default search action
Jianbiao Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j22]Yufei Han, Chao Li, Jianbiao Zhang, Yifan Wang, Lehao Yu, Yihao Cao, Hong Shen, Weixing Hou, Hailin Luo:
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem. Comput. Secur. 148: 104158 (2025) - 2024
- [j21]Haoxiang Huang, Jianbiao Zhang, Lei Zhang, Jun Hu, Yihao Cao:
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node. Comput. Secur. 137: 103648 (2024) - [j20]Yihao Cao, Jianbiao Zhang, Yaru Zhao, Pengchong Su, Haoxiang Huang:
SRFL: A Secure & Robust Federated Learning framework for IoT with trusted execution environments. Expert Syst. Appl. 239: 122410 (2024) - [j19]Yaru Zhao, Yihao Cao, Jianbiao Zhang, Haoxiang Huang, Yanhui Liu:
FlexibleFL: Mitigating poisoning attacks with contributions in cloud-edge federated learning systems. Inf. Sci. 664: 120350 (2024) - [j18]Yihao Cao, Jianbiao Zhang, Yaru Zhao, Hong Shen, Haoxiang Huang:
Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models. IEEE Trans. Inf. Forensics Secur. 19: 8845-8859 (2024) - 2023
- [j17]Wanshan Xu, Jianbiao Zhang, Yilin Yuan, Xiao Wang:
Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud. Concurr. Comput. Pract. Exp. 35(9) (2023) - [j16]Naveed Khan, Jianbiao Zhang, Huhnkuk Lim, Jehad Ali, Intikhab Ullah, Muhammad Salman Pathan, Shehzad Ashraf Chaudhry:
An ECC-based mutual data access control protocol for next-generation public cloud. J. Cloud Comput. 12(1): 101 (2023) - [j15]Yaru Zhao, Jianbiao Zhang, Yihao Cao:
Manipulating vulnerability: Poisoning attacks and countermeasures in federated cloud-edge-client learning for image classification. Knowl. Based Syst. 259: 110072 (2023) - [c9]Jianhui Huang, Changxiang Shen, Jianbiao Zhang, Liang Wang, Ruqian Li:
A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM. ICCNS 2023: 88-93 - [c8]Nadeem Yaqub, Jianbiao Zhang, Weiru Wang:
Enhancing Security and Privacy in Healthcare: A Conceptual Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2023: 188-195 - 2022
- [j14]Yilin Yuan, Jianbiao Zhang, Wanshan Xu, Zheng Li:
Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system. Concurr. Comput. Pract. Exp. 34(10) (2022) - [j13]Zhaoqian Zhang, Jianbiao Zhang, Yilin Yuan, Zheng Li:
An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain. IEEE Internet Things J. 9(11): 8681-8692 (2022) - [j12]Wanshan Xu, Jianbiao Zhang, Yilin Yuan:
Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System. KSII Trans. Internet Inf. Syst. 16(4): 1286-1306 (2022) - [j11]Wanshan Xu, Jianbiao Zhang, Yilin Yuan, Xiao Wang, Yanhui Liu, Muhammad Irfan Khalid:
Towards efficient verifiable multi-keyword search over encrypted data based on blockchain. PeerJ Comput. Sci. 8: e930 (2022) - [j10]Haoxiang Huang, Jianbiao Zhang, Jun Hu, Yingfang Fu, Chenggang Qin:
Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem. IEEE Trans. Inf. Forensics Secur. 17: 3306-3320 (2022) - [j9]Yilin Yuan, Jianbiao Zhang, Wanshan Xu, Zheng Li:
Identity-based public data integrity verification scheme in cloud storage system via blockchain. J. Supercomput. 78(6): 8509-8530 (2022) - 2021
- [j8]Mesmin J. Mbyamm Kiki, Jianbiao Zhang, Bonzou Adolphe Kouassi:
MapReduce FCM clustering set algorithm. Clust. Comput. 24(1): 489-500 (2021) - [j7]Yanhui Liu, Jianbiao Zhang, Jing Zhan:
Privacy protection for fog computing and the internet of things data based on blockchain. Clust. Comput. 24(2): 1331-1345 (2021) - [j6]Tao Ye, Jianbiao Zhang, Fengbiao Zan:
Research on lightweight detection model of fake domain name. Int. J. Wirel. Mob. Comput. 20(3): 264-271 (2021) - [j5]Yanhui Liu, Jianbiao Zhang, Shupei Wu, Muhammad Salman Pathan:
Research on digital copyright protection based on the hyperledger fabric blockchain network technology. PeerJ Comput. Sci. 7: e709 (2021) - [i1]Muhammad Salman Pathan, Jianbiao Zhang, Deepu John, Avishek Nag, Soumyabrata Dev:
Identifying Stroke Indicators Using Rough Sets. CoRR abs/2110.10152 (2021) - 2020
- [j4]Yilin Yuan, Jianbiao Zhang, Wanshan Xu:
Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System. IEEE Access 8: 120778-120784 (2020) - [j3]Wanshan Xu, Jianbiao Zhang, Yilin Yuan:
DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme. IEEE Access 8: 144480-144488 (2020) - [j2]Muhammad Salman Pathan, Jianbiao Zhang, Deepu John, Avishek Nag, Soumyabrata Dev:
Identifying Stroke Indicators Using Rough Sets. IEEE Access 8: 210318-210327 (2020)
2010 – 2019
- 2019
- [c7]Jianbiao Zhang, Yanhui Liu, Zhaoqian Zhang:
Research on Cross-Chain Technology Architecture System Based on Blockchain. CSPS 2019: 2609-2617 - [c6]Jianbiao Zhang, Yanhui Liu, Zhaoqian Zhang:
Research on Data Protection Architecture Based on Block Chain. CSPS 2019: 2618-2624 - [c5]Xiao Wang, Jianbiao Zhang, Ai Zhang, Xingwei Feng, Zhiqiang Zeng:
Research on Active Dynamic Trusted Migration Scheme for VM-vTPCM. CSPS 2019: 2625-2633 - 2018
- [j1]Shan-Shan Tu, Muhammad Waqas, Sadaqat ur Rehman, Muhammad Aamir, Obaid Ur Rehman, Jianbiao Zhang, Chinchen Chang:
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack. IEEE Access 6: 74993-75001 (2018) - [c4]Jianbiao Zhang, Fan Yang, Shanshan Tu, Ai Zhang:
An Abnormal Behavior Clustering Algorithm Based on K-means. BICS 2018: 535-544 - [c3]Xiao Wang, Jianbiao Zhang, Ai Zhang:
Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence. BICS 2018: 717-726 - [c2]Wanshan Xu, Jianbiao Zhang, YaHao Zhang:
A Trusted Connection Authentication Reinforced by Bayes Algorithm. BICS 2018: 727-737 - [c1]Sam Njuki, Jianbiao Zhang, Edna Chebet Too, Richard Rimiru:
An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms. ICACS 2018: 14-20
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint