Follow
Hongwei Li
Title
Cited by
Cited by
Year
Identity-based authentication for cloud computing
H Li, Y Dai, L Tian, H Yang
The First International Conference on Cloud Computing, 157-166, 2009
4122009
EPPDR: an efficient privacy-preserving demand response scheme with adaptive key evolution in smart grid
H Li, X Lin, H Yang, X Liang, R Lu, X Shen
IEEE Transactions on Parallel and Distributed Systems 25 (8), 2053 - 2064, 2014
3362014
VerifyNet: Secure and verifiable federated learning
G Xu, H Li, S Liu, K Yang, X Lin
IEEE Transactions on Information Forensics and Security 15, 911-926, 2020
3002020
Enabling Fine-grained Multi-keyword Search Supporting Classified Sub-dictionaries over Encrypted Cloud Data
H Li, Y Yang, T Luan, X Liang, L Zhou, X Shen
IEEE Transactions on Dependable and Secure Computing, 2016
2932016
An efficient merkle-tree-based authentication scheme for smart grid
H Li, R Lu, L Zhou, B Yang, X Shen
IEEE Systems Journal 8 (2), 655-663, 2014
2902014
Efficient and privacy-enhanced federated learning for industrial artificial intelligence
M Hao, H Li, X Luo, G Xu, H Yang, S Liu
IEEE Transactions on Industrial Informatics 16 (10), 6532-6542, 2020
2642020
Engineering Searchable Encryption of Mobile Cloud Networks: When QoE Meets QoP
H Li, D Liu, Y Dai, T H. Luan
IEEE Wireless Communications 22 (4), 74 - 80, 2015
1912015
Enabling Efficient Multi-keyword Ranked Search over Encrypted Mobile Cloud Data through Blind Storage
H Li, D Liu, Y Dai, TH Luan, X Shen
IEEE Transactions on Emerging Topics in Computing 3 (1), 127-138, 2015
1842015
HealthDep: An efficient and secure deduplication scheme for cloud-assisted eHealth systems
Y Zhang, C Xu, H Li, K Yang, J Zhou, X Lin
IEEE Transactions on Industrial Informatics 14 (9), 4101-4112, 2018
1662018
Secure multi-party computation: theory, practice and applications
C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
1652019
Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data
H Li, Y Yang, Y Dai, S Yu, Y Xiang
IEEE Transactions on Cloud Computing 8 (2), 484-494, 2020
1482020
Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation
Y Zhang, C Xu, X Liang, H Li, Y Mu, X Zhang
IEEE Transactions on Information Forensics and Security 12 (3), 676-688, 2016
1442016
Enabling efficient and geometric range query with access control over encrypted spatial data
G Xu, H Li, Y Dai, K Yang, X Lin
IEEE Transactions on Information Forensics and Security 14 (4), 870-885, 2019
1362019
Personalized Search over Encrypted Data with Efficient and Secure Updates in Mobile Clouds
H Li, D Liu, Y Dai, T Luan, S Yu
IEEE Transactions on Emerging Topics in Computing 6 (1), 97 - 109, 2018
1232018
Lightweight fine-grained search over encrypted data in fog computing
Y Miao, J Ma, X Liu, J Weng, H Li, H Li
IEEE Transactions on Services Computing 12 (5), 772-785, 2018
1212018
Querying in internet of things with privacy preserving: Challenges, solutions and opportunities
H Ren, H Li, Y Dai, K Yang, X Lin
IEEE Network 32 (6), 144-151, 2018
1172018
Towards efficient and privacy-preserving federated deep learning
M Hao, H Li, G Xu, S Liu, H Yang
Proceedings of ICC, 1-6, 2019
1042019
SCLPV: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors
Y Zhang, C Xu, S Yu, H Li, X Zhang
IEEE Transactions on Computational Social Systems 2 (4), 159-170, 2015
1002015
Privacy-preserving attribute-based keyword search in shared multi-owner setting
Y Miao, X Liu, KKR Choo, RH Deng, J Li, H Li, J Ma
IEEE Transactions on Dependable and Secure Computing 18 (3), 1080-1094, 2019
962019
Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage
Y Zhang, C Xu, J Ni, H Li, XS Shen
IEEE Transactions on Cloud Computing 9 (4), 1335-1348, 2019
922019
The system can't perform the operation now. Try again later.
Articles 1–20