Follow
Feng Li
Title
Cited by
Cited by
Year
Enabling efficient spatial keyword queries on encrypted data with strong security guarantees
X Wang, J Ma, F Li, X Liu, Y Miao, RH Deng
IEEE Transactions on Information Forensics and Security 16, 4909-4923, 2021
252021
Time-controllable keyword search scheme with efficient revocation in mobile e-health cloud
Y Miao, F Li, X Li, Z Liu, J Ning, H Li, KKR Choo, RH Deng
IEEE Transactions on Mobile Computing 23 (5), 3650-3665, 2023
222023
Towards efficient verifiable boolean search over encrypted cloud data
F Li, J Ma, Y Miao, Z Liu, KKR Choo, X Liu, RH Deng
IEEE Transactions on Cloud Computing 11 (1), 839-853, 2021
182021
Verifiable and dynamic multi-keyword search over encrypted cloud data using bitmap
F Li, J Ma, Y Miao, Q Jiang, X Liu, KKR Choo
IEEE Transactions on Cloud Computing 11 (1), 336-348, 2021
172021
Verifiable outsourced attribute-based encryption scheme for cloud-assisted mobile e-health system
Y Miao, F Li, X Li, J Ning, H Li, KKR Choo, RH Deng
IEEE Transactions on Dependable and Secure Computing, 2023
102023
A Survey on Searchable Symmetric Encryption
F Li, J Ma, Y Miao, X Liu, J Ning, RH Deng
ACM Computing Surveys 56 (5), 1-42, 2023
92023
IMShell-Dec: Pay More Attention to External Links in PowerShell
RD Han, C Yang, JF Ma, S Ma, YB Wang, F Li
ICT Systems Security and Privacy Protection: 35th IFIP TC 11 International …, 2020
72020
REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data
Y Miao, F Li, X Jia, H Wang, X Liu, KKR Choo, RH Deng
IEEE Transactions on Dependable and Secure Computing, 2023
22023
Beyond Volume Pattern: Storage-Efficient Boolean Searchable Symmetric Encryption with Suppressed Leakage
F Li, J Ma, Y Miao, P Wu, X Song
European Symposium on Research in Computer Security, 126-146, 2023
22023
Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things
S Liu, Y Miao, F Li, X Li, KKR Choo, RH Deng
IEEE Internet of Things Journal, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–10