Attribute-Based Ring Signatures.

Jin Li , Kwangjo Kim
IACR Cryptology ePrint Archive 2008 394

76
2008
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing*

Xiaofeng Chen , Jin Li , Hua Ma , Xingxing Xie
Journal of Universal Computer Science 19 2349 -2367

21
2013
Secure Outsourced Attribute-based Encryption.

Duncan S. Wong , Xiaofeng Chen , Jingwei Li , Chunfu Jia
IACR Cryptology ePrint Archive 2012 635

8
2012
Enabling Efficient Fuzzy Keyword Search over Encrypted Data in Cloud Computing.

Ning Cao , Kui Ren , Wenjing Lou , Jin Li
IACR Cryptology ePrint Archive 2009 593

55
2009
A2BE: Accountable Attribute-Based Encryption for Abuse Free Access Control.

Kui Ren , Jin Li , Kwangjo Kim
IACR Cryptology ePrint Archive 2009 118

65
2009
A New Efficient Verifiable Fuzzy Keyword Search Scheme.

Xiaofeng Chen , Qiang Tang , Jin Li , Jianfeng Wang
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 3 ( 4) 61 -71

20
2012
MobiShare+: Security Improved System for Location Sharing in Mobile Online Social Networks.

Xiaofeng Chen , Jingwei Li , Chunfu Jia , Jin Li
J. Internet Serv. Inf. Secur. 4 25 -36

20
2014
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.

Xiaofeng Chen , Qiang Tang , Jin Li , Jianfeng Wang
J. Internet Serv. Inf. Secur. 2 49 -58

11
2012
FFSSE: Flexible Forward Secure Searchable Encryption with Efficient Performance.

Joseph K. Liu , Jin Li , Yang Xiang , Zheli Liu
IACR Cryptology ePrint Archive 2017 1105

4
2017
Security Matters: A Survey on Adversarial Machine Learning.

Ning Cao , Guofu Li , Zhemin Yang , Jin Li
arXiv: Learning

29
2018
Special Issue on Security and Privacy in Machine Learning.

Jin Li , Francesco Palmieri , Yang Xiang
Information Sciences 487 208 -209

2019
Anonymous attribute-based encryption supporting efficient decryption test

Yinghui Zhang , Xiaofeng Chen , Jin Li , Duncan S. Wong
computer and communications security 511 -516

134
2013
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing

Tao Jiang , Xiaofeng Chen , Jin Li , Duncan S. Wong
information security practice and experience 346 -358

17
2014
Proxy Ring Signature: Formal Definitions, Efficient Construction and New Variant

Jin Li , Tsz Hon Yuen , Xiaofeng Chen , Yanming Wang
computational intelligence and security 2 545 -555

6
2006
Compressive Sensing of Medical Images With Confidentially Homomorphic Aggregations

Licheng Wang , Lixiang Li , Jin Li , Jing Li
IEEE Internet of Things Journal 6 ( 2) 1402 -1409

58
2019
Verifiable Outsourcing Computation for Matrix Multiplication With Improved Efficiency and Applicability

Shenmin Zhang , Hongwei Li , Yuanshun Dai , Jin Li
IEEE Internet of Things Journal 5 ( 6) 5076 -5088

15
2018
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice

Yinghui Zhang , Jin Li , Dong Zheng , Ping Li
Journal of Network and Computer Applications 122 50 -60

39
2018
Special issue on advances in security and privacy in IoT

Jin Li , Francesco Palmieri , Qiben Yan
Journal of Network and Computer Applications 137 91 -92

2019
Tc-PEDCKS: Towards time controlled public key encryption with delegatable conjunctive keyword search for Internet of Things

Lingling Xu , Jin Li , Xiaofeng Chen , Wanhua Li
Journal of Network and Computer Applications 128 11 -20

9
2019
Secure multiparty learning from the aggregation of locally trained models

Xu Ma , Cunmei Ji , Xiaoyu Zhang , Jianfeng Wang
Journal of Network and Computer Applications 167 102754

17
2020