Jianbiao Zhang
Orcid: 0000-0002-4917-7996
According to our database1,
Jianbiao Zhang
authored at least 31 papers
between 2018 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem.
Comput. Secur., 2025
2024
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node.
Comput. Secur., February, 2024
Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models.
IEEE Trans. Inf. Forensics Secur., 2024
FlexibleFL: Mitigating poisoning attacks with contributions in cloud-edge federated learning systems.
Inf. Sci., 2024
SRFL: A Secure & Robust Federated Learning framework for IoT with trusted execution environments.
Expert Syst. Appl., 2024
2023
J. Cloud Comput., December, 2023
Manipulating vulnerability: Poisoning attacks and countermeasures in federated cloud-edge-client learning for image classification.
Knowl. Based Syst., 2023
Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud.
Concurr. Comput. Pract. Exp., 2023
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023
A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023
2022
Identity-based public data integrity verification scheme in cloud storage system via blockchain.
J. Supercomput., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Towards efficient verifiable multi-keyword search over encrypted data based on blockchain.
PeerJ Comput. Sci., 2022
Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System.
KSII Trans. Internet Inf. Syst., 2022
An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain.
IEEE Internet Things J., 2022
Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system.
Concurr. Comput. Pract. Exp., 2022
2021
Research on digital copyright protection based on the hyperledger fabric blockchain network technology.
PeerJ Comput. Sci., 2021
Int. J. Wirel. Mob. Comput., 2021
Privacy protection for fog computing and the internet of things data based on blockchain.
Clust. Comput., 2021
2020
IEEE Access, 2020
2019
Proceedings of the Communications, Signal Processing, and Systems, 2019
Proceedings of the Communications, Signal Processing, and Systems, 2019
Proceedings of the Communications, Signal Processing, and Systems, 2019
2018
IEEE Access, 2018
Proceedings of the 2018 2nd International Conference on Algorithms, Computing and Systems, 2018
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018
Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018