default search action
Meixia Miao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j30]Meixia Miao, Siqi Zhao, Jiawei Li, Jianghong Wei, Willy Susilo:
Practically secure linear-map vector commitment and its applications. Comput. Stand. Interfaces 91: 103885 (2025) - [j29]Yusong Yao, Yiwen Shi, Guohua Tian, Meixia Miao, Willy Susilo:
PSCBO: A provably secure consensus-based blockchain Oracle. Comput. Stand. Interfaces 91: 103892 (2025) - 2024
- [j28]Meixia Miao, Siqi Zhao, Jiawei Li, Jianghong Wei:
Aggregatably Verifiable Data Streaming. IEEE Internet Things J. 11(13): 24109-24122 (2024) - [j27]Guohua Tian, Jianghong Wei, Meixia Miao, Fuchun Guo, Willy Susilo, Xiaofeng Chen:
Blockchain-Based Compact Verifiable Data Streaming With Self-Auditing. IEEE Trans. Dependable Secur. Comput. 21(4): 3917-3930 (2024) - [j26]Jianghong Wei, Meixia Miao, Guohua Tian, Jun Shen, Xiaofeng Chen, Willy Susilo:
Optimal Verifiable Data Streaming Under Concurrent Queries. IEEE Trans. Mob. Comput. 23(5): 5543-5557 (2024) - [j25]Meixia Miao, Lin Tang, Jiawei Li, Xuefeng Zhang:
New Blockchain-Based Publicly Traceable Self-Tallying Voting Protocol. IEEE Trans. Netw. Sci. Eng. 11(2): 2034-2046 (2024) - 2023
- [j24]Xuan Jing, Meixia Miao, Jianghong Wei, Jianfeng Wang:
Communication-Efficient Verifiable Data Streaming Protocol in the Multi-User Setting. IEEE Trans. Cloud Comput. 11(4): 3341-3354 (2023) - [j23]Saiyu Qi, Jianfeng Wang, Meixia Miao, Meng Zhang, Xiaofeng Chen:
TinyEnc: Enabling Compressed and Encrypted Big Data Stores With Rich Query Support. IEEE Trans. Dependable Secur. Comput. 20(1): 176-192 (2023) - 2022
- [j22]Chen Liang, Meixia Miao, Jianfeng Ma, Hongyang Yan, Qun Zhang, Xinghua Li:
Detection of global positioning system spoofing attack on unmanned aerial vehicle system. Concurr. Comput. Pract. Exp. 34(7) (2022) - [j21]Angtai Li, Guohua Tian, Meixia Miao, Jianpeng Gong:
Blockchain-based cross-user data shared auditing. Connect. Sci. 34(1): 83-103 (2022) - [j20]Xu Ma, Yuqing Zhou, Laihua Wang, Meixia Miao:
Privacy-preserving Byzantine-robust federated learning. Comput. Stand. Interfaces 80: 103561 (2022) - [j19]Meixia Miao, Jianghong Wei, Jiaojiao Wu, Kuan-Ching Li, Willy Susilo:
Verifiable data streaming with efficient update for intelligent automation systems. Int. J. Intell. Syst. 37(2): 1322-1338 (2022) - [j18]Meixia Miao, Jiawei Li, Yunling Wang, Jianghong Wei, Xinghua Li:
Verifiable data streaming protocol supporting update history queries. Int. J. Intell. Syst. 37(12): 11342-11361 (2022) - [j17]Yunling Wang, Pei Wei, Meixia Miao, Xuefeng Zhang:
Verifiable dynamic search over encrypted data in cloud-assisted intelligent systems. Int. J. Intell. Syst. 37(12): 11830-11852 (2022) - [c9]Meixia Miao, Panru Wu, Yunling Wang:
Multi-user Verifiable Database with Efficient Keyword Search. CSS 2022: 133-146 - 2021
- [j16]Meixia Miao, Yunling Wang, Jianfeng Wang, Xinyi Huang:
Verifiable database supporting keyword searches with forward security. Comput. Stand. Interfaces 77: 103491 (2021) - [j15]Yunling Wang, Meixia Miao, Jianfeng Wang, Xuefeng Zhang:
Secure deduplication with efficient user revocation in cloud storage. Comput. Stand. Interfaces 78: 103523 (2021) - [j14]Meixia Miao, Guohua Tian, Willy Susilo:
New proofs of ownership for efficient data deduplication in the adversarial conspiracy model. Int. J. Intell. Syst. 36(6): 2753-2766 (2021) - [c8]Yuqi Chen, Xiaoyu Zhang, Yi Xie, Meixia Miao, Xu Ma:
CECMLP: New Cipher-Based Evaluating Collaborative Multi-layer Perceptron Scheme in Federated Learning. ACNS (1) 2021: 79-99 - 2020
- [c7]Lulu Wang, Xiaoyu Zhang, Yi Xie, Xu Ma, Meixia Miao:
A High-Recall Membership Inference Attack Based on Confidence-Thresholding Method with Relaxed Assumption. ML4CS (2) 2020: 525-539
2010 – 2019
- 2019
- [j13]Yaping Su, Jianfeng Wang, Yunling Wang, Meixia Miao:
Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing. IEEE Access 7: 141352-141362 (2019) - [j12]Yunling Wang, Jianfeng Wang, Shifeng Sun, Meixia Miao, Xiaofeng Chen:
Toward Forward Secure SSE Supporting Conjunctive Keyword Search. IEEE Access 7: 142762-142772 (2019) - [j11]Meixia Miao, Jianfeng Wang, Sheng Wen, Jianfeng Ma:
Publicly verifiable database scheme with efficient keyword search. Inf. Sci. 475: 18-28 (2019) - [j10]Yuan Wang, Meixia Miao, Jian Shen, Jianfeng Wang:
Towards efficient privacy-preserving encrypted image search in cloud computing. Soft Comput. 23(6): 2101-2112 (2019) - [c6]Meng Zhang, Saiyu Qi, Meixia Miao, Fuyou Zhang:
Enabling Compressed Encryption for Cloud Based Big Data Stores. CANS 2019: 270-287 - [c5]Chen Liang, Meixia Miao, Jianfeng Ma, Hongyan Yan, Qun Zhang, Xinghua Li, Teng Li:
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. ML4CS 2019: 123-139 - 2018
- [j9]Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen:
Comparable encryption scheme supporting multiple users in cloud computing. Int. J. High Perform. Comput. Netw. 11(1): 24-33 (2018) - [j8]Meixia Miao, Jianfeng Ma, Xinyi Huang, Qian Wang:
Efficient Verifiable Databases With Insertion/Deletion Operations From Delegating Polynomial Functions. IEEE Trans. Inf. Forensics Secur. 13(2): 511-520 (2018) - 2017
- [j7]Limin Shen, Jianfeng Ma, Ximeng Liu, Fushan Wei, Meixia Miao:
A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks. IEEE Internet Things J. 4(2): 546-554 (2017) - [j6]Meixia Miao, Jianfeng Wang, Jianfeng Ma, Willy Susilo:
Publicly verifiable databases with efficient insertion/deletion operations. J. Comput. Syst. Sci. 86: 49-58 (2017) - [j5]Xinghua Li, Meixia Miao, Hai Liu, Jianfeng Ma, Kuan-Ching Li:
An incentive mechanism for K-anonymity in LBS privacy protection based on credit mechanism. Soft Comput. 21(14): 3907-3917 (2017) - [c4]Yanan Li, Qianhong Wu, Wenyi Tang, Bo Qin, Qin Wang, Meixia Miao:
Outsourcing Encrypted Excel Files. ISPEC 2017: 506-524 - 2016
- [j4]Limin Shen, Jianfeng Ma, Ximeng Liu, Meixia Miao:
A Provably Secure Aggregate Signature Scheme for Healthcare Wireless Sensor Networks. J. Medical Syst. 40(11): 244:1-244:10 (2016) - [j3]Jianfeng Wang, Meixia Miao, Yaqian Gao, Xiaofeng Chen:
Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing. Soft Comput. 20(11): 4487-4495 (2016) - 2015
- [j2]Meixia Miao, Tao Jiang, Ilsun You:
Payment-based incentive mechanism for secure cloud deduplication. Int. J. Inf. Manag. 35(3): 379-386 (2015) - [j1]Meixia Miao, Jianfeng Wang, Hui Li, Xiaofeng Chen:
Secure multi-server-aided data deduplication in cloud computing. Pervasive Mob. Comput. 24: 129-137 (2015) - [c3]Jun Ye, Meixia Miao, Peng Chen, Xiaofeng Chen:
Request-Based Comparable Encryption Scheme with Multiple Users. BWCCA 2015: 414-416 - [c2]Meixia Miao, Jianfeng Wang, Jianfeng Ma:
New Publicly Verifiable Databases Supporting Insertion Operation. NBiS 2015: 640-642 - 2014
- [c1]Yaqian Gao, Meixia Miao, Jianfeng Wang, Xiaofeng Chen:
Secure Approximate Nearest Neighbor Search over Encrypted Data. BWCCA 2014: 578-583
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint