Suivre
Meixia Miao
Meixia Miao
Adresse e-mail validée de xidian.edu.cn
Titre
Citée par
Citée par
Année
A secure and efficient ID-based aggregate signature scheme for wireless sensor networks
L Shen, J Ma, X Liu, F Wei, M Miao
IEEE Internet of Things Journal 4 (2), 546-554, 2016
1042016
Secure multi-server-aided data deduplication in cloud computing
M Miao, J Wang, H Li, X Chen
Pervasive and Mobile Computing 24, 129-137, 2015
792015
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism
X Li, M Miao, H Liu, J Ma, KC Li
Soft Computing 21, 3907-3917, 2017
642017
A provably secure aggregate signature scheme for healthcare wireless sensor networks
L Shen, J Ma, X Liu, M Miao
Journal of medical systems 40, 1-10, 2016
442016
Publicly verifiable database scheme with efficient keyword search
M Miao, J Wang, S Wen, J Ma
Information Sciences 475, 18-28, 2019
352019
Privacy-preserving byzantine-robust federated learning
X Ma, Y Zhou, L Wang, M Miao
Computer Standards & Interfaces 80, 103561, 2022
302022
Towards efficient privacy-preserving encrypted image search in cloud computing
Y Wang, M Miao, J Shen, J Wang
Soft Computing 23, 2101-2112, 2019
252019
Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions
M Miao, J Ma, X Huang, Q Wang
IEEE Transactions on Information Forensics and Security 13 (2), 511-520, 2017
252017
Blockchain-based cross-user data shared auditing
A Li, G Tian, M Miao, J Gong
Connection science 34 (1), 83-103, 2022
232022
Detection of GPS spoofing attack on unmanned aerial vehicle system
C Liang, M Miao, J Ma, H Yan, Q Zhang, X Li, T Li
Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019
212019
Publicly verifiable databases with efficient insertion/deletion operations
M Miao, J Wang, J Ma, W Susilo
Journal of Computer and System Sciences 86, 49-58, 2017
202017
Secure deduplication with efficient user revocation in cloud storage
Y Wang, M Miao, J Wang, X Zhang
Computer Standards & Interfaces 78, 103523, 2021
192021
Detection of global positioning system spoofing attack on unmanned aerial vehicle system
C Liang, M Miao, J Ma, H Yan, Q Zhang, X Li
Concurrency and Computation: Practice and Experience 34 (7), e5925, 2022
172022
Payment-based incentive mechanism for secure cloud deduplication
M Miao, T Jiang, I You
International Journal of Information Management 35 (3), 379-386, 2015
172015
Toward forward secure SSE supporting conjunctive keyword search
Y Wang, J Wang, S Sun, M Miao, X Chen
IEEE Access 7, 142762-142772, 2019
162019
Efficient verifiable multi-key searchable encryption in cloud computing
Y Su, J Wang, Y Wang, M Miao
IEEE Access 7, 141352-141362, 2019
162019
Verifiable database supporting keyword searches with forward security
M Miao, Y Wang, J Wang, X Huang
Computer Standards & Interfaces 77, 103491, 2021
152021
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing
J Wang, M Miao, Y Gao, X Chen
Soft Computing 20, 4487-4495, 2016
142016
Verifiable data streaming with efficient update for intelligent automation systems
M Miao, J Wei, J Wu, KC Li, W Susilo
International Journal of Intelligent Systems 37 (2), 1322-1338, 2022
102022
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model
M Miao, G Tian, W Susilo
International Journal of Intelligent Systems 36 (6), 2753-2766, 2021
92021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20