A survey on privacy protection in blockchain system Q Feng, D He, S Zeadally, MK Khan, N Kumar Journal of network and computer applications 126, 45-58, 2019 | 953 | 2019 |
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks Q Feng, D He, S Zeadally, K Liang IEEE Transactions on Industrial Informatics 16 (6), 4146-4155, 2019 | 244 | 2019 |
Ideal lattice-based anonymous authentication protocol for mobile devices Q Feng, D He, S Zeadally, N Kumar, K Liang IEEE Systems Journal 13 (3), 2775-2785, 2018 | 97 | 2018 |
SecureNLP: A system for multi-party privacy-preserving natural language processing Q Feng, D He, Z Liu, H Wang, KKR Choo IEEE Transactions on Information Forensics and Security 15, 3709-3721, 2020 | 95 | 2020 |
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment Q Feng, D He, S Zeadally, H Wang Future Generation Computer Systems 84, 239-251, 2018 | 88 | 2018 |
Lightweight collaborative authentication with key protection for smart electronic health record system Q Feng, D He, H Wang, L Zhou, KKR Choo IEEE Sensors Journal 20 (4), 2181-2196, 2019 | 30 | 2019 |
Distributed signing protocol for IEEE P1363‐compliant identity‐based signature scheme Q Feng, D He, Z Liu, D Wang, KKR Choo IET Information Security 14 (4), 443-451, 2020 | 25 | 2020 |
Multi-party signing protocol for the identity-based signature scheme in IEEE P1363 standard Q Feng, D He, Z Liu, D Wang, KKR Choo IET Inf. Secur 1 (99), 1-10, 2020 | 16 | 2020 |
Cryptographic primitives in privacy-preserving machine learning: A survey H Qin, D He, Q Feng, MK Khan, M Luo, KKR Choo IEEE Transactions on Knowledge and Data Engineering 36 (5), 1919-1934, 2023 | 15 | 2023 |
Efficient multi-party EdDSA signature with identifiable aborts and its applications to blockchain Q Feng, K Yang, M Ma, D He IEEE Transactions on Information Forensics and Security 18, 1937-1950, 2023 | 15 | 2023 |
A security-enhanced pairing-free certificateless aggregate signature for vehicular Ad-Hoc networks H Zheng, M Luo, Y Zhang, C Peng, Q Feng IEEE Systems Journal 17 (3), 3822-3833, 2022 | 13 | 2022 |
White-box implementation of Shamir’s identity-based signature scheme Q Feng, D He, H Wang, N Kumar, KKR Choo IEEE Systems Journal 14 (2), 1820-1829, 2019 | 13 | 2019 |
Practical secure two-party EdDSA signature generation with key protection and applications in cryptocurrency Q Feng, D He, M Luo, Z Li, KKR Choo 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 11 | 2020 |
EPRICE: An efficient and privacy-preserving real-time incentive system for crowdsensing in industrial Internet of Things Q Feng, D He, M Luo, X Huang, KKR Choo IEEE Transactions on Computers 72 (9), 2482-2495, 2023 | 10 | 2023 |
Multi-party privacy-preserving faster r-cnn framework for object detection R Wang, M Luo, Q Feng, C Peng, D He IEEE Transactions on Emerging Topics in Computational Intelligence 8 (1 …, 2023 | 8 | 2023 |
The applications of blockchain in the covert communication B Du, D He, M Luo, C Peng, Q Feng Wireless Communications and Mobile Computing 2022 (1), 4618007, 2022 | 8 | 2022 |
PpNNT: Multiparty privacy-preserving neural network training system Q Feng, D He, J Shen, M Luo, KKR Choo IEEE Transactions on Artificial Intelligence 5 (1), 370-383, 2023 | 7 | 2023 |
A Privacy-Aware K-Nearest Neighbor Query Scheme for Location-Based Services J Qi, X Jia, M Luo, Q Feng IEEE Internet of Things Journal 11 (6), 10831-10842, 2023 | 5 | 2023 |
Sanitizable signature scheme with privacy protection for electronic medical data sharing Z Xu, M Luo, C Peng, Q Feng Cyber Security and Applications 1, 100018, 2023 | 4 | 2023 |
PERCE: A permissioned redactable credentials scheme for a period of membership Y Liu, D He, Q Feng, M Luo, KKR Choo IEEE Transactions on Information Forensics and Security 18, 3132-3142, 2023 | 4 | 2023 |