A secure and efficient ID-based aggregate signature scheme for wireless sensor networks L Shen, J Ma, X Liu, F Wei, M Miao IEEE Internet of Things Journal 4 (2), 546-554, 2016 | 106 | 2016 |
Secure multi-server-aided data deduplication in cloud computing M Miao, J Wang, H Li, X Chen Pervasive and Mobile Computing 24, 129-137, 2015 | 79 | 2015 |
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism X Li, M Miao, H Liu, J Ma, KC Li Soft Computing 21, 3907-3917, 2017 | 64 | 2017 |
A provably secure aggregate signature scheme for healthcare wireless sensor networks L Shen, J Ma, X Liu, M Miao Journal of medical systems 40, 1-10, 2016 | 44 | 2016 |
Publicly verifiable database scheme with efficient keyword search M Miao, J Wang, S Wen, J Ma Information Sciences 475, 18-28, 2019 | 36 | 2019 |
Privacy-preserving byzantine-robust federated learning X Ma, Y Zhou, L Wang, M Miao Computer Standards & Interfaces 80, 103561, 2022 | 33 | 2022 |
Towards efficient privacy-preserving encrypted image search in cloud computing Y Wang, M Miao, J Shen, J Wang Soft Computing 23, 2101-2112, 2019 | 26 | 2019 |
Efficient verifiable databases with insertion/deletion operations from delegating polynomial functions M Miao, J Ma, X Huang, Q Wang IEEE Transactions on Information Forensics and Security 13 (2), 511-520, 2017 | 26 | 2017 |
Blockchain-based cross-user data shared auditing A Li, G Tian, M Miao, J Gong Connection science 34 (1), 83-103, 2022 | 24 | 2022 |
Detection of GPS spoofing attack on unmanned aerial vehicle system C Liang, M Miao, J Ma, H Yan, Q Zhang, X Li, T Li Machine Learning for Cyber Security: Second International Conference, ML4CS …, 2019 | 21 | 2019 |
Publicly verifiable databases with efficient insertion/deletion operations M Miao, J Wang, J Ma, W Susilo Journal of Computer and System Sciences 86, 49-58, 2017 | 20 | 2017 |
Secure deduplication with efficient user revocation in cloud storage Y Wang, M Miao, J Wang, X Zhang Computer Standards & Interfaces 78, 103523, 2021 | 19 | 2021 |
Detection of global positioning system spoofing attack on unmanned aerial vehicle system C Liang, M Miao, J Ma, H Yan, Q Zhang, X Li Concurrency and Computation: Practice and Experience 34 (7), e5925, 2022 | 17 | 2022 |
Payment-based incentive mechanism for secure cloud deduplication M Miao, T Jiang, I You International Journal of Information Management 35 (3), 379-386, 2015 | 17 | 2015 |
Verifiable database supporting keyword searches with forward security M Miao, Y Wang, J Wang, X Huang Computer Standards & Interfaces 77, 103491, 2021 | 16 | 2021 |
Toward forward secure SSE supporting conjunctive keyword search Y Wang, J Wang, S Sun, M Miao, X Chen IEEE Access 7, 142762-142772, 2019 | 16 | 2019 |
Efficient verifiable multi-key searchable encryption in cloud computing Y Su, J Wang, Y Wang, M Miao IEEE Access 7, 141352-141362, 2019 | 16 | 2019 |
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing J Wang, M Miao, Y Gao, X Chen Soft Computing 20, 4487-4495, 2016 | 14 | 2016 |
Verifiable data streaming with efficient update for intelligent automation systems M Miao, J Wei, J Wu, KC Li, W Susilo International Journal of Intelligent Systems 37 (2), 1322-1338, 2022 | 11 | 2022 |
Tinyenc: Enabling compressed and encrypted big data stores with rich query support S Qi, J Wang, M Miao, M Zhang, X Chen IEEE Transactions on Dependable and Secure Computing 20 (1), 176-192, 2021 | 9 | 2021 |