Jie Shi
Jie Shi
Security Expert in Huawei Singapore Research Centre
Bestätigte E-Mail-Adresse bei huawei.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Authorized keyword search on encrypted data
J Shi, J Lai, Y Li, RH Deng, J Weng
European symposium on research in computer security, 419-435, 2014
562014
SecTTS: A secure track & trace system for RFID-enabled supply chains
J Shi, Y Li, W He, D Sim
Computers in Industry, 2012
332012
A fine-grained access control model for relational databases
J Shi, H Zhu
Journal of Zhejiang University-Science C 11 (8), 575-586, 2010
292010
SecDS: a secure EPC discovery service system in EPCglobal network
J Shi, D Sim, Y Li, R Deng
Proceedings of the second ACM conference on Data and Application Security …, 2012
252012
Bdpl: A boundary differentially private layer against machine learning model extraction attacks
H Zheng, Q Ye, H Hu, C Fang, J Shi
European Symposium on Research in Computer Security, 66-83, 2019
192019
A Secure and Efficient Discovery Service System in EPCglobal Network
J Shi, Y Li, RH Deng
Computers & Security, 2012
192012
Constructing plausible innocuous pseudo queries to protect user query intention
Z Wu, J Shi, C Lu, E Chen, G Xu, G Li, S Xie, SY Philip
Information Sciences 325, 215-226, 2015
182015
Evaluation of Different Electronic Product Code Discovery Service Models
SM Kywe, J Shi, Y Li, R Kailash
Advances in Internet of Things 2 (2), 37-46, 2012
142012
On the Soundness Property for SQL Queries of Fine-grained Access Control in DBMSs
J Shi, H Zhu, G Fu, T Jiang
Computer and Information Science, 2009. ICIS 2009. Eighth IEEE/ACIS …, 2009
132009
Batch clone detection in RFID-enabled supply chain
J Shi, SM Kywe, Y Li
2014 IEEE International Conference on RFID (IEEE RFID), 118-125, 2014
122014
Fine grained transaction log for data recovery in database systems
G Fu, H Zhu, Y Feng, Y Zhu, J Shi, M Chen, X Wang
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 123-131, 2008
92008
Formal specification and verification of an extended security policy model for database systems
Z Hong, Z Yi, L Chenyang, S Jie, F Ge, W Yuanzhen
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 132-141, 2008
92008
Controlling information leakage of fine-grained access model in dbmss
H Zhu, J Shi, Y Wang, Y Feng
2008 The Ninth International Conference on Web-Age Information Management …, 2008
92008
Dynamic data recovery for database systems based on fine grained transaction log
H Zhu, G Fu, Y Zhu, R Jin, K Lü, J Shi
Proceedings of the 2008 international symposium on Database engineering …, 2008
72008
Lightweight management of authorization update on cloud data
Z Cui, H Zhu, J Shi, L Chi, K Yan
2013 International Conference on Parallel and Distributed Systems, 456-461, 2013
62013
A secure platform for information sharing in epcglobal network
J Shi, Y Li, RH DENG, W He, EW Lee
International Journal of RFID Security and Cryptography 2 (1/4), 107, 2013
62013
Efficient authorisation update on cloud data
Z Cui, H Zhu, J Shi, L Chi, K Yan
International Journal of Web and Grid Services 12 (2), 109-141, 2016
52016
Attack and defense mechanisms of malicious epc event injection in epc discovery service
SM Kywe, Y Li, J Shi
2013 IEEE International Conference on RFID-Technologies and Applications …, 2013
52013
Finding Motifs of Financial Data Streams in Real Time
T Jiang, Y Feng, B Zhang, J Shi, Y Wang
Advances in Computation and Intelligence, 546-555, 2008
52008
Game-theoretic understanding of adversarially learned features
J Ren, D Zhang, Y Wang, L Chen, Z Zhou, X Cheng, X Wang, Y Chen, ...
arXiv preprint arXiv:2103.07364, 2021
42021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20