


default search action
En Zhang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Jinkai Zhang, Wenming Ma
, En Zhang, Xuchen Xia:
Time-Aware Dual LSTM Neural Network with Similarity Graph Learning for Remote Sensing Service Recommendation. Sensors 24(4): 1185 (2024) - 2023
- [j27]Tenghui Wang
, Lili Wang, En Zhang, Yan Ma, Yapeng Wang
, Haijun Xie, Mingchao Zhu:
Underwater Image Enhancement Based on Optimal Contrast and Attenuation Difference. IEEE Access 11: 68538-68549 (2023) - [j26]Chunhong Liu, Jieyu Zhang, Haoyang Zhang, Xiaoniu Li, En Zhang:
Group Cooperative Teaching Design With Knowledge Graphs in Project-Driven Learning. Int. J. Inf. Commun. Technol. Educ. 19(1): 1-11 (2023) - [j25]En Zhang, Zihao Nie, Qiang Yang
, Yiqiao Wang, Dong Liu, Sang-Woon Jeon
, Jun Zhang:
Heterogeneous cognitive learning particle swarm optimization for large-scale optimization problems. Inf. Sci. 633: 321-342 (2023) - [j24]Yu Wu, Jing Feng, Guang Hu
, En Zhang, Huan-Huan Yu:
Colorimetric Sensors for Chemical and Biological Sensing Applications. Sensors 23(5): 2749 (2023) - [j23]Peiyan Yuan
, Rong Huang
, Junna Zhang, En Zhang, Xiaoyan Zhao
:
Accuracy Rate Maximization in Edge Federated Learning With Delay and Energy Constraints. IEEE Syst. J. 17(2): 2053-2064 (2023) - [c14]Feng-Hao Liu
, En Zhang
, Leiyong Qin
:
Efficient Multiparty Probabilistic Threshold Private Set Intersection. CCS 2023: 2188-2201 - [c13]En Zhang, Fan Wu, Xuesong Lu:
An Intelligent Scheduling System for Large-Scale Online Judging. ICCSE (1) 2023: 265-279 - [c12]Han-Yang Pan, Qiang Yang, Ming Li, En Zhang, Yuan-Yuan Ma, Tao Li, Dong Liu, Jun Zhang:
Stochastic Dominant Cognitive Experience Guided Particle Swarm Optimization. SMC 2023: 5237-5242 - 2022
- [j22]En Zhang, Huimin Li, Yuchen Huang, Shuangxi Hong, Le Zhao, Congmin Ji:
Practical multi-party private collaborative k-means clustering. Neurocomputing 467: 256-265 (2022) - [j21]Lin Sun
, Mengmeng Li, Weiping Ding
, En Zhang, Xiaoxia Mu, Jiucheng Xu:
AFNFS: Adaptive fuzzy neighborhood-based feature selection with adaptive synthetic over-sampling for imbalanced data. Inf. Sci. 612: 724-744 (2022) - [j20]Xintao Duan
, Lei Li
, Yao Su, Wenxin Wang
, En Zhang
, Xianfang Wang:
DIGDH: A Novel Framework of Difference Image Grafting Deep Hiding for Image Data Hiding. Symmetry 14(1): 151 (2022) - [c11]Siqi Han, Wanting Li, En Zhang, Jilin Shi, Wei Wang, Xuesong Lu:
MLadder: An Online Training System for Machine Learning and Data Science Education. CIKM 2022: 4862-4866 - [c10]Feiyu Wang, Lili Wang, Wulong Yu, Fan Xia, En Zhang, Binghua Su:
Research on the Teaching of Music Education in Colleges and Universities Under the Reflective Teaching Dimension. ICIEI 2022: 77-83 - [c9]Dongxia Wang, En Zhang, Xuesong Lu:
Automatic Grading of Student Code with Similarity Measurement. ECML/PKDD (6) 2022: 286-301 - [c8]Zihao Nie, Qiang Yang, En Zhang, Dong Liu, Jun Zhang:
Ant Colony optimization for Electric Vehicle Routing Problem with Capacity and Charging Time Constraints. SMC 2022: 480-485 - 2021
- [j19]En Zhang
, Jian Chang
, Yu Li
:
Efficient Threshold Private Set Intersection. IEEE Access 9: 6560-6570 (2021) - [j18]Xintao Duan, Baoxia Li, Daidou Guo, Kai Jia, En Zhang, Chuan Qin
:
Coverless Information Hiding Based on WGAN-GP Model. Int. J. Digit. Crime Forensics 13(4): 57-70 (2021) - [j17]En Zhang
, Ming Li
, Siu-Ming Yiu, Jiao Du
, Jun-Zhe Zhu, Ganggang Jin:
Fair hierarchical secret sharing scheme based on smart contract. Inf. Sci. 546: 166-176 (2021) - [j16]En Zhang
, Yingying Hou
, Gongli Li:
A lattice-based searchable encryption scheme with the validity period control of files. Multim. Tools Appl. 80(3): 4655-4672 (2021) - [c7]Liwei Shao, Lei La, En Zhang, Honglei Hua:
Topic Model based Ensemble Learning for Rating Prediction and Its Application. BCD 2021: 2-7 - [c6]Lei La, Liwei Shao, En Zhang, Honglei Hua:
Covid-19 Related Topic Detection in Catering Industry with Online Review and Embedding. BCD 2021: 60-65 - [c5]Feiyu Wang, Wei Cao, Rong Liao, Baoqing Song
, En Zhang, Binghua Su:
Research on Music Education and Teaching in Colleges and Universities under the Dimension of Aesthetic Intersubjectivity. ICFET 2021: 60-70 - 2020
- [j15]Haiju Fan, Kanglei Zhou
, En Zhang, Wenying Wen, Ming Li
:
Subdata image encryption scheme based on compressive sensing and vector quantization. Neural Comput. Appl. 32(16): 12771-12787 (2020)
2010 – 2019
- 2019
- [j14]Xintao Duan
, Kai Jia, Baoxia Li, Daidou Guo, En Zhang
, Chuan Qin
:
Reversible Image Steganography Scheme Based on a U-Net Structure. IEEE Access 7: 9314-9323 (2019) - [j13]Peiyan Yuan
, Xiaoxiao Pang
, Ping Liu, En Zhang:
FollowMe: One Social Importance-Based Collaborative Scheme in MONs. Future Internet 11(4): 98 (2019) - [j12]Xintao Duan
, Jingjing Liu, En Zhang:
Efficient image encryption and compression based on a VAE generative model. J. Real Time Image Process. 16(3): 765-773 (2019) - [j11]Ze Zhao, Pengcheng Chen, En Zhang, Guoyun Lu
:
Health Monitoring of Bolt Looseness in Timber Structures Using PZT-Enabled Time-Reversal Method. J. Sensors 2019: 2801638:1-2801638:8 (2019) - [j10]En Zhang
, Jun-Zhe Zhu, Gong-Li Li, Jian Chang, Yu Li:
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation. Secur. Commun. Networks 2019: 6989383:1-6989383:8 (2019) - [c4]En Zhang, Feng-Hao Liu, Qiqi Lai, Ganggang Jin, Yu Li:
Efficient Multi-Party Private Set Intersection Against Malicious Adversaries. CCSW 2019: 93-104 - [c3]Ying Lei, En Zhang:
Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era. DPTA 2019: 1613-1619 - 2018
- [j9]En Zhang, Jie Peng, Ming Li:
Outsourcing secret sharing scheme based on homomorphism encryption. IET Inf. Secur. 12(1): 94-99 (2018) - [j8]Ming Li
, Hua Ren
, En Zhang
, Wei Wang
, Lin Sun
, Di Xiao
:
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. Secur. Commun. Networks 2018: 4313769:1-4313769:11 (2018) - [j7]Haiju Fan, Ming Li, Dong Liu, En Zhang:
Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter. Signal Process. 143: 28-41 (2018) - [j6]Ye Li
, Zoe Lin Jiang
, Xuan Wang
, Jun-bin Fang, En Zhang
, Xianmin Wang
:
Securely Outsourcing ID3 Decision Tree in Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 2385150:1-2385150:10 (2018) - [c2]Xintao Duan, Jingjing Liu, En Zhang, Haoxian Song, Kai Jia:
Image Encryption and Compression Based on a VAE Generative Model. ICCCS (3) 2018: 79-89 - [c1]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - 2017
- [j5]Peiyan Yuan, Shangwang Liu, En Zhang:
Modelling epidemic routing with heterogeneous infection rate. Int. J. High Perform. Comput. Netw. 10(3): 218-225 (2017) - [j4]En Zhang
, Fenghua Li, Ben Niu, Yanchao Wang:
Server-aided private set intersection based on reputation. Inf. Sci. 387: 180-194 (2017) - [i1]Xintao Duan, Haoxian Song, En Zhang, Jingjing Liu:
Image camouflage based on Generate Model. CoRR abs/1710.07782 (2017) - 2015
- [j3]En Zhang, Quandang Sun, Yapeng Liu:
抗合谋理性多秘密共享方案 (Collusion-free Rational Multi-secret Sharing Scheme). 计算机科学 42(10): 164-169 (2015) - [j2]En Zhang
, Peiyan Yuan
, Jiao Du
:
Verifiable Rational Secret Sharing Scheme in Mobile Networks. Mob. Inf. Syst. 2015: 462345:1-462345:7 (2015) - 2013
- [j1]En Zhang, Yongquan Cai:
Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks. Int. J. Found. Comput. Sci. 24(6): 879-898 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint