Optimal parameter settings for bat algorithm F Xue, Y Cai, Y Cao, Z Cui, F Li International Journal of Bio-Inspired Computation 7 (2), 125-128, 2015 | 79 | 2015 |
A survey on quantum image processing Y Cai, X Lu, N Jiang Chinese Journal of Electronics 27 (4), 718-727, 2018 | 44 | 2018 |
A novel quantum image compression method based on JPEG N Jiang, X Lu, H Hu, Y Dang, Y Cai International Journal of Theoretical Physics 57, 611-636, 2018 | 35 | 2018 |
Information hiding: Arabic text steganography by using Unicode characters to hide secret data A Ditta, C Yongquan, M Azeem, KG Rana, H Yu, MQ Memon International Journal of Electronic Security and Digital Forensics 10 (1), 61-78, 2018 | 23 | 2018 |
Efficient and secure identity-based public auditing for dynamic outsourced data with proxy H Yu, Y Cai, S Kong, Z Ning, F Xue, H Zhong KSII Transactions on Internet and Information Systems (TIIS) 11 (10), 5039-5061, 2017 | 19 | 2017 |
Secure self-healing group key distribution scheme with constant storage for SCADA systems in smart grid TJ Tsitaitse, Y Cai, A Ditta Wireless Personal Communications 101, 1749-1763, 2018 | 12 | 2018 |
Public-key cryptosystem based on conic curve in finite field GF (2 (n)). YQ Cai, L Zhao, YY Jin Dianzi Xuebao(Acta Electronica Sinica) 34 (8), 1464-1468, 2006 | 11 | 2006 |
Rational secret sharing protocol with fairness Y Cai, X Peng Chinese Journal of Electronics 21 (1), 149-152, 2012 | 10 | 2012 |
A novel identity-based threshold signature Y Cai, XD Zhang, N Jiang Acta Electronica Sinica 37 (4S1), 102-105, 2009 | 10 | 2009 |
Identity-based conference key distribution protocol with user anonymity C Yongquan, W Yali Chinese Journal of Electronics 16 (1), 179-181, 2007 | 10 | 2007 |
A new rational secret sharing E Zhang, YQ Cai China Communications 7 (4), 18-22, 2010 | 9 | 2010 |
ID‐based dynamic replicated data auditing for the cloud H Yu, Y Cai, RO Sinnott, Z Yang Concurrency and Computation: Practice and Experience 31 (11), e5051, 2019 | 8 | 2019 |
A verifiable rational secret sharing scheme based on bilinear pairing E ZHANG, Y CAI Acta Electronica Sinica 40 (5), 1050-1054, 2012 | 8 | 2012 |
A cheat-proof rational secret sharing scheme Y Cai, X Ren Journal of Computational Information Systems 7 (1), 88-96, 2011 | 8 | 2011 |
The banknote anti-forgery system based on digital signature algorithms S Su, Y Cai, C Shen Intelligence and Security Informatics: IEEE ISI 2008 International Workshops …, 2008 | 8 | 2008 |
Research on parallelisation of collaborative filtering recommendation algorithm based on Spark Y Yang, Z Ning, Y Cai, P Liang, H Liu International Journal of Wireless and Mobile Computing 14 (4), 312-319, 2018 | 7 | 2018 |
Using different techniques of steganography deducting null cipher in plain text A Ditta, C Yongquan, KG Rana, K Shanshan, M Azeem, T Jean International Journal of Wireless and Mobile Computing 9 (4), 317-324, 2015 | 7 | 2015 |
Rational multi-secret sharing scheme in standard point-to-point communication networks E Zhang, Y Cai International Journal of Foundations of Computer Science 24 (06), 879-897, 2013 | 7 | 2013 |
Rational secure two-party computation protocol E ZHANG, YQ CAI Journal of Computer Research and Development 50 (7), 1409-1417, 2013 | 7 | 2013 |
Wireless ad hoc network: detection of malicious node by using neighbour-based authentication approach KG Rana, C Yongquan, M Azeem, A Ditta, H Yu, SA Khuhro International Journal of Wireless and Mobile Computing 14 (1), 16-24, 2018 | 6 | 2018 |