default search action
Wenxiu Ding
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Lanyan Wang, Wenxiu Ding, Zheng Yan, Su Qiu, Mingjun Wang, Zhiguo Wan:
EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation. IEEE Internet Things J. 11(8): 14579-14592 (2024) - [j20]Yuxuan Cai, Wenxiu Ding, Yuxuan Xiao, Zheng Yan, Ximeng Liu, Zhiguo Wan:
SecFed: A Secure and Efficient Federated Learning Based on Multi-Key Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 21(4): 3817-3833 (2024) - 2023
- [j19]Panpan Han, Zheng Yan, Wenxiu Ding, Shufan Fei, Zhiguo Wan:
A Survey on Cross-chain Technologies. Distributed Ledger Technol. Res. Pract. 2(2): 1-30 (2023) - [j18]Dan Liu, Zheng Yan, Wenxiu Ding, Yuxuan Cai, Yaxing Chen, Zhiguo Wan:
ESMAC: Efficient and Secure Multi-Owner Access Control With TEE in Multi-Level Data Processing. IEEE Trans. Dependable Secur. Comput. 20(5): 4052-4069 (2023) - [c8]Guocang Liu, Haoxiang Han, Wenxiu Ding, Shufan Fei, Zheng Yan:
Demo Paper: Anonymous Authentication on Trust in Blockchain-Based Mobile Crowdsourcing System. Blockchain 2023: 140-144 - 2022
- [j17]Shufan Fei, Zheng Yan, Wenxiu Ding, Haomeng Xie:
Security Vulnerabilities of SGX and Countermeasures: A Survey. ACM Comput. Surv. 54(6): 126:1-126:36 (2022) - [j16]Wentao Wei, Jie Wang, Zheng Yan, Wenxiu Ding:
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion. Inf. Fusion 82: 43-57 (2022) - [c7]Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng, Zhiguo Wan:
An Efficient and Secure Scheme of Verifiable Computation for Intel SGX. TrustCom 2022: 473-482 - [c6]Wei Sun, Zheng Yan, Xi Xu, Wenxiu Ding, Lijun Gao:
Software Side Channel Vulnerability Detection Based on Similarity Calculation and Deep Learning. TrustCom 2022: 800-809 - 2021
- [i1]Wenxiu Ding, Wei Sun, Zheng Yan, Robert H. Deng:
An efficient and secure scheme of verifiable computation for Intel SGX. CoRR abs/2106.14253 (2021) - 2020
- [j15]Yu Shi, Shan Zhu, Jianxin Yang, Minghai Shao, Wenxiu Ding, Wanrong Jiang, Xinchen Sun, Ninghua Yao:
Investigation of Potential Mechanisms Associated with Non-small Cell Lung Cancer. J. Comput. Biol. 27(9): 1433-1442 (2020) - [j14]Wenxiu Ding, Huiyang Wang, Xisong Zhu, Bernhard Zimmer:
Prediction and Analysis of Respiratory Circulation System in Radiotherapy Patients by Four-Dimensional Computed Tomography Image Technology. J. Medical Imaging Health Informatics 10(8): 1851-1856 (2020) - [j13]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Privacy-Preserving Data Processing with Flexible Access Control. IEEE Trans. Dependable Secur. Comput. 17(2): 363-376 (2020) - [j12]Wenxiu Ding, Rui Hu, Zheng Yan, Xinren Qian, Robert H. Deng, Laurence T. Yang, Mianxiong Dong:
An Extended Framework of Privacy-Preserving Computation With Flexible Access Control. IEEE Trans. Netw. Serv. Manag. 17(2): 918-930 (2020) - [j11]Rui Hu, Zheng Yan, Wenxiu Ding, Laurence T. Yang:
A survey on data provenance in IoT. World Wide Web 23(2): 1441-1463 (2020) - [c5]Rui Hu, Wenxiu Ding, Zheng Yan:
Privacy-preserving Computation over Encrypted Vectors. GLOBECOM 2020: 1-6
2010 – 2019
- 2019
- [j10]Wenxiu Ding, Xuyang Jing, Zheng Yan, Laurence T. Yang:
A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion. Inf. Fusion 51: 129-144 (2019) - [j9]Dan Liu, Zheng Yan, Wenxiu Ding, Mohammed Atiquzzaman:
A Survey on Secure Data Analytics in Edge Computing. IEEE Internet Things J. 6(3): 4946-4967 (2019) - [j8]Zheng Yan, Lifang Zhang, Wenxiu Ding, Qinghua Zheng:
Heterogeneous Data Storage Management with Deduplication in Cloud Computing. IEEE Trans. Big Data 5(3): 393-407 (2019) - [c4]Wenxiu Ding, Zheng Yan, Xinren Qian, Robert H. Deng:
Computing Maximum and Minimum with Privacy Preservation and Flexible Access Control. GLOBECOM 2019: 1-7 - [c3]Xueqin Liang, Zheng Yan, Wenxiu Ding, Robert H. Deng:
Game Theoretical Study on a Client-Controlled Deduplication Scheme. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1154-1161 - [p1]Zheng Yan, Xueqin Liang, Wenxiu Ding, Xixun Yu, Mingjun Wang, Robert H. Deng:
Encrypted Big Data Deduplication in Cloud Storage. Smart Data 2019: 63-92 - 2017
- [j7]Zheng Yan, Xixun Yu, Wenxiu Ding:
Context-Aware Verifiable Cloud Computing. IEEE Access 5: 2211-2227 (2017) - [j6]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Encrypted data processing with Homomorphic Re-Encryption. Inf. Sci. 409: 35-55 (2017) - [c2]Wenxiu Ding, Zheng Yan, Robert H. Deng:
Secure Encrypted Data Deduplication with Ownership Proof and User Revocation. ICA3PP 2017: 297-312 - 2016
- [j5]Wenxiu Ding, Zheng Yan, Robert H. Deng:
A Survey on Future Internet Security Architectures. IEEE Access 4: 4374-4393 (2016) - [j4]Zheng Yan, Wenxiu Ding, Valtteri Niemi, Athanasios V. Vasilakos:
Two Schemes of Privacy-Preserving Trust Evaluation. Future Gener. Comput. Syst. 62: 175-189 (2016) - [j3]Zheng Yan, Wenxiu Ding, Xixun Yu, Haiqi Zhu, Robert H. Deng:
Deduplication on Encrypted Big Data in Cloud. IEEE Trans. Big Data 2(2): 138-150 (2016) - [j2]Ximeng Liu, Robert H. Deng, Wenxiu Ding, Rongxing Lu, Baodong Qin:
Privacy-Preserving Outsourced Calculation on Floating Point Numbers. IEEE Trans. Inf. Forensics Secur. 11(11): 2513-2527 (2016) - 2015
- [j1]Qingkuan Dong, Wenxiu Ding, Lili Wei:
Improvement and optimized implementation of cryptoGPS protocol for low-cost radio-frequency identification authentication. Secur. Commun. Networks 8(8): 1474-1484 (2015) - [c1]Zheng Yan, Wenxiu Ding, Haiqi Zhu:
A Scheme to Manage Encrypted Data Storage with Deduplication in Cloud. ICA3PP (3) 2015: 547-561
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 00:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint