Weidong Zhong

Orcid: 0000-0002-9203-7251

According to our database1, Weidong Zhong authored at least 15 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Linearly Homomorphic Signature Scheme With High-Signature Efficiency and Its Application in IoT.
IEEE Internet Things J., December, 2024

Learning microstructure-property mapping via label-free 3D convolutional neural network.
Vis. Comput., October, 2024

A structure-preserving linearly homomorphic signature scheme with designated combiner.
PeerJ Comput. Sci., 2024

Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing.
J. King Saud Univ. Comput. Inf. Sci., 2024

2023
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid.
IEEE Access, 2023

NEOP: A Framework for Distributed Mobile Apps on Heterogeneous Devices.
Proceedings of the 15th IEEE International Symposium on Autonomous Decentralized System, 2023

Fault Classification and Diagnosis Method for Photovoltaic Power Connected to Distribution Network Equipment Based on arc Flashover Analysis.
Proceedings of the 4th International Conference on Big Data & Artificial Intelligence & Software Engineering, 2023

2022
Setting Calculation Method and Protection Coordination for Relay Protection System in Consideration of Arc Flash.
Proceedings of the 8th International Conference on Systems and Informatics, 2022

2019
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition.
Secur. Commun. Networks, 2019

Construction and Parallel Implementation of Homomorphic Arithmetic Unit Based on NuFHE.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

Preprocessing of Correlation Power Analysis Based on Improved Wavelet Packet.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

2018
A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher.
Wirel. Commun. Mob. Comput., 2018

2015
How to build a faster private information retrieval protocol?
J. Ambient Intell. Humaniz. Comput., 2015

2011
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010


  Loading...