Securely Outsourcing Attribute-Based Encryption with Checkability | IEEE Transactions on Parallel and Distributed Systems | 2014 | 306 |
Solutions for Quasilinear Schrödinger Equations via the Nehari Method | Communications in Partial Differential Equations | 2004 | 291 |
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud Data | IEEE Transactions on Information Forensics and Security | 2017 | 231 |
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards | Journal of Network and Computer Applications | 2011 | 202 |
Quantum secure direct communication with χ-type entangled states | Physical Review A | 2008 | 198 |
CVAP: Validation for Cluster Analyses | Data Science Journal | 2009 | 178 |
New Publicly Verifiable Databases with Efficient Updates | IEEE Transactions on Dependable and Secure Computing | 2015 | 177 |
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations | IEEE Transactions on Information Forensics and Security | 2015 | 163 |
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based Signcryption | Future Generation Computer Systems | 2015 | 139 |
Computation Offloading Toward Edge Computing | Proceedings of the IEEE | 2019 | 127 |
Can Likert Scales be Treated as Interval Scales?—A Simulation Study | Journal of Social Service Research | 2017 | 120 |
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures | IEEE Transactions on Information Forensics and Security | 2016 | 117 |
Secure Distributed Deduplication Systems with Improved Reliability | IEEE Transactions on Computers | 2015 | 109 |
ELECTRE II method to deal with probabilistic linguistic term sets and its application to edge computing | Nonlinear Dynamics | 2019 | 101 |
Server-Aided Public Key Encryption With Keyword Search | IEEE Transactions on Information Forensics and Security | 2016 | 101 |
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT | IEEE Internet of Things Journal | 2019 | 100 |
Verifiable Auditing for Outsourced Database in Cloud Computing | IEEE Transactions on Computers | 2015 | 100 |
Weighted Sobolev embedding with unbounded and decaying radial potentials | Journal of Differential Equations | 2007 | 100 |
Ground states of nonlinear Schrödinger equations with potentials | Annales De L'Institut Henri Poincare (C) Analyse Non Lineaire | 2006 | 99 |
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoT | IEEE Transactions on Industrial Informatics | 2020 | 94 |
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage | IEEE Transactions on Services Computing | 2018 | 78 |
Malicious sequential pattern mining for automatic malware detection | Expert Systems With Applications | 2016 | 78 |
NONLINEAR SCHRÖDINGER EQUATIONS WITH UNBOUNDED AND DECAYING RADIAL POTENTIALS | Communications in Contemporary Mathematics | 2007 | 74 |
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services | Future Generation Computer Systems | 2017 | 72 |
Deep4MalDroid: A Deep Learning Framework for Android Malware Detection Based on Linux Kernel System Call Graphs | | 2016 | 71 |