Meixia Miao

Orcid: 0000-0002-9503-4013

According to our database1, Meixia Miao authored at least 35 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Verifiable Data Streaming Under Concurrent Queries.
IEEE Trans. Mob. Comput., May, 2024

New Blockchain-Based Publicly Traceable Self-Tallying Voting Protocol.
IEEE Trans. Netw. Sci. Eng., 2024

2023
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support.
IEEE Trans. Dependable Secur. Comput., 2023

Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting.
IEEE Trans. Cloud Comput., 2023

2022
Verifiable dynamic search over encrypted data in cloud-assisted intelligent systems.
Int. J. Intell. Syst., December, 2022

Verifiable data streaming protocol supporting update history queries.
Int. J. Intell. Syst., December, 2022

Verifiable data streaming with efficient update for intelligent automation systems.
Int. J. Intell. Syst., 2022

Privacy-preserving Byzantine-robust federated learning.
Comput. Stand. Interfaces, 2022

Blockchain-based cross-user data shared auditing.
Connect. Sci., 2022

Detection of global positioning system spoofing attack on unmanned aerial vehicle system.
Concurr. Comput. Pract. Exp., 2022

Multi-user Verifiable Database with Efficient Keyword Search.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model.
Int. J. Intell. Syst., 2021

Secure deduplication with efficient user revocation in cloud storage.
Comput. Stand. Interfaces, 2021

Verifiable database supporting keyword searches with forward security.
Comput. Stand. Interfaces, 2021

CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated Learning.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed Assumption.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Towards efficient privacy-preserving encrypted image search in cloud computing.
Soft Comput., 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

Toward Forward Secure SSE Supporting Conjunctive Keyword Search.
IEEE Access, 2019

Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing.
IEEE Access, 2019

Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Enabling Compressed Encryption for Cloud Based Big Data Stores.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions.
IEEE Trans. Inf. Forensics Secur., 2018

Comparable encryption scheme supporting multiple users in cloud computing.
Int. J. High Perform. Comput. Netw., 2018

2017
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism.
Soft Comput., 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017

2016
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016

A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks.
J. Medical Syst., 2016

2015
Secure multi-server-aided data deduplication in cloud computing.
Pervasive Mob. Comput., 2015

Payment-based incentive mechanism for secure cloud deduplication.
Int. J. Inf. Manag., 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Request-Based Comparable Encryption Scheme with Multiple Users.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
Secure Approximate Nearest Neighbor Search over Encrypted Data.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014


  Loading...