Mingwu Zhang
Orcid: 0000-0001-8551-8826
According to our database1,
Mingwu Zhang
authored at least 199 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Veh. Technol., September, 2024
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET.
IEEE Internet Things J., April, 2024
IEEE Internet Things J., April, 2024
L-Net: A lightweight convolutional neural network for devices with low computing power.
Inf. Sci., March, 2024
Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks.
IEEE Internet Things J., February, 2024
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing.
Comput. Secur., January, 2024
Adaptive personalized privacy-preserving data collection scheme with local differential privacy.
J. King Saud Univ. Comput. Inf. Sci., 2024
Efficient Noninteractive Polynomial Commitment Scheme in the Discrete Logarithm Setting.
IEEE Internet Things J., 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the Information Security Practice and Experience, 2024
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT.
Proceedings of the Information Security Practice and Experience, 2024
Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
A secure and lightweight batch authentication scheme for Internet of Drones environment.
Veh. Commun., December, 2023
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications.
IEEE Syst. J., December, 2023
A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities.
Sensors, December, 2023
J. Syst. Archit., December, 2023
Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system.
Inf. Sci., November, 2023
Des. Codes Cryptogr., November, 2023
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks.
Comput. J., November, 2023
A redesigned secure and efficient data transaction protocol for mobile payment system.
J. Syst. Archit., October, 2023
IEEE Internet Things J., October, 2023
A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder Theorem in Mobile Crowdsensing System.
IEEE Syst. J., September, 2023
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates.
Comput. Stand. Interfaces, August, 2023
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles.
IEEE Trans. Veh. Technol., June, 2023
IEEE Internet Things J., June, 2023
Inf. Process. Manag., May, 2023
A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things.
Inf. Sci., April, 2023
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption.
Comput. J., April, 2023
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing.
IEEE Syst. J., March, 2023
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things.
IEEE Syst. J., March, 2023
TransFlow: a Snakemake workflow for transmission analysis of<i>Mycobacterium tuberculosis</i>whole-genome sequencing data.
Bioinform., January, 2023
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry.
IEEE Trans. Serv. Comput., 2023
Privacy-Preserving Online Medical Prediagnosis Training Model Based on Soft-Margin SVM.
IEEE Trans. Serv. Comput., 2023
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2023
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET.
IEEE Internet Things J., 2023
An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications.
IEEE Internet Things J., 2023
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption.
Comput. Stand. Interfaces, 2023
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption.
Comput. Stand. Interfaces, 2023
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing.
Comput. Stand. Interfaces, 2023
Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data.
IEEE Access, 2023
Proceedings of the Provable and Practical Security, 2023
Proceedings of the Blockchain Technology and Emerging Applications, 2023
2022
A Distributed and Privacy-Preserving Random Forest Evaluation Scheme with Fine Grained Access Control.
Symmetry, 2022
Symmetry, 2022
PPDDS: A Privacy-Preserving Disease Diagnosis Scheme Based on the Secure Mahalanobis Distance Evaluation Model.
IEEE Syst. J., 2022
A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support Vector Machine in Clouds.
IEEE Syst. J., 2022
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things.
IEEE Syst. J., 2022
Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments.
IEEE Syst. J., 2022
Quantum Inf. Process., 2022
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain.
J. Syst. Archit., 2022
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption.
Comput. Stand. Interfaces, 2022
Comput. J., 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022
Proceedings of the Information Security - 25th International Conference, 2022
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing.
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks.
Proceedings of the Emerging Information Security and Applications, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing.
Theor. Comput. Sci., 2021
PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations.
IEEE Syst. J., 2021
SE-PPFM: A Searchable Encryption Scheme Supporting Privacy-Preserving Fuzzy Multikeyword in Cloud Systems.
IEEE Syst. J., 2021
Quantum Inf. Process., 2021
Inf. Sci., 2021
A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment.
IEEE Internet Things J., 2021
Des. Codes Cryptogr., 2021
PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks.
Comput. Stand. Interfaces, 2021
IEEE Access, 2021
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids.
Proceedings of the Ubiquitous Security - First International Conference, 2021
Proceedings of the Provable and Practical Security, 2021
A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
2020
Wirel. Commun. Mob. Comput., 2020
Theor. Comput. Sci., 2020
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid.
Inf. Sci., 2020
PPO-CPQ: A Privacy-Preserving Optimization of Clinical Pathway Query for E-Healthcare Systems.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds.
IEEE Syst. J., 2019
Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange.
Int. J. Netw. Secur., 2019
IEEE Access, 2019
IEEE Access, 2019
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
A Method of Collecting Four Character Medicine Effect Phrases in TCM Patents Based on Semi-supervised Learning.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019
2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Syst. J., 2018
A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training.
Int. J. Data Warehous. Min., 2018
J. Ambient Intell. Humaniz. Comput., 2018
KSII Trans. Internet Inf. Syst., 2018
Int. J. Netw. Secur., 2018
Int. J. Intell. Inf. Database Syst., 2018
ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances.
Fundam. Informaticae, 2018
Comput. J., 2018
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation.
Sci. China Inf. Sci., 2018
Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things.
IEEE Access, 2018
Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments.
IEEE Access, 2018
Proceedings of the Information Security Practice and Experience, 2018
Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Syst. J., 2017
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service.
Int. J. Web Grid Serv., 2017
Cost-effective secure E-health cloud system using identity based cryptographic techniques.
Future Gener. Comput. Syst., 2017
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server.
IEEE Access, 2017
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model.
IEEE Access, 2017
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the Advances in Internetworking, 2017
2016
Secur. Commun. Networks, 2016
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity.
Secur. Commun. Networks, 2016
Int. J. Electron. Secur. Digit. Forensics, 2016
Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
Int. J. Commun. Syst., 2016
IACR Cryptol. ePrint Arch., 2016
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing.
Concurr. Comput. Pract. Exp., 2016
Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations.
Comput. J., 2016
Proceedings of the Provable Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization.
IEEE Trans. Inf. Forensics Secur., 2015
Secur. Commun. Networks, 2015
基于Petri网的Web服务组合验证方法 (Verification Methods Based on Petri Networks for Web Services Composition).
计算机科学, 2015
基于服务组合模型结构特征的性能瓶颈定位方案 (Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model).
计算机科学, 2015
Int. J. Netw. Secur., 2015
Comput. J., 2015
Comput. J., 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
J. Supercomput., 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction.
Int. J. Netw. Secur., 2014
Int. J. Commun. Syst., 2014
Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Inf. Secur., 2014
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks.
Frontiers Comput. Sci., 2014
ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage.
Proceedings of the Information Security Practice and Experience, 2014
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation.
IEEE Syst. J., 2013
Secur. Commun. Networks, 2013
Math. Comput. Model., 2013
Int. J. Netw. Secur., 2013
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction.
IACR Cryptol. ePrint Arch., 2013
Comput. J., 2013
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions.
Proceedings of the Information Security Practice and Experience, 2013
2012
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Secur. Commun. Networks, 2012
Inf. Process. Lett., 2012
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Trans. Inf. Syst., 2012
Combining AHP with GIS in synthetic evaluation of environmental suitability for living in China's 35 major cities.
Int. J. Geogr. Inf. Sci., 2012
LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation.
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
Inf. Sci., 2011
Int. J. Netw. Secur., 2011
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
Int. J. Netw. Secur., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
J. Digit. Content Technol. its Appl., 2010
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
2009
Int. J. Netw. Secur., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009
2008
BMC Syst. Biol., 2008
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International Conference on Natural Computation, 2007
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007
Proceedings of the 7th IEEE International Conference on Bioinformatics and Bioengineering, 2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007