default search action
Hua Zhang 0001
- > Home > Persons > Hua Zhang 0001
Publications
- 2023
- [j74]Wenmin Li, Yang Chen, Fei Gao, Shuo Zhang, Hua Zhang, Qiaoyan Wen:
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain. IEEE Internet Things J. 10(14): 12090-12101 (2023) - [j73]Hua Zhang, Kaixuan Li, Teng Huang, Xin Zhang, Wenmin Li, Zhengping Jin, Fei Gao, Minghui Gao:
Publishing locally private high-dimensional synthetic data efficiently. Inf. Sci. 633: 343-356 (2023) - [j71]Haoran Gao, Hua Zhang, Xin Zhang, Wenmin Li, Jiahui Wang, Fei Gao:
Enhanced covertness class discriminative universal adversarial perturbations. Neural Networks 165: 516-526 (2023) - [j70]Hua Zhang, Shaohua Zhao, Ziqing Guo, Qiaoyan Wen, Wenmin Li, Fei Gao:
Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds. IEEE Trans. Cloud Comput. 11(1): 308-323 (2023) - 2022
- [j69]Ping Yu, Wei Ni, Hua Zhang, Ren Ping Liu, Qiaoyan Wen, Wenmin Li, Fei Gao:
Secure and Differentiated Fog-Assisted Data Access for Internet of Things. Comput. J. 65(8): 1948-1963 (2022) - [j67]Shaohua Zhao, Hua Zhang, Xin Zhang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Forward privacy multikeyword ranked search over encrypted database. Int. J. Intell. Syst. 37(10): 7356-7378 (2022) - [j65]Yunping Gong, Fei Gao, Wenmin Li, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
A rORAM scheme with logarithmic bandwidth and logarithmic locality. Int. J. Intell. Syst. 37(10): 8068-8091 (2022) - [j64]Haoran Gao, Hua Zhang, Xingguo Yang, Wenmin Li, Fei Gao, Qiaoyan Wen:
Generating natural adversarial examples with universal perturbations for text classification. Neurocomputing 471: 175-182 (2022) - [j61]Hao Lin, Fei Gao, Hua Zhang, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. IEEE Syst. J. 16(1): 1460-1470 (2022) - [j59]Yang Chen, Wenmin Li, Fei Gao, Qiaoyan Wen, Hua Zhang, Huawei Wang:
Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing. IEEE Trans. Serv. Comput. 15(2): 724-735 (2022) - [j58]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. IEEE Trans. Serv. Comput. 15(4): 1813-1824 (2022) - 2021
- [j53]Hao Lin, Hua Zhang, Hanbing Yan, Huawei Wang, Yijie Shi, Fei Gao, Qiaoyan Wen:
A Secure Online Treatment Blockchain Service. Wirel. Pers. Commun. 117(3): 1773-1795 (2021) - 2020
- [j49]Yang Chen, Wenmin Li, Fei Gao, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Practical Attribute-Based Conjunctive Keyword Search Scheme. Comput. J. 63(8): 1203-1215 (2020) - [j48]Zhidan Li, Wenmin Li, Fei Gao, Ping Yu, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services. Comput. J. 63(12): 1886-1903 (2020) - [j46]Yuanbo Cui, Fei Gao, Wenmin Li, Yijie Shi, Hua Zhang, Qiaoyan Wen, Emmanouil Panaousis:
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services. Sensors 20(16): 4651 (2020) - [j44]Yuanbo Cui, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin:
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network. Soft Comput. 24(2): 965-980 (2020) - [j43]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". IEEE Trans. Inf. Forensics Secur. 15: 2584-2586 (2020) - [j42]Hua Zhang, Boqin Qin, Tengfei Tu, Ziqing Guo, Fei Gao, Qiaoyan Wen:
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications. IEEE Trans. Ind. Informatics 16(1): 658-668 (2020) - [j40]Hua Zhang, Jiawei Qin, Boan Zhang, Hanbing Yan, Jing Guo, Fei Gao, Senmiao Wang, Yangye Hu:
A Multiclass Detection System for Android Malicious Apps Based on Color Image Features. Wirel. Commun. Mob. Comput. 2020: 8882295:1-8882295:21 (2020) - 2019
- [j34]Yang Chen, Wenmin Li, Fei Gao, Wei Yin, Kaitai Liang, Hua Zhang, Qiaoyan Wen:
Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures. Comput. J. 62(12): 1748-1760 (2019) - [j33]Wei Guo, Hua Zhang, Su-Juan Qin, Fei Gao, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener. Comput. Syst. 95: 309-322 (2019) - [i8]Zhidan Li, Wenmin Li, Fei Gao, Wei Yin, Hua Zhang, Qiaoyan Wen, Kaitai Liang:
Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search. IACR Cryptol. ePrint Arch. 2019: 1314 (2019) - 2012
- [c3]Maozhen Ding, Fei Gao, Zhengping Jin, Hua Zhang:
An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings. IC-NIDC 2012: 526-530
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint