Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating Z Liu, ZL Jiang, X Wang, SM Yiu Journal of Network and Computer Applications 108, 112-123, 2018 | 111 | 2018 |
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing ZL Jiang, N Guo, Y Jin, J Lv, Y Wu, Z Liu, J Fang, SM Yiu, X Wang Information Sciences 518, 168-180, 2020 | 48 | 2020 |
Outsourcing two-party privacy preserving k-means clustering protocol in wireless sensor networks X Liu, ZL Jiang, SM Yiu, X Wang, C Tan, Y Li, Z Liu, Y Jin, J Fang 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2015 | 28 | 2015 |
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing Y Yang, J Sun, Z Liu, YQ Qiao Journal of Information Security and Applications 65, 103108, 2022 | 23 | 2022 |
Offline/online attribute‐based encryption with verifiable outsourced decryption Z Liu, ZL Jiang, X Wang, X Huang, SM Yiu, K Sadakane Concurrency and Computation: Practice and Experience 29 (7), e3915, 2017 | 22 | 2017 |
Dynamic attribute-based access control in cloud storage systems Z Liu, ZL Jiang, X Wang, SM Yiu, C Zhang, X Zhao 2016 IEEE Trustcom/BigDataSE/ISPA, 129-137, 2016 | 19 | 2016 |
A traceable outsourcing cp-abe scheme with attribute revocation R Zhang, L Hui, S Yiu, X Yu, Z Liu, ZL Jiang 2017 IEEE Trustcom/BigDataSE/ICESS, 363-370, 2017 | 18 | 2017 |
Multi-authority ciphertext policy attribute-based encryption scheme on ideal lattices Z Liu, ZL Jiang, X Wang, Y Wu, SM Yiu 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018 | 15 | 2018 |
PTKE: Translation-based temporal knowledge graph embedding in polar coordinate system R Liu, G Yin, Z Liu, L Zhang Neurocomputing 529, 80-91, 2023 | 10 | 2023 |
A temporal and spatial constrained attribute-based access control scheme for cloud storage Z Liu, ZL Jiang, X Wang, SM Yiu, R Zhang, Y Wu 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 9 | 2018 |
Attribution rollout: a new way to interpret visual transformer L Xu, X Yan, W Ding, Z Liu Journal of Ambient Intelligence and Humanized Computing 14 (1), 163-173, 2023 | 8 | 2023 |
Practical multi-authority ciphertext policy attribute-based encryption from R-LWE J Sun, Y Qiao, Z Liu, Y Chen, Y Yang 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2021 | 8 | 2021 |
Nowhere to hide: A novel private protocol identification algorithm J Shi, X Yu, Z Liu Security and Communication Networks 2021 (1), 6672911, 2021 | 8 | 2021 |
A revocable outsourcing attribute-based encryption scheme ZL Jiang, R Zhang, Z Liu, SM Yiu, LCK Hui, X Wang, J Fang Cloud Computing, Security, Privacy in New Computing Environments: 7th …, 2018 | 8 | 2018 |
White-box traceable dynamic attribute based encryption Z Liu, X Wang, L Cui, ZL Jiang, C Zhang 2017 International Conference on Security, Pattern Analysis, and Cybernetics …, 2017 | 7 | 2017 |
Lattice-based proxy signature scheme with reject sampling method ZL Jiang, Y Liang, Z Liu, X Wang 2017 International Conference on Security, Pattern Analysis, and Cybernetics …, 2017 | 7 | 2017 |
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT Y Yang, G Zhang, S Li, Z Liu Frontiers of Computer Science 18 (3), 183817, 2024 | 5 | 2024 |
Design and Implementation of a Lightweight Security‐Enhanced Scheme for Modbus TCP Protocol Z Liu, T Liang, W Wang, R Sun, S Li Security and Communication Networks 2023 (1), 5486566, 2023 | 5 | 2023 |
Graph-based supervised discrete image hashing J Guan, Y Li, J Sun, X Wang, H Zhao, J Zhang, Z Liu, S Qi Journal of Visual Communication and Image Representation 58, 675-687, 2019 | 5 | 2019 |
Reinforcement learning with time intervals for temporal knowledge graph reasoning R Liu, G Yin, Z Liu, Y Tian Information Systems 120, 102292, 2024 | 4 | 2024 |