Secure outsourcing SIFT: Efficient and privacy-preserving image feature extraction in the encrypted domain L Jiang, C Xu, X Wang, B Luo, H Wang IEEE Transactions on Dependable and Secure Computing 17 (1), 179-193, 2017 | 56 | 2017 |
Toward practical privacy-preserving processing over encrypted data in IoT: an assistive healthcare use case L Jiang, L Chen, T Giannetsos, B Luo, K Liang, J Han IEEE Internet of Things Journal 6 (6), 10177-10190, 2019 | 50 | 2019 |
Statistical learning based fully homomorphic encryption on encrypted data L Jiang, C Xu, X Wang, C Lin Soft Computing 21, 7473-7483, 2017 | 19 | 2017 |
Generating universal adversarial perturbation with ResNet J Xu, H Liu, D Wu, F Zhou, C Gao, L Jiang Information Sciences 537, 302-312, 2020 | 13 | 2020 |
Application of (fully) homomorphic encryption for encrypted computing models L Jiang, C Xu, X Wang, KF Chen, B Wang Journal of Cryptologic Research 4 (6), 596-610, 2017 | 9 | 2017 |
A new effective shift rule for M-sequences X Wang, L Zhang, L Jiang IEEE Access 8, 74957-74964, 2019 | 7 | 2019 |
Analysis and comparison of the network security protocol with DoS/DDoS attack resistance performance L Jiang, C Xu, X Wang, Y Zhou 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 6 | 2015 |
(全) 同态加密在基于密文计算模型中的应用 蒋林智, 许春香, 王晓芳, 陈克非, 王保仓 密码学报, 596-610, 2017 | 5 | 2017 |
Cycle structure and adjacency graphs of a class of LFSRs and a new family of De Bruijn cycles X Wang, L Jiang IEEE Access 6, 38770-38779, 2018 | 3 | 2018 |
同态加密专栏序言 陈克非, 蒋林智 密码学报 4 (6), 558-560, 2017 | 2 | 2017 |
ID-based deniable threshold ring authentication C Jin, C Xu, L Jiang, F Li 2015 IEEE 17th International Conference on High Performance Computing and …, 2015 | 2 | 2015 |
A symmetric authenticated proxy re-encryption scheme with provable security Z Peng, S Tang, L Jiang Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017 | 1 | 2017 |
“单调有界数列必收敛” 的应用综述 蒋林智 皖西学院学报 21 (2), 25-28, 2005 | 1 | 2005 |
Adversarial Perturbation with ResNet H Liu, L Jiang, J Xu, D Wu, L Chen Proceedings of the 2020 on Great Lakes Symposium on VLSI, 549-554, 2020 | | 2020 |
一种新的基于 Client-puzzle 的 WAPI 认证协议抗拒绝服务攻击方案 蒋林智, 丁勇 桂林电子科技大学学报 32 (1), 35-39, 2012 | | 2012 |
迫敛性在解决求极限问题中的应用讨论 蒋林智 皖西学院学报 22 (2), 13-15, 2006 | | 2006 |