Public-key authenticated encryption with keyword search revisited: Security model and constructions B Qin, Y Chen, Q Huang, X Liu, D Zheng Information Sciences 516, 515-528, 2020 | 138 | 2020 |
Programmable hash functions from lattices: short signatures and IBEs with small key sizes J Zhang, Y Chen, Z Zhang Annual international cryptology conference, 303-332, 2016 | 84 | 2016 |
A lightweight blockchain-based privacy protection for smart surveillance at the edge A Fitwi, Y Chen, S Zhu 2019 IEEE International Conference on Blockchain (Blockchain), 552-555, 2019 | 72 | 2019 |
PGC: Decentralized confidential payment system with auditability Y Chen, X Ma, C Tang, MH Au Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 68 | 2020 |
Bioartificial liver system based on choanoid fluidized bed bioreactor improve the survival time of fulminant hepatic failure pigs G Lv, L Zhao, A Zhang, W Du, Y Chen, C Yu, X Pan, Y Zhang, T Song, ... Biotechnology and bioengineering 108 (9), 2229-2236, 2011 | 68 | 2011 |
Smart city surveillance at the network edge in the era of iot: opportunities and challenges N Chen, Y Chen Smart cities: development and governance frameworks, 153-176, 2018 | 59 | 2018 |
Blendsm-ddm: Blockchain-enabled secure microservices for decentralized data marketplaces R Xu, GS Ramachandran, Y Chen, B Krishnamachari 2019 IEEE international smart cities conference (ISC2), 14-17, 2019 | 54 | 2019 |
Evaluation of a bioartificial liver based on a nonwoven fabric bioreactor with porcine hepatocytes in pigs LJ Li, WB Du, YM Zhang, J Li, XP Pan, JJ Chen, HC Cao, Y Chen, ... Journal of hepatology 44 (2), 317-324, 2006 | 54 | 2006 |
Smart city surveillance in fog computing N Chen, Y Chen, X Ye, H Ling, S Song, CT Huang Advances in mobile cloud computing and big data in the 5G era, 203-226, 2017 | 53 | 2017 |
Efficacy of coupled low-volume plasma exchange with plasma filtration adsorption in treating pigs with acute liver failure: a randomised study N Zhou, J Li, Y Zhang, J Lu, E Chen, W Du, J Wang, X Pan, D Zhu, Y Yang, ... Journal of hepatology 63 (2), 378-387, 2015 | 46 | 2015 |
Bridging the missing link of cloud data storage security in AWS J Feng, Y Chen, P Liu 2010 7th IEEE Consumer communications and Networking Conference, 1-2, 2010 | 46 | 2010 |
Privacy-preserving surveillance as an edge service based on lightweight video protection schemes using face de-identification and window masking A Fitwi, Y Chen, S Zhu, E Blasch, G Chen Electronics 10 (3), 236, 2021 | 43 | 2021 |
An experimental study on microservices based edge computing platforms Q Qu, R Xu, SY Nikouei, Y Chen IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops …, 2020 | 37 | 2020 |
Generic constructions of integrated PKE and PEKS Y Chen, J Zhang, D Lin, Z Zhang Designs, Codes and Cryptography 78 (2), 493-526, 2016 | 36 | 2016 |
Neuronet: An adaptive infrastructure for network security Y Chen, H Chen International Journal of Information, Intelligence and Knowledge 1 (2), 143-168, 2009 | 31 | 2009 |
A novel PMU fog based early anomaly detection for an efficient wide area PMU network Z Yang, N Chen, Y Chen, N Zhou 2018 IEEE 2nd International Conference on Fog and Edge Computing (ICFEC), 1-10, 2018 | 27 | 2018 |
A study of entropy sources in cloud computers: random number generation on cloud hosts B Kerrigan, Y Chen International Conference on Mathematical Methods, Models, and Architectures …, 2012 | 27 | 2012 |
I-vise: Interactive video surveillance as an edge service using unsupervised feature queries SY Nikouei, Y Chen, AJ Aved, E Blasch IEEE Internet of Things Journal 8 (21), 16181-16190, 2020 | 26 | 2020 |
Blockchain methods for trusted avionics systems E Blasch, R Xu, Y Chen, G Chen, D Shen 2019 IEEE National Aerospace and Electronics Conference (NAECON), 192-199, 2019 | 26 | 2019 |
Generalized (identity‐based) hash proof system and its applications Y Chen, Z Zhang, D Lin, Z Cao Security and Communication Networks 9 (12), 1698-1716, 2016 | 26 | 2016 |