Folgen
Jin Li  李进
Jin Li 李进
Professor @Guangzhou University
Bestätigte E-Mail-Adresse bei gzhu.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
Enabling public auditability and data dynamics for storage security in cloud computing
Q Wang, C Wang, K Ren, W Lou, J Li
IEEE transactions on parallel and distributed systems 22 (5), 847-859, 2010
16762010
Enabling public verifiability and data dynamics for storage security in cloud computing
Q Wang, C Wang, J Li, K Ren, W Lou
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
15692009
Enabling efficient fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
Cryptology ePrint Archive, Report 2009 593, 16, 2009
1399*2009
Fuzzy keyword search over encrypted data in cloud computing
J Li, Q Wang, C Wang, N Cao, K Ren, W Lou
2010 Proceedings IEEE INFOCOM, 1-5, 2010
13602010
Secure ranked keyword search over encrypted cloud data
C Wang, N Cao, J Li, K Ren, W Lou
2010 IEEE 30th international conference on distributed computing systems …, 2010
11312010
Secure Deduplication with Efficient and Reliable Convergent Key Management
J Li, X Chen, M Li, J Li, P Lee, W Lou
IEEE Transactions on Parallel and Distributed Systems 25 (6), 1615-1625, 2014
7972014
Toward publicly auditable secure cloud data storage services
C Wang, K Ren, W Lou, J Li
IEEE network 24 (4), 19-24, 2010
6482010
Significant permission identification for machine-learning-based android malware detection
J Li, L Sun, Q Yan, Z Li, W Srisa-An, H Ye
IEEE Transactions on Industrial Informatics 14 (7), 3216-3225, 2018
6182018
A Hybrid Cloud Approach for Secure Authorized Deduplication
J Li, Y Li, X Chen, P Lee, W Lou
IEEE Transactions on Parallel and Distributed Systems, 2014
5582014
New Algorithms for Secure Outsourcing of Modular Exponentiations
X Chen, J Li, J Ma, Q Tang, W Lou
ESORICS, 2012
5132012
Securely outsourcing attribute-based encryption with checkability
J Li, X Huang, J Li, X Chen, Y Xiang
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2201-2210, 2013
4892013
Multi-key privacy-preserving deep learning in cloud computing
P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen
Future Generation Computer Systems 74, 76-85, 2017
4782017
Identity-based encryption with outsourced revocation in cloud computing
J Li, J Li, X Chen, C Jia, W Lou
IEEE Transactions on computers 64 (2), 425-437, 2013
4572013
Attribute-based signature and its applications
J Li, MH Au, W Susilo, D Xie, K Ren
Proceedings of the 5th ACM symposium on information, computer and …, 2010
3712010
Privacy-preserving outsourced classification in cloud computing
P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen
Cluster Computing 21, 277-286, 2018
3572018
Verifiable computation over large database with incremental updates
X Chen, J Li, J Weng, J Ma, W Lou
IEEE transactions on Computers 65 (10), 3184-3195, 2015
3222015
An ensemble random forest algorithm for insurance big data analysis
W Lin, Z Wu, L Lin, A Wen, J Li
Ieee access 5, 16568-16575, 2017
2912017
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2852017
New publicly verifiable databases with efficient updates
X Chen, J Li, X Huang, J Ma, W Lou
IEEE Transactions on Dependable and Secure Computing 12 (5), 546-556, 2014
2782014
Anonymous and traceable group data sharing in cloud computing
J Shen, T Zhou, X Chen, J Li, W Susilo
IEEE Transactions on Information Forensics and Security 13 (4), 912-925, 2017
2712017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20