Yanfeng Shi

Orcid: 0000-0002-2924-0548

According to our database1, Yanfeng Shi authored at least 17 papers between 2013 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Constraint on Bounded Relative Distance for Robust MME Detection in Spaceborne Cluster Flight Netted Radar.
IEEE Access, 2022

Research on Attribute-Based Privacy-Preserving Computing Technologies.
Proceedings of the Big Data and Security - 4th International Conference, 2022

2021
Delegated Key-Policy Attribute-Based Set Intersection over Outsourced Encrypted Data Sets for CloudIoT.
Secur. Commun. Networks, 2021

Vehicle Road Privacy Recommendation System Equipped with Markov Chain.
Proceedings of the Big Data and Security - Third International Conference, 2021

Research on Outsourced PSI Protocols for Privacy Preserving Data Sharing.
Proceedings of the Big Data and Security - Third International Conference, 2021

A Review on Traceable Attribute-Based Encryption.
Proceedings of the Big Data and Security - Third International Conference, 2021

2020
Transmit Power Allocation with Connectivity Probability for Multi-QoS in Cluster Flight Spacecraft Network.
Wirel. Commun. Mob. Comput., 2020

Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2020

Android Malware Detection Method Based on App-Image Conversion.
Proceedings of the Big Data and Security - Second International Conference, 2020

2019
An Efficient Lattice-Based IBE Scheme Using Combined Public Key.
Proceedings of the Big Data and Security - First International Conference, 2019

2018
Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Comput., 2018

2017
Power Control for Passive QAM Multisensor Backscatter Communication Systems.
J. Sensors, 2017

Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack.
Sci. China Inf. Sci., 2017

2016
Deterministic attribute-based encryption.
Int. J. High Perform. Comput. Netw., 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation.
Inf. Sci., 2015

2013
Identity-Based Symmetric Private Set Intersection.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013


  Loading...