default search action
Jialu Hao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Wei Wu, Jialu Hao:
Privacy-preserving Apriori-based association rule mining over semantically secure encrypted cloud database. Peer Peer Netw. Appl. 17(6): 4156-4174 (2024) - 2023
- [j10]Dilxat Ghopur, Jianfeng Ma, Xindi Ma, Jialu Hao, Tao Jiang, Xiangyu Wang:
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation. IEEE Trans. Serv. Comput. 16(6): 3999-4011 (2023) - 2022
- [j9]Jialu Hao, Cheng Huang, Wenjuan Tang, Yang Zhang, Shuai Yuan:
Smart Contract-Based Access Control Through Off-Chain Signature and On-Chain Evaluation. IEEE Trans. Circuits Syst. II Express Briefs 69(4): 2221-2225 (2022) - [j8]Jialu Hao, Wenjuan Tang, Cheng Huang, Jian Liu, Huimei Wang, Ming Xian:
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT. IEEE Trans. Emerg. Top. Comput. 10(2): 933-947 (2022) - 2021
- [j7]Ziyuan Li, Jialu Hao, Jian Liu, Huimei Wang, Ming Xian:
An IoT-Applicable Access Control Model Under Double-Layer Blockchain. IEEE Trans. Circuits Syst. II Express Briefs 68(6): 2102-2106 (2021) - [j6]Wei Wu, Jian Liu, Huimei Wang, Jialu Hao, Ming Xian:
Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique. IEEE Trans. Knowl. Data Eng. 33(10): 3424-3437 (2021) - 2020
- [j5]Hong Rong, Jian Liu, Wei Wu, Jialu Hao, Huimei Wang, Ming Xian:
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment. Comput. Secur. 98: 101969 (2020) - [j4]Jialu Hao, Jian Liu, Wei Wu, Fengyi Tang, Ming Xian:
Secure and Fine-Grained Self-Controlled Outsourced Data Deletion in Cloud-Based IoT. IEEE Internet Things J. 7(2): 1140-1153 (2020)
2010 – 2019
- 2019
- [j3]Jialu Hao, Jian Liu, Huimei Wang, Lingshuang Liu, Ming Xian, Xuemin Shen:
Efficient Attribute-Based Access Control With Authorized Search in Cloud Storage. IEEE Access 7: 182772-182783 (2019) - [j2]Jialu Hao, Cheng Huang, Jianbing Ni, Hong Rong, Ming Xian, Xuemin (Sherman) Shen:
Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Networks 153: 1-10 (2019) - [c5]Jialu Hao, Cheng Huang, Guangyu Chen, Ming Xian, Xuemin Sherman Shen:
Privacy-Preserving Interest-Ability Based Task Allocation in Crowdsourcing. ICC 2019: 1-6 - 2018
- [c4]Jialu Hao, Cheng Huang, Jian Liu, Ming Xian, Xuemin Shen:
Efficient Outsourced Data Access Control with User Revocation for Cloud-Based IoT. GLOBECOM 2018: 1-6 - 2017
- [j1]Hong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian:
Privacy-Preserving k-Means Clustering under Multiowner Setting in Distributed Cloud Environments. Secur. Commun. Networks 2017: 3910126:1-3910126:19 (2017) - [c3]Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian:
OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. NSS 2017: 499-509 - [c2]Hong Rong, Huimei Wang, Jian Liu, Jialu Hao, Ming Xian:
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework. SecureComm 2017: 67-87 - 2016
- [c1]Hong Rong, Huimei Wang, Jian Liu, Wei Wu, Jialu Hao, Ming Xian:
Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment. Inscrypt 2016: 451-471
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-17 21:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint