Blockchain-based secure deduplication and shared auditing in decentralized storage G Tian, Y Hu, J Wei, Z Liu, X Huang, X Chen, W Susilo IEEE Transactions on Dependable and Secure Computing 19 (6), 3941-3954, 2021 | 64 | 2021 |
Randomized deduplication with ownership management and data sharing in cloud storage G Tian, H Ma, Y Xie, Z Liu Journal of Information Security and Applications 51, 102432, 2020 | 27 | 2020 |
Blockchain-based cross-user data shared auditing A Li, G Tian, M Miao, J Gong Connection science 34 (1), 83-103, 2022 | 24 | 2022 |
Research progress on attack and defense techniques in block-chain system 田国华, 胡云瀚, 陈晓峰 Journal of Software 32 (5), 1495-1525, 2021 | 18 | 2021 |
区块链系统攻击与防御技术研究进展 田国华, 胡云瀚, 陈晓峰 软件学报 32 (5), 1495-1525, 2021 | 16 | 2021 |
Vrbc: A verifiable redactable blockchain with efficient query and integrity auditing G Tian, J Wei, M Kutyłowski, W Susilo, X Huang, X Chen IEEE Transactions on Computers, 2022 | 15 | 2022 |
Revocable attribute-based encryption scheme with efficient deduplication for ehealth systems H Ma, Y Xie, J Wang, G Tian, Z Liu IEEE Access 7, 89205-89217, 2019 | 15 | 2019 |
Optimal verifiable data streaming protocol with data auditing J Wei, G Tian, J Shen, X Chen, W Susilo Computer Security–ESORICS 2021: 26th European Symposium on Research in …, 2021 | 10 | 2021 |
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model M Miao, G Tian, W Susilo International Journal of Intelligent Systems 36 (6), 2753-2766, 2021 | 9 | 2021 |
A practical heartbeat-based defense scheme against cloning Attacks in PoA blockchain Y Hu, G Tian, A Jiang, S Liu, J Wei, J Wang, S Tan Computer Standards & Interfaces 83, 103656, 2023 | 7 | 2023 |
Anti-Leakage Client-Side Deduplication with Ownership Management in Fog Computing. H Ma, G Tian, L Zhang Int. J. Netw. Secur. 22 (1), 24-35, 2020 | 6 | 2020 |
A blockchain-based compact audit-enabled deduplication in decentralized storage S Liu, Y Yao, G Tian, J Wei, X Liu Computer Standards & Interfaces 85, 103718, 2023 | 5 | 2023 |
Client-side ciphertext deduplication scheme with flexible access control Y Xie, G Tian, H Yuan, C Jiang, J Wang International Journal of Computational Science and Engineering 23 (2), 145-157, 2020 | 3 | 2020 |
Blockchain-based collaborative intrusion detection scheme T Dang, G Tian, J Wei, S Liu International Journal of Computational Science and Engineering 26 (4), 418-429, 2023 | 2 | 2023 |
Blockchain-based secure deduplication against duplicate-faking attack in decentralised storage J Zhou, G Tian, J Wei International Journal of Computational Science and Engineering 26 (4), 406-417, 2023 | 2 | 2023 |
Blockchain-based self-auditing scheme with batch verification for decentralized storage Z Yuan, J Wu, J Gong, Y Liu, G Tian, J Wang Wireless Communications and Mobile Computing 2022, 2022 | 2 | 2022 |
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing G Tian, J Wei, M Miao, F Guo, W Susilo, X Chen IEEE Transactions on Dependable and Secure Computing, 2023 | 1 | 2023 |
Secure and Efficient k-Nearest Neighbor Query with Privacy-Preserving Authentication Z Li, G Tian, S Tan International Symposium on Security and Privacy in Social Networks and Big …, 2022 | 1 | 2022 |
SQL queries over encrypted databases: a survey B Sun, S Zhao, G Tian Connection Science 36 (1), 2323059, 2024 | | 2024 |
Public Auditing and Secure Deduplication of Dynamic Data Based on Blockchain Y Tian, S Tan, G Tian 2023 International Conference on Data Security and Privacy Protection (DSPP …, 2023 | | 2023 |