Yichen Zhang
Orcid: 0000-0002-0907-7827Affiliations:
- Fujian Normal University, Fuzhou, China
- Hohai University, Nanjing, China (PhD 2015)
According to our database1,
Yichen Zhang
authored at least 84 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., December, 2024
IEEE Internet Things J., March, 2024
2023
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size.
IEEE Trans. Knowl. Data Eng., September, 2023
IEEE Syst. J., June, 2023
Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System.
IEEE Trans. Aerosp. Electron. Syst., April, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Cloud Comput., 2022
IEEE Trans. Computers, 2022
IEEE Internet Things J., 2022
CoRR, 2022
2021
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks.
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing.
IEEE Trans. Emerg. Top. Comput., 2021
IEEE Syst. J., 2021
Comput. Stand. Interfaces, 2021
Encoding Frequency Constraints in Preventive Unit Commitment Using Deep Learning with Region-of-Interest Active Sampling.
CoRR, 2021
2020
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs.
Wirel. Pers. Commun., 2020
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Broadcast., 2020
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation.
Soft Comput., 2020
Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext.
Soft Comput., 2020
IEEE Syst. J., 2020
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service.
Inf. Sci., 2020
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT.
IEEE Internet Things J., 2020
Hybrid Imitation Learning for Real-Time Service Restoration in Resilient Distribution Systems.
CoRR, 2020
Adaptive Switching Control of Wind Turbine Generators for Necessary Frequency Response.
CoRR, 2020
CoRR, 2020
Robust Synthesis of Wind Turbine Generators to Support Microgrid Frequency Considering Linearization-Induced Uncertainty.
CoRR, 2020
Approximating Trajectory Constraints with Machine Learning - Microgrid Islanding with Frequency Constraints.
CoRR, 2020
CoRR, 2020
2019
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service.
KSII Trans. Internet Inf. Syst., 2019
Inf. Sci., 2019
Inf. Sci., 2019
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure.
IEEE Access, 2019
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search.
IEEE Access, 2019
IEEE Access, 2019
2018
Theor. Comput. Sci., 2018
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Syst. J., 2018
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.
Secur. Commun. Networks, 2018
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption.
KSII Trans. Internet Inf. Syst., 2018
Inf. Sci., 2018
Inf. Sci., 2018
Fundam. Informaticae, 2018
Set Theory-Based Safety Supervisory Control for Wind Turbines to Ensure Adequate Frequency Response.
CoRR, 2018
2017
IEEE Trans. Serv. Comput., 2017
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Serv. Comput., 2017
IEEE Trans. Inf. Forensics Secur., 2017
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Secur. Commun. Networks, 2017
Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.
Int. J. Commun. Syst., 2017
2016
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
J. Inf. Sci. Eng., 2016
KSII Trans. Internet Inf. Syst., 2016
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
IACR Cryptol. ePrint Arch., 2016
Comput. Informatics, 2016
2015
计算机科学, 2015
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015
2014
Concurr. Comput. Pract. Exp., 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
2013
KSII Trans. Internet Inf. Syst., 2013
KSII Trans. Internet Inf. Syst., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
Comput. Math. Appl., 2012
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
2009
2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2004
Proceedings of the 3rd International Conference on Information Security, 2004
2003