Minghao Zhao
Orcid: 0000-0001-9232-9185Affiliations:
- Tsinghua University, School of Software, Beijing, China
- Shandong University, College of Computer Science and Technology, Jinan, China (former)
According to our database1,
Minghao Zhao
authored at least 46 papers
between 2015 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
2015
2016
2017
2018
2019
2020
2021
2022
2023
0
1
2
3
4
5
6
7
8
9
4
4
2
7
5
3
3
2
1
1
3
3
1
5
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems.
Digit. Commun. Networks, October, 2023
Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training.
World Wide Web (WWW), September, 2023
Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.
Inf. Sci., May, 2023
Neural Networks, April, 2023
2022
IEEE Trans. Parallel Distributed Syst., 2022
Inf. Sci., 2022
Label-only membership inference attacks on machine unlearning without dependence of posteriors.
Int. J. Intell. Syst., 2022
Improving transaction succeed ratio in payment channel networks via enhanced node connectivity and balanced channel capacity.
Int. J. Intell. Syst., 2022
Proceedings of the Provable and Practical Security, 2022
FP<sup>2</sup>-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning.
Proceedings of the Provable and Practical Security, 2022
2021
Secur. Commun. Networks, 2021
Secure computation protocols under asymmetric scenarios in enterprise information system.
Enterp. Inf. Syst., 2021
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Markov chain analysis of evolutionary algorithms on OneMax function - From coupon collector's problem to (1 + 1) EA.
Theor. Comput. Sci., 2020
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer.
Inf. Sci., 2020
Inf. Sci., 2020
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020
Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020
2019
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019
Int. J. High Perform. Comput. Netw., 2019
An Efficient Lucas Sequence-Based Batch Auditing Scheme for the Internet of Medical Things.
IEEE Access, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Soft Comput., 2018
J. Inf. Secur. Appl., 2018
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms.
Int. J. High Perform. Comput. Netw., 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018
Proceedings of the 47th International Conference on Parallel Processing, 2018
2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Comput. Secur., 2017
Ann. des Télécommunications, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
2016
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015