Takip et
Qiang Wang
Qiang Wang
Software College, Northeastern University
mail.neu.edu.cn üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Outsourced privacy-preserving decision tree classification service over encrypted data
C Wang, A Wang, J Xu, Q Wang, F Zhou
Journal of Information Security and Applications 53, 102517, 2020
432020
Efficient, dynamic and identity-based remote data integrity checking for multiple replicas
S Peng, F Zhou, J Li, Q Wang, Z Xu
Journal of network and computer applications 134, 72-88, 2019
372019
Identity-based public multi-replica provable data possession
S Peng, F Zhou, Q Wang, Z Xu, J Xu
IEEE Access 5, 26990-27001, 2017
362017
Tag-based verifiable delegated set intersection over outsourced private datasets
Q Wang, F Zhou, J Xu, S Peng
IEEE Transactions on Cloud Computing 10 (2), 1201-1214, 2020
192020
Secure Lightweight Stream Data Outsourcing for Internet of Things
P Su, L Zhao, AID Ahmed Y, Z Albert Y, J Hu, G Min, Q Wang
IEEE Internet of Things Journal, 2021
142021
Efficient verifiable databases with additional insertion and deletion operations in cloud computing
Q Wang, F Zhou, J Xu, Z Xu
Future Generation Computer Systems 115, 553-567, 2021
102021
Secure collaborative publicly verifiable computation
Q Wang, F Zhou, C Chen, P Xuan, Q Wu
IEEE Access 5, 2479-2488, 2017
102017
Privacy-preserving subgraph matching protocol for two parties
Z Xu, F Zhou, Y Li, J Xu, Q Wang
International Journal of Foundations of Computer Science 30 (04), 571-588, 2019
92019
Privacy-preserving publicly verifiable databases
Q Wang, F Zhou, B Zhou, J Xu, C Chen, Q Wang
IEEE Transactions on Dependable and Secure Computing 19 (3), 1639-1654, 2020
82020
Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT
Q Wu, F Zhou, J Xu, Q Wang, D Feng
Journal of information security and applications 69, 103270, 2022
72022
A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications
Q Wang, F Zhou, J Xu, Z Xu
The Computer Journal 63 (4), 633-647, 2020
72020
Verifiable outsourced computation with full delegation
Q Wang, F Zhou, S Peng, Z Xu
International Conference on Algorithms and Architectures for Parallel …, 2018
72018
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system
L Yin, J Xu, C Wang, Q Wang, F Zhou
Journal of Systems Architecture 143, 102957, 2023
62023
Graph encryption for all‐path queries
Z Xu, F Zhou, J Li, Y Li, Q Wang
Concurrency and Computation: Practice and Experience 32 (16), e5362, 2020
62020
Secure data stream outsourcing with publicly verifiable integrity in cloud storage
Q Wu, F Zhou, J Xu, Q Wang
Journal of Information Security and Applications 49, 102392, 2019
62019
Faster fog-aided private set intersection with integrity preserving
Q Wang, F Zhou, T Ma, Z Xu
Frontiers of Information Technology & Electronic Engineering 19 (12), 1558-1568, 2018
42018
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE
B Li, F Zhou, Q Wang, J Xu, D Feng
Journal of Systems Architecture 154, 103221, 2024
32024
Bcvse: Verifiable searchable encryption scheme with blockchain supporting fuzzy query
F Zhou, Z Jiao, Q Wang, J Sun
Arabian Journal for Science and Engineering 49 (3), 4401-4418, 2024
32024
Flexible revocation and verifiability for outsourced Private Set Intersection computation
J Sun, F Zhou, Q Wang, Z Jiao, Y Zhang
Journal of Information Security and Applications 73, 103438, 2023
32023
Efficient Aggregate Queries on Location Data with Confidentiality
D Feng, F Zhou, Q Wang, Q Wu, B Li
Sensors 22 (13), 4908, 2022
22022
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20