Hua Zhang
Orcid: 0000-0002-0532-9783Affiliations:
- Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switch Technology, China
According to our database1,
Hua Zhang
authored at least 94 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Intelligent analysis of android application privacy policy and permission consistency.
Artif. Intell. Rev., July, 2024
IEEE Trans. Software Eng., June, 2024
NUAT-GAN: Generating Black-Box Natural Universal Adversarial Triggers for Text Classifiers Using Generative Adversarial Networks.
IEEE Trans. Inf. Forensics Secur., 2024
Comments on "VERSA: Verifiable Secure Aggregation for Cross-Device Federated Learning".
IEEE Trans. Dependable Secur. Comput., 2024
2023
Neural Networks, August, 2023
J. Inf. Secur. Appl., August, 2023
Inf. Sci., July, 2023
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a New Tool.
IEEE Internet Things J., July, 2023
Privacy Protection Data Retrieval Scheme With Inverted Index for IoT Based on Blockchain.
IEEE Internet Things J., July, 2023
IEEE Trans. Cloud Comput., 2023
2022
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Serv. Comput., 2022
ACM Trans. Cyber Phys. Syst., 2022
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage.
IEEE Syst. J., 2022
KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys.
IEEE Internet Things J., 2022
Generating natural adversarial examples with universal perturbations for text classification.
Neurocomputing, 2022
Int. J. Intell. Syst., 2022
Int. J. Intell. Syst., 2022
Comput. J., 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
2021
KRRecover: An Auto-Recovery Tool for Hijacked Devices and Encrypted Files by Ransomwares on Android.
Symmetry, 2021
Secur. Commun. Networks, 2021
Cost-Sensitive Approach to Improve the HTTP Traffic Detection Performance on Imbalanced Data.
Secur. Commun. Networks, 2021
2020
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation.
Wirel. Pers. Commun., 2020
A Multiclass Detection System for Android Malicious Apps Based on Color Image Features.
Wirel. Commun. Mob. Comput., 2020
Dynamic Outsourced Auditing Services for Cloud Storage Based on Batch-Leaves-Authenticated Merkle Hash Tree.
IEEE Trans. Serv. Comput., 2020
An Adaptive Encryption-as-a-Service Architecture Based on Fog Computing for Real-Time Substation Communications.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Inf. Forensics Secur., 2020
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network.
Soft Comput., 2020
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings.
Sensors, 2020
Cache-Based Privacy Preserving Solution for Location and Content Protection in Location-Based Services.
Sensors, 2020
Multim. Tools Appl., 2020
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services.
Comput. J., 2020
IEEE Access, 2020
IEEE Access, 2020
Vulnerability Detection on Android Apps-Inspired by Case Study on Vulnerability Related With Web Functions.
IEEE Access, 2020
2019
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System.
Wirel. Pers. Commun., 2019
Robust Multiple Servers Architecture Based Authentication Scheme Preserving Anonymity.
Sensors, 2019
Multim. Tools Appl., 2019
IACR Cryptol. ePrint Arch., 2019
Outsourced dynamic provable data possession with batch update for secure cloud storage.
Future Gener. Comput. Syst., 2019
Comput. J., 2019
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
2018
Dynamic Outsourced Proofs of Retrievability Enabling Auditing Migration for Remote Storage Security.
Wirel. Commun. Mob. Comput., 2018
Secure multi-keyword ranked search over encrypted cloud data for multiple data owners.
J. Syst. Softw., 2018
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool.
CoRR, 2018
IEEE Access, 2018
IEEE Access, 2018
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Secur. Commun. Networks, 2017
Flexible CP-ABE Based Access Control on Encrypted Data for Mobile Users in Hybrid Cloud System.
J. Comput. Sci. Technol., 2017
KSII Trans. Internet Inf. Syst., 2017
2016
IEEE Trans. Broadcast., 2016
IEICE Trans. Inf. Syst., 2016
2015
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'.
Wirel. Pers. Commun., 2015
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption.
Secur. Commun. Networks, 2015
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems.
J. Medical Syst., 2015
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems.
J. Medical Syst., 2015
Inf. Sci., 2015
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment.
Frontiers Comput. Sci., 2015
2014
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems.
J. Medical Syst., 2014
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model.
Frontiers Comput. Sci., 2014
2013
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems.
J. Medical Syst., 2013
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices.
Inf. Technol. Control., 2013
An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks.
Int. J. Netw. Manag., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
A novel pairing-free certificateless authenticated key agreement protocol with provable security.
Frontiers Comput. Sci., 2013
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols
CoRR, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
2012
An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012
A Fault Detection Method for Wireless Sensor Networks Based on Credible Sensor Nodes Set.
Proceedings of the Ninth IEEE International Conference on e-Business Engineering, 2012
A Fault Detection Scheme Based on Self-Clustering Nodes Sets for Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing
CoRR, 2011
Proceedings of the 2nd International Symposium on Intelligence Information Processing and Trusted Computing, 2011
2010
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
2009
Int. J. Netw. Manag., 2009