A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion W Ding, X Jing, Z Yan, LT Yang Information Fusion 51, 129-144, 2019 | 236 | 2019 |
Deduplication on encrypted big data in cloud Z Yan, W Ding, X Yu, H Zhu, RH Deng IEEE transactions on big data 2 (2), 138-150, 2016 | 214 | 2016 |
A survey on secure data analytics in edge computing D Liu, Z Yan, W Ding, M Atiquzzaman IEEE Internet of Things Journal 6 (3), 4946-4967, 2019 | 178 | 2019 |
Security vulnerabilities of SGX and countermeasures: A survey S Fei, Z Yan, W Ding, H Xie ACM Computing Surveys (CSUR) 54 (6), 1-36, 2021 | 158 | 2021 |
Encrypted data processing with homomorphic re-encryption W Ding, Z Yan, RH Deng Information Sciences 409, 35-55, 2017 | 107 | 2017 |
Privacy-preserving data processing with flexible access control D Wenxiu, Z Yan, RH Deng IEEE Transactions on Dependable and Secure Computing 17 (2), 363-376, 2017 | 90 | 2017 |
Two schemes of privacy-preserving trust evaluation Z Yan, W Ding, V Niemi, AV Vasilakos Future Generation Computer Systems 62, 175-189, 2016 | 82 | 2016 |
A survey on data provenance in IoT R Hu, Z Yan, W Ding, LT Yang World Wide Web 23, 1441-1463, 2020 | 79 | 2020 |
Privacy-preserving outsourced calculation on floating point numbers X Liu, RH Deng, W Ding, R Lu, B Qin IEEE Transactions on Information Forensics and Security 11 (11), 2513-2527, 2016 | 76 | 2016 |
Heterogeneous data storage management with deduplication in cloud computing Z Yan, L Zhang, D Wenxiu, Q Zheng IEEE Transactions on Big Data 5 (3), 393-407, 2017 | 71 | 2017 |
A survey on future Internet security architectures W Ding, Z Yan, RH Deng IEEE Access 4, 4374-4393, 2016 | 69 | 2016 |
A scheme to manage encrypted data storage with deduplication in cloud Z Yan, W Ding, H Zhu Algorithms and Architectures for Parallel Processing: 15th International …, 2015 | 48 | 2015 |
An extended framework of privacy-preserving computation with flexible access control W Ding, R Hu, Z Yan, X Qian, RH Deng, LT Yang, M Dong IEEE Transactions on Network and Service Management 17 (2), 918-930, 2019 | 43 | 2019 |
A survey on cross-chain technologies P Han, Z Yan, W Ding, S Fei, Z Wan Distributed ledger technologies: research and practice 2 (2), 1-30, 2023 | 41 | 2023 |
Context-aware verifiable cloud computing Z Yan, X Yu, W Ding IEEE access 5, 2211-2227, 2017 | 40 | 2017 |
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion W Wei, J Wang, Z Yan, W Ding Information Fusion 82, 43-57, 2022 | 26 | 2022 |
Improvement and optimized implementation of cryptoGPS protocol for low‐cost radio‐frequency identification authentication Q Dong, W Ding, L Wei Security and Communication Networks 8 (8), 1474-1484, 2015 | 19 | 2015 |
Secure encrypted data deduplication with ownership proof and user revocation W Ding, Z Yan, RH Deng Algorithms and Architectures for Parallel Processing: 17th International …, 2017 | 16 | 2017 |
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption Y Cai, W Ding, Y Xiao, Z Yan, X Liu, Z Wan IEEE Transactions on Dependable and Secure Computing, 2023 | 11 | 2023 |
Computing maximum and minimum with privacy preservation and flexible access control W Ding, Z Yan, X Qian, RH Deng 2019 IEEE Global Communications Conference (GLOBECOM), 1-7, 2019 | 7 | 2019 |