White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes J Ning, X Dong, Z Cao, L Wei, X Lin IEEE Transactions on Information Forensics and Security 10 (6), 1274-1288, 2015 | 236 | 2015 |
Auditable -Time Outsourced Attribute-Based Encryption for Access Control in Cloud Computing J Ning, Z Cao, X Dong, K Liang, H Ma, L Wei IEEE Transactions on Information Forensics and Security 13 (1), 94-105, 2017 | 202 | 2017 |
Attribute based encryption with privacy protection and accountability for CloudIoT J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang IEEE Transactions on Cloud Computing 10 (2), 762-773, 2020 | 187 | 2020 |
Privacy-preserving federated deep learning with irregular users G Xu, H Li, Y Zhang, S Xu, J Ning, RH Deng IEEE Transactions on Dependable and Secure Computing 19 (2), 1364-1381, 2020 | 140 | 2020 |
Large universe ciphertext-policy attribute-based encryption with white-box traceability J Ning, Z Cao, X Dong, L Wei, X Lin Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014 | 110 | 2014 |
White-box traceable CP-ABE for cloud storage service: How to catch people leaking their access credentials effectively J Ning, Z Cao, X Dong, L Wei IEEE Transactions on Dependable and Secure Computing 15 (5), 883-897, 2016 | 107 | 2016 |
Passive attacks against searchable encryption J Ning, J Xu, K Liang, F Zhang, EC Chang IEEE Transactions on Information Forensics and Security 14 (3), 789-802, 2018 | 105 | 2018 |
Match in my way: Fine-grained bilateral access control for secure cloud-fog computing S Xu, J Ning, Y Li, Y Zhang, G Xu, X Huang, RH Deng IEEE Transactions on Dependable and Secure Computing 19 (2), 1064-1077, 2020 | 97 | 2020 |
PrivHome: Privacy-preserving authenticated communication in smart home environment GS Poh, P Gope, J Ning IEEE Transactions on Dependable and Secure Computing 18 (3), 1095-1107, 2019 | 91 | 2019 |
CryptCloud: Secure and Expressive Data Access Control for Cloud Storage J Ning, Z Cao, X Dong, K Liang, L Wei, KKR Choo IEEE Transactions on Services Computing 14 (1), 111-124, 2018 | 90 | 2018 |
Accountable authority ciphertext-policy attribute-based encryption with white-box traceability and public auditing in the cloud J Ning, X Dong, Z Cao, L Wei Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 90 | 2015 |
Public auditing for shared cloud data with efficient and secure group management H Tian, F Nan, H Jiang, CC Chang, J Ning, Y Huang Information Sciences 472, 107-125, 2019 | 76 | 2019 |
Secure fine-grained encrypted keyword search for e-healthcare cloud H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu IEEE Transactions on Dependable and Secure Computing 18 (3), 1307-1319, 2019 | 71 | 2019 |
Dual access control for cloud-based data storage and sharing J Ning, X Huang, W Susilo, K Liang, X Liu, Y Zhang IEEE Transactions on Dependable and Secure Computing 19 (2), 1036-1048, 2020 | 67 | 2020 |
K-Time Modifiable and Epoch-Based Redactable Blockchain S Xu, J Ning, J Ma, X Huang, RH Deng IEEE Transactions on Information Forensics and Security 16, 4507-4520, 2021 | 63 | 2021 |
Lightweight privacy-preserving identity-based verifiable IoT-based health storage system R Ding, H Zhong, J Ma, X Liu, J Ning IEEE Internet of Things Journal 6 (5), 8393-8405, 2019 | 62 | 2019 |
PrivDPI: Privacy-preserving encrypted traffic inspection with reusable obfuscated rules J Ning, GS Poh, JC Loh, J Chia, EC Chang Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 60 | 2019 |
Optimized verifiable fine-grained keyword search in dynamic multi-owner settings Y Miao, RH Deng, KKR Choo, X Liu, J Ning, H Li IEEE Transactions on Dependable and Secure Computing 18 (4), 1804-1820, 2019 | 60 | 2019 |
Redactable blockchain in decentralized setting J Ma, S Xu, J Ning, X Huang, RH Deng IEEE Transactions on Information Forensics and Security 17, 1227-1242, 2022 | 54 | 2022 |
Distributed additive encryption and quantization for privacy preserving federated deep learning H Zhu, R Wang, Y Jin, K Liang, J Ning Neurocomputing 463, 309-327, 2021 | 53 | 2021 |