Kai Zhang

Orcid: 0000-0001-9728-4051

Affiliations:
  • Shanghai University of Electric Power, Department of Information Security, China
  • East China Normal University, Department of Computer Science and Technology, Shanghai, China (former)


According to our database1, Kai Zhang authored at least 69 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions.
IEEE Internet Things J., October, 2024

Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.
Clust. Comput., October, 2024

Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid.
Peer Peer Netw. Appl., September, 2024

A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
IEEE Internet Things J., April, 2024

Updatable searchable symmetric encryption: Definitions and constructions.
Theor. Comput. Sci., February, 2024

FPCNN: A fast privacy-preserving outsourced convolutional neural network with low-bandwidth.
Knowl. Based Syst., January, 2024

Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT.
IEEE Internet Things J., January, 2024

Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024

Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024

Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024

TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription.
J. Syst. Archit., 2024

Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
J. Inf. Secur. Appl., 2024

Registered Functional Encryptions from Pairings.
IACR Cryptol. ePrint Arch., 2024

Revocable certificateless Provable Data Possession with identity privacy in cloud storage.
Comput. Stand. Interfaces, 2024

An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
Comput. J., 2024

EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.
Comput. J., 2024

Privacy-Preserving Breast Cancer Prediction Based on Logistic Regression.
Comput. J., 2024

2023
FedLVR: a federated learning-based fine-grained vehicle recognition scheme in intelligent traffic system.
Multim. Tools Appl., October, 2023

Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
Comput. J., October, 2023

Forward Secure Public-key Authenticated Encryption with Conjunctive Keyword Search.
Comput. J., September, 2023

Revocable identity-based matchmaking encryption in the standard model.
IET Inf. Secur., July, 2023

Bounded-collusion decentralized ABE with sublinear parameters.
Theor. Comput. Sci., June, 2023

Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving.
Peer Peer Netw. Appl., January, 2023

Blockchain-Based Fair Payment for ABE with Outsourced Decryption.
Peer Peer Netw. Appl., January, 2023

Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-Preserving Federated Learning via Functional Encryption, Revisited.
IEEE Trans. Inf. Forensics Secur., 2023

Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023

Verifiable Cloud-Based Data Publish-Subscribe Service With Hidden Access Policy.
IEEE Trans. Cloud Comput., 2023

DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
IEEE Trans. Cloud Comput., 2023

RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage.
J. Syst. Archit., 2023

Registered ABE via Predicate Encodings.
IACR Cryptol. ePrint Arch., 2023

2022
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022

Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Blockchain-based access control for dynamic device management in microgrid.
Peer-to-Peer Netw. Appl., 2022

FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid.
IEEE Internet Things J., 2022

Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices.
IEEE Internet Things J., 2022

A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs.
IEEE Access, 2022

2021
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021

Group Signature with Verifier-Local Revocation Based on Coding Theory.
Secur. Commun. Networks, 2021

Traffic sign detection algorithm based on feature expression enhancement.
Multim. Tools Appl., 2021

Updatable All-But-One Dual Projective Hashing and Its Applications.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Towards Requester-Provider Bilateral Utility Maximization and Collision Resistance in Blockchain-Based Microgrid Energy Trading.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
A post-quantum hybrid encryption based on QC-LDPC codes in the multi-user setting.
Theor. Comput. Sci., 2020

Cloud-assisted secure and conjunctive publish/subscribe service in smart grids.
IET Inf. Secur., 2020

An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020

Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data.
IEEE Access, 2020

2019
Efficient public key encryption with equality test in the standard model.
Theor. Comput. Sci., 2019

Public key encryption with equality test via hash proof system.
Theor. Comput. Sci., 2019

Energy Theft Detection With Energy Privacy Preservation in the Smart Grid.
IEEE Internet Things J., 2019

A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019

Multi-Authority Non-Monotonic KP-ABE With Cryptographic Reverse Firewall.
IEEE Access, 2019

2018
P3GQ: A practical privacy-preserving generic location-based services query scheme.
Pervasive Mob. Comput., 2018

VKSE-DO: verifiable keyword search over encrypted data for dynamic data-owner.
Int. J. High Perform. Comput. Netw., 2018

Lattice-Based Dual Receiver Encryption and More.
IACR Cryptol. ePrint Arch., 2018

Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
IACR Cryptol. ePrint Arch., 2018

A Secure Data Forwarding Protocol for Data Statistic Services in Multi-Hop Marine Sensor Networks.
Fundam. Informaticae, 2018

2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
Wirel. Commun. Mob. Comput., 2017

PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs.
Sensors, 2017

Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Efficient and provably secure identity-based multi-signature schemes for data aggregation in marine wireless sensor networks.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017

2016
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing.
Secur. Commun. Networks, 2016

New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016

Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Comput. Collect. Intell., 2015

An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015


  Loading...