Name
Papers
Collaborators
QI XIA
53
95
Citations 
PageRank 
Referers 
132
21.76
443
Referees 
References 
818
348
Search Limit
100818
Title
Citations
PageRank
Year
A Blockchain Approach to Ensuring Provenance to Outsourced Cloud Data in a Sharing Ecosystem00.342022
A blockchain-adaptive contractual approach for multi-contracting organizational entities00.342022
Supply chain equilibrium on a game theory-incentivized blockchain network00.342022
Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable00.342022
Controllable software licensing system for sub-licensing00.342022
A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain00.342022
Secure and Efficient Data Aggregation for IoT Monitoring Systems00.342021
Complementary Blockchain-Based Privacy Protection for Covid-19 Contact Tracing.00.342021
Scalable and redactable blockchain with update and anonymity00.342021
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors00.342021
Policy-Driven Blockchain and Its Applications for Transport Systems10.352020
Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.30.362020
A Novel End-To-End Fault Diagnosis Approach for Rolling Bearings by Integrating Wavelet Packet Transform into Convolutional Neural Network Structures.00.342020
A Study of Primary School Pupils' Motivation, Emotional Intelligence and Attentional Control Ability.00.342019
Fully Secure Lightweight Certificateless Signature Scheme For Iiot00.342019
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System.10.362019
Efficient Micropayment of Cryptocurrency from Blockchains.00.342019
Provably Secure (Broadcast) Homomorphic Signcryption00.342019
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain.20.432019
Maximizing the first eigenfrequency of structures subjected to uniform boundary erosion through the level set method.00.342019
V-Chain: A Blockchain-Based Car Lease Platform00.342018
GridMonitoring: Secured Sovereign Blockchain Based Monitoring on Smart Grid.30.362018
Practical and secure telemedicine systems for user mobility.00.342018
On sufficient dimension reduction with missing responses through estimating equations.00.342018
High-Bandwidth Ultrasonic Communication Using Graphene-Based Acoustic Devices00.342018
Secure Payment Routing Protocol For Economic Systems Based On Blockchain00.342018
Eliminate localized eigenmodes in level set based topology optimization for the maximization of the first eigenfrequency of vibration.51.022017
MeDShare: Trust-Less Medical Data Sharing Among Cloud Service Providers via Blockchain.321.162017
On a new hybrid estimator for the central mean space.10.372017
Bbds: Blockchain-Based Data Sharing For Electronic Medical Records In Cloud Environments321.252017
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems10.362017
Unsupervised Representation Learning for Pulmonary Nodule Classification00.342017
Image Segmentation of Liver CT Based on Fully Convolutional Network00.342017
Privacy-Preserving Mobile Crowdsensing For Located-Based Applications10.342017
Dual-Anonymous Reward Distribution For Mobile Crowdsensing00.342017
Distributed clinical data sharing via dynamic access-control policy transformation.80.512016
SDIVIP2: shared data integrity verification with identity privacy preserving in mobile clouds40.392016
Advanced security analysis of a signature scheme with message recovery00.342015
On the Security of an Efficient Dynamic Auditing Protocol in Cloud Storage.80.472014
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures20.382014
A novel blind separation method in magnetic resonance images.00.342014
A New Construction of Proxy Signature Using Chameleon Hash Function00.342013
Tailoring The Ratios Between Eigenfrequencies Of Tapping Mode Atomic Force Microscope Probe Using Concentrated Masses00.342013
Image registration using a point-line duality based line matching method.40.462013
A Strong Designated Verifier Signature Scheme with Secure Disavowability10.352012
Improved certificateless signature scheme provably secure in the standard model.170.852012
A pattern matching method using geometric information of images00.342011
Cryptanalysis of Two Identity Based Signcryption Schemes00.342009
Analysis and Improvement of a Proxy Blind Multi-signature Scheme without a Secure Channel00.342009
Simultaneous optimization of the material properties and the topology of functionally graded structures20.402008
  • 1
  • 2