Follow
Jiawei Yuan
Jiawei Yuan
Associate Professor of CS
Verified email at umassd.edu
Title
Cited by
Cited by
Year
Privacy preserving back-propagation neural network learning made practical with cloud computing
J Yuan, S Yu
IEEE Transactions on Parallel and Distributed Systems 25 (1), 212-221, 2014
2872014
Secure and constant cost public cloud storage auditing with deduplication
J Yuan, S Yu
2013 IEEE Conference on Communications and Network Security (CNS), 145-153, 2013
2142013
BANA: Body area network authentication exploiting channel characteristics
L Shi, M Li, S Yu, J Yuan
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
2052012
Proofs of retrievability with public verifiability and constant communication cost in cloud
J Yuan, S Yu
Proceedings of the 2013 international workshop on Security in cloud …, 2013
1872013
Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
J Yuan, S Yu
Information Forensics and Security, IEEE Transactions on 10 (8), 1717 - 1726, 2015
1662015
Efficient public integrity checking for cloud data sharing with multi-user modification
J Yuan, S Yu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2121-2129, 2014
1562014
Efficient privacy-preserving biometric identification in cloud computing
J Yuan, S Yu
2013 Proceedings IEEE INFOCOM, 2652-2660, 2013
1342013
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones
Y Tian, J Yuan, H Song
Journal of Information Security and Applications 48, 102354, 2019
1162019
Mining Twitter to assess the public perception of the “Internet of Things”
J Bian, K Yoshigoe, A Hicks, J Yuan, Z He, M Xie, Y Guo, M Prosperi, ...
PloS one 11 (7), e0158450, 2016
1102016
SEISA: Secure and efficient encrypted image search with access control
J Yuan, S Yu, L Guo
2015 IEEE conference on computer communications (INFOCOM), 2083-2091, 2015
1022015
ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
L Shi, J Yuan, S Yu, M Li
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
882013
Practical privacy-preserving mapreduce based k-means clustering over large-scale dataset
J Yuan, Y Tian
IEEE transactions on cloud computing 7 (2), 568-579, 2017
742017
MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks
L Shi, J Yuan, S Yu, M Li
IEEE Internet of Things Journal 2 (1), 52-62, 2015
652015
Examining healthcare utilization patterns of elderly middle-aged adults in the United States
CE Zayas, Z He, J Yuan, M Maldonado-Molina, W Hogan, F Modave, ...
Proceedings of the... International Florida AI Research Society Conference …, 2016
502016
Blockchain enabled verification for cellular-connected unmanned aircraft system networking
J Wang, Y Liu, S Niu, H Song, W Jing, J Yuan
Future Generation Computer Systems 123, 233-244, 2021
322021
Workload-aware task placement in edge-assisted human re-identification
A Acharya, Y Hou, Y Mao, M Xian, J Yuan
2019 16th Annual IEEE International Conference on Sensing, Communication …, 2019
282019
Towards a privacy preserving cohort discovery framework for clinical research networks
J Yuan, B Malin, F Modave, Y Guo, WR Hogan, E Shenkman, J Bian
Journal of biomedical informatics 66, 42-51, 2017
222017
Blockchain-based secure routing strategy for airborne mesh networks
Y Liu, J Wang, H Song, J Li, J Yuan
2019 IEEE International Conference on Industrial Internet (ICII), 56-61, 2019
192019
Edge-assisted image processing with joint optimization of responding and placement strategy
A Acharya, Y Hou, Y Mao, J Yuan
2019 International Conference on Internet of Things (iThings) and IEEE Green …, 2019
182019
Pcpor: public and constant-cost proofs of retrievability in cloud1
J Yuan, S Yu
Journal of Computer Security 23 (3), 403-425, 2015
182015
The system can't perform the operation now. Try again later.
Articles 1–20