Efficient public key encryption with equality test supporting flexible authorization S Ma, Q Huang, M Zhang, B Yang IEEE Transactions on Information Forensics and Security 10 (3), 458-470, 2014 | 210 | 2014 |
Efficient privacy-preserving cube-data aggregation scheme for smart grids H Shen, M Zhang, J Shen IEEE Transactions on Information Forensics and Security 12 (6), 1369-1381, 2017 | 158 | 2017 |
PPO-CPQ: a privacy-preserving optimization of clinical pathway query for e-healthcare systems M Zhang, Y Chen, W Susilo IEEE Internet of Things Journal 7 (10), 10660-10672, 2020 | 148 | 2020 |
Public key encryption with delegated equality test in a multi-user setting S Ma, M Zhang, Q Huang, B Yang The Computer Journal 58 (4), 986-1002, 2015 | 127 | 2015 |
A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment M Zhang, Y Chen, J Lin IEEE Internet of Things Journal 8 (13), 10830-10842, 2021 | 125 | 2021 |
Cost-effective secure E-health cloud system using identity based cryptographic techniques XA Wang, J Ma, F Xhafa, M Zhang, X Luo Future Generation Computer Systems 67, 242-254, 2017 | 103 | 2017 |
An ensemble method based on selection using bat algorithm for intrusion detection Y Shen, K Zheng, C Wu, M Zhang, X Niu, Y Yang The Computer Journal 61 (4), 526-538, 2018 | 93 | 2018 |
Efficient identity-based signcryption scheme for multiple receivers Y Yu, B Yang, X Huang, M Zhang International Conference on Autonomic and Trusted Computing, 13-21, 2007 | 90 | 2007 |
RECOGNIZED BY THE EUROPEAN PHYSICAL SOCIETY APPROVED BY THE EUROPEAN COMMISSION J Huebschmann, G Rudolph, M Schmidt Bulg. J. Phys 33 (s1), 51-68, 2006 | 86* | 2006 |
On the soundness and security of privacy-preserving SVM for outsourcing data classification X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017 | 82 | 2017 |
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid H Shen, Y Liu, Z Xia, M Zhang Information Sciences 526, 289-300, 2020 | 77 | 2020 |
SE-PPFM: A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems M Zhang, Y Chen, J Huang IEEE Systems Journal 15 (2), 2980-2988, 2020 | 72 | 2020 |
Cryptographic reverse firewall via malleable smooth projective hash functions R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang International Conference on the Theory and Application of Cryptology and …, 2016 | 66 | 2016 |
A secure clinical diagnosis with privacy-preserving multiclass support vector machine in clouds M Zhang, W Song, J Zhang IEEE Systems Journal 16 (1), 67-78, 2020 | 65 | 2020 |
Privacy-preserving federated learning in medical diagnosis with homomorphic re-encryption H Ku, W Susilo, Y Zhang, W Liu, M Zhang Computer Standards & Interfaces 80, 103583, 2022 | 59 | 2022 |
A novel privacy-preserving authentication scheme for V2G networks Y Su, G Shen, M Zhang IEEE Systems Journal 14 (2), 1963-1971, 2019 | 54 | 2019 |
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation L Sun, C Xu, M Zhang, K Chen, H Li Science China. Information Sciences 61 (3), 038106, 2018 | 47 | 2018 |
A cloud-aided privacy-preserving multi-dimensional data comparison protocol H Shen, M Zhang, H Wang, F Guo, W Susilo Information Sciences 545, 739-752, 2021 | 46 | 2021 |
Improved secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments Z Qiao, Q Yang, Y Zhou, M Zhang IEEE Systems Journal 16 (2), 1842-1850, 2021 | 44 | 2021 |
An ID-based cryptographic mechanisms based on GDLP and IFP C Meshram, SA Meshram, M Zhang Information Processing Letters 112 (19), 753-758, 2012 | 43 | 2012 |