Jianhong Zhang
Orcid: 0000-0001-7549-1375
According to our database1,
Jianhong Zhang
authored at least 157 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications.
Trans. Emerg. Telecommun. Technol., October, 2024
Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT.
IEEE Internet Things J., February, 2024
CKAA: Certificateless key-agreement authentication scheme in digital twin telemedicine environment.
Trans. Emerg. Telecommun. Technol., January, 2024
On the Security of Privacy-Enhanced Authentication Protocol for Federated Learning in VANETs.
IEEE Trans. Inf. Forensics Secur., 2024
On the Security of Lightweight and Escrow-Free Certificate-Based Data Aggregation for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024
On the Security of Multi-Receiver Certificateless Generalized Signcryption Scheme for WBANs.
IEEE Trans. Dependable Secur. Comput., 2024
PFDAM: Privacy-Preserving Fine-Grained Data Aggregation Scheme Supporting Multifunctionality in Smart Grid.
IEEE Internet Things J., 2024
Design of an Asymmetric Damping Structure for a Single Cylinder and Single Rod MR Damper.
IEEE Access, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
SE-P²μm: Secure and Efficient Privacy-Preserving User-Profile Matching Protocol for Social Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023
Int. J. Bifurc. Chaos, August, 2023
Secure and Lightweight Data Aggregation Scheme for Anonymous Multi-Receivers in WBAN.
IEEE Trans. Netw. Sci. Eng., 2023
Comment on "Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs".
IEEE Trans. Inf. Forensics Secur., 2023
Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators.
J. King Saud Univ. Comput. Inf. Sci., 2023
Classification and topic tracking of college students' cybersecurity education based on the internet.
J. Comput. Methods Sci. Eng., 2023
IEEE Access, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
On the Security of Privacy-preserving Data Aggregation Scheme Based on CRT in Mobile Crowdsensing System.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023
Multi-mode signal fusion and improved residual dense network fault diagnosis of nuclear power plant.
Proceedings of the CAA Symposium on Fault Detection, 2023
2022
Sensors, 2022
Corrigendum to "Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing".
Secur. Commun. Networks, 2022
Predicting Copper and Lead Concentration in Crops Using Reflectance Spectroscopy Associated With Intrinsic Wavelength-Scale Decomposition Spectral Transformation.
IEEE Access, 2022
On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2022
2021
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification.
Secur. Commun. Networks, 2021
Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing.
Secur. Commun. Networks, 2021
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2021
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Brain functional networks analysis of five fingers grasping in virtual reality environment.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021
2020
Soft Comput., 2020
IEEE Internet Things J., 2020
Int. J. Netw. Secur., 2020
The <i>Wolfiporia cocos</i> Genome and Transcriptome Shed Light on the Formation of Its Edible and Medicinal Sclerotium.
Genom. Proteom. Bioinform., 2020
Hand-oriented tasking assessment of fine movement control deficits in Alzheimer's Disease.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020
2019
Wirel. Networks, 2019
Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication.
Sensors, 2019
Multim. Tools Appl., 2019
Int. J. High Perform. Comput. Netw., 2019
Identity-and-data privacy forward security public auditing protocol in the standard model.
Int. J. Commun. Syst., 2019
Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing.
IEEE Access, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019
Effects of Alzheimer's Disease on Reach-to-Pinch Performance with Multimodal Sensory Feedbacks.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019
2018
S<sup>2</sup>PAD: secure self-certified public auditing for data integrity in cloud storage and its extension.
Int. J. Inf. Commun. Technol., 2018
Comput. J., 2018
On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying, 2018
2017
Secur. Commun. Networks, 2017
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017
On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage.
Int. J. Netw. Secur., 2017
OGPADSM<sup>2</sup>: oriented-group public auditing for data sharing with multi-user modification.
Int. J. High Perform. Comput. Netw., 2017
Int. J. Embed. Syst., 2017
Achieving public verifiability and data dynamics for cloud data in the standard model.
Clust. Comput., 2017
Using the entrapment sequence method as a standard to evaluate key steps of proteomics data analysis process.
BMC Genom., 2017
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
2016
Secur. Commun. Networks, 2016
J. Inf. Sci. Eng., 2016
Inf. Sci., 2016
Clust. Comput., 2016
Clust. Comput., 2016
Clust. Comput., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
Proceedings of the Provable Security, 2016
Proceedings of the 9th International Congress on Image and Signal Processing, 2016
2015
Secur. Commun. Networks, 2015
Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function.
J. Commun., 2015
Int. J. Commun. Syst., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015
2014
Int. J. Netw. Secur., 2014
Short computational Diffie-Hellman-based proxy signature scheme in the standard model.
Int. J. Commun. Syst., 2014
Int. J. Commun. Syst., 2014
Clust. Comput., 2014
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014
Proceedings of the 2014 Ninth International Conference on P2P, 2014
2013
J. Inf. Sci. Eng., 2013
J. Digit. Inf. Manag., 2013
Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes.
Int. J. Intell. Inf. Database Syst., 2013
On the security of an ID-based anonymous proxy signature scheme and its improved scheme.
Int. J. Embed. Syst., 2013
SP<sup>2</sup>DAS: Self-certified PKC-Based Privacy-Preserving Data Aggregation Scheme in Smart Grid.
Int. J. Distributed Sens. Networks, 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
J. Inf. Sci. Eng., 2011
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011
Proceedings of the Advanced Intelligent Computing - 7th International Conference, 2011
Fuzzy control of a four-rope-driven level-adjustment robot considering all constrained situations.
Proceedings of the American Control Conference, 2011
2010
J. Netw. Comput. Appl., 2010
On the Security of Convertible Multiauthenticated Encryption Scheme and Its Improved Scheme.
J. Digit. Content Technol. its Appl., 2010
Efficient Blind Signature Scheme based on Modified Generalized Bilinear Inversion for Multiple Signers.
J. Digit. Content Technol. its Appl., 2010
Proceedings of the Web-Age Information Management, 2010
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010
Proceedings of the International Conference on E-Business and E-Government, 2010
Proceedings of the Communication and Networking, 2010
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010
2009
Int. J. Distributed Sens. Networks, 2009
Int. J. Distributed Sens. Networks, 2009
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Intelligent control of a four-rope-driven level-adjustment device with constrained outputs.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009
On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings.
Proceedings of the Information Security Practice and Experience, 2009
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009
Proceedings of the International Forum on Information Technology and Applications, 2009
On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Proceedings of the Advances in Computer Science, 2009
Proceedings of the Active Media Technology, 5th International Conference, 2009
Proceedings of the American Control Conference, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of The 2008 IEEE International Conference on Networking, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
2007
Proceedings of the International Conference on Networking, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Computational Science and Its Applications, 2007
2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
2005
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.
Informatica (Slovenia), 2005
IEICE Trans. Inf. Syst., 2005
Appl. Math. Comput., 2005
Proceedings of the Advances in Web-Age Information Management, 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004
2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
2002