| Public and private blockchain in construction business process and information integration R Yang, R Wakefield, S Lyu, S Jayasuriya, F Han, X Yi, X Yang, ... Automation in construction 118, 103276, 2020 | 663 | 2020 |
| Homomorphic encryption X Yi, R Paulet, E Bertino Homomorphic encryption and applications, 27-46, 2014 | 541 | 2014 |
| Privacy-preserving and content-protecting location based queries R Paulet, MG Kaosar, X Yi, E Bertino IEEE transactions on knowledge and data engineering 26 (5), 1200-1210, 2013 | 217 | 2013 |
| Hash function based on chaotic tent maps X Yi IEEE Transactions on Circuits and Systems II: Express Briefs 52 (6), 354-357, 2005 | 174 | 2005 |
| Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation PP Jayaraman, X Yang, A Yavari, D Georgakopoulos, X Yi Future Generation Computer Systems 76, 540-549, 2017 | 173 | 2017 |
| An identity-based signature scheme from the Weil pairing X Yi IEEE communications letters 7 (2), 76-78, 2003 | 172 | 2003 |
| Aggregation service for federated learning: An efficient, secure, and more resilient realization Y Zheng, S Lai, Y Liu, X Yuan, X Yi, C Wang IEEE Transactions on Dependable and Secure Computing 20 (2), 988-1001, 2022 | 168 | 2022 |
| Secure edge of things for smart healthcare surveillance framework A Alabdulatif, I Khalil, X Yi, M Guizani IEEE access 7, 31010-31021, 2019 | 151 | 2019 |
| Blockchain-based federated learning with secure aggregation in trusted execution environment for internet-of-things AP Kalapaaking, I Khalil, MS Rahman, M Atiquzzaman, X Yi, M Almashor IEEE Transactions on Industrial Informatics 19 (2), 1703-1714, 2022 | 146 | 2022 |
| Privacy protection for wireless medical sensor data X Yi, A Bouguettaya, D Georgakopoulos, A Song, J Willemson IEEE transactions on dependable and secure computing 13 (3), 369-380, 2015 | 144 | 2015 |
| Single-database private information retrieval from fully homomorphic encryption X Yi, MG Kaosar, R Paulet, E Bertino IEEE Transactions on Knowledge and Data Engineering 25 (5), 1125-1134, 2012 | 144 | 2012 |
| Practical approximate k nearest neighbor queries with location and query privacy X Yi, R Paulet, E Bertino, V Varadharajan IEEE Transactions on Knowledge and Data Engineering 28 (6), 1546-1559, 2016 | 143 | 2016 |
| Security and privacy in cloud computing: vision, trends, and challenges Z Tari, X Yi, US Premarathne, P Bertok, I Khalil IEEE Cloud Computing 2 (2), 30-38, 2015 | 128 | 2015 |
| A practical privacy-preserving recommender system S Badsha, X Yi, I Khalil Data Science and Engineering 1 (3), 161-177, 2016 | 124 | 2016 |
| Privacy of outsourced k-means clustering D Liu, E Bertino, X Yi Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 122 | 2014 |
| Towards secure big data analytic for cloud-enabled applications with fully homomorphic encryption A Alabdulatif, I Khalil, X Yi Journal of Parallel and Distributed Computing 137, 192-204, 2020 | 114 | 2020 |
| Practical k nearest neighbor queries with location privacy X Yi, R Paulet, E Bertino, V Varadharajan 2014 IEEE 30th international conference on data engineering, 640-651, 2014 | 111 | 2014 |
| Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy X Yi, Y Ye IEEE Transactions on Knowledge and Data Engineering 15 (4), 1054-1055, 2003 | 110 | 2003 |
| Blockchain-based federated learning with SMPC model verification against poisoning attack for healthcare systems AP Kalapaaking, I Khalil, X Yi IEEE Transactions on Emerging Topics in Computing 12 (1), 269-280, 2023 | 105 | 2023 |
| Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities X Yang, X Yi, S Nepal, A Kelarev, F Han Future Generation Computer Systems 112, 859-874, 2020 | 105 | 2020 |