Qikun Zhang

Orcid: 0000-0002-6117-5686

According to our database1, Qikun Zhang authored at least 54 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A precise partition strategy for proactive fragmentation avoidance in SDM-EONs with crosstalk awareness.
Photonic Netw. Commun., April, 2024

A routing modulation and spectrum assignment algorithm for semi-filterless elastic optical networks.
Opt. Switch. Netw., February, 2024

Enhancing adversarial attacks with resize-invariant and logical ensemble.
Neural Networks, 2024

2023
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration.
J. Ambient Intell. Humaniz. Comput., October, 2023

Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network.
Multim. Tools Appl., April, 2023

A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment.
Int. J. Netw. Manag., 2023

2022
Group key agreement protocol among terminals of the intelligent information system for mobile edge computing.
Int. J. Intell. Syst., December, 2022

Dynamic permission access control model based on privacy protection.
Telecommun. Syst., 2022

A group key agreement protocol for intelligent internet of things system.
Int. J. Intell. Syst., 2022

A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios.
Int. J. Intell. Syst., 2022

A permission-combination scalable access control model for Internet of things.
Trans. Emerg. Telecommun. Technol., 2022

Multidomain security authentication for the Internet of things.
Concurr. Comput. Pract. Exp., 2022

2021
A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment.
Wirel. Commun. Mob. Comput., 2021

A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks.
Secur. Commun. Networks, 2021

Learnable Heterogeneous Convolution: Learning both topology and strength.
Neural Networks, 2021

A novel FastICA algorithm based on improved secant method for Intelligent drive.
J. Intell. Fuzzy Syst., 2021

Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things.
Int. J. Intell. Syst., 2021

An asymmetric group key agreement protocol based on attribute threshold for Internet of Things.
Trans. Emerg. Telecommun. Technol., 2021

A Security Data Sharing Model for Cloud Network.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA.
Int. J. Perform. Eng., 2020

Blockchain-based asymmetric group key agreement protocol for internet of vehicles.
Comput. Electr. Eng., 2020

A Resource-Periodic-Arrangement Strategy for RMSA Problem in Elastic Optical Networks.
IEEE Access, 2020

Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices.
Proceedings of the Information Security Applications - 21st International Conference, 2020

A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Applied Cryptography and Network Security Workshops, 2020

2019
A positive-negative delayer for slotted OBS networks to enhance two-way signaling scheme.
Telecommun. Syst., 2019

Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things.
Sensors, 2019

A routing and spectrum assignment algorithm in elastic optical network based on minimizing contiguity reduction.
Photonic Netw. Commun., 2019

A constrained-lower-indexed-block spectrum assignment policy in elastic optical networks.
Opt. Switch. Netw., 2019

A hierarchical group key agreement protocol using orientable attributes for cloud computing.
Inf. Sci., 2019

An authenticated hierarchical asymmetric group key agreement protocol based on identity.
Int. J. Embed. Syst., 2019

Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication.
IEEE Access, 2019

Farsighted Spectrum Resource Assignment Method for Advance Reservation Requests in Elastic Optical Networks.
IEEE Access, 2019

A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks.
IEEE Access, 2019

Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security - 22nd International Conference, 2019

Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the Frontiers in Cyber Security - Second International Conference, 2019

Attribute-Based Signatures for Inner-Product Predicate from Lattices.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
An Authentication Key Establish Protocol for WSNs Based on Combined Key.
Wirel. Pers. Commun., 2018

A partial-success-rate-based resource reservation scheme for slotted OBS networks.
Photonic Netw. Commun., 2018

Is visual saliency useful for content-based image retrieval?
Multim. Tools Appl., 2018

An authenticated asymmetric group key agreement based on attribute encryption.
J. Netw. Comput. Appl., 2018

Stochastic Block-Coordinate Gradient Projection Algorithms for Submodular Maximization.
Complex., 2018

Cross-cluster asymmetric group key agreement for wireless sensor networks.
Sci. China Inf. Sci., 2018

A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application.
IEEE Access, 2018

Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2016
Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives.
KSII Trans. Internet Inf. Syst., 2016

2012
Identification of NAND flash ECC algorithms in mobile devices.
Digit. Investig., 2012

2011
Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups.
J. Comput., 2011

An Improved Cross-Domain Role-Based Authorization Management Model.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

A RBAC Model Based on Multi-granularities of Time Constraints.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2008
Construction of a Dynamic Trust Ontology Model.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...