320(top 1%)
papers
7.6K(top 1%)
citations
48(top 1%)
h-index
74(top 1%)
g-index
444
all documents
8.8K
doc citations
1.1K
citing journals
314
times ranked

Top Articles

#TitleJournalYearCitations
1Public Key Encryption with Keyword Search RevisitedLecture Notes in Computer Science2008268
2On Similarity Preserving Feature SelectionIEEE Transactions on Knowledge and Data Engineering2013249
3Trapdoor security in a searchable public-key encryption scheme with a designated testerJournal of Systems and Software2010235
4Human detection from images and videos: A surveyPattern Recognition2016208
5Certificateless Signature RevisitedPattern Recognition2007169
6Multiple kernel extreme learning machineNeurocomputing2015157
7Auditing Business Process ComplianceLecture Notes in Computer Science2007151
8CP-ABE With Constant-Size Keys for Lightweight DevicesIEEE Transactions on Information Forensics and Security2014133
9Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability ObfuscationIEEE Transactions on Information Forensics and Security2017131
10Privacy-Preserving Decentralized Key-Policy Attribute-Based EncryptionIEEE Transactions on Parallel and Distributed Systems2012126
11Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based EncryptionIEEE Transactions on Information Forensics and Security2015117
12Efficient Fair Conditional Payments for Outsourcing ComputationsIEEE Transactions on Information Forensics and Security2012112
13A Survey of Self-Organization Mechanisms in Multiagent SystemsIEEE Transactions on Systems, Man, and Cybernetics: Systems2017110
14Threshold Anonymous Announcement in VANETsIEEE Journal on Selected Areas in Communications2011108
15Improvements on an authentication scheme for vehicular sensor networksExpert Systems With Applications2014106
16Asymmetric Group Key AgreementLecture Notes in Computer Science2009106
17From Regional to Global Brain: A Novel Hierarchical Spatial-Temporal Neural Network Model for EEG Emotion RecognitionIEEE Transactions on Affective Computing2022100
18A Self-Adaptive Sleep/Wake-Up Scheduling Approach for Wireless Sensor NetworksIEEE Transactions on Cybernetics201897
19Optical Image Encryption Based on Chaotic Baker Map and Double Random Phase EncodingJournal of Lightwave Technology201388
20A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext SecurityJournal of Lightwave Technology201385
21A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data SharingIEEE Transactions on Information Forensics and Security201485
22Conceptual Design of A Multi-Agent System for Interconnected Power Systems RestorationIEEE Transactions on Power Systems201284
23Identity-based data storage in cloud computingFuture Generation Computer Systems201383
24Simultaneous nitrification/denitrification and trace organic contaminant (TrOC) removal by an anoxic–aerobic membrane bioreactor (MBR)Bioresource Technology201482
25Certificateless Signatures: New Schemes and Security ModelsComputer Journal201272
26A Hybrid Multiagent Framework With Q-Learning for Power Grid Systems RestorationIEEE Transactions on Power Systems201170
27A Secure and Effective Anonymous User Authentication Scheme for Roaming Service in Global Mobility NetworksWireless Personal Communications201370
28A New Payment System for Enhancing Location Privacy of Electric VehiclesIEEE Transactions on Vehicular Technology201470
29An Efficient Generic Framework for Three-Factor Authentication With Provably Secure InstantiationIEEE Transactions on Information Forensics and Security201470
30Automated functional testing of online search servicesSoftware Testing Verification and Reliability201269
31Linkable Ring Signature with Unconditional AnonymityIEEE Transactions on Knowledge and Data Engineering201468
32Semi-Proving: An Integrated Method for Program Proving, Testing, and DebuggingIEEE Transactions on Software Engineering201164
33Enhanced privacy of a remote data integrity-checking protocol for secure cloud storageInternational Journal of Information Security201564
34Efficient algorithms for secure outsourcing of bilinear pairingsTheoretical Computer Science201564
35The Theory of Quaternion Orthogonal DesignsIEEE Transactions on Signal Processing200863
36Strongly secure certificateless short signaturesJournal of Systems and Software201262
37Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential SystemsLecture Notes in Computer Science200961
38An Empirical Study of Model-Agnostic Techniques for Defect Prediction ModelsIEEE Transactions on Software Engineering202260
39On the Security of an Efficient Dynamic Auditing Protocol in Cloud StorageIEEE Transactions on Parallel and Distributed Systems201459
40A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level FusionIEEE Transactions on Information Forensics and Security201559
41Efficient Generic On-Line/Off-Line Signatures Without Key ExposureLecture Notes in Computer Science200759
42Secure ID-based linkable and revocable-iff-linked ring signature with constant-size constructionTheoretical Computer Science201357
43Self-Adaptation-Based Dynamic Coalition Formation in a Distributed Agent Network: A Mechanism and a Brief SurveyIEEE Transactions on Parallel and Distributed Systems201356
44A revisit of three studies related to random testingScience China Information Sciences201556
45Certificate-Based Signature: Security Model and Efficient ConstructionLecture Notes in Computer Science200754
46Process SEER: A Tool for Semantic Effect Annotation of Business Process ModelsLecture Notes in Computer Science200954
47Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized CiphertextIEEE Transactions on Information Forensics and Security201554
48Process Discovery from Model and Text ArtefactsIEEE Transactions on Information Forensics and Security200752
49A novel shape-based non-redundant local binary pattern descriptor for object detectionPattern Recognition201352
50Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record SystemIEEE Access201952