Blockchain-based decentralized trust management in vehicular networks Z Yang, K Yang, L Lei, K Zheng, VCM Leung IEEE Internet of Things Journal 6 (2), 1495-1505, 2018 | 1023 | 2018 |
An Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Computing. K Yang, X Jia IEEE Trans. Parallel Distrib. Syst. 24 (9), 1717-1726, 2013 | 847 | 2013 |
Security and Privacy in Smart City Applications: Challenges and Solutions K Zhang, J Ni, K Yang, X Liang, J Ren, XS Shen IEEE Communications Magazine 55 (1), 122-129, 2017 | 723 | 2017 |
VerifyNet: Secure and Verifiable Federated Learning G Xu, H Li, S Liu, K Yang, X Lin IEEE Transactions on Information Forensics and Security 15, 911-926, 2019 | 689 | 2019 |
DAC-MACS: Effective data access control for multiauthority cloud storage systems K Yang, X Jia, K Ren, B Zhang, R Xie IEEE Transactions on Information Forensics and Security 8 (11), 1790-1801, 2013 | 633 | 2013 |
Big data-driven optimization for mobile networks toward 5G K Zheng, Z Yang, K Zhang, P Chatzimisios, K Yang, W Xiang IEEE Network 30 (1), 44-51, 2016 | 382 | 2016 |
Expressive, efficient, and revocable data access control for multi-authority cloud storage K Yang, X Jia IEEE transactions on parallel and distributed systems 25 (7), 1735-1744, 2013 | 371 | 2013 |
Data storage auditing service in cloud computing: challenges, methods and opportunities K Yang, X Jia World Wide Web 15 (4), 409-428, 2012 | 340 | 2012 |
A blockchain-based reputation system for data credibility assessment in vehicular networks Z Yang, K Zheng, K Yang, VCM Leung 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and …, 2017 | 237 | 2017 |
Security and privacy in mobile crowdsourcing networks: challenges and opportunities K Yang, K Zhang, J Ren, X Shen IEEE Communications Magazine 53 (8), 75-81, 2015 | 236 | 2015 |
Healthdep: An efficient and secure deduplication scheme for cloud-assisted ehealth systems Y Zhang, C Xu, H Li, K Yang, J Zhou, X Lin IEEE Transactions on Industrial Informatics 14 (9), 4101-4112, 2018 | 224 | 2018 |
Attribute-based fine-grained access control with efficient revocation in cloud storage systems K Yang, X Jia, K Ren Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 223 | 2013 |
Enabling efficient and geometric range query with access control over encrypted spatial data G Xu, H Li, Y Dai, K Yang, X Lin IEEE Transactions on Information Forensics and Security 14 (4), 870-885, 2018 | 205 | 2018 |
Attributed-based access control for multi-authority systems in cloud storage K Yang, X Jia 2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012 | 198 | 2012 |
Privacy-preserving task recommendation services for crowdsourcing J Shu, X Jia, K Yang, H Wang IEEE Transactions on Services Computing 14 (1), 235-247, 2018 | 185 | 2018 |
Security and privacy for mobile healthcare networks: from a quality of protection perspective K Zhang, K Yang, X Liang, Z Su, X Shen, HH Luo IEEE Wireless Communications 22 (4), 104-112, 2015 | 180 | 2015 |
An efficient and fine-grained big data access control scheme with privacy-preserving policy K Yang, Q Han, H Li, K Zheng, Z Su, X Shen IEEE Internet of Things Journal 4 (2), 563-571, 2017 | 165 | 2017 |
Secure and verifiable policy update outsourcing for big data access control in the cloud K Yang, X Jia, K Ren IEEE Transactions on Parallel and Distributed Systems 26 (12), 3461-3470, 2014 | 163 | 2014 |
Querying in internet of things with privacy preserving: Challenges, solutions and opportunities H Ren, H Li, Y Dai, K Yang, X Lin IEEE Network 32 (6), 144-151, 2018 | 161 | 2018 |
Anonymous and privacy-preserving federated learning with industrial big data B Zhao, K Fan, K Yang, Z Wang, H Li, Y Yang IEEE Transactions on Industrial Informatics 17 (9), 6314-6323, 2021 | 133 | 2021 |