A lightweight attribute-based access control scheme for intelligent transportation system with full privacy protection H Tian, X Li, H Quan, CC Chang, T Baker IEEE Sensors Journal 21 (14), 15793-15806, 2020 | 32 | 2020 |
Publicly verifiable inner product evaluation over outsourced data streams under multiple keys X Liu, W Sun, H Quan, W Lou, Y Zhang, H Li IEEE Transactions on Services Computing 10 (5), 826-838, 2016 | 23 | 2016 |
Efficient and secure top-k queries with top order-preserving encryption H Quan, B Wang, Y Zhang, G Wu IEEE Access 6, 31525-31540, 2018 | 17 | 2018 |
Public auditing of log integrity for shared cloud storage systems via blockchain H Tian, J Wang, CC Chang, H Quan Mobile Networks and Applications, 1-13, 2023 | 10 | 2023 |
Are friends of my friends too social? limitations of location privacy in a socially-connected world B Aronov, A Efrat, M Li, J Gao, JSB Mitchell, V Polishchuk, B Wang, ... Proceedings of the Eighteenth ACM International Symposium on Mobile Ad Hoc …, 2018 | 9 | 2018 |
Lightweight handover authentication with location privacy-preserving in mobile wireless networks L Liu, H Quan, X Liu, Y Zhang International Journal of Embedded Systems 7 (3-4), 280-288, 2015 | 8 | 2015 |
Data inference from encrypted databases: a multi-dimensional order-preserving matching approach Y Pan, A Efrat, M Li, B Wang, H Quan, J Mitchell, J Gao, E Arkin Proceedings of the Twenty-First International Symposium on Theory …, 2020 | 7 | 2020 |
Randex: mitigating range injection attacks on searchable encryption H Quan, H Liu, B Wang, M Li, Y Zhang 2019 IEEE Conference on Communications and Network Security (CNS), 133-141, 2019 | 7 | 2019 |
Identity-based public auditing for cloud storage of internet-of-vehicles data H Tian, F Peng, H Quan, CC Chang ACM Transactions on Internet Technology 22 (4), 1-24, 2023 | 6 | 2023 |
Certificateless Public Auditing for Cloud‐Based Medical Data in Healthcare Industry 4.0 H Tian, W Ye, J Wang, H Quan, CC Chang International Journal of Intelligent Systems 2023 (1), 3375823, 2023 | 5 | 2023 |
Detecting multiple steganography methods in speech streams using multi-encoder network H Tian, J Wu, H Quan, CC Chang IEEE Signal Processing Letters 29, 2462-2466, 2022 | 4 | 2022 |
Data auditing for the internet of things environments leveraging smart contract F Peng, H Tian, H Quan, J Lu Frontiers in Cyber Security: Third International Conference, FCS 2020 …, 2020 | 4 | 2020 |
Public auditing for real-time medical sensor data in cloud-assisted HealthIIoT system W Ye, J Wang, H Tian, H Quan Frontiers of Optoelectronics 15 (1), 29, 2022 | 3 | 2022 |
SVC: Secure VANET-Assisted Remote Healthcare Monitoring System in Disaster Area. X Liu, H Quan, Y Zhang, Q Zhao, L Liu KSII Transactions on Internet & Information Systems 10 (3), 2016 | 3 | 2016 |
对加密电子医疗记录有效的连接关键词的搜索 张丽丽, 张玉清, 刘雪峰, 全韩彧 软件学报 27 (6), 1577-1591, 2016 | 2 | 2016 |
Secreach: secure reachability computation on encrypted location check-in data H Quan, B Wang, I Leontiadis, M Li, Y Zhang Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 2 | 2016 |
FastReach: A system for privacy-preserving reachability queries over location data H Quan, B Wang, M Li, I Leontiadis Computers & Security 135, 103513, 2023 | 1 | 2023 |
A Novel Global-Local Representations Network for Speech Steganalysis S Xu, H Tian, H Quan, J Lu Proceedings of the 2022 5th International Conference on Artificial …, 2022 | 1 | 2022 |
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage H Tian, M Wang, H Quan, CC Chang, AV Vasilakos Computers & Security 150, 104250, 2025 | | 2025 |
Smart contract-based public integrity auditing for cloud storage against malicious auditors H Tian, N Gan, F Peng, H Quan, CC Chang, AV Vasilakos Future Generation Computer Systems, 107709, 2025 | | 2025 |