Fedproc: Prototypical contrastive federated learning on non-iid data X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang Future Generation Computer Systems 143, 93-104, 2023 | 134 | 2023 |
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation Y Shen, T Zhang, Y Wang, H Wang, X Jiang IEEE Communications Magazine 55 (9), 86-93, 2017 | 81 | 2017 |
TRAC: Traceable and revocable access control scheme for mHealth in 5G-enabled IIoT Q Li, B Xia, H Huang, Y Zhang, T Zhang IEEE Transactions on Industrial Informatics 18 (5), 3437-3448, 2021 | 72 | 2021 |
Personal health records integrity verification using attribute based proxy signature in cloud computing X Liu, J Ma, J Xiong, T Zhang, Q Li Internet and Distributed Computing Systems: 6th International Conference …, 2013 | 51 | 2013 |
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. J Guo, J Ma, X Li, J Zhang, T Zhang Journal of Information Science & Engineering 33 (4), 2017 | 36 | 2017 |
Privacy-preserving asynchronous grouped federated learning for IoT T Zhang, A Song, X Dong, Y Shen, J Ma IEEE Internet of Things Journal 9 (7), 5511-5523, 2021 | 27 | 2021 |
A hierarchical access control scheme for perceptual layer of IoT J Ma, Y Guo, J Ma, J Xiong, T Zhang Computer Research and Development 50, 1267-1275, 2013 | 26 | 2013 |
Traceable CiphertextPolicy AttributeBased Encryption with Verifiable Outsourced Decryption in eHealth Cloud Q Li, H Zhu, Z Ying, T Zhang Wireless Communications and Mobile Computing 2018 (1), 1701675, 2018 | 25 | 2018 |
HTAC: Fine-grained policy-hiding and traceable access control in mHealth Q Li, Y Zhang, T Zhang, H Huang, Y He, J Xiong IEEE Access 8, 123430-123439, 2020 | 24 | 2020 |
Threshold attributebased encryption with attribute hierarchy for lattices in the standard model X Liu, J Ma, J Xiong, Q Li, T Zhang, H Zhu IET Information Security 8 (4), 217-223, 2014 | 23 | 2014 |
Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing X Dong, T Zhang, D Lu, G Li, Y Shen, J Ma IEEE Transactions on Vehicular Technology 68 (9), 8881-8892, 2019 | 20 | 2019 |
Ciphertext policy weighted attribute based encryption scheme X Liu, J Ma, J Xiong, Q Li, T Zhang Journal of Xi’an Jiaotong University 47 (8), 44-48, 2013 | 20 | 2013 |
Microthingschain: Edge computing and decentralized iot architecture based on blockchain for cross-domain data shareing J Zheng, X Dong, T Zhang, J Chen, W Tong, X Yang 2018 International Conference on Networking and Network Applications (NaNA …, 2018 | 19 | 2018 |
A situational awareness trust evolution model for mobile devices in D2D communication J Guo, J Ma, X Li, T Zhang, Z Liu IEEE Access 6, 4375-4386, 2017 | 17 | 2017 |
Trust-based service composition in multi-domain environments under time constraint T Zhang, JF Ma, Q Li, N Xi, C Sun Science China Information Sciences 57, 1-16, 2014 | 17 | 2014 |
Service composition in multi-domain environment under time constraint T Zhang, J Ma, C Sun, Q Li, N Xi 2013 IEEE 20th International Conference on Web Services, 227-234, 2013 | 16 | 2013 |
Trustworthy service composition with secure data transmission in sensor networks T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong World Wide Web 21, 185-200, 2018 | 15 | 2018 |
PRAM: privacy preserving access management scheme in cloud services J Xiong, Z Yao, J Ma, X Liu, Q Li, T Zhang Proceedings of the 2013 international workshop on Security in cloud …, 2013 | 15 | 2013 |
Trust-based service composition and selection in service oriented architecture JJ Guo, JF Ma, XX Guo, XH Li, JW Zhang, T Zhang Peer-to-Peer Networking and Applications 11, 862-880, 2018 | 12 | 2018 |
Decentralized information flow verification framework for the service chain composition in mobile computing environments N Xi, J Ma, C Sun, T Zhang 2013 IEEE 20th International Conference on Web Services, 563-570, 2013 | 12 | 2013 |