Multi-key privacy-preserving deep learning in cloud computing P Li, J Li, Z Huang, T Li, CZ Gao, SM Yiu, K Chen Future Generation Computer Systems 74, 76-85, 2017 | 478 | 2017 |
Privacy-preserving outsourced classification in cloud computing P Li, J Li, Z Huang, CZ Gao, WB Chen, K Chen Cluster Computing 21, 277-286, 2018 | 357 | 2018 |
Global synchronization in arrays of delayed neural networks with constant and delayed coupling J Cao, P Li, W Wang Physics Letters A 353 (4), 318-325, 2006 | 333 | 2006 |
Differentially private Naive Bayes learning over multiple data sources T Li, J Li, Z Liu, P Li, C Jia Information Sciences 444, 89-104, 2018 | 226 | 2018 |
Robust impulsive synchronization of coupled delayed neural networks with uncertainties P Li, J Cao, Z Wang Physica A: Statistical Mechanics and its Applications 373, 261-272, 2007 | 210 | 2007 |
Assessment of robotic versus laparoscopic distal gastrectomy for gastric cancer: a randomized controlled trial J Lu, CH Zheng, BB Xu, JW Xie, JB Wang, JX Lin, QY Chen, LL Cao, ... Annals of surgery 273 (5), 858-867, 2021 | 149 | 2021 |
A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map P Li, Z Li, WA Halang, G Chen Physics Letters A 349 (6), 467-473, 2006 | 132 | 2006 |
Verifiable searchable encryption with aggregate keys for data sharing system Z Liu, T Li, P Li, C Jia, J Li Future Generation Computer Systems 78, 778-788, 2018 | 125 | 2018 |
A stream cipher based on a spatiotemporal chaotic system P Li, Z Li, WA Halang, G Chen Chaos, Solitons & Fractals 32 (5), 1867-1876, 2007 | 119 | 2007 |
Privacy-preserving machine learning with multiple data providers YX P Li, T Li, H Ye, J Li, X Chen Future Generation Computer Systems, 2018 | 101 | 2018 |
New directly revocable attribute-based encryption scheme and its application in cloud storage environment H Wang, Z Zheng, L Wu, P Li Cluster Computing 20, 2385-2392, 2017 | 101 | 2017 |
Roles of Hsp70s in stress responses of microorganisms, plants, and animals A Yu, P Li, T Tang, J Wang, Y Chen, L Liu BioMed research international 2015, 2015 | 92 | 2015 |
Generating stable biometric keys for flexible cloud computing authentication using finger vein Z Wu, L Tian, P Li, T Wu, M Jiang, C Wu Information Sciences 433, 431-447, 2018 | 88 | 2018 |
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice Y Zhang, J Li, D Zheng, P Li, Y Tian Journal of Network and Computer Applications 122, 50-60, 2018 | 84 | 2018 |
Towards secure and flexible EHR sharing in mobile health cloud under static assumptions Z Cai, H Yan, P Li, Z Huang, C Gao Cluster Computing 20, 2415-2422, 2017 | 84 | 2017 |
Epidemiology and clinical characteristics of patients with glaucoma: an analysis of hospital data between 2003 and 2012 Y Zhao, JL Fu, YL Li, P Li, FL Lou Indian Journal of Ophthalmology 63 (11), 825-831, 2015 | 76 | 2015 |
Stability in static delayed neural networks: a nonlinear measure approach P Li, J Cao Neurocomputing 69 (13-15), 1776-1781, 2006 | 73 | 2006 |
Attention-based convolutional neural network for deep face recognition H Ling, J Wu, J Huang, J Chen, P Li Multimedia Tools and Applications 79, 5595-5616, 2020 | 72 | 2020 |
Outsourced privacy-preserving classification service over encrypted data T Li, Z Huang, P Li, Z Liu, C Jia Journal of Network and Computer Applications 106, 100-110, 2018 | 71 | 2018 |
An immune checkpoint score system for prognostic evaluation and adjuvant chemotherapy selection in gastric cancer JB Wang, P Li, XL Liu, QL Zheng, YB Ma, YJ Zhao, JW Xie, JX Lin, J Lu, ... Nature Communications 11 (1), 6352, 2020 | 69 | 2020 |