Kai Zhang
Orcid: 0000-0001-9728-4051Affiliations:
- Shanghai University of Electric Power, Department of Information Security, China
- East China Normal University, Department of Computer Science and Technology, Shanghai, China (former)
According to our database1,
Kai Zhang
authored at least 69 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions.
IEEE Internet Things J., October, 2024
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.
Clust. Comput., October, 2024
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid.
Peer Peer Netw. Appl., September, 2024
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
IEEE Internet Things J., April, 2024
Theor. Comput. Sci., February, 2024
FPCNN: A fast privacy-preserving outsourced convolutional neural network with low-bandwidth.
Knowl. Based Syst., January, 2024
Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT.
IEEE Internet Things J., January, 2024
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
IEEE Trans. Inf. Forensics Secur., 2024
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2024
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription.
J. Syst. Archit., 2024
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
J. Inf. Secur. Appl., 2024
Revocable certificateless Provable Data Possession with identity privacy in cloud storage.
Comput. Stand. Interfaces, 2024
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
Comput. J., 2024
EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.
Comput. J., 2024
Comput. J., 2024
2023
FedLVR: a federated learning-based fine-grained vehicle recognition scheme in intelligent traffic system.
Multim. Tools Appl., October, 2023
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
Comput. J., October, 2023
Comput. J., September, 2023
IET Inf. Secur., July, 2023
Theor. Comput. Sci., June, 2023
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving.
Peer Peer Netw. Appl., January, 2023
Peer Peer Netw. Appl., January, 2023
IEEE Trans. Inf. Forensics Secur., 2023
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Cloud Comput., 2023
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
IEEE Trans. Cloud Comput., 2023
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage.
J. Syst. Archit., 2023
2022
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage.
IEEE Trans. Cloud Comput., 2022
Peer-to-Peer Netw. Appl., 2022
FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs.
IEEE Access, 2022
2021
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021
Secur. Commun. Networks, 2021
Multim. Tools Appl., 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Towards Requester-Provider Bilateral Utility Maximization and Collision Resistance in Blockchain-Based Microgrid Energy Trading.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
Theor. Comput. Sci., 2020
IET Inf. Secur., 2020
An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020
Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data.
IEEE Access, 2020
2019
Theor. Comput. Sci., 2019
Theor. Comput. Sci., 2019
IEEE Internet Things J., 2019
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
Comput. J., 2019
IEEE Access, 2019
2018
Pervasive Mob. Comput., 2018
Int. J. High Perform. Comput. Netw., 2018
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
IACR Cryptol. ePrint Arch., 2018
A Secure Data Forwarding Protocol for Data Statistic Services in Multi-Hop Marine Sensor Networks.
Fundam. Informaticae, 2018
2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
Wirel. Commun. Mob. Comput., 2017
PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs.
Sensors, 2017
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Efficient and provably secure identity-based multi-signature schemes for data aggregation in marine wireless sensor networks.
Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017
2016
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing.
Secur. Commun. Networks, 2016
New application of partitioning methodology: identity-based dual receiver encryption.
Secur. Commun. Networks, 2016
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
Sci. China Inf. Sci., 2016
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
Trans. Comput. Collect. Intell., 2015
An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015