关注
Yanguo Peng
Yanguo Peng
在 xidian.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Certificateless public key encryption with keyword search
P Yanguo, C Jiangtao, P Changgen, Y Zuobin
China Communications 11 (11), 100-113, 2014
1062014
ADFL: A poisoning attack defense framework for horizontal federated learning
J Guo, H Li, F Huang, Z Liu, Y Peng, X Li, J Ma, VG Menon, KK Igorevich
IEEE Transactions on Industrial Informatics 18 (10), 6526-6536, 2022
182022
SCALE: An efficient framework for secure dynamic skyline query processing in the cloud
W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui
Database Systems for Advanced Applications: 25th International Conference …, 2020
172020
A control-chart-based detector for small-amount electricity theft (SET) attack in smart grids
X Xia, J Lin, Y Xiao, J Cui, Y Peng, Y Ma
IEEE Internet of Things Journal 9 (9), 6745-6762, 2021
162021
LS-RQ: A lightweight and forward-secure range query on geographically encrypted data
Y Peng, L Wang, J Cui, X Liu, H Li, J Ma
IEEE Transactions on Dependable and Secure Computing 19 (1), 388-401, 2020
132020
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts
Y Peng, H Li, J Cui, J Zhang, J Ma, C Peng
Science China Information Sciences 60, 1-17, 2017
122017
Image analysis using modified exponent-Fourier moments
B He, J Cui, B Xiao, Y Peng
EURASIP Journal on Image and Video Processing 2019, 1-27, 2019
102019
SecureNearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments
W Xue, H Li, Y Peng, J Cui, Y Shi
IEEE Transactions on Big Data 4 (4), 586-599, 2017
102017
A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud
Y Peng, J Cui, H Li, J Ma
Information Sciences 387, 146-164, 2017
102017
Quaternion fractional-order color orthogonal moment-based image representation and recognition
B He, J Liu, T Yang, B Xiao, Y Peng
EURASIP Journal on Image and Video Processing 2021 (1), 17, 2021
72021
Towards Secure Approximate-Nearest Neighbor Query Over Encrypted High-Dimensional Data
Y Peng, H Li, J Cui, J Ma, Y Liu
IEEE Access 6, 23137-23151, 2018
62018
Secsky: A secure dynamic skyline query scheme with data privacy
J Zhao, Y Ma, J Cui, Y Peng, K Li, T Wang
IEEE Access 9, 5690-5703, 2020
52020
An efficient range query model over encrypted outsourced data using secure kd tree
Y Peng, H Li, J Cui, Y Zhu, C Peng
2016 International Conference on Networking and Network Applications (NaNA …, 2016
52016
An efficient secure dynamic skyline query model
W Wang, H Li, Y Peng, SS Bhowmick, P Chen, X Chen, J Cui
arXiv preprint arXiv:2002.07511, 2020
42020
Adagt: An adaptive group testing method for improving efficiency and sensitivity of large-scale screening against covid-19
X Xia, Y Liu, Y Xiao, J Cui, B Yang, Y Peng
IEEE Transactions on Automation Science and Engineering 19 (2), 646-662, 2021
32021
Image analysis by fast improved radial harmonicFourier moments algorithm
B He, J Cui, Y Peng, T Yang
International Journal of Imaging Systems and Technology 30 (4), 1033-1045, 2020
32020
PvCT: A publicly verifiable contact tracing algorithm in cloud computing
Y Zhu, W Ma, J Cui, X Xia, Y Peng, J Ning
Security and Communication Networks 2021, 1-18, 2021
22021
A rational exchange protocol under asymmetric information in wireless sensor networks
Z Lv, C Peng, Y Peng, J Zhang
Wireless Communications and Mobile Computing 2018, 2018
12018
Certificateless public key broadcast encryption based on Huffman tree
L Feng, C Peng, Y Peng
Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) 48 (24), 2012
12012
Quartet: A Query Aware Database Adaptive Compilation Decision System
Z Wang, J Cui, X Gao, H Li, Y Peng, Z Liu, H Zhang, K Zhao
Expert Systems with Applications 244, 122841, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20