A trust-based collaborative filtering algorithm for E-commerce recommendation system L Jiang, Y Cheng, L Yang, J Li, H Yan, X Wang Journal of ambient intelligence and humanized computing 10, 3023-3034, 2019 | 260 | 2019 |
An ID-based linearly homomorphic signature scheme and its application in blockchain Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang IEEE Access 6, 20632-20640, 2018 | 236 | 2018 |
MHAT: An efficient model-heterogenous aggregation training scheme for federated learning L Hu, H Yan, L Li, Z Pan, X Liu, Z Zhang Information Sciences 560, 493-503, 2021 | 130 | 2021 |
Blockchain-based public auditing and secure deduplication with fair arbitration H Yuan, X Chen, J Wang, J Yuan, H Yan, W Susilo Information Sciences 541, 409-425, 2020 | 128 | 2020 |
An ensemble learning based prediction strategy for dynamic multi-objective optimization F Wang, Y Li, F Liao, H Yan Applied Soft Computing 96, 106592, 2020 | 120 | 2020 |
Sensitive and energetic IoT access control for managing cloud electronic health records K Riad, R Hamza, H Yan IEEE Access 7, 86384-86393, 2019 | 118 | 2019 |
Adversarial examples: attacks and defenses in the physical world H Ren, T Huang, H Yan International Journal of Machine Learning and Cybernetics 12 (11), 3325-3336, 2021 | 110 | 2021 |
Location-sharing systems with enhanced privacy in mobile online social networks J Li, H Yan, Z Liu, X Chen, X Huang, DS Wong IEEE Systems Journal 11 (2), 439-448, 2015 | 94 | 2015 |
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts AS Patil, R Hamza, A Hassan, N Jiang, H Yan, J Li Computers & Security 97, 101958, 2020 | 87 | 2020 |
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions Z Cai, H Yan, P Li, Z Huang, C Gao Cluster Computing 20, 2415-2422, 2017 | 85 | 2017 |
An efficient blockchain-based privacy preserving scheme for vehicular social networks Y Pu, T Xiang, C Hu, A Alrawais, H Yan Information Sciences 540, 308-324, 2020 | 84 | 2020 |
A homomorphic network coding signature scheme for multiple sources and its application in IoT T Li, W Chen, Y Tang, H Yan Security and communication networks 2018 (1), 9641273, 2018 | 82 | 2018 |
PPCL: Privacy-preserving collaborative learning for mitigating indirect information leakage H Yan, L Hu, X Xiang, Z Liu, X Yuan Information Sciences 548, 423-437, 2021 | 78 | 2021 |
Toward optimal participant decisions with voting-based incentive model for crowd sensing N Jiang, D Xu, J Zhou, H Yan, T Wan, J Zheng Information Sciences 512, 1-17, 2020 | 78 | 2020 |
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT H Yan, Y Wang, C Jia, J Li, Y Xiang, W Pedrycz Future Generation Computer Systems 95, 344-353, 2019 | 64 | 2019 |
Centralized duplicate removal video storage system with privacy preservation in IoT H Yan, X Li, Y Wang, C Jia Sensors 18 (6), 1814, 2018 | 64 | 2018 |
Generative steganography via auto-generation of semantic object contours Z Zhou, X Dong, R Meng, M Wang, H Yan, K Yu, KKR Choo IEEE Transactions on Information Forensics and Security 18, 2751-2765, 2023 | 53 | 2023 |
Secure video retrieval using image query on an untrusted cloud H Yan, M Chen, L Hu, C Jia Applied Soft Computing 97, 106782, 2020 | 53 | 2020 |
Server-aided anonymous attribute-based authentication in cloud computing Z Liu, H Yan, Z Li Future Generation Computer Systems 52, 61-66, 2015 | 46 | 2015 |
An efficient and certificateless conditional privacy-preserving authentication scheme for wireless body area networks big data services S Ji, Z Gui, T Zhou, H Yan, J Shen IEEE Access 6, 69603-69611, 2018 | 43 | 2018 |