Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive J Weng, J Weng, J Zhang, M Li, Y Zhang, W Luo IEEE Transactions on Dependable and Secure Computing 18 (5), 2438-2455, 2019 | 681 | 2019 |
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing Z Wan, RH Deng IEEE transactions on information forensics and security 7 (2), 743-754, 2011 | 673 | 2011 |
Attribute-based encryption with verifiable outsourced decryption J Lai, RH Deng, C Guan, J Weng IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013 | 594 | 2013 |
CrowdBC: A blockchain-based decentralized framework for crowdsourcing M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng IEEE transactions on parallel and distributed systems 30 (6), 1251-1266, 2018 | 579 | 2018 |
Security and privacy in smart health: Efficient policy-hiding attribute-based access control Y Zhang, D Zheng, RH Deng IEEE Internet of Things Journal 5 (3), 2130-2145, 2018 | 507 | 2018 |
Efficient and practical fair exchange protocols with off-line TTP F Bao, RH Deng, W Mao Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186 …, 1998 | 495 | 1998 |
Key-aggregate cryptosystem for scalable data sharing in cloud storage CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng IEEE transactions on parallel and distributed systems 25 (2), 468-477, 2013 | 486 | 2013 |
Variations of diffie-hellman problem F Bao, RH Deng, H Zhu International conference on information and communications security, 301-312, 2003 | 451 | 2003 |
Efficient unidirectional proxy re-encryption SSM Chow, J Weng, Y Yang, RH Deng International Conference on Cryptology in Africa, 316-332, 2010 | 433 | 2010 |
ROPecker: A generic and practical approach for defending against ROP attack Y Cheng, Z Zhou, Y Miao, X Ding, RH Deng Internet Society, 2014 | 402 | 2014 |
Feature selection for text classification: A review X Deng, Y Li, J Weng, J Zhang Multimedia Tools and Applications 78 (3), 3797-3816, 2019 | 396 | 2019 |
Chosen-ciphertext secure proxy re-encryption without pairings RH Deng, J Weng, S Liu, K Chen International Conference on Cryptology and Network Security, 1-17, 2008 | 365 | 2008 |
Trellis-coded multidimensional phase modulation SS Pietrobon, RH Deng, A Lafanechere, G Ungerboeck, DJ Costello IEEE Transactions on Information Theory 36 (1), 63-89, 1990 | 353 | 1990 |
A signcryption scheme with signature directly verifiable by public key F Bao, RH Deng International workshop on public key cryptography, 55-59, 1998 | 350 | 1998 |
Private query on encrypted data in multi-user settings F Bao, RH Deng, X Ding, Y Yang International Conference on Information Security Practice and Experience, 71-85, 2008 | 336 | 2008 |
Verifiable computation over large database with incremental updates X Chen, J Li, J Weng, J Ma, W Lou IEEE transactions on Computers 65 (10), 3184-3195, 2015 | 325 | 2015 |
Practical protocols for certified electronic mail RH Deng, L Gong, AA Lazar, W Wang Journal of network and systems management 4, 279-297, 1996 | 323 | 1996 |
Anonymous secure routing in mobile ad-hoc networks B Zhu, Z Wan, MS Kankanhalli, F Bao, RH Deng 29th annual IEEE international conference on local computer networks, 102-108, 2004 | 316 | 2004 |
A generic framework for three-factor authentication: Preserving security and privacy in distributed systems X Huang, Y Xiang, A Chonka, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems 22 (8), 1390-1397, 2010 | 306 | 2010 |
On the equivalence of McEliece's and Niederreiter's public-key cryptosystems YX Li, RH Deng, XM Wang IEEE Transactions on Information Theory 40 (1), 271-273, 1994 | 290 | 1994 |