DSP RE-Encryption: A flexible mechanism for access control enforcement management in DaaS XX Tian, XL Wang, AY Zhou 2009 IEEE International Conference on Cloud Computing, 25-32, 2009 | 45 | 2009 |
Privacy preserving query processing on secret share based data storage XX Tian, CF Sha, XL Wang, AY Zhou Database Systems for Advanced Applications: 16th International Conference …, 2011 | 29 | 2011 |
A survey on management of data provenance M Gao, CQ Jin, XL Wang, XX Tian, AY Zhou Chinese Journal of Computers 33 (3), 373-389, 2010 | 29 | 2010 |
A survey of extended role-based access control in cloud computing H Li, S Wang, X Tian, W Wei, C Sun Proceedings of the 4th International Conference on Computer Engineering and …, 2015 | 23 | 2015 |
Image copy‐move forgery detection algorithm based on ORB and novel similarity metric X Tian, G Zhou, M Xu IET Image Processing 14 (10), 2092-2100, 2020 | 21 | 2020 |
An efficient communication intrusion detection scheme in AMI combining feature dimensionality reduction and improved LSTM G Lu, X Tian Security and Communication Networks 2021, 1-21, 2021 | 18 | 2021 |
DSP Re-encryption Based Access Control Enforcement Management Mechanism in DaaS. X Tian, X Wang, A Zhou Int. J. Netw. Secur. 15 (1), 28-41, 2013 | 16 | 2013 |
Shortest path based potential common friend recommendation in social networks X Tian, Y Song, X Wang, X Gong 2012 Second International Conference on Cloud and Green Computing, 541-548, 2012 | 14 | 2012 |
Multidimensional Data Aggregation Scheme For Smart Grid with Differential Privacy. X Tian, Q Song, F Tian Int. J. Netw. Secur. 20 (6), 1137-1148, 2018 | 13 | 2018 |
A security enforcement ID-based partially blind signature scheme XX Tian, HJ Li, JP Xu, Y Wang 2009 International conference on web information systems and mining, 488-492, 2009 | 13 | 2009 |
Database as a Service? Security and Privacy Preserving 田秀霞, 王晓玲, 高明, 周傲英 Journal of Software 21 (5), 991-1006, 2010 | 12 | 2010 |
ID-based encryption with keyword search scheme from bilinear pairings X Tian, Y Wang 2008 4th International Conference on Wireless Communications, Networking and …, 2008 | 11 | 2008 |
A deep understanding of cloud computing security H Li, X Tian, W Wei, CC Sun International Conference on Network Computing and Information Security, 98-105, 2012 | 10 | 2012 |
Image copy-move forgery passive detection based on improved PCNN and self-selected sub-images G Zhou, X Tian, A Zhou Frontiers of Computer Science 16, 1-16, 2022 | 9 | 2022 |
An enhanced wildcard-based fuzzy searching scheme in encrypted databases J Hua, Y Liu, H Chen, X Tian, C Jin World Wide Web 23, 2185-2214, 2020 | 9 | 2020 |
Database as a Service⎯ Security and Privacy Preserving T Xiu-Xia, W Xiao-Ling, G Ming, Z Ao-Ying Journal of Software 21 (5), 991-1006, 2010 | 9 | 2010 |
Genetic algorithm rule definition for denial of services network intrusion detection Y Wang, D Gu, X Tian, J Li 2009 International Conference on Computational Intelligence and Natural …, 2009 | 8 | 2009 |
Anomaly detection algorithm based on improved K-means for electric power data R Wu, A Zhang, X Tian, T Zhang Journal of East China Normal University (Natural Science) 4, 79-87, 2020 | 7 | 2020 |
CloudKeyBank: privacy and owner authorization enforced key management Framework X Tian, L Huang, T Wu, X Wang, A Zhou IEEE Transactions on Knowledge and Data Engineering 27 (12), 3217-3230, 2015 | 7 | 2015 |
A novel classification model SA-MPCNN for power equipment defect text X Tian, C Li, B Zhao Transactions on Asian and Low-Resource Language Information Processing 20 (6 …, 2021 | 6 | 2021 |