Segui
xiuxia tian
xiuxia tian
Computer Science, Shanghai University of Electric Power; Visiting Scholar of Computer Science, UC
Email verificata su shiep.edu.cn
Titolo
Citata da
Citata da
Anno
DSP RE-Encryption: A flexible mechanism for access control enforcement management in DaaS
XX Tian, XL Wang, AY Zhou
2009 IEEE International Conference on Cloud Computing, 25-32, 2009
452009
Privacy preserving query processing on secret share based data storage
XX Tian, CF Sha, XL Wang, AY Zhou
Database Systems for Advanced Applications: 16th International Conference …, 2011
292011
A survey on management of data provenance
M Gao, CQ Jin, XL Wang, XX Tian, AY Zhou
Chinese Journal of Computers 33 (3), 373-389, 2010
292010
A survey of extended role-based access control in cloud computing
H Li, S Wang, X Tian, W Wei, C Sun
Proceedings of the 4th International Conference on Computer Engineering and …, 2015
232015
Image copy‐move forgery detection algorithm based on ORB and novel similarity metric
X Tian, G Zhou, M Xu
IET Image Processing 14 (10), 2092-2100, 2020
212020
An efficient communication intrusion detection scheme in AMI combining feature dimensionality reduction and improved LSTM
G Lu, X Tian
Security and Communication Networks 2021, 1-21, 2021
182021
DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS.
X Tian, X Wang, A Zhou
Int. J. Netw. Secur. 15 (1), 28-41, 2013
162013
Shortest path based potential common friend recommendation in social networks
X Tian, Y Song, X Wang, X Gong
2012 Second International Conference on Cloud and Green Computing, 541-548, 2012
142012
Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy.
X Tian, Q Song, F Tian
Int. J. Netw. Secur. 20 (6), 1137-1148, 2018
132018
A security enforcement ID-based partially blind signature scheme
XX Tian, HJ Li, JP Xu, Y Wang
2009 International conference on web information systems and mining, 488-492, 2009
132009
Database as a Service? Security and Privacy Preserving
田秀霞, 王晓玲, 高明, 周傲英
Journal of Software 21 (5), 991-1006, 2010
122010
ID-based encryption with keyword search scheme from bilinear pairings
X Tian, Y Wang
2008 4th International Conference on Wireless Communications, Networking and …, 2008
112008
A deep understanding of cloud computing security
H Li, X Tian, W Wei, CC Sun
International Conference on Network Computing and Information Security, 98-105, 2012
102012
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images
G Zhou, X Tian, A Zhou
Frontiers of Computer Science 16, 1-16, 2022
92022
An enhanced wildcard-based fuzzy searching scheme in encrypted databases
J Hua, Y Liu, H Chen, X Tian, C Jin
World Wide Web 23, 2185-2214, 2020
92020
Database as a Service⎯ Security and Privacy Preserving
T Xiu-Xia, W Xiao-Ling, G Ming, Z Ao-Ying
Journal of Software 21 (5), 991-1006, 2010
92010
Genetic algorithm rule definition for denial of services network intrusion detection
Y Wang, D Gu, X Tian, J Li
2009 International Conference on Computational Intelligence and Natural …, 2009
82009
Anomaly detection algorithm based on improved K-means for electric power data
R Wu, A Zhang, X Tian, T Zhang
Journal of East China Normal University (Natural Science) 4, 79-87, 2020
72020
CloudKeyBank: privacy and owner authorization enforced key management Framework
X Tian, L Huang, T Wu, X Wang, A Zhou
IEEE Transactions on Knowledge and Data Engineering 27 (12), 3217-3230, 2015
72015
A novel classification model SA-MPCNN for power equipment defect text
X Tian, C Li, B Zhao
Transactions on Asian and Low-Resource Language Information Processing 20 (6 …, 2021
62021
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20