[1]. Qi Feng, Debiao He, Zhe Liu, Huaqun Wang, and Kim-Kwang Raymond Choo, SecureNLP: A system for multi-party privacy-preserving natural language processing, IEEE Transactions on Information Forensics and Security (SCI, CCF A), DOI: 10.1109/TIFS.2020.2997134, 2020.
[2]. Chao Lin, Debiao He, Zeadally Sherali, Xinyi Huang, Zhe Liu, Blockchain-based data sharing system for sensing-as-a-service in smart cities, ACM Transactions on Internet Technology (SCI), DOI: 10.1145/3397202, 2020.
[3]. Cong Peng, Debiao He, Jianhua Chen, Neeraj Kumar, Muhammad Khurram Khan, EPRT: An efficient privacy-preserving medical service recommendation and trust discovery scheme, ACM Transactions on Internet Technology (SCI), DOI: 10.1145/3397678, 2020.
[4]. Huaqun Wang, Debiao He, Zhe Liu, Rui Guo, Blockchain-based anonymous reporting scheme with anonymous rewarding, IEEE Transactions on Engineering Management (SCI), DOI: 10.1109/TEM.2019.2909529, 2019.
[5]. Huaqun Wang, Debiao He, Anmin Fu, Qi Li, Qihua Wang, Provable data possession with outsourced data transfer, IEEE Transactions on Services Computing (SCI), DOI: 10.1109/TSC.2019.2892095, 2019.
[6]. Debiao He, Yudi Zhang, Ding Wang, Kim-Kwang Raymond Choo, Secure and efficient two-party signing protocol for the identity-based signature scheme in the IEEE P1363 standard for public key cryptography, IEEE Transactions on Dependable and Secure Computing (CCF-A, SCI), DOI: 10.1109/TDSC.2018.2857775, 2018.
[7]. Huaqun Wang, Debiao He, Jinguang Han, VOD-ADAC: Anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud, IEEE Transactions on Services Computing (SCI), DOI: 10.1109/TSC.2017.2687459, 2017.
[8]. Chao Lin, Debiao He, Xinyi Huang, Muhammad Khurram Khan and Kim-Kwang Raymond Choo, DCAP: A secure and efficient decentralized conditional anonymous payment system based on blockchain, IEEE Transactions on Information Forensics and Security (SCI, CCF A), vol. 15, no. 1, pp. 2440-2452, 2020.
[9]. Qi Feng, Debiao He, Sherali Zeadally, Kaitai Liang, BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad-hoc networks, IEEE Transactions on Industrial Informatics, vol. 16, no. 6, pp. 4146 - 4155, 2020.
[10]. Huaqun Wang, Debiao He, Jia Yu, Zhiwei Wang, Incentive and unconditionally anonymous identity-based public provable data possession, IEEE Transactions on Services Computing (SCI, CCF-B), vol. 12, no. 5, pp. 824-835, 2019.
[11]. Debiao He, Neeraj Kumar, Huaqun Wang, Lina Wang, Kim-Kwang Raymond Choo, Alexey Vinel, A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network, IEEE Transactions on Dependable and Secure Computing (SCI, CCF-A), vol. 15, no. 4. pp. 633-645, 2018.
[12]. Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang, Certificateless provable data possession scheme for cloud-based smart grid data management systems, IEEE Transactions on Industrial Informatics (SCI), vol. 14, no. 3, pp. 1232-1241, 2018.
[13]. Debiao He, Mimi Ma, Sherali Zeadally, Neeraj Kumar, Kaitai Liang, Certificateless public key authenticated encryption with keyword search for industrial internet of things, IEEE Transaction on Industrial Informatics (SCI), vol. 14, no. 8, pp. 3618-3627, 2018.
[14]. Mimi Ma, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Jianhua Chen, Certificateless searchable public key encryption scheme for industrial internet of things, IEEE Transactions on Industrial Informatics (SCI), vol. 14, no. 2, pp. 759-767.
[15]. Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey Vinel, and Laurence T Yang, Efficient and privacy-preserving data aggregation scheme for smart grid against internal adversaries, IEEE Transactions on Smart Grid (SCI), vol. 8, no. 5, pp. 2411-2419, 2017.
[16]. Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Wei Wu, Efficient hierarchical identity-based signature with batch verification for automatic dependent surveillance-broadcast system, IEEE Transactions on Information Forensics and Security, vol. 12, no. 2, pp. 454-464, 2017.
[17]. Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu, Efficient and anonymous mobile user authentication protocol using self-certified public key cryptography for multi-server architectures, IEEE Transactions on Information Forensics & Security (SCI, CCF-A), vol. 11, no. 9, pp. 2052-2064, 2016.
[18]. Huaqun Wang, Debiao He, Shaohua Tang, Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud, IEEE Transactions on Information Forensics & Security (SCI, CCF-A), vol. 11, no. 6, pp. 1165- 1176, 2016.
[19]. Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang, An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad-hoc networks, IEEE Transactions on Information Forensics and Security (SCI, CCF-A), vol. 10, no. 12, pp. 1681-2691, 2015.
[20]. Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu. Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment, IEEE Transactions on Dependable and Secure Computing (SCI, CCF-A), vol. 12, no. 4, pp. 428-442, 2015.
DBLP: http://dblp.uni-trier.de/pers/hd/h/He:Debiao
Google Scholar: https://scholar.google.ca/citations?user=-ykV7IQAAAAJ&hl=en