Junwei Zhang

Orcid: 0000-0002-1213-6031

Affiliations:
  • Xidian University, School of Cyber Engineering and Shaanxi Key Laboratory of Network and System Security, Xian, China (PhD 2010)


According to our database1, Junwei Zhang authored at least 37 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay.
J. Syst. Archit., 2024

2022
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

A certificateless authentication scheme with fuzzy batch verification for federated UAV network.
Int. J. Intell. Syst., 2022

SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Smart home: Keeping privacy based on Air-Padding.
IET Inf. Secur., 2021

2020
An Efficient Decentralized Key Management Mechanism for VANET With Blockchain.
IEEE Trans. Veh. Technol., 2020

Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing.
IEEE Trans. Serv. Comput., 2020

Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images.
Remote. Sens., 2020

BTNC: A blockchain based trusted network connection protocol in IoT.
J. Parallel Distributed Comput., 2020

TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning.
IEEE Internet Things J., 2020

Achieving secure and convenient WLAN sharing in personal.
IET Inf. Secur., 2020

A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Fingerprint Protected Password Authentication Protocol.
Secur. Commun. Networks, 2019

Blockchain-based secure and fair crowdsourcing scheme.
Int. J. Distributed Sens. Networks, 2019

Universally composable secure geographic area verification without pre-shared secret.
Sci. China Inf. Sci., 2019

LBOA: Location-Based Secure Outsourced Aggregation in IoT.
IEEE Access, 2019

2018
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

DOAS: Efficient data owner authorized search over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2018

Trust-based service composition and selection in service oriented architecture.
Peer-to-Peer Netw. Appl., 2018

BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2018

A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control.
Proceedings of the International Conference on Networking and Network Applications, 2018

2017
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive Mob. Comput., 2017

VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings.
Pervasive Mob. Comput., 2017

An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017

Identifying opinion leaders in social networks with topic limitation.
Clust. Comput., 2017

hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts.
Sci. China Inf. Sci., 2017

VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings.
Sci. China Inf. Sci., 2017

2016
Position based key exchange: defnitions and implementations.
J. Commun. Inf. Networks, 2016

Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating.
Sci. China Inf. Sci., 2016

2015
Protocol Derivation System for the Needham-Schroeder family.
Secur. Commun. Networks, 2015

Universally composable secure positioning in the bounded retrieval model.
Sci. China Inf. Sci., 2015

2010
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks.
IEEE Trans. Wirel. Commun., 2010

Universally composable one-time signature and broadcast authentication.
Sci. China Inf. Sci., 2010

Universally composable secure TNC model and EAP-TNC protocol in IF-T.
Sci. China Inf. Sci., 2010

Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010


  Loading...