Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
Ge, Chunpeng, Liu, Zhe, Xia, Jinyue, Fang, Liming
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Published in IEEE transactions on dependable and secure computing (01.05.2021)
Get full text
Journal Article
Secure Keyword Search and Data Sharing Mechanism for Cloud Computing
Ge, Chunpeng, Susilo, Willy, Liu, Zhe, Xia, Jinyue, Szalachowski, Pawel, Fang, Liming
Published in IEEE transactions on dependable and secure computing (01.11.2021)
Published in IEEE transactions on dependable and secure computing (01.11.2021)
Get full text
Journal Article
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine
Fang, Liming, Yin, Changchun, Zhou, Lu, Li, Yang, Su, Chunhua, Xia, Jinyue
Published in Information sciences (01.01.2020)
Published in Information sciences (01.01.2020)
Get full text
Journal Article
An efficient method for meteorological nephogram recognition in cloud environment
Li, Tao, Wang, Lei, Ren, Yongjun, Li, Xiang, Xia, Jinyue, An, Ran
Published in EURASIP journal on wireless communications and networking (17.12.2019)
Published in EURASIP journal on wireless communications and networking (17.12.2019)
Get full text
Journal Article
A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing
Ge, Chunpeng, Zhou, Lu, Xia, Jinyue, Szalachowski, Pawel, Su, Chunhua
Published in IEEE access (2019)
Published in IEEE access (2019)
Get full text
Journal Article
Revocable Attribute-Based Encryption With Data Integrity in Clouds
Ge, Chunpeng, Susilo, Willy, Baek, Joonsang, Liu, Zhe, Xia, Jinyue, Fang, Liming
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Published in IEEE transactions on dependable and secure computing (01.09.2022)
Get full text
Journal Article
Privacy-Preserving Recommendation Based on Kernel Method in Cloud Computing
Li, Tao, Qian, Qi, Ren, Yongjun, Ren, Yongzhen, Xia, Jinyue
Published in Computers, materials & continua (01.01.2021)
Published in Computers, materials & continua (01.01.2021)
Get full text
Journal Article
Digital Continuity Guarantee Approach of Electronic Record based on Data Quality Theory
Ren, Yongjun, Qi, Jian, Cheng, Yaping, Wang, Jin, Xia, Jinyue
Published in Computers, materials & continua (01.01.2020)
Published in Computers, materials & continua (01.01.2020)
Get full text
Journal Article
A Sea Ice Recognition Algorithm in Bohai Based on Random Forest
Li, Tao, Wu, Di, Han, Rui, Xia, Jinyue, Ren, Yongjun
Published in Computers, materials & continua (2022)
Published in Computers, materials & continua (2022)
Get full text
Journal Article
A Cluster Correlation power analysis against double blinding exponentiation
Wan, Wunan, Chen, Jun, Zhang, Shibing, Xia, Jinyue
Published in Journal of information security and applications (01.10.2019)
Published in Journal of information security and applications (01.10.2019)
Get full text
Journal Article
Outlier Detection of Mixed Data Based on Neighborhood Combinatorial Entropy
Wang, Lina, Zhang, Qixiang, Niu, Xiling, Ren, Yongjun, Xia, Jinyue
Published in Computers, materials & continua (2021)
Published in Computers, materials & continua (2021)
Get full text
Journal Article