Yinghui Zhang

Orcid: 0000-0002-5764-3272

Affiliations:
  • Xi'an University of Posts and Telecommunications, National Engineering Laboratory for Wireless Security, Xi'an, China


According to our database1, Yinghui Zhang authored at least 125 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Anonymous and Secure Data Transmission Mechanism With Trajectory Tracking for D2D Relay Communication in 3GPP 5G Networks.
IEEE Trans. Intell. Transp. Syst., August, 2024

CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., July, 2024

UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks.
IEEE Internet Things J., June, 2024

A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network.
IEEE Trans. Netw. Serv. Manag., April, 2024

CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices.
IEEE Syst. J., March, 2024

HLSBD2: a quantum secure hybrid level source based data deduplication for the cloud.
J. Ambient Intell. Humaniz. Comput., January, 2024

DRCLAS: An efficient certificateless aggregate signature scheme with dynamic revocation in vehicular ad-hoc networks.
Veh. Commun., 2024

Efficient Bilateral Privacy-Preserving Data Collection for Mobile Crowdsensing.
IEEE Trans. Serv. Comput., 2024

Hierarchal Bilateral Access Control With Constant Size Ciphertexts for Mobile Cloud Computing.
IEEE Trans. Cloud Comput., 2024

Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage.
J. Syst. Archit., 2024

2023
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G.
IEEE Trans. Netw. Serv. Manag., September, 2023

A Secure EMR Sharing System With Tamper Resistance and Expressive Access Control.
IEEE Trans. Dependable Secur. Comput., 2023

A Novel Authentication Scheme Supporting Multiple User Access for 5G and Beyond.
IEEE Trans. Dependable Secur. Comput., 2023

A Software-Based Remote Attestation Scheme for Internet of Things Devices.
IEEE Trans. Dependable Secur. Comput., 2023

Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data.
IEEE Trans. Cloud Comput., 2023

Secure and Efficient Smart Healthcare System Based on Federated Learning.
Int. J. Intell. Syst., 2023

LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication.
Comput. Commun., 2023

DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X.
IEEE Trans. Intell. Transp. Syst., 2022

TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2022

Match in My Way: Fine-Grained Bilateral Access Control for Secure Cloud-Fog Computing.
IEEE Trans. Dependable Secur. Comput., 2022

EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet.
IEEE Trans. Dependable Secur. Comput., 2022

Dual Access Control for Cloud-Based Data Storage and Sharing.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight and Expressive Fine-Grained Access Control for Healthcare Internet-of-Things.
IEEE Trans. Cloud Comput., 2022

Secure Similarity Search Over Encrypted Non-Uniform Datasets.
IEEE Trans. Cloud Comput., 2022

Toward Secure and Privacy-Preserving Cloud Data Sharing: Online/Offline Multiauthority CP-ABE With Hidden Policy.
IEEE Syst. J., 2022

Compact Multiple Attribute-Based Signatures With Key Aggregation and Its Application.
IEEE Syst. J., 2022

An Efficient Certificateless Ring Signcryption Scheme With Conditional Privacy-Preserving in VANETs.
J. Syst. Archit., 2022

Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare.
J. King Saud Univ. Comput. Inf. Sci., 2022

Verifiable and privacy preserving federated learning without fully trusted centers.
J. Ambient Intell. Humaniz. Comput., 2022

A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks.
IEEE Internet Things J., 2022

Blockchain-based attribute-based keyword searchable encryption for health cloud system.
Int. J. Embed. Syst., 2022

Secure Asynchronous Federated Learning for Edge Computing Devices.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

A Collaborative Access Control Scheme Based on Incentive Mechanisms.
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022

2021
Outsourcing Service Fair Payment Based on Blockchain and Its Applications in Cloud Computing.
IEEE Trans. Serv. Comput., 2021

On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

Robust and Universal Seamless Handover Authentication in 5G HetNets.
IEEE Trans. Dependable Secur. Comput., 2021

Efficient privacy-preserving authentication for V2G networks.
Peer-to-Peer Netw. Appl., 2021

Secure and verifiable outsourced data dimension reduction on dynamic data.
Inf. Sci., 2021

O<sup>3</sup>-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System.
IEEE Internet Things J., 2021

Secure Collaborative Deep Learning Against GAN Attacks in the Internet of Things.
IEEE Internet Things J., 2021

Efficient attribute-based encryption with repeated attributes optimization.
Int. J. Inf. Sec., 2021

Attribute-based Encryption for Cloud Computing Access Control: A Survey.
ACM Comput. Surv., 2021

Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication.
Comput. Commun., 2021

2020
An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud.
J. Supercomput., 2020

Efficient ciphertext-policy attribute-based encryption with blackbox traceability.
Inf. Sci., 2020

Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020

LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks.
IEEE Internet Things J., 2020

An Efficient Mobile Location-based Service Framework for Resource-constrained Devices.
Int. J. Netw. Secur., 2020

A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing.
Int. J. Distributed Sens. Networks, 2020

Revocable and certificateless public auditing for cloud storage.
Sci. China Inf. Sci., 2020

HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth.
IEEE Access, 2020

Cloud-Assisted Privacy Protection for Data Retrieval Against Keyword Guessing Attacks.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT.
IEEE Trans. Ind. Informatics, 2019

DABKE: Secure deniable attribute-based key exchange framework.
J. Comput. Secur., 2019

Traceable Dynamic Public Auditing with Identity Privacy Preserving for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2019

Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet Things J., 2019

SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet Things J., 2019

Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity.
Int. J. Found. Comput. Sci., 2019

Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things.
Ann. des Télécommunications, 2019

Efficient and privacy-preserving traceable attribute-based encryption in blockchain.
Ann. des Télécommunications, 2019

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019

Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks.
IEEE Access, 2019

Shared Dynamic Data Audit Supporting Anonymous User Revocation in Cloud Storage.
IEEE Access, 2019

Efficient Privacy-Preserving Access Control of Mobile Multimedia Data in Cloud Computing.
IEEE Access, 2019

Generic Construction of ElGamal-Type Attribute-Based Encryption Schemes with Revocability and Dual-Policy.
Proceedings of the Security and Privacy in Communication Networks, 2019

Super Payment Channel for Decentralized Cryptocurrencies.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Efficient and secure big data storage system with leakage resilience in cloud computing.
Soft Comput., 2018

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.
Sensors, 2018

Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.
Sensors, 2018

Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.
Secur. Commun. Networks, 2018

A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience.
Secur. Commun. Networks, 2018

灵活访问且模糊可搜索的EHR云服务系统 (Flexibly Accessed and Vaguely Searchable EHR Cloud Service System).
计算机科学, 2018

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Netw. Comput. Appl., 2018

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.
J. Netw. Comput. Appl., 2018

Dual-side privacy-preserving task matching for spatial crowdsourcing.
J. Netw. Comput. Appl., 2018

Efficient and privacy-aware attribute-based data sharing in mobile cloud computing.
J. Ambient Intell. Humaniz. Comput., 2018

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet Things J., 2018

Secure and fine-grained access control on e-healthcare records in mobile cloud computing.
Future Gener. Comput. Syst., 2018

Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.
Future Gener. Comput. Syst., 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Comput. Secur., 2018

Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing.
Comput. Informatics, 2018

Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power.
IEEE Access, 2018

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

Efficient Traceable Oblivious Transfer and Its Applications.
Proceedings of the Information Security Practice and Experience, 2018

Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Towards privacy protection and malicious behavior traceability in smart health.
Pers. Ubiquitous Comput., 2017

Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks.
Mob. Inf. Syst., 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

Expressive ciphertext-policy attribute-based encryption with direct user revocation.
Int. J. Embed. Syst., 2017

Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice.
Proceedings of the International Conference on Networking and Network Applications, 2017

Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Attribute-Based Encryption with Multi-keyword Search.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Secur. Commun. Networks, 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Secur. Commun. Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive Mob. Comput., 2016

Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
J. Supercomput., 2015

2014
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2014

Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurr. Comput. Pract. Exp., 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Comput. Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

2013
Efficient online/offline signcryption without key exposure.
Int. J. Grid Util. Comput., 2013

Key-Evolving Hierarchical ID-Based Signcryption.
Comput. J., 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks.
Secur. Commun. Networks, 2012

Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012


  Loading...