Name
Papers
Collaborators
JUN SHAO
62
120
Citations 
PageRank 
Referers 
165
25.53
482
Referees 
References 
855
446
Search Limit
100855
Title
Citations
PageRank
Year
A Cca Secure Public Key Encryption Scheme Based On Finite Groups Of Lie Type00.342022
Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare20.372022
Fair Outsourcing Polynomial Computation Based on the Blockchain00.342022
FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing00.342022
Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data10.362022
Achieving Efficient and Privacy-Preserving Dynamic Skyline Query in Online Medical Diagnosis10.352022
Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data20.372022
An Accuracy-Lossless Perturbation Method for Defending Privacy Attacks in Federated Learning00.342022
EPGQ: Efficient and Private Feature-Based Group Nearest Neighbor Query Over Road Networks00.342022
Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud10.352022
Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data50.432022
PPAQ: Privacy-Preserving Aggregate Queries for Optimal Location Selection in Road Networks00.342022
PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare10.352022
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices00.342021
Searchable Encryption for Conjunctive Queries with Extended Forward and Backward Privacy.00.342021
Toward Privacy-Preserving Cybertwin-Based Spatiotemporal Keyword Query for ITS in 6G Era40.402021
Towards Private Similarity Query based Healthcare Monitoring over Digital Twin Cloud Platform10.352021
Spatio-temporal Similarity based Privacy-preserving Worker Selection in Mobile Crowdsensing00.342021
hPRESS: A Hardware-enhanced Proxy Re-encryption Scheme using Secure Enclave10.352021
Using Reduced Paths to Achieve Efficient Privacy-Preserving Range Query in Fog-Based IoT10.352021
Achieve Efficient Position-Heap-Based Privacy-Preserving Substring-Of-Keyword Query Over Cloud00.342021
Toward Oblivious Location-Based k -Nearest Neighbor Query in Smart Cities20.372021
Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud20.382021
Extended Galbraith'S Test On The Anonymity Of Ibe Schemes From Higher Residuosity00.342021
Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing10.362021
Preserving Location Privacy for Outsourced Most-Frequent Item Query in Mobile Crowdsensing10.352021
Achieve Space-Efficient Key Management In Lightning Network00.342021
RRT-GoalBias and Path Smoothing Based Motion Planning of Mobile Manipulators with Obstacle Avoidance.00.342021
A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment.00.342020
Achieving O(log3n) Communication-Efficient Privacy-Preserving Range Query in Fog-Based IoT70.532020
Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS20.372020
A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms.00.342020
Forward and Backward Private DSSE for Range Queries00.342019
New Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools with Defence Cost.00.342019
Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.40.412019
Cryptographic primitives in blockchains.30.572019
An Efficient And Privacy-Preserving Disease Risk Prediction Scheme For E-Healthcare40.392019
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type00.342019
Achieving Efficient and Privacy-Preserving Top-k Query Over Vertically Distributed Data Sources00.342019
Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage.60.392018
A New Design Of Online/Offline Signatures Based On Lattice00.342018
Secure Outsourced Computation in Connected Vehicular Cloud Computing.10.352018
Data Security and Privacy in Fog Computing.70.422018
CCA-secure ABE with outsourced decryption for fog computing.180.602018
Too Much of a Good Thing: Downsides of a Large Network in Tech Firms and Mitigating Effects of Political Skills.00.342017
Preface - Special issue to celebrate the 30th anniversary of Journal of Systems Science and Complexity.30.412017
Hidden-Token Searchable Public-Key Encryption00.342017
A Privacy-Preserving Data-Sharing Framework for Smart Grid.20.362017
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.50.462017
A New Optimization Algorithm for HEVC00.342015
  • 1
  • 2