default search action
Shibin Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j34]Desheng Zheng, Wuping Ke, Xiaoyu Li, Shibin Zhang, Guangqiang Yin, Weizhong Qian, Yong Zhou, Fan Min, Shan Yang:
Channel-augmented joint transformation for transferable adversarial attacks. Appl. Intell. 54(11-12): 428-442 (2024) - [j33]Min Hou, Yue Wu, Shibin Zhang:
Efficient Quantum Private Comparison Based on GHZ States. Entropy 26(5): 413 (2024) - [j32]Min Hou, Yue Wu, Shibin Zhang:
New Quantum Private Comparison Using Four-Particle Cluster State. Entropy 26(6): 512 (2024) - [j31]Yiran Li, Shibin Zhang, Yan Chang, Guowen Xu, Hongwei Li:
Privacy-Preserving and Poisoning-Defending Federated Learning in Fog Computing. IEEE Internet Things J. 11(3): 5063-5077 (2024) - [j30]Zhi Qin, Enyang Liu, Shibin Zhang, Yan Chang, Lili Yan:
A relational extraction approach based on multiple embedding representations and multi-head self-attention. J. Intell. Fuzzy Syst. 46(3): 7093-7107 (2024) - [j29]Chenyi Huang, Shibin Zhang:
Adversarial examples detection based on quantum fuzzy convolution neural network. Quantum Inf. Process. 23(4): 143 (2024) - [j28]Lin Zeng, Yan Chang, XueJian Zhang, Weifeng Xue, Shibin Zhang, Lili Yan:
Cryptographic enhancement of image data security through quantum-classical hybrid encryption with parameterized pixel ratios. Quantum Inf. Process. 23(7): 244 (2024) - [j27]Sha Xie, Lili Yan, Shibin Zhang, Yan Chang, Zhiying Lv:
Blockchain data sharing scheme based on quantum re-encryption. Quantum Inf. Process. 23(8): 285 (2024) - [j26]Zhenyi Wang, Haizi Wang, Shibin Zhang, Shuai Qiu:
Shipment lead time hedging and coordination in prefabricated construction supply chain. RAIRO Oper. Res. 58(3): 2143-2166 (2024) - 2023
- [j25]Xi Huang, Shibin Zhang, Chen Lin, Jinyue Xia:
Quantum Fuzzy Support Vector Machine for Binary Classification. Comput. Syst. Sci. Eng. 45(3): 2783-2794 (2023) - [j24]Xi Huang, Wenfang Zhang, Shibin Zhang:
Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption. Quantum Inf. Process. 22(7): 272 (2023) - 2022
- [j23]Shibin Zhang:
Automatic estimation of spatial spectra via smoothing splines. Comput. Stat. 37(2): 565-590 (2022) - [c17]Qiulu Jiang, Wunan Wan, Zhi Qin, Jinquan Zhang, Hui Han, Shibin Zhang, Jinyue Xia:
Blockchain-Based Efficient Incentive Mechanism in Crowdsensing. ICAIS (3) 2022: 120-132 - [c16]Huailin Pu, Wunan Wan, Zhi Qin, Jinquan Zhang, Qiulu Jiang, Shibin Zhang, Jinyue Xia:
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios. ICAIS (3) 2022: 133-143 - [c15]Zhe Li, Zhiwei Sheng, Wunan Wan, Shibin Zhang, Zhi Qin, Jinquan Zhang, Jinyue Xia:
Blockchain Cross-Chain Research Based on Verifiable Ring Signatures. ICAIS (3) 2022: 171-183 - [c14]Min Hou, Shibin Zhang, Jinyue Xia:
Quantum Fuzzy K-Means Algorithm Based on Fuzzy Theory. ICAIS (1) 2022: 348-356 - [c13]Xiaolei Liu, Xiaoyu Li, Desheng Zheng, Jiayu Bai, Yu Peng, Shibin Zhang:
Automatic Selection Attacks Framework for Hard Label Black-Box Models. INFOCOM Workshops 2022: 1-7 - 2021
- [j22]Wunan Wan, Jun Chen, Jinyue Xia, Jinquan Zhang, Shibin Zhang, Hao Chen:
Clustering Collision Power Attack on RSA-CRT. Comput. Syst. Sci. Eng. 36(2): 417-434 (2021) - [j21]Xizi Peng, Jinquan Zhang, Shibin Zhang, Wunan Wan, Hao Chen, Jinyue Xia:
A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain. Comput. Syst. Sci. Eng. 37(2): 265-281 (2021) - [j20]Xiang Gao, Jia Yu, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. Inf. Sci. 546: 177-191 (2021) - [j19]Jiazhong Lu, Weisha Zhang, Ziye Deng, Shibin Zhang, Yan Chang, Xiaolei Liu:
Research on information steganography based on network data stream. Neural Comput. Appl. 33(3): 851-866 (2021) - [j18]Lili Yan, Shibin Zhang, Yan Chang, GuoGen Wan, Fan Yang:
Semi-quantum private comparison protocol with three-particle G-like states. Quantum Inf. Process. 20(1): 17 (2021) - [c12]Xi Huang, Shibin Zhang, Wen Cheng:
Quantum Private Comparison Based on GHZ-type States. AFRICON 2021: 1-4 - 2020
- [j17]Shibin Zhang:
Nonparametric Bayesian inference for the spectral density based on irregularly spaced data. Comput. Stat. Data Anal. 151: 107019 (2020) - [j16]Min Yang, Shibin Zhang, Yang Zhao, Qirun Wang:
Dynamic negotiation of user behaviour via blockchain technology in federated system. Int. J. Comput. Sci. Eng. 22(1): 74-83 (2020) - [j15]Jinqiao Dai, Shibin Zhang, Jinyue Xia:
A multi-group e-commerce signature scheme based on quantum teleportation. Int. J. Comput. Sci. Eng. 22(2/3): 243-251 (2020) - [j14]Min Yang, Shibin Zhang, Hang Zhang, Jinyue Xia:
Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371. J. Inf. Secur. Appl. 50 (2020) - [j13]Xue-Yang Li, Yan Chang, Shibin Zhang:
Quantum Secret Sharing Scheme with Credible Authentication based on Quantum Walk. KSII Trans. Internet Inf. Syst. 14(7): 3116-3133 (2020) - [j12]Zheng Tao, Yan Chang, Shibin Zhang:
Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states. Quantum Inf. Process. 19(5): 163 (2020) - [j11]Jiazhong Lu, Xiaolei Liu, Shibin Zhang, Yan Chang:
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning. Secur. Commun. Networks 2020: 6641844:1-6641844:13 (2020) - [c11]Chen Yang, GuoGen Wan, Peilin He, Yuanyuan Huang, Shibin Zhang:
User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process. ICAIS (2) 2020: 18-29 - [c10]Jinqiao Dai, Shibin Zhang, Yan Chang, Xueyang Li, Tao Zheng:
A Semi-quantum Group Signature Scheme Based on Bell States. ICAIS (2) 2020: 246-257 - [c9]Peilin He, Yuanyuan Huang, Jialing Dai, Shibin Zhang:
An Improved Quantum Identity Authentication Protocol for Multi-party Secure Communication. ICAIS (2) 2020: 258-266 - [c8]Xue-Yang Li, Yan Chang, Shibin Zhang:
Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States. ICAIS (2) 2020: 280-288 - [c7]Zheng Tao, Shibin Zhang, Yan Chang, Lili Yan:
A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States. ICAIS (2) 2020: 289-297 - [c6]Jianchao Gan, Zhiwei Sheng, Shibin Zhang, Yang Zhao:
Design and Implementation of Heterogeneous Identity Alliance Risk Assessment System. ICAIS (2) 2020: 307-317 - [c5]Xizi Peng, Jinquan Zhang, Shibin Zhang:
A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average. ICAIS (2) 2020: 328-340
2010 – 2019
- 2019
- [j10]Shibin Zhang:
Bayesian copula spectral analysis for stationary time series. Comput. Stat. Data Anal. 133: 166-179 (2019) - [j9]Lili Yan, Yan Chang, Shibin Zhang:
An efficiency batch authentication scheme for smart grid using binary authentication tree. Int. Arab J. Inf. Technol. 16(3): 435-441 (2019) - [j8]Min Yang, Shibin Zhang, Hang Zhang, Jinyue Xia:
A new user behavior evaluation method in online social network. J. Inf. Secur. Appl. 47: 217-222 (2019) - [c4]Zheng Tao, Xiang Gao, Shibin Zhang, Yan Chang, Jinyue Xia:
Multi-function Quantum Cryptography Protocol Based on Bell State. ICAIS (4) 2019: 110-119 - [c3]Jinquan Zhang, Xizi Peng, Shibin Zhang:
Robust Audio Watermarking Algorithm Based on Moving Average and DCT. ICAIS (3) 2019: 419-429 - [c2]Jing Zhao, Chenchen Liu, Zhengyu Zhang, Shibin Zhang, Ming Zhao:
Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay Systems. ITNAC 2019: 1-6 - 2018
- [j7]Lili Yan, YuHua Sun, Yan Chang, Shibin Zhang, GuoGen Wan, Zhiwei Sheng:
Semi-quantum protocol for deterministic secure quantum communication using Bell states. Quantum Inf. Process. 17(11): 315 (2018) - [j6]Xiaowen Zheng, Yanfeng Wang, Meng Jiang, Shibin Zhang:
Numerical Simulation of Interior Turbulent Flow Regulation of Wet Submersible Motor. Wirel. Pers. Commun. 102(2): 1443-1459 (2018) - [c1]Ning Liu, Min Yang, Hang Zhang, Chen Yang, Yang Zhao, Jianchao Gan, Shibin Zhang:
Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning Algorithm. ICCCS (5) 2018: 266-275 - 2017
- [j5]Lili Yan, Yan Chang, Shibin Zhang:
A lightweight authentication and key agreement scheme for smart grid. Int. J. Distributed Sens. Networks 13(2) (2017) - [j4]Lili Yan, Yan Chang, Shibin Zhang:
Comments on 'An improved authentication scheme for mobile satellite communication systems'. Int. J. Electron. Secur. Digit. Forensics 9(4): 396-406 (2017) - [j3]Yan Chang, Shibin Zhang, Jing-Min Zhu:
Comment on "flexible protocol for quantum private query based on B92 protocol". Quantum Inf. Process. 16(3): 86 (2017) - 2016
- [j2]Shibin Zhang:
Adaptive spectral estimation for nonstationary multivariate time series. Comput. Stat. Data Anal. 103: 330-349 (2016) - [j1]Yan Chang, Shibin Zhang, Guihua Han, Zhiwei Sheng, Lili Yan, Jinxin Xiong:
Quantum Private Query Protocol Based on Two Non-Orthogonal States. Entropy 18(5): 163 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint