default search action
Yingmo Jie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yingmo Jie, Charles Zhechao Liu, Kim-Kwang Raymond Choo, Cheng Guo:
An incentive compatible ZD strategy-based data sharing model for federated learning: A perspective of iterated prisoner's dilemma. Eur. J. Oper. Res. 315(2): 764-776 (2024) - [j22]Cheng Guo, Binbin Zheng, Yingmo Jie, Yi-Ning Liu, Yan Hu:
A game-theory-based scheme to facilitate consensus latency minimization in sharding blockchain. Inf. Sci. 657: 119954 (2024) - [j21]Yingmo Jie, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
A Game-Theory-Based Contract Mechanism to Facilitate Technology Spillover in Emerging Electric Vehicle Markets. IEEE Trans. Engineering Management 71: 76-89 (2024) - 2023
- [j20]Pengxu Tian, Cheng Guo, Yingmo Jie, Yining Liu, Lin Yao:
Scan-free verifiable public-key searchable encryption supporting efficient user updates in distributed systems. J. Inf. Secur. Appl. 74: 103471 (2023) - 2020
- [j19]Yingmo Jie, Charles Zhechao Liu, Mingchu Li, Kim-Kwang Raymond Choo, Ling Chen, Cheng Guo:
Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving. Appl. Math. Comput. 376: 125142 (2020) - [j18]Cheng Guo, Jing Jia, Kim-Kwang Raymond Choo, Yingmo Jie:
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images. Comput. Secur. 99: 102021 (2020) - [j17]Yingmo Jie, Cheng Guo, Kim-Kwang Raymond Choo, Charles Zhechao Liu, Mingchu Li:
Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment. IEEE Internet Things J. 7(4): 3041-3052 (2020) - [j16]Cheng Guo, Jing Jia, Yingmo Jie, Charles Zhechao Liu, Kim-Kwang Raymond Choo:
Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization. IEEE Internet Things J. 7(4): 3104-3113 (2020) - [j15]Ling Chen, Mingchu Li, Ling Qin, Yingmo Jie:
A game-theoretic approach for channel security against active time-varying attacks based on artificial noise. J. Ambient Intell. Humaniz. Comput. 11(6): 2215-2224 (2020) - [j14]Cheng Guo, Xueru Jiang, Kim-Kwang Raymond Choo, Yingmo Jie:
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity. J. Netw. Comput. Appl. 162: 102664 (2020) - [j13]Bin Feng, Xiangli Li, Yingmo Jie, Cheng Guo, Huijuan Fu:
A Novel Semi-fragile Digital Watermarking Scheme for Scrambled Image Authentication and Restoration. Mob. Networks Appl. 25(1): 82-94 (2020) - [j12]Cheng Guo, Xue Chen, Yingmo Jie, Zhangjie Fu, Mingchu Li, Bin Feng:
Dynamic Multi-Phrase Ranked Search over Encrypted Data with Symmetric Searchable Encryption. IEEE Trans. Serv. Comput. 13(6): 1034-1044 (2020)
2010 – 2019
- 2019
- [j11]Yingmo Jie, Kim-Kwang Raymond Choo, Mingchu Li, Ling Chen, Cheng Guo:
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model. Future Gener. Comput. Syst. 101: 169-179 (2019) - [j10]Cheng Guo, Ruhan Zhuang, Yingmo Jie, Kim-Kwang Raymond Choo, Xinyu Tang:
Secure Range Search Over Encrypted Uncertain IoT Outsourced Data. IEEE Internet Things J. 6(2): 1520-1529 (2019) - [j9]Yingmo Jie, Mingchu Li, Cheng Guo, Bin Feng, Tingting Tang:
A new construction of compressed sensing matrices for signal processing via vector spaces over finite fields. Multim. Tools Appl. 78(22): 31137-31161 (2019) - 2018
- [j8]Yingmo Jie, Mingchu Li, Cheng Guo, Ling Chen:
Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping. IEEE Access 6: 51374-51383 (2018) - [j7]Cheng Guo, Xinyu Tang, Yingmo Jie, Bin Feng:
Efficient method to verify the integrity of data with supporting dynamic data in cloud computing. Sci. China Inf. Sci. 61(11): 119101:1-119101:3 (2018) - [j6]Cheng Guo, Ningqi Luo, Md. Zakirul Alam Bhuiyan, Yingmo Jie, Yuanfang Chen, Bin Feng, Muhammad Alam:
Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage. Future Gener. Comput. Syst. 84: 190-199 (2018) - [j5]Yingmo Jie, Xinyu Tang, Kim-Kwang Raymond Choo, Shenghao Su, Mingchu Li, Cheng Guo:
Online task scheduling for edge computing based on repeated stackelberg game. J. Parallel Distributed Comput. 122: 159-172 (2018) - [j4]Yingmo Jie, Cheng Guo, Mingchu Li, Bin Feng:
Construction of compressed sensing matrices for signal processing. Multim. Tools Appl. 77(23): 30551-30574 (2018) - [c4]Ling Chen, Mingchu Li, Ling Qin, Yingmo Jie:
A Game-theoretic Approach for Channel Security Against Active Time-Varying attacks Based on Artificial Noise. FNC/MobiSPC 2018: 212-218 - [c3]Cheng Guo, Pengxu Tian, Yingmo Jie, Xinyu Tang:
A Privacy Preserving Similarity Search Scheme over Encrypted High-Dimensional Data for Multiple Data Owners. ICCCS (2) 2018: 484-495 - 2017
- [j3]Yingmo Jie, Mingchu Li, Tingting Tang, Cheng Guo:
Optimal Allocation Strategy Based on Stackelberg Game for Inspecting Drunk Driving on Traffic Network. KSII Trans. Internet Inf. Syst. 11(12): 5759-5779 (2017) - [j2]Yingmo Jie, Cheng Guo, Zhangjie Fu:
Newly deterministic construction of compressed sensing matrices via singular linear spaces over finite fields. J. Comb. Optim. 34(1): 245-256 (2017) - [c2]Cheng Guo, Ningqi Luo, Md. Zakirul Alam Bhuiyan, Yingmo Jie, Yuanfang Chen, Muhammad Alam:
Key-Aggregate Authentication Cryptosystem for Data Sharing in Dynamic Cloud Storage. ISPAN-FCST-ISCC 2017: 242-249 - [c1]Bin Feng, Xiangli Li, Yingmo Jie, Cheng Guo, Huijuan Fu:
Semi-fragile Watermarking Algorithm Based on Arnold Scrambling for Three-Layer Tamper Localization and Restoration. QSHINE 2017: 71-80 - 2016
- [j1]Cheng Guo, Ruhan Zhuang, Yingmo Jie, Yizhi Ren, Ting Wu, Kim-Kwang Raymond Choo:
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds. J. Medical Syst. 40(11): 235:1-235:8 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint