Follow
jun ye
jun ye
suse
Verified email at suse.edu.cn
Title
Cited by
Cited by
Year
Secure outsourcing of modular exponentiations under single untrusted programme model
Y Ding, Z Xu, J Ye, KKR Choo
Journal of Computer and System Sciences 90, 1-13, 2017
482017
Efficient and secure encrypted image search in mobile cloud computing
Q Zou, J Wang, J Ye, J Shen, X Chen
Soft Computing 21, 2959-2969, 2017
352017
Fine-grained searchable encryption in multi-user setting
J Ye, J Wang, J Zhao, J Shen, KC Li
Soft Computing 21, 6201-6212, 2017
292017
Controllable keyword search scheme supporting multiple users
J Ye, Y Ding
Future Generation Computer Systems 81, 433-442, 2018
272018
Secure and efficient fine-grained data access control scheme in cloud computing1
C Yang, J Ye
Journal of High Speed Networks 21 (4), 259-271, 2015
232015
An improved algorithm for secure outsourcing of modular exponentiations
J Ye, X Chen, J Ma
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
212015
Verifiable delegation of polynomials.
J Ye, H Zhang, C Fu
Int. J. Netw. Secur. 18 (2), 283-290, 2016
162016
Attribute-based fine-grained access control with user revocation
J Ye, W Zhang, SL Wu, YY Gao, JT Qiu
Information and Communication Technology: Second IFIP TC5/8 International …, 2014
142014
A novel video copyright protection scheme based on blockchain and double watermarking
J Zheng, S Teng, P Li, W Ou, D Zhou, J Ye
Security and communication networks 2021, 1-16, 2021
122021
Secure outsourcing of modular exponentiation with single untrusted server
J Ye, J Wang
2015 18th International Conference on Network-Based Information Systems, 643-645, 2015
112015
Image search scheme over encrypted database
J Ye, Z Xu, Y Ding
Future Generation Computer Systems 87, 251-258, 2018
102018
Efficient request-based comparable encryption scheme based on sliding window method
P Chen, J Ye, X Chen
Soft Computing 20, 4589-4596, 2016
102016
Research on Improved YOLOv3 Fire Detection Based on Enlarged Feature Map Resolution and Cluster Analysis
C Yue, J Ye
Journal of Physics: Conference Series 1757 (1), 012094, 2021
72021
Tor hidden services discovery and analysis: a literature survey
J Bian, C Cao, L Wang, J Ye, Y Zhao, C Tang
Journal of Physics: Conference Series 1757 (1), 012162, 2021
72021
Computation offloading based on improved glowworm swarm optimization algorithm in mobile edge computing
K Fu, J Ye
Journal of Physics: Conference Series 1757 (1), 012195, 2021
62021
Identity-based re-encryption scheme with lightweight re-encryption key generation
L Liu, J Ye
Journal of Discrete Mathematical Sciences and Cryptography 21 (1), 41-57, 2018
62018
Comparable encryption scheme supporting multiple users in cloud computing
J Ye, M Miao, P Chen, X Chen
International Journal of High Performance Computing and Networking 11 (1), 24-33, 2018
52018
A new efficient request-based comparable encryption scheme
P Chen, J Ye, X Chen
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
52015
Zero-Trust-Based Protection Scheme for Users in Internet of Vehicles
L Fang, C Wu, Y Kang, W Ou, D Zhou, J Ye
Security and Communication Networks 2022, 2022
42022
Reputation-based defense scheme against backdoor attacks on federated learning
L Su, Z Liu, J Ye
2021 International Conference on Big Data Analytics for Cyber-Physical …, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20