Privacy preserving back-propagation neural network learning made practical with cloud computing J Yuan, S Yu IEEE Transactions on Parallel and Distributed Systems 25 (1), 212-221, 2014 | 310 | 2014 |
Secure and constant cost public cloud storage auditing with deduplication J Yuan, S Yu 2013 IEEE Conference on Communications and Network Security (CNS), 145-153, 2013 | 230 | 2013 |
BANA: Body area network authentication exploiting channel characteristics L Shi, M Li, S Yu, J Yuan Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 214 | 2012 |
Proofs of retrievability with public verifiability and constant communication cost in cloud J Yuan, S Yu Proceedings of the 2013 international workshop on Security in cloud …, 2013 | 192 | 2013 |
Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification J Yuan, S Yu Information Forensics and Security, IEEE Transactions on 10 (8), 1717 - 1726, 2015 | 174 | 2015 |
Efficient public integrity checking for cloud data sharing with multi-user modification J Yuan, S Yu IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2121-2129, 2014 | 162 | 2014 |
Efficient privacy-preserving biometric identification in cloud computing J Yuan, S Yu 2013 Proceedings IEEE INFOCOM, 2652-2660, 2013 | 145 | 2013 |
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones Y Tian, J Yuan, H Song Journal of Information Security and Applications 48, 102354, 2019 | 144 | 2019 |
Mining Twitter to assess the public perception of the “Internet of Things” J Bian, K Yoshigoe, A Hicks, J Yuan, Z He, M Xie, Y Guo, M Prosperi, ... PloS one 11 (7), e0158450, 2016 | 128 | 2016 |
SEISA: Secure and efficient encrypted image search with access control J Yuan, S Yu, L Guo 2015 IEEE conference on computer communications (INFOCOM), 2083-2091, 2015 | 112 | 2015 |
ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks L Shi, J Yuan, S Yu, M Li Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 90 | 2013 |
Practical privacy-preserving mapreduce based k-means clustering over large-scale dataset J Yuan, Y Tian IEEE transactions on cloud computing 7 (2), 568-579, 2017 | 87 | 2017 |
MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks L Shi, J Yuan, S Yu, M Li IEEE Internet of Things Journal 2 (1), 52-62, 2015 | 65 | 2015 |
Examining healthcare utilization patterns of elderly and middle-aged adults in the United States CE Zayas, Z He, J Yuan, M Maldonado-Molina, W Hogan, F Modave, ... The Twenty-Ninth International Flairs Conference, 2016 | 63 | 2016 |
Blockchain enabled verification for cellular-connected unmanned aircraft system networking J Wang, Y Liu, S Niu, H Song, W Jing, J Yuan Future Generation Computer Systems 123, 233-244, 2021 | 35 | 2021 |
Workload-aware task placement in edge-assisted human re-identification A Acharya, Y Hou, Y Mao, M Xian, J Yuan 2019 16th Annual IEEE International Conference on Sensing, Communication …, 2019 | 29 | 2019 |
Towards a privacy preserving cohort discovery framework for clinical research networks J Yuan, B Malin, F Modave, Y Guo, WR Hogan, E Shenkman, J Bian Journal of biomedical informatics 66, 42-51, 2017 | 26 | 2017 |
Adversarial attacks and defenses toward ai-assisted uav infrastructure inspection A Raja, L Njilla, J Yuan IEEE Internet of Things Journal 9 (23), 23379-23389, 2022 | 23 | 2022 |
Blockchain-based secure routing strategy for airborne mesh networks Y Liu, J Wang, H Song, J Li, J Yuan 2019 IEEE International Conference on Industrial Internet (ICII), 56-61, 2019 | 20 | 2019 |
Sensor data-driven uav anomaly detection using deep learning approach J Galvan, A Raja, Y Li, J Yuan MILCOM 2021-2021 IEEE Military Communications Conference (MILCOM), 589-594, 2021 | 19 | 2021 |