Jiawei Yuan
Jiawei Yuan
Associate Professor of CS
Verified email at
Cited by
Cited by
Privacy preserving back-propagation neural network learning made practical with cloud computing
J Yuan, S Yu
IEEE Transactions on Parallel and Distributed Systems 25 (1), 212-221, 2014
Secure and constant cost public cloud storage auditing with deduplication
J Yuan, S Yu
2013 IEEE Conference on Communications and Network Security (CNS), 145-153, 2013
BANA: Body area network authentication exploiting channel characteristics
L Shi, M Li, S Yu, J Yuan
Proceedings of the fifth ACM conference on security and privacy in wireless …, 2012
Proofs of retrievability with public verifiability and constant communication cost in cloud
J Yuan, S Yu
Proceedings of the 2013 international workshop on Security in cloud …, 2013
Public Integrity Auditing for Dynamic Data Sharing with Multi-User Modification
J Yuan, S Yu
Information Forensics and Security, IEEE Transactions on 10 (8), 1717 - 1726, 2015
Efficient public integrity checking for cloud data sharing with multi-user modification
J Yuan, S Yu
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 2121-2129, 2014
Efficient privacy-preserving biometric identification in cloud computing
J Yuan, S Yu
2013 Proceedings IEEE INFOCOM, 2652-2660, 2013
Mining Twitter to assess the public perception of the “Internet of Things”
J Bian, K Yoshigoe, A Hicks, J Yuan, Z He, M Xie, Y Guo, M Prosperi, ...
PloS one 11 (7), e0158450, 2016
ASK-BAN: Authenticated secret key extraction utilizing channel characteristics for body area networks
L Shi, J Yuan, S Yu, M Li
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
SEISA: Secure and efficient encrypted image search with access control
J Yuan, S Yu, L Guo
2015 IEEE conference on computer communications (INFOCOM), 2083-2091, 2015
Efficient privacy-preserving authentication framework for edge-assisted Internet of Drones
Y Tian, J Yuan, H Song
Journal of Information Security and Applications 48, 102354, 2019
MASK-BAN: Movement-aided authenticated secret key extraction utilizing channel characteristics in body area networks
L Shi, J Yuan, S Yu, M Li
IEEE Internet of Things Journal 2 (1), 52-62, 2015
Practical privacy-preserving mapreduce based k-means clustering over large-scale dataset
J Yuan, Y Tian
IEEE transactions on cloud computing 7 (2), 568-579, 2017
Examining healthcare utilization patterns of elderly and middle-aged adults in the United States
CE Zayas, Z He, J Yuan, M Maldonado-Molina, W Hogan, F Modave, ...
The Twenty-Ninth International Flairs Conference, 2016
Workload-aware task placement in edge-assisted human re-identification
A Acharya, Y Hou, Y Mao, M Xian, J Yuan
2019 16th Annual IEEE International Conference on Sensing, Communication …, 2019
Towards a privacy preserving cohort discovery framework for clinical research networks
J Yuan, B Malin, F Modave, Y Guo, WR Hogan, E Shenkman, J Bian
Journal of biomedical informatics 66, 42-51, 2017
Flexible and publicly verifiable aggregation query for outsourced databases in cloud
J Yuan, S Yu
2013 IEEE Conference on Communications and Network Security (CNS), 520-524, 2013
Edge-assisted image processing with joint optimization of responding and placement strategy
A Acharya, Y Hou, Y Mao, J Yuan
2019 International Conference on Internet of Things (iThings) and IEEE Green …, 2019
Pcpor: public and constant-cost proofs of retrievability in cloud1
J Yuan, S Yu
Journal of Computer Security 23 (3), 403-425, 2015
CLARA: an integrated clinical research administration system
J Bian, M Xie, W Hogan, L Hutchins, U Topaloglu, C Lane, J Holland, ...
Journal of the American Medical Informatics Association 21 (e2), e369-e373, 2014
The system can't perform the operation now. Try again later.
Articles 1–20