A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications J Lin, W Yu, N Zhang, X Yang, H Zhang, W Zhao IEEE internet of things journal 4 (5), 1125-1142, 2017 | 3226 | 2017 |
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium W Shen, J Yu, H Xia, H Zhang, X Lu, R Hao Journal of Network and Computer Applications 82, 56-64, 2017 | 128 | 2017 |
Ultra-dense networks: Survey of state of the art and future directions W Yu, H Xu, H Zhang, D Griffith, N Golmie 2016 25th international conference on computer communication and networks …, 2016 | 121 | 2016 |
Towards achieving keyword search over dynamic encrypted cloud data with symmetric-key based verification X Ge, J Yu, H Zhang, C Hu, Z Li, Z Qin, R Hao IEEE Transactions on Dependable and Secure computing 18 (1), 490-504, 2019 | 118 | 2019 |
Enabling efficient verifiable fuzzy keyword search over encrypted data in cloud computing X Ge, J Yu, C Hu, H Zhang, R Hao IEEE Access 6, 45725-45739, 2018 | 60 | 2018 |
An edge computing based public vehicle system for smart transportation J Lin, W Yu, X Yang, P Zhao, H Zhang, W Zhao IEEE Transactions on Vehicular Technology 69 (11), 12635-12651, 2020 | 55 | 2020 |
On behavior-based detection of malware on android platform W Yu, H Zhang, L Ge, R Hardy 2013 IEEE global communications conference (GLOBECOM), 814-819, 2013 | 55 | 2013 |
Remote data possession checking with privacy-preserving authenticators for cloud storage W Shen, G Yang, J Yu, H Zhang, F Kong, R Hao Future Generation Computer Systems 76, 136-145, 2017 | 48 | 2017 |
Cloud storage for electronic health records based on secret sharing with verifiable reconstruction outsourcing H Zhang, J Yu, C Tian, P Zhao, G Xu, J Lin IEEE Access 6, 40713-40722, 2018 | 47 | 2018 |
Water quality assessment with hierarchical cluster analysis based on Mahalanobis distance X Du, F Shao, S Wu, H Zhang, S Xu Environmental monitoring and assessment 189, 1-12, 2017 | 47 | 2017 |
Machine learning on cloud with blockchain: a secure, verifiable and fair approach to outsource the linear regression H Zhang, P Gao, J Yu, J Lin, NN Xiong IEEE Transactions on Network Science and Engineering 9 (6), 3956-3967, 2021 | 43 | 2021 |
Blockchain-based two-party fair contract signing scheme L Zhang, H Zhang, J Yu, H Xian Information Sciences 535, 142-155, 2020 | 40 | 2020 |
Privacy-preserving and distributed algorithms for modular exponentiation in IoT with edge computing assistance H Li, J Yu, H Zhang, M Yang, H Wang IEEE Internet of Things Journal 7 (9), 8769-8779, 2020 | 40 | 2020 |
Scheduling methods for unmanned aerial vehicle based delivery systems H Zhang, S Wei, W Yu, E Blasch, G Chen, D Shen, K Pham 2014 IEEE/AIAA 33rd Digital Avionics Systems Conference (DASC), 6C1-1-6C1-9, 2014 | 39 | 2014 |
Novel secure outsourcing of modular inversion for arbitrary and variable modulus C Tian, J Yu, H Zhang, H Xue, C Wang, K Ren IEEE Transactions on Services Computing 15 (1), 241-253, 2019 | 38 | 2019 |
Practical and secure outsourcing algorithms for solving quadratic congruences in internet of things H Zhang, J Yu, C Tian, G Xu, P Gao, J Lin IEEE Internet of Things Journal 7 (4), 2968-2981, 2020 | 35 | 2020 |
How to securely outsource finding the min-cut of undirected edge-weighted graphs P Zhao, J Yu, H Zhang, Z Qin, C Wang IEEE Transactions on Information Forensics and Security 15, 315-328, 2019 | 34 | 2019 |
SPPS: A search pattern privacy system for approximate shortest distance query of encrypted graphs in IIoT X Ge, J Yu, H Zhang, J Bai, J Fan, NN Xiong IEEE Transactions on Systems, Man, and Cybernetics: Systems 52 (1), 136-150, 2021 | 33 | 2021 |
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields Q Zhou, C Tian, H Zhang, J Yu, F Li Information Sciences 512, 641-660, 2020 | 33 | 2020 |
A cloud computing based system for cyber security management G Xu, W Yu, Z Chen, H Zhang, P Moulema, X Fu, C Lu International Journal of Parallel, Emergent and Distributed Systems 30 (1 …, 2015 | 32 | 2015 |