Certificateless public key encryption with keyword search P Yanguo, C Jiangtao, P Changgen, Y Zuobin
China Communications 11 (11), 100-113, 2014
106 2014 ADFL: A poisoning attack defense framework for horizontal federated learning J Guo, H Li, F Huang, Z Liu, Y Peng, X Li, J Ma, VG Menon, KK Igorevich
IEEE Transactions on Industrial Informatics 18 (10), 6526-6536, 2022
20 2022 SCALE: An efficient framework for secure dynamic skyline query processing in the cloud W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui
Database Systems for Advanced Applications: 25th International Conference …, 2020
17 2020 A control-chart-based detector for small-amount electricity theft (SET) attack in smart grids X Xia, J Lin, Y Xiao, J Cui, Y Peng, Y Ma
IEEE Internet of Things Journal 9 (9), 6745-6762, 2021
16 2021 LS-RQ: A lightweight and forward-secure range query on geographically encrypted data Y Peng, L Wang, J Cui, X Liu, H Li, J Ma
IEEE Transactions on Dependable and Secure Computing 19 (1), 388-401, 2020
13 2020 hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts Y Peng, H Li, J Cui, J Zhang, J Ma, C Peng
Science China Information Sciences 60, 1-17, 2017
12 2017 Secure Nearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments W Xue, H Li, Y Peng, J Cui, Y Shi
IEEE Transactions on Big Data 4 (4), 586-599, 2017
11 2017 Image analysis using modified exponent-Fourier moments B He, J Cui, B Xiao, Y Peng
EURASIP Journal on Image and Video Processing 2019, 1-27, 2019
10 2019 A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud Y Peng, J Cui, H Li, J Ma
Information Sciences 387, 146-164, 2017
10 2017 Quaternion fractional-order color orthogonal moment-based image representation and recognition B He, J Liu, T Yang, B Xiao, Y Peng
EURASIP Journal on Image and Video Processing 2021 (1), 17, 2021
7 2021 Towards Secure Approximate -Nearest Neighbor Query Over Encrypted High-Dimensional Data Y Peng, H Li, J Cui, J Ma, Y Liu
IEEE Access 6, 23137-23151, 2018
6 2018 Secsky: A secure dynamic skyline query scheme with data privacy J Zhao, Y Ma, J Cui, Y Peng, K Li, T Wang
IEEE Access 9, 5690-5703, 2020
5 2020 An efficient range query model over encrypted outsourced data using secure kd tree Y Peng, H Li, J Cui, Y Zhu, C Peng
2016 International Conference on Networking and Network Applications (NaNA …, 2016
5 2016 An efficient secure dynamic skyline query model W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui
arXiv preprint arXiv:2002.07511, 2020
4 2020 Adagt: An adaptive group testing method for improving efficiency and sensitivity of large-scale screening against covid-19 X Xia, Y Liu, Y Xiao, J Cui, B Yang, Y Peng
IEEE Transactions on Automation Science and Engineering 19 (2), 646-662, 2021
3 2021 Image analysis by fast improved radial harmonic‐Fourier moments algorithm B He, J Cui, Y Peng, T Yang
International Journal of Imaging Systems and Technology 30 (4), 1033-1045, 2020
3 2020 PvCT: A publicly verifiable contact tracing algorithm in cloud computing Y Zhu, W Ma, J Cui, X Xia, Y Peng, J Ning
Security and Communication Networks 2021, 1-18, 2021
2 2021 A rational exchange protocol under asymmetric information in wireless sensor networks Z Lv, C Peng, Y Peng, J Zhang
Wireless Communications and Mobile Computing 2018, 2018
1 2018 Certificateless public key broadcast encryption based on Huffman tree L Feng, C Peng, Y Peng
Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) 48 (24), 2012
1 2012 Quartet: A Query Aware Database Adaptive Compilation Decision System Z Wang, J Cui, X Gao, H Li, Y Peng, Z Liu, H Zhang, K Zhao
Expert Systems with Applications 244, 122841, 2024
2024