Yudi Zhang

Orcid: 0000-0002-7830-5133

Affiliations:
  • University of Wollongong, NSW, Australia
  • Wuhan University, Wuhan, Hubei, China (former)


According to our database1, Yudi Zhang authored at least 22 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Real-time privacy-preserved auditing for shared outsourced data.
Comput. Stand. Interfaces, 2025

2024
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs.
IET Inf. Secur., 2024

OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT.
Proceedings of the Information Security Practice and Experience, 2024

2023
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering.
IEEE Trans. Serv. Comput., 2023

Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System.
IEEE Trans. Cloud Comput., 2023

Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing.
Comput. Stand. Interfaces, 2023

2022
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption.
Comput. Stand. Interfaces, 2022

A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2022

SVFLS: A Secure and Verifiable Federated Learning Training Scheme.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021

2020
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020

Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020

A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020

An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds.
IEEE Syst. J., 2019

2018
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018

2017
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments.
IEEE Syst. J., 2017

Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security.
J. Inf. Sci. Eng., 2017

Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server.
KSII Trans. Internet Inf. Syst., 2017

An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding.
Proceedings of the Advances in Internetworking, 2017


  Loading...