Enabling identity-based integrity auditing and data sharing with sensitive information hiding for secure cloud storage W Shen, J Qin, J Yu, R Hao, J Hu IEEE Transactions on Information Forensics and Security 14 (2), 331-346, 2018 | 350 | 2018 |
Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability G Yang, J Yu, W Shen, Q Su, Z Fu, R Hao Journal of Systems and Software 113, 130-139, 2016 | 166 | 2016 |
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium W Shen, J Yu, H Xia, H Zhang, X Lu, R Hao Journal of Network and Computer Applications 82, 56-64, 2017 | 125 | 2017 |
Data integrity auditing without private key storage for secure cloud storage W Shen, J Qin, J Yu, R Hao, J Hu, J Ma IEEE Transactions on Cloud Computing 9 (4), 1408-1421, 2019 | 71 | 2019 |
Remote data possession checking with privacy-preserving authenticators for cloud storage W Shen, G Yang, J Yu, H Zhang, F Kong, R Hao Future Generation Computer Systems 76, 136-145, 2017 | 44 | 2017 |
Lightweight cloud storage auditing with deduplication supporting strong privacy protection W Shen, Y Su, R Hao IEEE Access 8, 44359-44372, 2020 | 37 | 2020 |
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication X Gao, J Yu, WT Shen, Y Chang, SB Zhang, M Yang, B Wu Information Sciences 546, 177-191, 2021 | 28 | 2021 |
Efficient identity-based data integrity auditing with key-exposure resistance for cloud storage W Shen, J Yu, M Yang, J Hu IEEE Transactions on Dependable and Secure Computing 20 (6), 4593-4606, 2022 | 25 | 2022 |
Privacy-preserving certificateless public auditing supporting different auditing frequencies Y Huang, W Shen, J Qin, H Hou Computers & Security 128, 103181, 2023 | 15 | 2023 |
PPADT: privacy-preserving identity-based public auditing with efficient data transfer for cloud-based IoT data C Gai, W Shen, M Yang, J Yu IEEE Internet of Things Journal 10 (22), 20065-20079, 2023 | 14 | 2023 |
Privacy-preserving healthcare monitoring for IoT devices under edge computing W Cao, W Shen, Z Zhang, J Qin Computers & Security 134, 103464, 2023 | 8 | 2023 |
Keyword-based remote data integrity auditing supporting full data dynamics W Shen, C Gai, J Yu, Y Su IEEE Transactions on Services Computing, 2023 | 7 | 2023 |
Access-authorizing and privacy-preserving auditing with group dynamic for shared cloud data W Shen, J Yu, G Yang, Y Zhang, Z Fu, R Hao KSII Transactions on Internet and Information Systems (TIIS) 10 (7), 3319-3338, 2016 | 6 | 2016 |
ESVFL: Efficient and secure verifiable federated learning with privacy-preserving J Cai, W Shen, J Qin Information Fusion 109, 102420, 2024 | 5 | 2024 |
A public cloud storage auditing scheme for resource-constrained clients W Shen, J Yu, R Hao, X Wang International Journal of High Performance Systems Architecture 6 (3), 121-130, 2016 | 5 | 2016 |
Certificateless cloud storage auditing supporting data ownership transfer Y Huang, W Shen, J Qin Computers & Security 139, 103738, 2024 | 3 | 2024 |
Secure cloud storage auditing with deduplication and efficient data transfer J Yu, W Shen Cluster Computing 27 (2), 2203-2215, 2024 | 3 | 2024 |
Public Data Auditing with Constrained Auditing Number for Cloud Storage G Yang, H Xia, W Shen, X Jiang, J Yu International Journal of Security and Its Applications 9 (9), 21-32, 2015 | 3 | 2015 |
Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR J Yu, W Shen, X Zhang Computers & Security, 103932, 2024 | 2 | 2024 |
A Lightweight Identity‐Based Cloud Storage Auditing Supporting Proxy Update and Workload‐Based Payment W Shen, J Qin, J Ma Security and Communication Networks 2019 (1), 8275074, 2019 | 2 | 2019 |