Outsourced privacy-preserving decision tree classification service over encrypted data C Wang, A Wang, J Xu, Q Wang, F Zhou Journal of Information Security and Applications 53, 102517, 2020 | 43 | 2020 |
Efficient, dynamic and identity-based remote data integrity checking for multiple replicas S Peng, F Zhou, J Li, Q Wang, Z Xu Journal of network and computer applications 134, 72-88, 2019 | 37 | 2019 |
Identity-based public multi-replica provable data possession S Peng, F Zhou, Q Wang, Z Xu, J Xu IEEE Access 5, 26990-27001, 2017 | 36 | 2017 |
Tag-based verifiable delegated set intersection over outsourced private datasets Q Wang, F Zhou, J Xu, S Peng IEEE Transactions on Cloud Computing 10 (2), 1201-1214, 2020 | 19 | 2020 |
Secure Lightweight Stream Data Outsourcing for Internet of Things P Su, L Zhao, AID Ahmed Y, Z Albert Y, J Hu, G Min, Q Wang IEEE Internet of Things Journal, 2021 | 14 | 2021 |
Efficient verifiable databases with additional insertion and deletion operations in cloud computing Q Wang, F Zhou, J Xu, Z Xu Future Generation Computer Systems 115, 553-567, 2021 | 10 | 2021 |
Secure collaborative publicly verifiable computation Q Wang, F Zhou, C Chen, P Xuan, Q Wu IEEE Access 5, 2479-2488, 2017 | 10 | 2017 |
Privacy-preserving subgraph matching protocol for two parties Z Xu, F Zhou, Y Li, J Xu, Q Wang International Journal of Foundations of Computer Science 30 (04), 571-588, 2019 | 9 | 2019 |
Privacy-preserving publicly verifiable databases Q Wang, F Zhou, B Zhou, J Xu, C Chen, Q Wang IEEE Transactions on Dependable and Secure Computing 19 (3), 1639-1654, 2020 | 8 | 2020 |
Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT Q Wu, F Zhou, J Xu, Q Wang, D Feng Journal of information security and applications 69, 103270, 2022 | 7 | 2022 |
A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications Q Wang, F Zhou, J Xu, Z Xu The Computer Journal 63 (4), 633-647, 2020 | 7 | 2020 |
Verifiable outsourced computation with full delegation Q Wang, F Zhou, S Peng, Z Xu International Conference on Algorithms and Architectures for Parallel …, 2018 | 7 | 2018 |
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system L Yin, J Xu, C Wang, Q Wang, F Zhou Journal of Systems Architecture 143, 102957, 2023 | 6 | 2023 |
Graph encryption for all‐path queries Z Xu, F Zhou, J Li, Y Li, Q Wang Concurrency and Computation: Practice and Experience 32 (16), e5362, 2020 | 6 | 2020 |
Secure data stream outsourcing with publicly verifiable integrity in cloud storage Q Wu, F Zhou, J Xu, Q Wang Journal of Information Security and Applications 49, 102392, 2019 | 6 | 2019 |
Faster fog-aided private set intersection with integrity preserving Q Wang, F Zhou, T Ma, Z Xu Frontiers of Information Technology & Electronic Engineering 19 (12), 1558-1568, 2018 | 4 | 2018 |
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE B Li, F Zhou, Q Wang, J Xu, D Feng Journal of Systems Architecture 154, 103221, 2024 | 3 | 2024 |
Bcvse: Verifiable searchable encryption scheme with blockchain supporting fuzzy query F Zhou, Z Jiao, Q Wang, J Sun Arabian Journal for Science and Engineering 49 (3), 4401-4418, 2024 | 3 | 2024 |
Flexible revocation and verifiability for outsourced Private Set Intersection computation J Sun, F Zhou, Q Wang, Z Jiao, Y Zhang Journal of Information Security and Applications 73, 103438, 2023 | 3 | 2023 |
Efficient Aggregate Queries on Location Data with Confidentiality D Feng, F Zhou, Q Wang, Q Wu, B Li Sensors 22 (13), 4908, 2022 | 2 | 2022 |