Secure cloud-based EHR system using attribute-based cryptosystem and blockchain H Wang, Y Song Journal of medical systems 42 (8), 152, 2018 | 391 | 2018 |
Blockchain-based fair payment smart contract for public cloud storage auditing H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo Information Sciences 519, 348-362, 2020 | 164 | 2020 |
A reliable energy efficient dynamic spectrum sensing for cognitive radio IoT networks JA Ansere, G Han, H Wang, C Choi, C Wu IEEE Internet of Things Journal 6 (4), 6748-6759, 2019 | 133 | 2019 |
Flexible seaweed-like triboelectric nanogenerator as a wave energy harvester powering marine internet of things Y Wang, X Liu, Y Wang, H Wang, H Wang, SL Zhang, T Zhao, M Xu, ... ACS nano 15 (10), 15700-15709, 2021 | 112 | 2021 |
A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things G Han, L Zhou, H Wang, W Zhang, S Chan Future Generation Computer Systems 82, 689-697, 2018 | 111 | 2018 |
New directly revocable attribute-based encryption scheme and its application in cloud storage environment H Wang, Z Zheng, L Wu, P Li Cluster Computing 20, 2385-2392, 2017 | 103 | 2017 |
Ant-colony-based complete-coverage path-planning algorithm for underwater gliders in ocean areas with thermoclines G Han, Z Zhou, T Zhang, H Wang, L Liu, Y Peng, M Guizani IEEE Transactions on Vehicular Technology 69 (8), 8959-8971, 2020 | 98 | 2020 |
An underwater flag-like triboelectric nanogenerator for harvesting ocean current energy under extremely low velocity condition Y Wang, X Liu, T Chen, H Wang, C Zhu, H Yu, L Song, X Pan, J Mi, C Lee, ... Nano Energy 90, 106503, 2021 | 95 | 2021 |
Fast heterogeneous N2O5 uptake and ClNO2 production in power plant and industrial plumes observed in the nocturnal residual layer over the North China Plain Z Wang, W Wang, YJ Tham, Q Li, H Wang, L Wen, X Wang, T Wang Atmospheric chemistry and physics 17 (20), 12361-12378, 2017 | 93 | 2017 |
A survey on location privacy protection in wireless sensor networks J Jiang, G Han, H Wang, M Guizani Journal of Network and Computer Applications 125, 93-114, 2019 | 90 | 2019 |
When homomorphic encryption marries secret sharing: Secure large-scale sparse logistic regression and applications in risk control C Chen, J Zhou, L Wang, X Wu, W Fang, J Tan, L Wang, AX Liu, H Wang, ... Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data …, 2021 | 82 | 2021 |
CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks G Han, X Miao, H Wang, M Guizani, W Zhang IEEE Transactions on Vehicular Technology 68 (3), 2739-2750, 2019 | 78 | 2019 |
Position based cryptography with location privacy: A step for fog computing R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou Future Generation Computer Systems 78, 799-806, 2018 | 76 | 2018 |
A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT G Han, H Wang, X Miao, L Liu, J Jiang, Y Peng IEEE Transactions on Industrial Informatics 16 (8), 5527-5538, 2019 | 71 | 2019 |
Prediction-based delay optimization data collection algorithm for underwater acoustic sensor networks G Han, S Shen, H Wang, J Jiang, M Guizani IEEE Transactions on Vehicular Technology 68 (7), 6926-6936, 2019 | 70 | 2019 |
Multi-AUV collaborative data collection algorithm based on Q-learning in underwater acoustic sensor networks G Han, A Gong, H Wang, M Martínez-García, Y Peng IEEE Transactions on Vehicular Technology 70 (9), 9294-9305, 2021 | 63 | 2021 |
A trust update mechanism based on reinforcement learning in underwater acoustic sensor networks Y He, G Han, J Jiang, H Wang, M Martinez-Garcia IEEE Transactions on Mobile Computing 21 (3), 811-821, 2020 | 60 | 2020 |
KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT G Han, H Wang, M Guizani, S Chan, W Zhang IEEE Wireless Communications 25 (6), 84-90, 2018 | 60 | 2018 |
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing H Wang, D He, J Shen, Z Zheng, C Zhao, M Zhao Soft Computing 21, 7325-7335, 2017 | 57 | 2017 |
Efficient Attribute‐Based Encryption with Privacy‐Preserving Key Generation and Its Application in Industrial Cloud Y Song, H Wang, X Wei, L Wu Security and communication networks 2019 (1), 3249726, 2019 | 55 | 2019 |