Следене
Jialu Hao
Jialu Hao
Потвърден имейл адрес: nudt.edu.cn
Заглавие
Позовавания
Позовавания
Година
Fine-grained data access control with attribute-hiding policy for cloud-based IoT
J Hao, C Huang, J Ni, H Rong, M Xian, XS Shen
Computer Networks 153, 1-10, 2019
942019
CrowdSFL: A secure crowd computing framework based on blockchain and federated learning
Z Li, J Liu, J Hao, H Wang, M Xian
Electronics 9 (5), 773, 2020
662020
Secure and efficient outsourced k-means clustering using fully homomorphic encryption with ciphertext packing technique
W Wu, J Liu, H Wang, J Hao, M Xian
IEEE Transactions on Knowledge and Data Engineering 33 (10), 3424-3437, 2020
412020
Secure and fine-grained self-controlled outsourced data deletion in cloud-based IoT
J Hao, J Liu, W Wu, F Tang, M Xian
IEEE Internet of Things Journal 7 (2), 1140-1153, 2019
282019
An IoT-applicable access control model under double-layer blockchain
Z Li, J Hao, J Liu, H Wang, M Xian
IEEE Transactions on Circuits and Systems II: Express Briefs 68 (6), 2102-2106, 2020
262020
Secure data sharing with flexible user access privilege update in cloud-assisted IoMT
J Hao, W Tang, C Huang, J Liu, H Wang, M Xian
IEEE Transactions on Emerging Topics in Computing 10 (2), 933-947, 2021
192021
Efficient attribute-based access control with authorized search in cloud storage
J Hao, J Liu, H Wang, L Liu, M Xian, X Shen
IEEE Access 7, 182772-182783, 2019
182019
Privacy-preserving-means clustering under multiowner setting in distributed cloud environments
H Rong, H Wang, J Liu, J Hao, M Xian
Security and Communication Networks 2017, 2017
152017
Smart contract-based access control through off-chain signature and on-chain evaluation
J Hao, C Huang, W Tang, Y Zhang, S Yuan
IEEE Transactions on Circuits and Systems II: Express Briefs 69 (4), 2221-2225, 2021
132021
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment
H Rong, J Liu, W Wu, J Hao, H Wang, M Xian
Computers & Security 98, 101969, 2020
112020
Privacy-preserving interest-ability based task allocation in crowdsourcing
J Hao, C Huang, G Chen, M Xian, X Shen
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
102019
Efficient outsourced data access control with user revocation for cloud-based IoT
J Hao, C Huang, J Liu, M Xian, X Shen
2018 IEEE Global Communications Conference (GLOBECOM), 1-6, 2018
62018
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework
H Rong, H Wang, J Liu, J Hao, M Xian
Security and Privacy in Communication Networks: 13th International …, 2018
62018
Mobile cloud computing: the state of art, application scenarios and challenges
J Hao, M Xian, H Wang, F Tang, P Xiao
2018 4th International Conference on Computational Intelligence …, 2018
42018
OE-CP-ABE: over-encryption based cp-abe scheme for efficient policy updating
J Hao, J Liu, H Rong, H Wang, M Xian
Network and System Security: 11th International Conference, NSS 2017 …, 2017
42017
Puncturable ciphertext-policy attribute-based encryption scheme for efficient and flexible user revocation
D Ghopur, J Ma, X Ma, Y Miao, J Hao, T Jiang
Science China Information Sciences 66 (7), 172104, 2023
22023
PFDLIS: privacy-preserving and fair deep learning inference service under publicly verifiable covert security setting
F Tang, J Hao, J Liu, H Wang, M Xian
Electronics 8 (12), 1488, 2019
22019
Secure collaborative outsourced k-nearest neighbor classification with multiple owners in cloud environment
H Rong, H Wang, J Liu, W Wu, J Hao, M Xian
Information Security and Cryptology: 12th International Conference, Inscrypt …, 2017
22017
Puncturable key-policy attribute-based encryption scheme for efficient user revocation
D Ghopur, J Ma, X Ma, J Hao, T Jiang, X Wang
IEEE Transactions on Services Computing, 2023
12023
A Delegation Attack Method on Attribute-Based Signatures and Probable Solutions
J Hao, W Wu, S Wang, X Zhong, G Chu, F Shao
Mathematics 11 (1), 29, 2022
2022
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20