Follow
Wenxiu DING
Wenxiu DING
Verified email at xidian.edu.cn
Title
Cited by
Cited by
Year
Deduplication on encrypted big data in cloud
Z Yan, W Ding, X Yu, H Zhu, RH Deng
IEEE transactions on big data 2 (2), 138-150, 2016
2002016
A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion
W Ding, X Jing, Z Yan, LT Yang
Information Fusion 51, 129-144, 2019
1972019
A survey on secure data analytics in edge computing
D Liu, Z Yan, W Ding, M Atiquzzaman
IEEE Internet of Things Journal 6 (3), 4946-4967, 2019
1532019
Encrypted data processing with homomorphic re-encryption
W Ding, Z Yan, RH Deng
Information Sciences 409, 35-55, 2017
1022017
Security vulnerabilities of SGX and countermeasures: A survey
S Fei, Z Yan, W Ding, H Xie
ACM Computing Surveys (CSUR) 54 (6), 1-36, 2021
962021
Privacy-preserving data processing with flexible access control
D Wenxiu, Z Yan, RH Deng
IEEE Transactions on Dependable and Secure Computing 17 (2), 363-376, 2017
852017
Two schemes of privacy-preserving trust evaluation
Z Yan, W Ding, V Niemi, AV Vasilakos
Future Generation Computer Systems 62, 175-189, 2016
812016
A survey on future Internet security architectures
W Ding, Z Yan, RH Deng
IEEE Access 4, 4374-4393, 2016
682016
Privacy-preserving outsourced calculation on floating point numbers
X Liu, RH Deng, W Ding, R Lu, B Qin
IEEE Transactions on Information Forensics and Security 11 (11), 2513-2527, 2016
682016
A survey on data provenance in IoT
R Hu, Z Yan, W Ding, LT Yang
World Wide Web 23, 1441-1463, 2020
652020
Heterogeneous data storage management with deduplication in cloud computing
Z Yan, L Zhang, D Wenxiu, Q Zheng
IEEE Transactions on Big Data 5 (3), 393-407, 2017
652017
An extended framework of privacy-preserving computation with flexible access control
W Ding, R Hu, Z Yan, X Qian, RH Deng, LT Yang, M Dong
IEEE Transactions on Network and Service Management 17 (2), 918-930, 2019
432019
A scheme to manage encrypted data storage with deduplication in cloud
Z Yan, W Ding, H Zhu
Algorithms and Architectures for Parallel Processing: 15th International …, 2015
422015
Context-aware verifiable cloud computing
Z Yan, X Yu, W Ding
IEEE access 5, 2211-2227, 2017
382017
Improvement and optimized implementation of cryptoGPS protocol for low‐cost radio‐frequency identification authentication
Q Dong, W Ding, L Wei
Security and Communication Networks 8 (8), 1474-1484, 2015
192015
A survey on cross-chain technologies
P Han, Z Yan, W Ding, S Fei, Z Wan
Distributed Ledger Technologies: Research and Practice 2 (2), 1-30, 2023
162023
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion
W Wei, J Wang, Z Yan, W Ding
Information Fusion 82, 43-57, 2022
162022
Secure encrypted data deduplication with ownership proof and user revocation
W Ding, Z Yan, RH Deng
Algorithms and Architectures for Parallel Processing: 17th International …, 2017
152017
Computing maximum and minimum with privacy preservation and flexible access control
W Ding, Z Yan, X Qian, RH Deng
2019 IEEE Global Communications Conference (GLOBECOM), 1-7, 2019
72019
A low-cost PKC-based RFID mutual authentication protocol
W Lili, D Qingkuan, D Wenxiu
Telecommunications Science 29 (10), 65-71, 2013
6*2013
The system can't perform the operation now. Try again later.
Articles 1–20