Hua Zhang

Orcid: 0000-0002-0532-9783

Affiliations:
  • Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switch Technology, China


According to our database1, Hua Zhang authored at least 94 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Intelligent analysis of android application privacy policy and permission consistency.
Artif. Intell. Rev., July, 2024

Understanding and Detecting Real-World Safety Issues in Rust.
IEEE Trans. Software Eng., June, 2024

NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024

2023
Enhanced covertness class discriminative universal adversarial perturbations.
Neural Networks, August, 2023

A detector for Android repackaged applications with layout-fingerprint.
J. Inf. Secur. Appl., August, 2023

Publishing locally private high-dimensional synthetic data efficiently.
Inf. Sci., July, 2023

Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool.
IEEE Internet Things J., July, 2023

Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain.
IEEE Internet Things J., July, 2023

Scalable Fuzzy Keyword Ranked Search Over Encrypted Data on Hybrid Clouds.
IEEE Trans. Cloud Comput., 2023

2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022

Practical Attribute-Based Multi-Keyword Ranked Search Scheme in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

Efficient Encrypted Range Query on Cloud Platforms.
ACM Trans. Cyber Phys. Syst., 2022

Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022

Sound Can Help Us See More Clearly.
Sensors, 2022

KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys.
IEEE Internet Things J., 2022

Generating natural adversarial examples with universal perturbations for text classification.
Neurocomputing, 2022

Forward privacy multikeyword ranked search over encrypted database.
Int. J. Intell. Syst., 2022

Label specificity attack: Change your label as I want.
Int. J. Intell. Syst., 2022

A comprehensive study of Mozi botnet.
Int. J. Intell. Syst., 2022

A rORAM scheme with logarithmic bandwidth and logarithmic locality.
Int. J. Intell. Syst., 2022

Secure and Differentiated Fog-Assisted Data Access for Internet of Things.
Comput. J., 2022

Jasmine: A Static Analysis Framework for Spring Core Technologies.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
A Secure Online Treatment Blockchain Service.
Wirel. Pers. Commun., 2021

Privacy-Preserving Linear Region Search Service.
IEEE Trans. Serv. Comput., 2021

KRRecover: An Auto-Recovery Tool for Hijacked Devices and Encrypted Files by Ransomwares on Android.
Symmetry, 2021

Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2021

Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data.
Secur. Commun. Networks, 2021

2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020

A Multiclass Detection System for Android Malicious Apps Based on Color Image Features.
Wirel. Commun. Mob. Comput., 2020

Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree.
IEEE Trans. Serv. Comput., 2020

An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications.
IEEE Trans. Ind. Informatics, 2020

Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems".
IEEE Trans. Inf. Forensics Secur., 2020

KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020

A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020

Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020

Adaptively secure broadcast encryption with authenticated content distributors.
Multim. Tools Appl., 2020

New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020

Practical Attribute-Based Conjunctive Keyword Search Scheme.
Comput. J., 2020

A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System.
IEEE Access, 2020

DroidPDF: The Obfuscation Resilient Packer Detection Framework for Android Apps.
IEEE Access, 2020

Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions.
IEEE Access, 2020

2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019

Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity.
Sensors, 2019

Authenticated public key broadcast encryption with short ciphertexts.
Multim. Tools Appl., 2019

Towards Privacy-Preserving and Efficient Attribute-Based Multi-Keyword Search.
IACR Cryptol. ePrint Arch., 2019

Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019

Efficient Attribute-Based Data Sharing Scheme with Hidden Access Structures.
Comput. J., 2019

Chaotic Map-Based Authentication Protocol for Multiple Servers Architecture.
IEEE Access, 2019

A Robust Authentication Scheme for Multiple Servers Architecture.
IEEE Access, 2019

Acteve++: An Improved Android Application Automatic Tester Based on Acteve.
IEEE Access, 2019

An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption.
IEEE Access, 2019

2018
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security.
Wirel. Commun. Mob. Comput., 2018

Secure multi-keyword ranked search over encrypted cloud data for multiple data owners.
J. Syst. Softw., 2018

Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool.
CoRR, 2018

Webshell Traffic Detection With Character-Level Features Based on Deep Learning.
IEEE Access, 2018

An Anti-Quantum Transaction Authentication Approach in Blockchain.
IEEE Access, 2018

Delegation of Decryption Rights With Revocability From Learning With Errors.
IEEE Access, 2018

DexX: A Double Layer Unpacking Framework for Android.
IEEE Access, 2018

Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow.
IEEE Access, 2018

A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion.
Proceedings of the Information Security Practice and Experience, 2018

2017
Privacy-Preserving Outsourced Auditing Scheme for Dynamic Data Storage in Cloud.
Secur. Commun. Networks, 2017

Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System.
J. Comput. Sci. Technol., 2017

Identity Based Proxy Re-encryption Scheme under LWE.
KSII Trans. Internet Inf. Syst., 2017

2016
Adaptively Secure Broadcast Encryption With Constant Ciphertexts.
IEEE Trans. Broadcast., 2016

Transparent Discovery of Hidden Service.
IEICE Trans. Inf. Syst., 2016

A Novel Protocol-Feature Attack against Tor's Hidden Service.
IEICE Trans. Inf. Syst., 2016

2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015

A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.
Secur. Commun. Networks, 2015

A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015

An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015

Cryptanalysis and improvement of a certificateless aggregate signature scheme.
Inf. Sci., 2015

An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015

2014
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems.
J. Medical Syst., 2014

Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014

A Fuzzy Identity-Based Signcryption Scheme from Lattices.
KSII Trans. Internet Inf. Syst., 2014

Cryptanalysis and improvement of a certificateless encryption scheme in the standard model.
Frontiers Comput. Sci., 2014

2013
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013

A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices.
Inf. Technol. Control., 2013

An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks.
Int. J. Netw. Manag., 2013

On the security of a certificateless aggregate signature scheme.
IACR Cryptol. ePrint Arch., 2013

On the security of a certi cateless signature scheme in the standard model.
IACR Cryptol. ePrint Arch., 2013

A novel pairing-free certificateless authenticated key agreement protocol with provable security.
Frontiers Comput. Sci., 2013

Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013

A novel privacy preserving keyword searching for cloud storage.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

2012
A Light-Weight Rainbow Signature Scheme for WSN.
J. Networks, 2012

An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012

A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing
CoRR, 2011

A Deterministic Protocol for Rational Secret Sharing in Asynchronous Model.
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011

2010
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model.
IACR Cryptol. ePrint Arch., 2010

A Secure Protocol for Point-Segment Position Problem.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

2009
A constant rounds group key agreement protocol without using hash functions.
Int. J. Netw. Manag., 2009


  Loading...