Efficient and privacy-enhanced federated learning for industrial artificial intelligence M Hao, H Li, X Luo, G Xu, H Yang, S Liu IEEE Transactions on Industrial Informatics 16 (10), 6532-6542, 2019 | 592 | 2019 |
Identity-based authentication for cloud computing H Li, Y Dai, L Tian, H Yang Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009 | 427 | 2009 |
EPPDR: An efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid H Li, X Lin, H Yang, X Liang, R Lu, X Shen IEEE Transactions on Parallel and Distributed Systems 25 (8), 2053-2064, 2013 | 369 | 2013 |
Towards efficient and privacy-preserving federated deep learning M Hao, H Li, G Xu, S Liu, H Yang ICC 2019-2019 IEEE international conference on communications (ICC), 1-6, 2019 | 234 | 2019 |
Chronos: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage Y Zhang, C Xu, N Cheng, H Li, H Yang, X Shen IEEE Transactions on Services Computing 13 (2), 216-229, 2019 | 114 | 2019 |
A practical and compatible cryptographic solution to ADS-B security H Yang, Q Zhou, M Yao, R Lu, H Li, X Zhang IEEE Internet of Things Journal 6 (2), 3322-3334, 2018 | 102 | 2018 |
Lightweight and confidential data discovery and dissemination for wireless body area networks D He, S Chan, Y Zhang, H Yang IEEE journal of biomedical and health informatics 18 (2), 440-448, 2013 | 67 | 2013 |
An efficient and privacy-preserving disease risk prediction scheme for e-healthcare X Yang, R Lu, J Shao, X Tang, H Yang IEEE Internet of Things Journal 6 (2), 3284-3297, 2018 | 51 | 2018 |
Secure and Efficient k NN Classification for Industrial Internet of Things H Yang, S Liang, J Ni, H Li, XS Shen IEEE Internet of Things Journal 7 (11), 10945-10954, 2020 | 48 | 2020 |
Efficient public key encryption with revocable keyword search Y Yu, J Ni, H Yang, Y Mu, W Susilo Security and Communication Networks 7 (2), 466-472, 2014 | 44 | 2014 |
Using highly compressed gradients in federated learning for data reconstruction attacks H Yang, M Ge, K Xiang, J Li IEEE Transactions on Information Forensics and Security 18, 818-830, 2022 | 42 | 2022 |
Secure and distributed data discovery and dissemination in wireless sensor networks D He, S Chan, M Guizani, H Yang, B Zhou IEEE Transactions on Parallel and Distributed Systems 26 (4), 1129-1139, 2014 | 41 | 2014 |
AMA: Anonymous mutual authentication with traceability in carpooling systems J Ni, K Zhang, X Lin, H Yang, XS Shen 2016 IEEE International Conference on Communications (ICC), 1-6, 2016 | 40 | 2016 |
Secure and verifiable inference in deep neural networks G Xu, H Li, H Ren, J Sun, S Xu, J Ning, H Yang, K Yang, RH Deng Proceedings of the 36th Annual Computer Security Applications Conference …, 2020 | 38 | 2020 |
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data Y Zheng, R Lu, B Li, J Shao, H Yang, KKR Choo Information Sciences 498, 91-105, 2019 | 37 | 2019 |
A comprehensive overview of backdoor attacks in large language models within communication networks H Yang, K Xiang, M Ge, H Li, R Lu, S Yu IEEE Network, 2024 | 36 | 2024 |
Gradient leakage attacks in federated learning: Research frontiers, taxonomy and future directions H Yang, M Ge, D Xue, K Xiang, H Li, R Lu IEEE Network, 2023 | 36 | 2023 |
A new somewhat homomorphic encryption scheme over integers HM Yang, Q Xia, X Wang, D Tang 2012 International Conference on Computer Distributed Control and …, 2012 | 35 | 2012 |
LHCSAS: A lightweight and highly-compatible solution for ADS-B security H Yang, M Yao, Z Xu, B Liu GLOBECOM 2017-2017 IEEE Global Communications Conference, 1-7, 2017 | 34 | 2017 |
Achieving multi-authority access control with efficient attribute revocation in smart grid D Liu, H Li, Y Yang, H Yang 2014 IEEE International Conference on Communications (ICC), 634-639, 2014 | 34 | 2014 |