default search action
Jiaoli Shi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Zhuolin Mei, Jing Zeng, Caicai Zhang, Shimao Yao, Shunli Zhang, Haibin Wang, Hongbo Li, Jiaoli Shi:
Efficient and Verifiable Range Query Scheme for Encrypted Geographical Information in Untrusted Cloud Environments. ISPRS Int. J. Geo Inf. 13(8): 281 (2024) - [j7]Zhuolin Mei, Jing Yu, Caicai Zhang, Bin Wu, Shimao Yao, Jiaoli Shi, Zongda Wu:
Secure multi-dimensional data retrieval with access control and range query in the cloud. Inf. Syst. 122: 102343 (2024) - [j6]Zhuolin Mei, Huilai Zou, Jinzhou Huang, Caicai Zhang, Bin Wu, Jiaoli Shi, Zhengxiang Cheng:
A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional Data. Int. J. Web Serv. Res. 21(1): 1-17 (2024) - [c17]Mingzhu Ge, Liya Xu, Junhui Wang, Caicai Zhang, Jiaoli Shi, Hongbo Li:
A Vehicular Network Routing Based on the DQN Algorithm in the Cloud Environment. CLOUD 2024: 37-45 - [c16]Hourong Li, Yun Tian, Bin Wu, Jiaoli Shi:
Privacy Preserving Adjacency Query Supporting Homoionym Search over Medical Graph Data in Cloud Computing. CLOUD 2024: 46-55 - [c15]Liya Xu, Mingzhu Ge, Caicai Zhang, Jiaoli Shi, Xiwei Dong, Hongbo Li:
A Blockchain PoW Consensus Mechanism Based on Edge Computing in the IoVs. EDGE 2024: 74-81 - [c14]Yun Tian, Bin Wu, Jiaoli Shi, Caicai Zhang, Du Xu:
Secure Similar Adjacent Vertex Query on Sparse Graph Data in Cloud Environment. EDGE 2024: 95-104 - 2023
- [j5]Zhuolin Mei, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang, Zongda Wu:
Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques. Int. J. Web Serv. Res. 20(1): 1-18 (2023) - [j4]Shimao Yao, Ralph Voltaire J. Dayot, In-Ho Ra, Liya Xu, Zhuolin Mei, Jiaoli Shi:
An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 18: 3833-3848 (2023) - [c13]Han Wang, Hui Li, Zixian Wang, Feng Zhao, Yao Yao, Yuhong Chen, Tuanfa Qin, Ping Lu, Jiaoli Shi:
Optimizing Read Performance in Lightweight Blockchain with Cooperative Storage Scheme. BCCA 2023: 150-157 - [c12]Ruwang Wen, Zhengxiang Cheng, Weixuan Mao, Zhuolin Mei, Jiaoli Shi, Xiao Cheng:
HMGR: A Hybrid Model for Geolocation Recommendation. BigData 2023: 48-62 - [c11]Chao Luo, Jiaoli Shi, Minchen Xie, Chao Hu, Lihua Wang, Zhuolin Mei, Shimao Yao, Hui Li:
A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter. Inscrypt (1) 2023: 433-451 - [c10]Zhengxiang Cheng, Weixuan Mao, Ruwang Wen, Zhuolin Mei, Bin Wu, Jiaoli Shi, Xiao Cheng:
Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data. EDGE 2023: 69-81 - [c9]Weixuan Mao, Ruwang Wen, Zhengxiang Cheng, Zhuolin Mei, Haibin Wang, Bin Wu, Jiaoli Shi:
A Location Recommendation Model Based on User Behavior and Sequence Influence. ICIOT 2023: 18-30 - [c8]Jiaoli Shi, Chao Hu, Shimao Yao, Zhuolin Mei, Bin Wu, Hui Li:
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage. ICPADS 2023: 2875-2878 - 2022
- [c7]Liya Xu, Mingzhu Ge, Anyuan Deng, Jiaoli Shi, Shimao Yao:
An Emergency Information Broadcast Routing in VANET. WiCON 2022: 144-155 - 2021
- [j3]Kai He, Chunxiao Huang, Jiaoli Shi, Xinrong Hu, Xiying Fan:
Enabling Decentralized and Dynamic Data Integrity Verification for Secure Cloud Storage via T-Merkle Hash Tree Based Blockchain. Mob. Inf. Syst. 2021: 9977744:1-9977744:17 (2021) - [j2]Xieyang Shen, Chuanhe Huang, Xiajiong Shen, Jiaoli Shi, Danxin Wang:
A Collusion-Resistant Blockchain-Enabled Data Sharing Scheme with Decryption Outsourcing under Time Restriction. Secur. Commun. Networks 2021: 7249470:1-7249470:11 (2021) - 2020
- [c6]Kai He, Jiaoli Shi, Chunxiao Huang, Xinrong Hu:
Blockchain Based Data Integrity Verification for Cloud Storage with T-Merkle Tree. ICA3PP (3) 2020: 65-80 - [c5]Anyuan Deng, Jiaoli Shi, Kai He, Fang Xu:
IM-ACS: An Access Control Scheme Supporting Informal Non-malleable Security in Mobile Media Sharing System. ICA3PP (3) 2020: 81-92
2010 – 2019
- 2016
- [j1]Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Xieyang Shen:
An access control scheme with dynamic user management and cloud-aided decryption. Secur. Commun. Networks 9(18): 5659-5672 (2016) - [c4]Kai He, Chuanhe Huang, Zongpeng Li, Aiwu Shi, Jiaoli Shi:
An Online Auction for Deadline-Aware Dynamic Cloud Resource Provisioning. ICPADS 2016: 677-684 - [c3]Kai He, Chuanhe Huang, Jiaoli Shi, Jinhai Wang:
Public integrity auditing for dynamic regenerating code based cloud storage. ISCC 2016: 581-588 - 2015
- [c2]Kai He, Chuanhe Huang, Kan Yang, Jiaoli Shi:
Identity-preserving public auditing for shared cloud data. IWQoS 2015: 159-164 - 2014
- [c1]Jiaoli Shi, Chuanhe Huang, Jing Wang, Kai He, Jinhai Wang:
An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key. ICA3PP (1) 2014: 429-442
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint