Privacy preserving back-propagation neural network learning made practical with cloud computing J Yuan, S Yu IEEE Transactions on Parallel and Distributed Systems 25 (1), 212-221, 2014 | 243 | 2014 |
Secure and constant cost public cloud storage auditing with deduplication J Yuan, S Yu 2013 IEEE Conference on Communications and Network Security (CNS), 145-153, 2013 | 185 | 2013 |
BANA: Body area network authentication exploiting channel characteristics L Shi, M Li, S Yu, J Yuan IEEE Journal on selected Areas in Communications 31 (9), 1803-1816, 2013 | 183 | 2013 |
Proofs of retrievability with public verifiability and constant communication cost in cloud J Yuan, S Yu Proceedings of the 2013 international workshop on Security in cloud …, 2013 | 169 | 2013 |
Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification J Yuan, S Yu Information Forensics and Security, IEEE Transactions on 10 (8), 1717 - 1726, 2015 | 145 | 2015 |
Efficient public integrity checking for cloud data sharing with multi-user modification J Yuan, S Yu IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2121-2129, 2014 | 140 | 2014 |
Efficient privacy-preserving biometric identification in cloud computing J Yuan, S Yu 2013 Proceedings IEEE INFOCOM, 2652-2660, 2013 | 119 | 2013 |
Mining Twitter to assess the public perception of the “Internet of Things” J Bian, K Yoshigoe, A Hicks, J Yuan, Z He, M Xie, Y Guo, M Prosperi, ... PloS one 11 (7), e0158450, 2016 | 92 | 2016 |
ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks L Shi, J Yuan, S Yu, M Li Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 78 | 2013 |
SEISA: Secure and efficient encrypted image search with access control J Yuan, S Yu, L Guo 2015 IEEE conference on computer communications (INFOCOM), 2083-2091, 2015 | 77 | 2015 |
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones Y Tian, J Yuan, H Song Journal of Information Security and Applications 48, 102354, 2019 | 64 | 2019 |
MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks L Shi, J Yuan, S Yu, M Li IEEE Internet of Things Journal 2 (1), 52-62, 2015 | 57 | 2015 |
Practical privacy-preserving mapreduce based k-means clustering over large-scale dataset J Yuan, Y Tian IEEE transactions on cloud computing 7 (2), 568-579, 2017 | 50 | 2017 |
Examining healthcare utilization patterns of elderly and middle-aged adults in the United States CE Zayas, Z He, J Yuan, M Maldonado-Molina, W Hogan, F Modave, ... The Twenty-Ninth International Flairs Conference, 2016 | 38 | 2016 |
Workload-aware task placement in edge-assisted human re-identification A Acharya, Y Hou, Y Mao, M Xian, J Yuan 2019 16th Annual IEEE International Conference on Sensing, Communication …, 2019 | 22 | 2019 |
Towards a privacy preserving cohort discovery framework for clinical research networks J Yuan, B Malin, F Modave, Y Guo, WR Hogan, E Shenkman, J Bian Journal of biomedical informatics 66, 42-51, 2017 | 17 | 2017 |
Flexible and publicly verifiable aggregation query for outsourced databases in cloud J Yuan, S Yu 2013 IEEE Conference on Communications and Network Security (CNS), 520-524, 2013 | 17 | 2013 |
Edge-assisted image processing with joint optimization of responding and placement strategy A Acharya, Y Hou, Y Mao, J Yuan 2019 International Conference on Internet of Things (iThings) and IEEE Green …, 2019 | 16 | 2019 |
Pcpor: public and constant-cost proofs of retrievability in cloud1 J Yuan, S Yu Journal of Computer Security 23 (3), 403-425, 2015 | 15 | 2015 |
CLARA: an integrated clinical research administration system J Bian, M Xie, W Hogan, L Hutchins, U Topaloglu, C Lane, J Holland, ... Journal of the American Medical Informatics Association 21 (e2), e369-e373, 2014 | 15 | 2014 |