Meiqi He

Orcid: 0000-0001-5385-9060

According to our database1, Meiqi He authored at least 15 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Comparison of the molecular mechanisms of Fuzi Lizhong Pill and Huangqin decoction in the treatment of the cold and heat syndromes of ulcerative colitis based on network pharmacology.
Comput. Biol. Medicine, June, 2023

Corrigendum to: A Self-Tallying Electronic Voting Based on Blockchain.
Comput. J., February, 2023

2022
A Self-Tallying Electronic Voting Based on Blockchain.
Comput. J., 2022

2019
A Secure and Self-tallying E-voting System Based on Blockchain.
Proceedings of the Information Security Applications - 20th International Conference, 2019

From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2018

Searchable Encryption over Feature-Rich Data.
IEEE Trans. Dependable Secur. Comput., 2018

Privacy-preserving verifiable elastic net among multiple institutions in the cloud.
J. Comput. Secur., 2018

Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A New Privacy-Preserving Searching Model on Blockchain.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Privacy-Preserving Disease Risk Test Based on Bloom Filters.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

2015
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective.
Sci. China Inf. Sci., 2014


  Loading...