Learning the truth privately and confidently: Encrypted confidence-aware truth discovery in mobile crowdsensing Y Zheng, H Duan, C Wang IEEE Transactions on Information Forensics and Security 13 (10), 2475-2489, 2018 | 53 | 2018 |
Enabling Encrypted Cloud Media Center with Secure Deduplication Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui Proc. of ACM AsiaCCS, 2015 | 46 | 2015 |
Toward Encrypted Cloud Media Center With Secure Deduplication Y Zheng, X Yuan, X Wang, J Jiang, C Wang, X Gui IEEE Transactions on Multimedia 19 (2), 251-265, 2017 | 37 | 2017 |
Privacy-Aware and Efficient Mobile Crowdsensing with Truth Discovery Y Zheng, H Duan, X Yuan, C Wang IEEE Transactions on Dependable and Secure Computing 17 (1), 121 - 133, 2020 | 33 | 2020 |
A Novel Image Encryption Scheme Based on Hénon Map and Compound Spatiotemporal Chaos Y Zheng, J Jin Multimedia Tools and Applications 74 (18), 7803-7820, 2015 | 31 | 2015 |
Toward privacy-preserving personalized recommendation services C Wang, Y Zheng, J Jiang, K Ren Engineering 4 (1), 21-28, 2018 | 27 | 2018 |
Privacy-Preserving Image Denoising From External Cloud Databases Y Zheng, H Cui, C Wang, J Zhou IEEE Transactions on Information Forensics and Security, 2017 | 25 | 2017 |
Enabling Secure and Effective Near-duplicate Detection over Encrypted In-network Storage H Cui, X Yuan, Y Zheng, C Wang Proc. of IEEE INFOCOM, 2016 | 23 | 2016 |
Leveraging crowdsensed data streams to discover and sell knowledge: A secure and efficient realization C Cai, Y Zheng, C Wang 2018 IEEE 38th International Conference on Distributed Computing Systems …, 2018 | 22 | 2018 |
Aggregating crowd wisdom via blockchain: A private, correct, and robust realization H Duan, Y Zheng, Y Du, A Zhou, C Wang, MH Au 2019 IEEE International Conference on Pervasive Computing and Communications …, 2019 | 17 | 2019 |
Towards secure and efficient outsourcing of machine learning classification Y Zheng, H Duan, C Wang European Symposium on Research in Computer Security, 22-40, 2019 | 13 | 2019 |
Enabling search over encrypted cloud data with concealed search pattern J Yao, Y Zheng, C Wang, X Gui IEEE Access 6, 11112-11122, 2018 | 11 | 2018 |
You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center LY Zhang, Y Zheng, J Weng, C Wang, Z Shan, K Ren IEEE Transactions on Dependable and Secure Computing 17 (6), 1218-1231, 2018 | 10 | 2018 |
Towards Secure and Accurate Targeted Mobile Coupon Delivery J Jiang, Y Zheng, X Yuan, Z Shi, X Gui, C Wang, J Yao IEEE Access 4, 8116-8126, 2016 | 10 | 2016 |
Treasure collection on foggy islands: building secure network archives for internet of things H Duan, Y Zheng, C Wang, X Yuan IEEE Internet of Things Journal 6 (2), 2637-2650, 2018 | 8 | 2018 |
Towards private, robust, and verifiable crowdsensing systems via public blockchains C Cai, Y Zheng, Y Du, Z Qin, C Wang IEEE Transactions on Dependable and Secure Computing, 2019 | 6 | 2019 |
A privacy-preserving system for targeted coupon service J Yao, Y Zheng, Y Guo, C Cai, A Zhou, C Wang, X Gui IEEE Access 7, 120817-120830, 2019 | 6 | 2019 |
Denoising in the dark: Privacy-preserving deep neural network based image denoising Y Zheng, H Duan, X Tang, C Wang, J Zhou IEEE Transactions on Dependable and Secure Computing, 2019 | 5 | 2019 |
A practical system for privacy-aware targeted mobile advertising services J Jiang, Y Zheng, Z Shi, X Yuan, X Gui, C Wang IEEE Transactions on Services Computing 13 (3), 410-424, 2017 | 5 | 2017 |
Towards encrypted in-network storage services with secure near-duplicate detection H Cui, X Yuan, Y Zheng, C Wang IEEE Transactions on Services Computing, 2018 | 3 | 2018 |