default search action
Yunling Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Min Li, Enguang Zuo, Feng Li, Cheng Chen, Chaoxun Guo, Pei Liu, Yunling Wang, Xiaoyi Lv, Chen Chen:
DCFusion: Difference correlation-driven fusion mechanism of infrared and visible images. Pattern Recognit. 158: 111002 (2025) - 2024
- [j20]Kuizhuang Liu, Min Li, Enguang Zuo, Chen Chen, Cheng Chen, Bo Wang, Yunling Wang, Xiaoyi Lv:
ASFFuse: Infrared and visible image fusion model based on adaptive selection feature maps. Pattern Recognit. 149: 110226 (2024) - [j19]Kuizhuang Liu, Min Li, Cheng Chen, Chengwei Rao, Enguang Zuo, Yunling Wang, Ziwei Yan, Bo Wang, Chen Chen, Xiaoyi Lv:
DSFusion: Infrared and visible image fusion method combining detail and scene information. Pattern Recognit. 154: 110633 (2024) - [j18]Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Towards Practical Multi-Client Order-Revealing Encryption: Improvement and Application. IEEE Trans. Dependable Secur. Comput. 21(3): 1111-1126 (2024) - [c9]Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang:
Scalable Equi-Join Queries over Encrypted Database. CCS 2024: 4002-4016 - [c8]Yunling Wang, Shi-Feng Sun, Jianfeng Wang, Xiaofeng Chen, Joseph K. Liu, Dawu Gu:
Practical Non-interactive Encrypted Conjunctive Search with Leakage Suppression. CCS 2024: 4658-4672 - [c7]Palidan Tursun, Siyu Li, Min Li, Xiaoyi Lv, Cheng Chen, Chen Chen, Yunling Wang:
DRA-CN: A Novel Dual-Resolution Attention Capsule Network for Histopathology Image Classification. PRCV (14) 2024: 209-222 - [i1]Kai Du, Jianfeng Wang, Jiaojiao Wu, Yunling Wang:
Scalable Equi-Join Queries over Encrypted Database. IACR Cryptol. ePrint Arch. 2024: 1391 (2024) - 2023
- [j17]Zhenxing Huang, Wenbo Li, Yunling Wang, Zhou Liu, Qiyang Zhang, Yuxi Jin, Ruodai Wu, Guotao Quan, Dong Liang, Zhanli Hu, Na Zhang:
MLNAN: Multi-level noise-aware network for low-dose CT imaging implemented with constrained cycle Wasserstein generative adversarial networks. Artif. Intell. Medicine 143: 102609 (2023) - [j16]Wanjun Hao, Shuqin Liu, Chunyang Lv, Yunling Wang, Jianfeng Wang:
Efficient and privacy-preserving multi-party skyline queries in online medical primary diagnosis. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101637 (2023) - [j15]NaZiLa HaLiMaiMaiTi, Yue Hong, Min Li, Hongtao Li, Yunling Wang, Chen Chen, Xiaoyi Lv, Cheng Chen:
Classification of benign and malignant parotid tumors based on CT images combined with stack generalization model. Medical Biol. Eng. Comput. 61(11): 3123-3135 (2023) - [c6]Feng Li, Enguang Zuo, Chen Chen, Cheng Chen, Mingrui Ma, Yunling Wang, Xiaoyi Lv, Min Li:
MLDF-Net: Metadata Based Multi-level Dynamic Fusion Network. PRCV (1) 2023: 461-473 - 2022
- [j14]Meixia Miao, Jiawei Li, Yunling Wang, Jianghong Wei, Xinghua Li:
Verifiable data streaming protocol supporting update history queries. Int. J. Intell. Syst. 37(12): 11342-11361 (2022) - [j13]Yunling Wang, Pei Wei, Meixia Miao, Xuefeng Zhang:
Verifiable dynamic search over encrypted data in cloud-assisted intelligent systems. Int. J. Intell. Syst. 37(12): 11830-11852 (2022) - [j12]Yunling Wang, Shifeng Sun, Jianfeng Wang, Joseph K. Liu, Xiaofeng Chen:
Achieving Searchable Encryption Scheme With Search Pattern Hidden. IEEE Trans. Serv. Comput. 15(2): 1012-1025 (2022) - [c5]Meixia Miao, Panru Wu, Yunling Wang:
Multi-user Verifiable Database with Efficient Keyword Search. CSS 2022: 133-146 - 2021
- [j11]Meixia Miao, Yunling Wang, Jianfeng Wang, Xinyi Huang:
Verifiable database supporting keyword searches with forward security. Comput. Stand. Interfaces 77: 103491 (2021) - [j10]Yunling Wang, Meixia Miao, Jianfeng Wang, Xuefeng Zhang:
Secure deduplication with efficient user revocation in cloud storage. Comput. Stand. Interfaces 78: 103523 (2021) - [c4]Chunyang Lv, Jianfeng Wang, Shifeng Sun, Yunling Wang, Saiyu Qi, Xiaofeng Chen:
Efficient Multi-client Order-Revealing Encryption and Its Applications. ESORICS (2) 2021: 44-63 - 2020
- [j9]Yunkai Lei, Ting Li, Quan Tang, Yunling Wang, Chuan Yuan, Xiaoxi Yang, Yang Liu:
Comparison of UPFC, SVC and STATCOM in Improving Commutation Failure Immunity of LCC-HVDC Systems. IEEE Access 8: 135298-135307 (2020) - [j8]Yunkai Lei, Quan Tang, Ting Li, Yunling Wang, Weiting Xu, Jiehui Zheng, Lixiao Wang:
A Multi-Individual Distributed Modeling and Optimization Method for Integrated Energy Systems With Complex Composition. IEEE Access 8: 136198-136205 (2020) - [j7]Yifan Wang, Yunling Wang, Jianfeng Wang:
Efficient self-adaptive access control for personal medical data in emergency setting. Int. J. Comput. Sci. Eng. 23(4): 341-351 (2020)
2010 – 2019
- 2019
- [j6]Yaping Su, Jianfeng Wang, Yunling Wang, Meixia Miao:
Efficient Verifiable Multi-Key Searchable Encryption in Cloud Computing. IEEE Access 7: 141352-141362 (2019) - [j5]Yunling Wang, Jianfeng Wang, Shifeng Sun, Meixia Miao, Xiaofeng Chen:
Toward Forward Secure SSE Supporting Conjunctive Keyword Search. IEEE Access 7: 142762-142772 (2019) - [j4]Kai Nie, Yunling Wang, Xiaoling Tao:
Efficient publicly verifiable conjunctive keyword search over encrypted data in cloud computing. Int. J. Embed. Syst. 11(6): 707-718 (2019) - [j3]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Joonsang Baek, Ilsun You, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. J. Univers. Comput. Sci. 25(3): 222-244 (2019) - [c3]Zhongjun Zhang, Jianfeng Wang, Yunling Wang, Yaping Su, Xiaofeng Chen:
Towards Efficient Verifiable Forward Secure Searchable Symmetric Encryption. ESORICS (2) 2019: 304-321 - 2018
- [j2]Wenhao Guan, Yunling Wang, Jianfeng Wang, Xiaotong Fu:
Verifiable memory leakage-resilient dynamic searchable encryption. J. High Speed Networks 24(3): 201-217 (2018) - 2017
- [c2]Yunling Wang, Jianfeng Wang, Shifeng Sun, Joseph K. Liu, Willy Susilo, Xiaofeng Chen:
Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption. ProvSec 2017: 24-38 - 2016
- [j1]Yunling Wang, Jianfeng Wang, Xiaofeng Chen:
Secure searchable encryption: a survey. J. Commun. Inf. Networks 1(4): 52-65 (2016) - [c1]Zhiwei Zhang, Yunling Wang, Jianfeng Wang, Xiaofeng Chen, Jianfeng Ma:
Location-Sensitive Data Sharing in Mobile Cloud Computing. BWCCA 2016: 799-805
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-11 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint