Efficient public key encryption with equality test supporting flexible authorization S Ma, Q Huang, M Zhang, B Yang IEEE Transactions on Information Forensics and Security 10 (3), 458-470, 2014 | 173 | 2014 |
Efficient privacy-preserving cube-data aggregation scheme for smart grids H Shen, M Zhang, J Shen IEEE Transactions on Information Forensics and Security 12 (6), 1369-1381, 2017 | 126 | 2017 |
PPO-CPQ: a privacy-preserving optimization of clinical pathway query for e-healthcare systems M Zhang, Y Chen, W Susilo IEEE Internet of Things Journal 7 (10), 10660-10672, 2020 | 124 | 2020 |
Public key encryption with delegated equality test in a multi-user setting S Ma, M Zhang, Q Huang, B Yang The Computer Journal 58 (4), 986-1002, 2015 | 105 | 2015 |
A privacy-preserving optimization of neighborhood-based recommendation for medical-aided diagnosis and treatment M Zhang, Y Chen, J Lin IEEE Internet of Things Journal 8 (13), 10830-10842, 2021 | 94 | 2021 |
Cost-effective secure E-health cloud system using identity based cryptographic techniques XA Wang, J Ma, F Xhafa, M Zhang, X Luo Future Generation Computer Systems 67, 242-254, 2017 | 88 | 2017 |
Efficient identity-based signcryption scheme for multiple receivers Y Yu, B Yang, X Huang, M Zhang International Conference on Autonomic and Trusted Computing, 13-21, 2007 | 88 | 2007 |
RECOGNIZED BY THE EUROPEAN PHYSICAL SOCIETY APPROVED BY THE EUROPEAN COMMISSION J Huebschmann, G Rudolph, M Schmidt Bulg. J. Phys 33 (s1), 51-68, 2006 | 81* | 2006 |
On the soundness and security of privacy-preserving SVM for outsourcing data classification X Li, Y Zhu, J Wang, Z Liu, Y Liu, M Zhang IEEE Transactions on Dependable and Secure Computing 15 (5), 906-912, 2017 | 71 | 2017 |
An ensemble method based on selection using bat algorithm for intrusion detection Y Shen, K Zheng, C Wu, M Zhang, X Niu, Y Yang The Computer Journal 61 (4), 526-538, 2018 | 65 | 2018 |
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid H Shen, Y Liu, Z Xia, M Zhang Information Sciences 526, 289-300, 2020 | 58 | 2020 |
SE-PPFM: A searchable encryption scheme supporting privacy-preserving fuzzy multikeyword in cloud systems M Zhang, Y Chen, J Huang IEEE Systems Journal 15 (2), 2980-2988, 2020 | 51 | 2020 |
Cryptographic reverse firewall via malleable smooth projective hash functions R Chen, Y Mu, G Yang, W Susilo, F Guo, M Zhang International Conference on the Theory and Application of Cryptology and …, 2016 | 49 | 2016 |
A secure clinical diagnosis with privacy-preserving multiclass support vector machine in clouds M Zhang, W Song, J Zhang IEEE Systems Journal 16 (1), 67-78, 2020 | 45 | 2020 |
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation L Sun, C Xu, M Zhang, K Chen, H Li Science China Information Sciences 61, 1-3, 2018 | 44 | 2018 |
An ID-based cryptographic mechanisms based on GDLP and IFP C Meshram, SA Meshram, M Zhang Information Processing Letters 112 (19), 753-758, 2012 | 42 | 2012 |
Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail systems with privacy preservation M Zhang, T Takagi IEEE Systems Journal 7 (3), 410-419, 2012 | 40 | 2012 |
Accountable mobile e-commerce scheme in intelligent cloud system transactions M Zhang, Y Yao, Y Jiang, B Li, C Tang Journal of Ambient Intelligence and Humanized Computing 9, 1889-1899, 2018 | 37 | 2018 |
A cloud-aided privacy-preserving multi-dimensional data comparison protocol H Shen, M Zhang, H Wang, F Guo, W Susilo Information Sciences 545, 739-752, 2021 | 36 | 2021 |
Obfuscating EVES algorithm and its application in fair electronic transactions in public clouds M Zhang, Y Zhang, Y Jiang, J Shen IEEE Systems Journal 13 (2), 1478-1486, 2019 | 35 | 2019 |