Rui Zhang

Orcid: 0000-0003-0002-5593

Affiliations:
  • Chinese Academy of Sciences (CAS), Institute of Information Engineering, State Key Laboratory of Information Security, Beijing, China


According to our database1, Rui Zhang authored at least 44 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic.
IEEE/ACM Trans. Netw., October, 2024

DDoS family: A novel perspective for massive types of DDoS attacks.
Comput. Secur., March, 2024

metaNet: Interpretable unknown mobile malware identification with a novel meta-features mining algorithm.
Comput. Networks, 2024

Improving Model Robustness against Adversarial Examples with Redundant Fully Connected Layer.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

Demo: Enhancing Smart Contract Security Comprehensively through Dynamic Symbolic Execution.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
VulHunter: Hunting Vulnerable Smart Contracts at EVM Bytecode-Level via Multiple Instance Learning.
IEEE Trans. Software Eng., November, 2023

Distributed Attribute-Based Signature With Attribute Dynamic Update for Smart Grid.
IEEE Trans. Ind. Informatics, 2023

SAGE: Steering the Adversarial Generation of Examples With Accelerations.
IEEE Trans. Inf. Forensics Secur., 2023

BPMS: Blockchain-Based Privacy-Preserving Multi-Keyword Search in Multi-Owner Setting.
IEEE Trans. Cloud Comput., 2023

Poster: Detecting Adversarial Examples Hidden under Watermark Perturbation via Usable Information Theory.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Security and Privacy for Healthcare Blockchains.
IEEE Trans. Serv. Comput., 2022

SmartFast: an accurate and robust formal analysis tool for Ethereum smart contracts.
Empir. Softw. Eng., 2022

Electronic Voting Scheme Based on Blockchain and SM2 Cryptographic Algorithm Zero-Knowledge Proof.
Proceedings of the Web Services - ICWS 2022, 2022

SR-MuSig2: A Scalable and Reconfigurable Multi-signature Scheme and Its Applications.
Proceedings of the Information Security and Cryptology - 18th International Conference, 2022

2021
RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain.
ACM Trans. Internet Techn., 2021

A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain.
Secur. Commun. Networks, 2021

Design and analysis of telemedicine authentication protocol.
Int. J. Sens. Networks, 2021

Decentralized Trust Management: Risk Analysis and Trust Aggregation.
ACM Comput. Surv., 2021

Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of Blockchain.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
Verifiable outsourcing computation for modular exponentiation from shareable functions.
Clust. Comput., 2020

Secure Outsourcing Algorithms for Composite Modular Exponentiation Based on Single Untrusted Cloud.
Comput. J., 2020

Revocable Attribute-Based Signature for Blockchain-Based Healthcare System.
IEEE Access, 2020

A Reputation Based Hybrid Consensus for E-Commerce Blockchain.
Proceedings of the Web Services - ICWS 2020, 2020

A Secure and Efficient Smart Contract Execution Scheme.
Proceedings of the Web Services - ICWS 2020, 2020

2019
Research on electronic medical record access control based on blockchain.
Int. J. Distributed Sens. Networks, 2019

Security and Privacy on Blockchain.
ACM Comput. Surv., 2019

An Efficient Traceable and Anonymous Authentication Scheme for Permissioned Blockchain.
Proceedings of the Web Services - ICWS 2019, 2019

2018
Searchable Encryption for Healthcare Clouds: A Survey.
IEEE Trans. Serv. Comput., 2018

A new audio steganalysis method based on linear prediction.
Multim. Tools Appl., 2018

A privacy-preserving Internet of Things device management scheme based on blockchain.
Int. J. Distributed Sens. Networks, 2018

Attribute-based multi-function verifiable computation.
Future Gener. Comput. Syst., 2018

Privacy-Preserving Homomorphic MACs with Efficient Verification.
Proceedings of the Web Services - ICWS 2018, 2018

A Decentralizing Attribute-Based Signature for Healthcare Blockchain.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

An Improved Authentication Protocol in Telemedicine System.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size.
Comput. J., 2017

Oblivious Multi-Keyword Search for Secure Cloud Storage Service.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Multi-Client Verifiable Computation Service for Outsourced Data.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Mutual Authentication Protocol for RFID Based on ECC.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data.
ACM Trans. Internet Techn., 2016

PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data.
Proceedings of the IEEE International Conference on Web Services, 2016

2015
Efficient keyword search for public-key setting.
Proceedings of the 34th IEEE Military Communications Conference, 2015

An Approach for Mitigating Potential Threats in Practical SSO Systems.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Role-based and time-bound access and management of EHR data.
Secur. Commun. Networks, 2014

2010
Security Models and Requirements for Healthcare Application Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2010


  Loading...