selected Areas in Communications 34 (10), 2738-2749, 2016 | 17 | 2016 |
How to select optimal gateway in multi-domain wireless networks: Alternative solutions without learning S Zhong, Y Zhang IEEE Transactions on Wireless Communications 12 (11), 5620-5630, 2013 | 15 | 2013 |
Competitive auctions for cost-aware cellular traffic offloading with optimized capacity gain Y Zhang, S Tang, T Chen, S Zhong IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 13 | 2016 |
Towards privacy-preserving aggregation for collaborative spectrum sensing Y Mao, T Chen, Y Zhang, T Wang, S Zhong IEEE Transactions on Information Forensics and Security 12 (6), 1483-1493, 2017 | 12 | 2017 |
Secure deduplication schemes for content delivery in mobile edge computing Y Lin, Y Mao, Y Zhang, S Zhong Computers & Security 114, 102602, 2022 | 10 | 2022 |
Stemming downlink leakage from training sequences in multi-user MIMO networks Y Mao, Y Zhang, S Zhong Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 10 | 2016 |
Protecting location information in collaborative sensing of cognitive radio networks Y Mao, T Chen, Y Zhang, T Wang, S Zhong Proceedings of the 18th ACM International Conference on Modeling, Analysis …, 2015 | 10 | 2015 |
Cost-efficient indoor white space exploration through compressive sensing F Wu, D Liu, Z Wu, Y Zhang, G Chen IEEE/ACM Transactions on Networking 25 (3), 1686-1702, 2017 | 9 | 2017 |