default search action
Yinghui Zhang 0002
Person information
- affiliation: Xi'an University of Posts and Telecommunications, National Engineering Laboratory for Wireless Security, Xi'an, China
Other persons with the same name
- Yinghui Zhang — disambiguation page
- Yinghui Zhang 0001 — University of Northampton, UK (and 1 more)
- Yinghui Zhang 0003 — Inner Mongolia University, Hohhot, China
- Yinghui Zhang 0004 — Beijing Normal University, College of Education for the Future, China (and 1 more)
- Yinghui Zhang 0005 — Northeastern University, Software Center, Shenyang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j96]Zhenyang Guo, Jin Cao, Xinyi Wang, Yinghui Zhang, Ben Niu, Hui Li:
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks. IEEE Internet Things J. 11(12): 22091-22106 (2024) - [j95]Waqas Ajmal Khan, Fawad Khan, Shahzaib Tahir, Yinghui Zhang, Faisal Amjad, Jawad Ahmad:
HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud. J. Ambient Intell. Humaniz. Comput. 15(1): 89-102 (2024) - [j94]Axin Wu, Fagen Li, Xiangjun Xin, Yinghui Zhang, Jianhao Zhu:
Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage. J. Syst. Archit. 149: 103104 (2024) - [j93]Chao Shang, Jin Cao, Tong Zhu, Yinghui Zhang, Ben Niu, Hui Li:
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices. IEEE Syst. J. 18(1): 590-599 (2024) - [j92]Axin Wu, Yinghui Zhang, Jianhao Zhu, Qiuxia Zhao, Yu Zhang:
Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing. IEEE Trans. Cloud Comput. 12(2): 659-670 (2024) - [j91]Chao Shang, Jin Cao, Jiajia Liu, Yinghui Zhang, Ben Niu, Hui Li:
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network. IEEE Trans. Intell. Transp. Syst. 25(7): 6780-6795 (2024) - [j90]Yunqing Sun, Jin Cao, Xiongpeng Ren, Canhui Tang, Ben Niu, Yinghui Zhang, Hui Li:
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks. IEEE Trans. Intell. Transp. Syst. 25(8): 9733-9748 (2024) - [j89]Ruhui Ma, Jin Cao, Shiyang He, Yinghui Zhang, Ben Niu, Hui Li:
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network. IEEE Trans. Netw. Serv. Manag. 21(2): 2426-2444 (2024) - [j88]Axin Wu, Weiqi Luo, Anjia Yang, Yinghui Zhang, Jianhao Zhu:
Efficient Bilateral Privacy-Preserving Data Collection for Mobile Crowdsensing. IEEE Trans. Serv. Comput. 17(3): 865-877 (2024) - [j87]Rui Guo, Ruihan Dong, Xiong Li, Yinghui Zhang, Dong Zheng:
DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks. Veh. Commun. 47: 100763 (2024) - 2023
- [j86]Yuanyuan Yang, Jin Cao, Xiongpeng Ren, Ben Niu, Yinghui Zhang, Hui Li:
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication. Comput. Commun. 197: 214-229 (2023) - [j85]Wei Liu, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui, Dong Zheng:
Secure and Efficient Smart Healthcare System Based on Federated Learning. Int. J. Intell. Syst. 2023: 1-12 (2023) - [j84]Yinghui Zhang, Tian Zhu, Rui Guo, Shengmin Xu, Hui Cui, Jin Cao:
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data. IEEE Trans. Cloud Comput. 11(1): 971-983 (2023) - [j83]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control. IEEE Trans. Dependable Secur. Comput. 20(1): 53-67 (2023) - [j82]Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang, Hui Li:
A Software-Based Remote Attestation Scheme for Internet of Things Devices. IEEE Trans. Dependable Secur. Comput. 20(2): 1422-1434 (2023) - [j81]Chengzhe Lai, Yixiao Ma, Rongxing Lu, Yinghui Zhang, Dong Zheng:
A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond. IEEE Trans. Dependable Secur. Comput. 20(4): 2970-2987 (2023) - [j80]Xiongpeng Ren, Jin Cao, Ruhui Ma, Yurong Luo, Jian Guan, Yinghui Zhang, Hui Li:
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. IEEE Trans. Netw. Serv. Manag. 20(3): 3880-3899 (2023) - [c29]Yinghui Zhang, Hao Du, Jin Cao, Gang Han, Dong Zheng:
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection. Inscrypt (2) 2023: 293-304 - 2022
- [j79]Fan Zhang, Yinghui Zhang, Gang Han:
Blockchain-based attribute-based keyword searchable encryption for health cloud system. Int. J. Embed. Syst. 15(6): 493-504 (2022) - [j78]Xiongpeng Ren, Jin Cao, Maode Ma, Hui Li, Yinghui Zhang:
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. IEEE Internet Things J. 9(5): 3642-3656 (2022) - [j77]Gang Han, Tiantian Zhang, Yinghui Zhang, Guowen Xu, Jianfei Sun, Jin Cao:
Verifiable and privacy preserving federated learning without fully trusted centers. J. Ambient Intell. Humaniz. Comput. 13(3): 1431-1441 (2022) - [j76]Yinghui Zhang, Xuanni Wei, Jin Cao, Jianting Ning, Zuobin Ying, Dong Zheng:
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8350-8361 (2022) - [j75]Rui Guo, Lei Xu, Xiong Li, Yinghui Zhang, Xuelei Li:
An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs. J. Syst. Archit. 129: 102633 (2022) - [j74]Rui Guo, Kemeng Li, Xiong Li, Yinghui Zhang, Xuelei Li:
Compact Multiple Attribute-Based Signatures With Key Aggregation and Its Application. IEEE Syst. J. 16(2): 3025-3035 (2022) - [j73]Chenbin Zhao, Li Xu, Jiguo Li, He Fang, Yinghui Zhang:
Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy. IEEE Syst. J. 16(3): 4804-4815 (2022) - [j72]Shengmin Xu, Yingjiu Li, Robert H. Deng, Yinghui Zhang, Xiangyang Luo, Ximeng Liu:
Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things. IEEE Trans. Cloud Comput. 10(1): 474-490 (2022) - [j71]Cheng Guo, Wanping Liu, Ximeng Liu, Yinghui Zhang:
Secure Similarity Search Over Encrypted Non-Uniform Datasets. IEEE Trans. Cloud Comput. 10(3): 2102-2117 (2022) - [j70]Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. IEEE Trans. Dependable Secur. Comput. 19(1): 370-387 (2022) - [j69]Jianting Ning, Xinyi Huang, Willy Susilo, Kaitai Liang, Ximeng Liu, Yinghui Zhang:
Dual Access Control for Cloud-Based Data Storage and Sharing. IEEE Trans. Dependable Secur. Comput. 19(2): 1036-1048 (2022) - [j68]Shengmin Xu, Jianting Ning, Yingjiu Li, Yinghui Zhang, Guowen Xu, Xinyi Huang, Robert H. Deng:
Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing. IEEE Trans. Dependable Secur. Comput. 19(2): 1064-1077 (2022) - [j67]Qi Li, Bin Xia, Haiping Huang, Yinghui Zhang, Tao Zhang:
TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT. IEEE Trans. Ind. Informatics 18(5): 3437-3448 (2022) - [j66]Ruhui Ma, Jin Cao, Yinghui Zhang, Chao Shang, Lihui Xiong, Hui Li:
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X. IEEE Trans. Intell. Transp. Syst. 23(12): 23976-23992 (2022) - [c28]Yifei Li, Yinghui Zhang, Wei Liu, Jianting Ning, Dong Zheng:
A Collaborative Access Control Scheme Based on Incentive Mechanisms. CSS 2022: 48-55 - [c27]Dayu Cao, Yinghui Zhang, Wei Liu, Xuanni Wei:
Secure Asynchronous Federated Learning for Edge Computing Devices. SocialSec 2022: 138-147 - 2021
- [j65]Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Comput. Commun. 166: 165-173 (2021) - [j64]Yinghui Zhang, Robert H. Deng, Shengmin Xu, Jianfei Sun, Qi Li, Dong Zheng:
Attribute-based Encryption for Cloud Computing Access Control: A Survey. ACM Comput. Surv. 53(4): 83:1-83:41 (2021) - [j63]Fawad Khan, Hui Li, Yinghui Zhang, Haider Abbas, Tahreem Yaqoob:
Efficient attribute-based encryption with repeated attributes optimization. Int. J. Inf. Sec. 20(3): 431-444 (2021) - [j62]Zhenzhu Chen, Anmin Fu, Yinghui Zhang, Zhe Liu, Fanjian Zeng, Robert H. Deng:
Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things. IEEE Internet Things J. 8(7): 5839-5849 (2021) - [j61]Rui Guo, Geng Yang, Huixian Shi, Yinghui Zhang, Dong Zheng:
O3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System. IEEE Internet Things J. 8(11): 8949-8963 (2021) - [j60]Zhenzhu Chen, Anmin Fu, Robert H. Deng, Ximeng Liu, Yang Yang, Yinghui Zhang:
Secure and verifiable outsourced data dimension reduction on dynamic data. Inf. Sci. 573: 182-193 (2021) - [j59]Yinghui Zhang, Jian Zou, Rui Guo:
Efficient privacy-preserving authentication for V2G networks. Peer-to-Peer Netw. Appl. 14(3): 1366-1378 (2021) - [j58]Yinghui Zhang, Robert H. Deng, Elisa Bertino, Dong Zheng:
Robust and Universal Seamless Handover Authentication in 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(2): 858-874 (2021) - [j57]Jin Cao, Maode Ma, Yulong Fu, Hui Li, Yinghui Zhang:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(3): 1182-1195 (2021) - [j56]Jianfei Sun, Hu Xiong, Xuyun Nie, Yinghui Zhang, Pengfei Wu:
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2518-2519 (2021) - [j55]Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng:
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing. IEEE Trans. Serv. Comput. 14(4): 1152-1166 (2021) - 2020
- [j54]Qi Li, Yinghui Zhang, Tao Zhang, Haiping Huang, Yingjie He, Jinbo Xiong:
HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth. IEEE Access 8: 123430-123439 (2020) - [j53]Yinghui Zhang, Tiantian Zhang, Shengmin Xu, Guowen Xu, Dong Zheng:
Revocable and certificateless public auditing for cloud storage. Sci. China Inf. Sci. 63(10): 1-3 (2020) - [j52]Rui Guo, Chaoyuan Zhuang, Huixian Shi, Yinghui Zhang, Dong Zheng:
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int. J. Distributed Sens. Networks 16(2) (2020) - [j51]Yinghui Zhang, Xinwei Ma, Axin Wu, Fangyuan Ren, Dong Zheng:
An Efficient Mobile Location-based Service Framework for Resource-constrained Devices. Int. J. Netw. Secur. 22(4): 698-707 (2020) - [j50]Jin Cao, Zheng Yan, Ruhui Ma, Yinghui Zhang, Yulong Fu, Hui Li:
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 7(6): 5329-5344 (2020) - [j49]Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng:
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health. IEEE Internet Things J. 7(7): 6566-6575 (2020) - [j48]Shengmin Xu, Jiaming Yuan, Guowen Xu, Yingjiu Li, Ximeng Liu, Yinghui Zhang, Zuobin Ying:
Efficient ciphertext-policy attribute-based encryption with blackbox traceability. Inf. Sci. 538: 19-38 (2020) - [j47]Rui Guo, Xiong Li, Dong Zheng, Yinghui Zhang:
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. J. Supercomput. 76(7): 4884-4903 (2020) - [c26]Guowen Xu, Hongwei Li, Shengmin Xu, Hao Ren, Yinghui Zhang, Jianfei Sun, Robert H. Deng:
Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems. AsiaCCS 2020: 178-192 - [c25]Zhenwei Chen, Yinghui Zhang, Gang Han, Jiangyong He, Rui Guo, Dong Zheng:
Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks. ML4CS (1) 2020: 307-316
2010 – 2019
- 2019
- [j46]Yinghui Zhang, Chen Chen, Dong Zheng, Rui Guo, Shengmin Xu:
Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage. IEEE Access 7: 113832-113843 (2019) - [j45]Yinghui Zhang, Fangyuan Ren, Axin Wu, Tiantian Zhang, Jin Cao, Dong Zheng:
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks. IEEE Access 7: 114721-114730 (2019) - [j44]Qi Li, Youliang Tian, Yinghui Zhang, Limin Shen, Jingjing Guo:
Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing. IEEE Access 7: 131534-131542 (2019) - [j43]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Yinghui Zhang, Xixiang Lv:
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks 87: 49-60 (2019) - [j42]Axin Wu, Yinghui Zhang, Xiaokun Zheng, Rui Guo, Qinglan Zhao, Dong Zheng:
Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann. des Télécommunications 74(7-8): 401-411 (2019) - [j41]Yinghui Zhang, Axin Wu, Tiantian Zhang, Dong Zheng:
Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things. Ann. des Télécommunications 74(7-8): 413-421 (2019) - [j40]Yinghui Zhang, Menglei Yang, Dong Zheng, Tiantian Zhang, Rui Guo, Fang Ren:
Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity. Int. J. Found. Comput. Sci. 30(4): 665-681 (2019) - [j39]Yinghui Zhang, Jiangang Shu, Ximeng Liu, Jin Li, Dong Zheng:
Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing". IEEE Internet Things J. 6(1): 1287-1290 (2019) - [j38]Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing. IEEE Internet Things J. 6(2): 3003-3013 (2019) - [j37]Yinghui Zhang, Tiantian Zhang, Rui Guo, Shengmin Xu, Dong Zheng:
Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage. KSII Trans. Internet Inf. Syst. 13(11): 5653-5672 (2019) - [j36]Yangguang Tian, Yingjiu Li, Guomin Yang, Willy Susilo, Yi Mu, Hui Cui, Yinghui Zhang:
DABKE: Secure deniable attribute-based key exchange framework. J. Comput. Secur. 27(2): 259-275 (2019) - [j35]Yinghui Zhang, Robert H. Deng, Dong Zheng, Jin Li, Pengfei Wu, Jin Cao:
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Trans. Ind. Informatics 15(9): 5099-5108 (2019) - [c24]Pengfei Wu, Qingni Shen, Robert H. Deng, Ximeng Liu, Yinghui Zhang, Zhonghai Wu:
ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof. AsiaCCS 2019: 86-99 - [c23]Jianfei Sun, Hu Xiong, Robert H. Deng, Yinghui Zhang, Ximeng Liu, Mingsheng Cao:
Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT. DSC 2019: 1-8 - [c22]Shengmin Xu, Jiaming Yuan, Yingjiu Li, Ximeng Liu, Yinghui Zhang:
Super Payment Channel for Decentralized Cryptocurrencies. DSC 2019: 1-8 - [c21]Shengmin Xu, Yinghui Zhang, Yingjiu Li, Ximeng Liu, Guomin Yang:
Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy. SecureComm (2) 2019: 184-204 - 2018
- [j34]Dong Zheng, Axin Wu, Yinghui Zhang, Qinglan Zhao:
Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power. IEEE Access 6: 28019-28027 (2018) - [j33]Yinghui Zhang, Robert H. Deng, Jiangang Shu, Kan Yang, Dong Zheng:
TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain. IEEE Access 6: 31077-31087 (2018) - [j32]Yinghui Zhang, Dong Zheng, Rui Guo, Qinglan Zhao:
Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing. Comput. Informatics 37(2): 327-348 (2018) - [j31]Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang:
Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72: 1-12 (2018) - [j30]Yi Liu, Yinghui Zhang, Jie Ling, Zhusong Liu:
Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Future Gener. Comput. Syst. 78: 1020-1026 (2018) - [j29]Qi Han, Yinghui Zhang, Hui Li:
Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things. Future Gener. Comput. Syst. 83: 269-277 (2018) - [j28]Yinghui Zhang, Dong Zheng, Robert H. Deng:
Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control. IEEE Internet Things J. 5(3): 2130-2145 (2018) - [j27]Yinghui Zhang, Robert H. Deng, Ximeng Liu, Dong Zheng:
Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462: 262-277 (2018) - [j26]Yinghui Zhang, Axin Wu, Dong Zheng:
Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J. Ambient Intell. Humaniz. Comput. 9(4): 1039-1048 (2018) - [j25]Yinghui Zhang, Jin Li, Dong Zheng, Ping Li, Yangguang Tian:
Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. J. Netw. Comput. Appl. 122: 50-60 (2018) - [j24]Yinghui Zhang, Robert H. Deng, Gang Han, Dong Zheng:
Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things. J. Netw. Comput. Appl. 123: 89-100 (2018) - [j23]Jiangang Shu, Ximeng Liu, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
Dual-side privacy-preserving task matching for spatial crowdsourcing. J. Netw. Comput. Appl. 123: 101-111 (2018) - [j22]Ming Yan, Yinghui Zhang, Dong Zheng, Liudi Lv, Haonan Su:
灵活访问且模糊可搜索的EHR云服务系统 (Flexibly Accessed and Vaguely Searchable EHR Cloud Service System). 计算机科学 45(10): 172-177 (2018) - [j21]Yinghui Zhang, Pengzhen Lang, Dong Zheng, Menglei Yang, Rui Guo:
A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience. Secur. Commun. Networks 2018: 7202598:1-7202598:13 (2018) - [j20]Yinghui Zhang, Haonan Su, Menglei Yang, Dong Zheng, Fang Ren, Qinglan Zhao:
Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing. Secur. Commun. Networks 2018: 9081814:1-9081814:12 (2018) - [j19]Axin Wu, Dong Zheng, Yinghui Zhang, Menglei Yang:
Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing. Sensors 18(7): 2158 (2018) - [j18]Yinghui Zhang, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng, Jiangang Shu:
Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing. Sensors 18(8): 2659 (2018) - [j17]Yinghui Zhang, Menglei Yang, Dong Zheng, Pengzhen Lang, Axin Wu, Chen Chen:
Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput. 22(23): 7763-7772 (2018) - [c20]Jiangang Shu, Ximeng Liu, Kan Yang, Yinghui Zhang, Xiaohua Jia, Robert H. Deng:
SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing. GLOBECOM 2018: 1-6 - [c19]Dong Zheng, Kaixin Deng, Yinghui Zhang, Jiangfan Zhao, Xiaokun Zheng, Xinwei Ma:
Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things. ICA3PP (3) 2018: 453-459 - [c18]Yinghui Zhang, Jiangfan Zhao, Dong Zheng, Kaixin Deng, Fangyuan Ren, Xiaokun Zheng:
Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing. ICA3PP (4) 2018: 581-590 - [c17]Yangguang Tian, Yingjiu Li, Yinghui Zhang, Nan Li, Guomin Yang, Yong Yu:
DSH: Deniable Secret Handshake Framework. ISPEC 2018: 341-353 - [c16]Weiwei Liu, Yinghui Zhang, Yi Mu, Guomin Yang, Yangguang Tian:
Efficient Traceable Oblivious Transfer and Its Applications. ISPEC 2018: 610-621 - [c15]Ximeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Yang Yang, Yinghui Zhang:
PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains. TrustCom/BigDataSE 2018: 958-963 - 2017
- [j16]Qinglan Zhao, Dong Zheng, Xiangxue Li, Yinghui Zhang, Xiaoli Dong:
Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1965-1972 (2017) - [j15]Cuicui Bai, Yinghui Zhang, Hua Ma, Zhenhua Liu:
Expressive ciphertext-policy attribute-based encryption with direct user revocation. Int. J. Embed. Syst. 9(6): 495-504 (2017) - [j14]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li, Ilsun You:
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf. Sci. 379: 42-61 (2017) - [j13]Yinghui Zhang, Jiangfan Zhao, Dong Zheng:
Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks. Mob. Inf. Syst. 2017: 3680671:1-3680671:11 (2017) - [j12]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Towards privacy protection and malicious behavior traceability in smart health. Pers. Ubiquitous Comput. 21(5): 815-830 (2017) - [c14]Haonan Su, Dong Zheng, Yinghui Zhang:
An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage. CSE/EUC (1) 2017: 833-836 - [c13]Yinghui Zhang, Dong Zheng:
Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures. CSE/EUC (1) 2017: 870-874 - [c12]Runhe Li, Dong Zheng, Yinghui Zhang, Haonan Su, Menglei Yang, Pengzhen Lang:
Attribute-Based Encryption with Multi-keyword Search. DSC 2017: 172-177 - [c11]Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan:
Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures. DSC 2017: 475-482 - [c10]Liangxuan Zhang, Hui Li, Yinghui Zhang, Fawad Khan:
Efficient privacy-preserving decentralized ABE supporting expressive access structures. INFOCOM Workshops 2017: 547-552 - [c9]Yinghui Zhang, Dong Zheng, Qinglan Zhao, Chengzhe Lai, Fang Ren:
PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice. NaNA 2017: 11-16 - 2016
- [j11]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Efficient attribute-based data sharing in mobile clouds. Pervasive Mob. Comput. 28: 135-149 (2016) - [j10]Yinghui Zhang, Jin Li, Xiaofeng Chen, Hui Li:
Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur. Commun. Networks 9(14): 2397-2411 (2016) - [j9]Yinghui Zhang, Dong Zheng, Qi Li, Jin Li, Hui Li:
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing. Secur. Commun. Networks 9(16): 3688-3702 (2016) - [c8]Yinghui Zhang, Jin Li, Dong Zheng, Xiaofeng Chen, Hui Li:
Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures. ACISP (1) 2016: 509-524 - [c7]Yinghui Zhang, Dong Zheng:
Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing. BWCCA 2016: 807-814 - 2015
- [j8]Fatos Xhafa, Jianglang Feng, Yinghui Zhang, Xiaofeng Chen, Jin Li:
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing. J. Supercomput. 71(5): 1607-1619 (2015) - 2014
- [j7]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li:
Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks. Comput. Networks 75: 192-211 (2014) - [j6]Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:
Efficient and robust identity-based handoff authentication for EAP-based wireless networks. Concurr. Comput. Pract. Exp. 26(8): 1561-1573 (2014) - [j5]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing. KSII Trans. Internet Inf. Syst. 8(11): 4028-4049 (2014) - [j4]Keying Li, Jianfeng Wang, Yinghui Zhang, Hua Ma:
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme. J. Internet Serv. Inf. Secur. 4(2): 70-82 (2014) - [c6]Yinghui Zhang, Dong Zheng, Xiaofeng Chen, Jin Li, Hui Li:
Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts. ProvSec 2014: 259-273 - 2013
- [j3]Yinghui Zhang, Xiaofeng Chen, Hui Li:
Key-Evolving Hierarchical ID-Based Signcryption. Comput. J. 56(10): 1228-1248 (2013) - [j2]Fei Yan, Xiaofeng Chen, Yinghui Zhang:
Efficient online/offline signcryption without key exposure. Int. J. Grid Util. Comput. 4(1): 85-93 (2013) - [c5]Yinghui Zhang, Xiaofeng Chen, Jin Li, Duncan S. Wong, Hui Li:
Anonymous attribute-based encryption supporting efficient decryption test. AsiaCCS 2013: 511-516 - [c4]Yinghui Zhang, Hui Li, Xiaoqing Li, Hui Zhu:
Provably Secure and Subliminal-Free Variant of Schnorr Signature. ICT-EurAsia 2013: 383-391 - [c3]Yinghui Zhang, Xiaofeng Chen, Jin Li, Hui Li, Fenghua Li:
FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation. INCoS 2013: 38-45 - [c2]Keying Li, Yinghui Zhang, Hua Ma:
Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure. INCoS 2013: 46-50 - 2012
- [j1]Yinghui Zhang, Xiaofeng Chen, H. Li, J. Cao:
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks. Secur. Commun. Networks 5(10): 1121-1130 (2012) - [c1]Qi Han, Yinghui Zhang, Xiaofeng Chen, Hui Li, Jiaxiang Quan:
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks. NSS 2012: 180-191
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint