Yuan Zhang

Orcid: 0000-0002-7909-9845

Affiliations:
  • University of Electronic Science and Technology of China, Center for Cyber Security, Chengdu, China


According to our database1, Yuan Zhang authored at least 67 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain-Based Proxy-Oriented Data Integrity Checking Mechanism in Cloud-Assisted Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., November, 2024

Vertical Federated Learning Across Heterogeneous Regions for Industry 4.0.
IEEE Trans. Ind. Informatics, August, 2024

Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution.
IEEE Trans. Computers, April, 2024

Hardening Password-Based Credential Databases.
IEEE Trans. Inf. Forensics Secur., 2024

Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery.
IEEE Trans. Inf. Forensics Secur., 2024

PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage.
IEEE Trans. Inf. Forensics Secur., 2024

IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024

Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization.
CoRR, 2024

Instruction Backdoor Attacks Against Customized LLMs.
Proceedings of the 33rd USENIX Security Symposium, 2024

Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024

PPoD: Practical Proofs of Dealership for Authorized Data Trading.
Proceedings of the IEEE International Conference on Communications, 2024

STAGE: Secure and Efficient Data Delivery for Exchange-Assisted Data Marketplaces.
Proceedings of the IEEE International Conference on Communications, 2024

2023
HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain.
IEEE Trans. Mob. Comput., November, 2023

Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers.
IEEE Internet Things J., September, 2023

Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts.
IEEE Internet Things J., August, 2023

LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator.
J. Ambient Intell. Humaniz. Comput., July, 2023

Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage.
IEEE Trans. Serv. Comput., 2023

There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation.
IACR Cryptol. ePrint Arch., 2023

Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics.
IACR Cryptol. ePrint Arch., 2023

Privacy-Driven Fine-Grained Data Trading.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

2022
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage.
IEEE Trans. Serv. Comput., 2022

A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens.
IEEE Trans. Inf. Forensics Secur., 2022

Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids.
IEEE Trans. Dependable Secur. Comput., 2022

Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems.
IEEE Trans. Dependable Secur. Comput., 2022

Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids.
IEEE Syst. J., 2022

Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems.
IEEE Syst. J., 2022

Secure Feature Selection for Vertical Federated Learning in eHealth Systems.
Proceedings of the IEEE International Conference on Communications, 2022

2021
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage.
IEEE Trans. Mob. Comput., 2021

Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing.
IEEE Trans. Inf. Forensics Secur., 2021

FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things.
IEEE Trans. Dependable Secur. Comput., 2021

CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors.
IEEE Trans. Cloud Comput., 2021

Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage.
IEEE Trans. Cloud Comput., 2021

Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors.
IEEE Trans. Cloud Comput., 2021

Comments on an identity-based signature scheme for VANETs.
J. Syst. Archit., 2021

PFLM: Privacy-preserving federated learning with membership proof.
Inf. Sci., 2021

Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids.
IEEE Internet Things J., 2021

A blockchain-based access control and intrusion detection framework for satellite communication systems.
Comput. Commun., 2021

BESURE: Blockchain-Based Cloud-Assisted eHealth System with Secure Data Provenance.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

A Blockchain-based Online Transaction System for Physical Products Trading with Fairness, Privacy Preservation, and Auditability.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

Privacy-Preserving Friend Matching for Mobile Social Networks.
Proceedings of the IEEE Global Communications Conference, 2021

2020
Data Security in Cloud Storage
Wireless Networks, Springer, ISBN: 978-981-15-4373-9, 2020

Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage.
IEEE Trans. Serv. Comput., 2020

Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions.
Peer-to-Peer Netw. Appl., 2020

Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation.
Int. J. Inf. Sec., 2020

LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs.
IEEE Access, 2020

Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage.
Proceedings of the Security and Privacy in Digital Economy, 2020

A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage.
J. Inf. Secur. Appl., 2019

Functional broadcast encryption with applications to data sharing for cloud storage.
Inf. Sci., 2019

An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage.
Sci. China Inf. Sci., 2019

Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems.
IEEE Trans. Ind. Informatics, 2018

Private Blockchain-Based Secure Access Control for Smart Home Systems.
KSII Trans. Internet Inf. Syst., 2018

A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting.
J. Inf. Secur. Appl., 2018

Secure and Efficient Large Content Broadcasting in Mobile Social Networks.
IEEE Access, 2018

Blockchain-Based Secure Data Provenance for Cloud Storage.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

DStore: A Distributed Cloud Storage System Based on Smart Contracts and Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks.
Wirel. Pers. Commun., 2017

Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation.
IEEE Trans. Inf. Forensics Secur., 2017

Fuzzy identity-based signature scheme from lattice and its application in biometric authentication.
KSII Trans. Internet Inf. Syst., 2017

2016
Cryptographic Public Verification of Data Integrity for Cloud Storage Systems.
IEEE Cloud Comput., 2016

2015
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors.
IEEE Trans. Comput. Soc. Syst., 2015

Cryptanalysis of an integrity checking scheme for cloud data sharing.
J. Inf. Secur. Appl., 2015

2014
An Efficient Provable Secure Public Auditing Scheme for Cloud Storage.
KSII Trans. Internet Inf. Syst., 2014

2011
Analysis of the Authentication Protocols Based on Game Theory.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...