Attribute-based encryption with verifiable outsourced decryption J Lai, RH Deng, C Guan, J Weng IEEE Transactions on information forensics and security 8 (8), 1343-1354, 2013 | 435 | 2013 |
Efficient unidirectional proxy re-encryption SSM Chow, J Weng, Y Yang, RH Deng International Conference on Cryptology in Africa, 316-332, 2010 | 379 | 2010 |
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings J Weng, RH Deng, S Liu, K Chen Information Sciences 180 (24), 5077-5089, 2010 | 352* | 2010 |
Verifiable computation over large database with incremental updates X Chen, J Li, J Weng, J Ma, W Lou IEEE transactions on Computers 65 (10), 3184-3195, 2015 | 275 | 2015 |
Conditional proxy re-encryption secure against chosen-ciphertext attack J Weng, RH Deng, X Ding, CK Chu, J Lai Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 214 | 2009 |
Crowdbc: A blockchain-based decentralized framework for crowdsourcing M Li, J Weng, A Yang, W Lu, Y Zhang, L Hou, JN Liu, Y Xiang, RH Deng IEEE Transactions on Parallel and Distributed Systems 30 (6), 1251-1266, 2018 | 201 | 2018 |
Conditional proxy broadcast re-encryption CK Chu, J Weng, SSM Chow, J Zhou, RH Deng Australasian conference on information security and privacy, 327-342, 2009 | 146 | 2009 |
An efficient privacy-preserving outsourced calculation toolkit with multiple keys X Liu, RH Deng, KKR Choo, J Weng IEEE Transactions on Information Forensics and Security 11 (11), 2401-2414, 2016 | 141 | 2016 |
Multi-user private keyword search for cloud computing Y Yang, H Lu, J Weng 2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011 | 133 | 2011 |
Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data Z Fu, F Huang, K Ren, J Weng, C Wang IEEE Transactions on Information Forensics and Security 12 (8), 1874-1884, 2017 | 127 | 2017 |
Efficient and privacy-preserving outsourced calculation of rational numbers X Liu, KKR Choo, RH Deng, R Lu, J Weng IEEE Transactions on Dependable and Secure Computing 15 (1), 27-39, 2016 | 126 | 2016 |
Efficient conditional proxy re-encryption with chosen-ciphertext security J Weng, Y Yang, Q Tang, RH Deng, F Bao International Conference on Information Security, 151-166, 2009 | 114 | 2009 |
An overview on smart contracts: Challenges, advances and platforms Z Zheng, S Xie, HN Dai, W Chen, X Chen, J Weng, M Imran Future Generation Computer Systems 105, 475-491, 2020 | 113 | 2020 |
Deepchain: Auditable and privacy-preserving deep learning with blockchain-based incentive J Weng, J Weng, J Zhang, M Li, Y Zhang, W Luo IEEE Transactions on Dependable and Secure Computing, 2019 | 110 | 2019 |
Feature selection for text classification: A review X Deng, Y Li, J Weng, J Zhang Multimedia Tools and Applications 78 (3), 3797-3816, 2019 | 103 | 2019 |
CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles J Weng, M Chen, Y Yang, R Deng, K Chen, F Bao Science China Information Sciences 53 (3), 593-606, 2010 | 99 | 2010 |
Copy-move forgery detection based on hybrid features F Yang, J Li, W Lu, J Weng Engineering Applications of Artificial Intelligence 59, 73-83, 2017 | 95 | 2017 |
Cost-friendly differential privacy for smart meters: Exploiting the dual roles of the noise Z Zhang, Z Qin, L Zhu, J Weng, K Ren IEEE Transactions on Smart Grid 8 (2), 619-626, 2016 | 92 | 2016 |
Cloud based data sharing with fine-grained proxy re-encryption Y Yang, H Zhu, H Lu, J Weng, Y Zhang, KKR Choo Pervasive and Mobile computing 28, 122-134, 2016 | 88 | 2016 |
Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption X Mao, J Lai, Q Mei, K Chen, J Weng IEEE Transactions on dependable and secure computing 13 (5), 533-546, 2015 | 84 | 2015 |