Jianbiao Zhang

Orcid: 0000-0002-4917-7996

According to our database1, Jianbiao Zhang authored at least 31 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem.
Comput. Secur., 2025

2024
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node.
Comput. Secur., February, 2024

Privacy-Preserving Federated Learning With Improved Personalization and Poison Rectification of Client Models.
IEEE Trans. Inf. Forensics Secur., 2024

FlexibleFL: Mitigating poisoning attacks with contributions in cloud-edge federated learning systems.
Inf. Sci., 2024

SRFL: A Secure & Robust Federated Learning framework for IoT with trusted execution environments.
Expert Syst. Appl., 2024

2023
An ECC-based mutual data access control protocol for next-generation public cloud.
J. Cloud Comput., December, 2023

Manipulating vulnerability: Poisoning attacks and countermeasures in federated cloud-edge-client​ learning for image classification.
Knowl. Based Syst., 2023

Symmetric searchable encryption with supporting search pattern and access pattern protection in multi-cloud.
Concurr. Comput. Pract. Exp., 2023

Enhancing Security and Privacy in Healthcare: A Conceptual Model.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

A Trusted Execution Environment Architecture for Big Data Computing Platform Based on TPCM.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
Identity-based public data integrity verification scheme in cloud storage system via blockchain.
J. Supercomput., 2022

Research on Distributed Dynamic Trusted Access Control Based on Security Subsystem.
IEEE Trans. Inf. Forensics Secur., 2022

Towards efficient verifiable multi-keyword search over encrypted data based on blockchain.
PeerJ Comput. Sci., 2022

Enabling Dynamic Multi-Client and Boolean Query in Searchable Symmetric Encryption Scheme for Cloud Storage System.
KSII Trans. Internet Inf. Syst., 2022

An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain.
IEEE Internet Things J., 2022

Enable data privacy, dynamics, and batch in public auditing scheme for cloud storage system.
Concurr. Comput. Pract. Exp., 2022

2021
Research on digital copyright protection based on the hyperledger fabric blockchain network technology.
PeerJ Comput. Sci., 2021

Research on lightweight detection model of fake domain name.
Int. J. Wirel. Mob. Comput., 2021

Privacy protection for fog computing and the internet of things data based on blockchain.
Clust. Comput., 2021

MapReduce FCM clustering set algorithm.
Clust. Comput., 2021

2020
Dynamic Multiple-Replica Provable Data Possession in Cloud Storage System.
IEEE Access, 2020

DESSE: A Dynamic Efficient Forward Searchable Encryption Scheme.
IEEE Access, 2020

Identifying Stroke Indicators Using Rough Sets.
IEEE Access, 2020

2019
Research on Data Protection Architecture Based on Block Chain.
Proceedings of the Communications, Signal Processing, and Systems, 2019

Research on Cross-Chain Technology Architecture System Based on Blockchain.
Proceedings of the Communications, Signal Processing, and Systems, 2019

Research on Active Dynamic Trusted Migration Scheme for VM-vTPCM.
Proceedings of the Communications, Signal Processing, and Systems, 2019

2018
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack.
IEEE Access, 2018

An Evaluation on Securing Cloud Systems based on Cryptographic Key Algorithms.
Proceedings of the 2018 2nd International Conference on Algorithms, Computing and Systems, 2018

An Abnormal Behavior Clustering Algorithm Based on K-means.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018

A Trusted Connection Authentication Reinforced by Bayes Algorithm.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018

Machine-Learning-Based Malware Detection for Virtual Machine by Analyzing Opcode Sequence.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2018


  Loading...