Shun Zhang
Orcid: 0000-0002-3439-5579Affiliations:
- Anhui University, School of Computer Science and Technology, Hefei, China
According to our database1,
Shun Zhang
authored at least 28 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
ACM Trans. Sens. Networks, March, 2024
2023
Inf. Sci., October, 2023
Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation.
Proceedings of the Provable and Practical Security, 2023
2022
2021
Utility-efficient differentially private K-means clustering based on cluster merging.
Neurocomputing, 2021
Differentially private user-based collaborative filtering recommendation based on k-means clustering.
Expert Syst. Appl., 2021
CoRR, 2021
On the differential privacy of dynamic location obfuscation with personalized error bounds.
CoRR, 2021
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing.
Ad Hoc Networks, 2021
2020
A Differentially Private Framework in Spatial Crowdsourcing with Historical Data Learning.
CoRR, 2020
2019
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization.
IEEE Trans. Inf. Forensics Secur., 2019
Knowl. Based Syst., 2019
Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics.
CoRR, 2019
2018
CoRR, 2018
2017
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query.
Quantum Inf. Process., 2017
Quantum Inf. Process., 2017
Int. J. Netw. Secur., 2017
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
2016
Quantum Inf. Process., 2016
KSII Trans. Internet Inf. Syst., 2016
Quantum private set intersection cardinality and its application to anonymous authentication.
Inf. Sci., 2016
Int. J. Secur. Networks, 2016
Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
2015
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks.
J. Supercomput., 2015
Secur. Commun. Networks, 2015