Zijian Zhang

Orcid: 0000-0002-6313-4407

Affiliations:
  • Beijing Institute of Technology, Beijing, China


According to our database1, Zijian Zhang authored at least 116 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Survey on Quality Assurance of Smart Contracts.
ACM Comput. Surv., February, 2025

2024
Dolphin: Efficient Non-Blocking Consensus via Concurrent Block Generation.
IEEE Trans. Mob. Comput., December, 2024

Decentralized and Privacy-Preserving Smart Parking With Secure Repetition and Full Verifiability.
IEEE Trans. Mob. Comput., December, 2024

Trusted Execution Environment With Rollback Protection for Smart Contract-Based IoT Data Trading.
IEEE Internet Things J., October, 2024

RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for Metaverse.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024

Decentralized Fair IoT Data Trading via Searchable Proxy Re-Encryption.
IEEE Internet Things J., June, 2024

Anonymous, Secure, Traceable, and Efficient Decentralized Digital Forensics.
IEEE Trans. Knowl. Data Eng., May, 2024

Phantasm: Adaptive Scalable Mining Toward Stable BlockDAG.
IEEE Trans. Serv. Comput., 2024

Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud.
IEEE Trans. Serv. Comput., 2024

ABDP: Accurate Billing on Differentially Private Data Reporting for Smart Grids.
IEEE Trans. Serv. Comput., 2024

Decentralized Threshold Signatures With Dynamically Private Accountability.
IEEE Trans. Inf. Forensics Secur., 2024

Graph-Based Covert Transaction Detection and Protection in Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

Blockchain-Based Covert Communication: A Detection Attack and Efficient Improvement.
IEEE Trans. Inf. Forensics Secur., 2024

HCA: Hashchain-Based Consensus Acceleration Via Re-Voting.
IEEE Trans. Dependable Secur. Comput., 2024

A Blockchain-Based Privacy-Preserving Scheme for Sealed-Bid Auction.
IEEE Trans. Dependable Secur. Comput., 2024

Leveraging Fine-Tuned Language Models for Efficient and Accurate Smart Contract Auditing.
CoRR, 2024

High-Efficiency Urban 3D Radio Map Estimation Based on Sparse Measurements.
CoRR, 2024

No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning.
CoRR, 2024

A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN.
Proceedings of the IEEE INFOCOM 2024, 2024

Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
Proceedings of the IEEE International Conference on Communications, 2024

Validating Smart Contracts Using GPT Assistant.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024

Threshold Signatures with Private Accountability via Secretly Designated Witnesses.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Blockchain-Based Multisignature Lock for UAC in Metaverse.
IEEE Trans. Comput. Soc. Syst., October, 2023

InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023

Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023

Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Guest Editorial Special Issue on Multi-Modal Biomedical Computing-Deep Transfer Learning.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

EBDL: Effective blockchain-based covert storage channel with dynamic labels.
J. Netw. Comput. Appl., 2023

SmartAuction: A blockchain-based secure implementation of private data queries.
Future Gener. Comput. Syst., 2023

A Comparative Evaluation of Automated Analysis Tools for Solidity Smart Contracts.
CoRR, 2023

Zero-knowledge Proof Meets Machine Learning in Verifiability: A Survey.
CoRR, 2023

CSG: Curriculum Representation Learning for Signed Graph.
CoRR, 2023

Zero-Knowledge Proof-based Practical Federated Learning on Blockchain.
CoRR, 2023

A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies.
IEEE Commun. Surv. Tutorials, 2023

RSGNN: A Model-agnostic Approach for Enhancing the Robustness of Signed Graph Neural Networks.
Proceedings of the ACM Web Conference 2023, 2023

A Blockchain-Based Performance Monitoring Scheme for Network Function Virtualization in Space- Aerial- Terrestrial Integrated Networks.
Proceedings of the IEEE Globecom Workshops 2023, 2023

MSDC: Exploiting Multi-State Power Consumption in Non-intrusive Load Monitoring Based on a Dual-CNN Model.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Privacy-Preserving and Transparent Identity Management Scheme for Vehicular Social Networking.
IEEE Trans. Veh. Technol., 2022

User-Defined Privacy-Preserving Traffic Monitoring Against n-by-1 Jamming Attack.
IEEE/ACM Trans. Netw., 2022

Video Aficionado: We Know What You Are Watching.
IEEE Trans. Mob. Comput., 2022

Proof of Continuous Work for Reliable Data Storage Over Permissionless Blockchain.
IEEE Internet Things J., 2022

Chain-Based Covert Data Embedding Schemes in Blockchain.
IEEE Internet Things J., 2022

Towards Explainability in NLP: Analyzing and Calculating Word Saliency through Word Properties.
CoRR, 2022

Survey on Issues and Recent Advances in Vehicular Public-Key Infrastructure (VPKI).
IEEE Commun. Surv. Tutorials, 2022

Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022

Graph Encryption for Shortest Path Queries with k Unsorted Nodes.
Proceedings of the IEEE International Conference on Trust, 2022

A Searchable Re-encryption-based Scheme for Massive Data Transactions.
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022

Residual Entropy-based Graph Generative Algorithms.
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022

2021
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021

A Blockchain-Based Storage System With Financial Incentives for Load-balancing.
IEEE Trans. Netw. Sci. Eng., 2021

Privacy for 5G-Supported Vehicular Networks.
IEEE Open J. Commun. Soc., 2021

On improving knowledge graph facilitated simple question answering system.
Neural Comput. Appl., 2021

Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid.
J. Parallel Distributed Comput., 2021

Exploring active attacks for three incorrect implementations of the ISO/IEC 9798 in satellite networks.
Comput. Commun., 2021

Improving Togetherness Using Structural Entropy.
Proceedings of the Mobile Computing, Applications, and Services, 2021

Attacking Community Detectors: Mislead Detectors via Manipulating the Graph Structure.
Proceedings of the Mobile Computing, Applications, and Services, 2021

From Local to Global Norm Emergence: Dissolving Self-reinforcing Substructures with Incremental Social Instruments.
Proceedings of the 38th International Conference on Machine Learning, 2021

2020
Accountable credential management system for vehicular communication.
Veh. Commun., 2020

Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.
IEEE Trans. Veh. Technol., 2020

Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Differential Privacy-Based Blockchain for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2020

ASAP: An Anonymous Smart-Parking and Payment Scheme in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Blockchain-based anomaly detection of electricity consumption in smart grids.
Pattern Recognit. Lett., 2020

WiPOS: A POS Terminal Password Inference System Based on Wireless Signals.
IEEE Internet Things J., 2020

SCM: Secure and accountable TLS certificate management.
Int. J. Commun. Syst., 2020

Attack-Resilient TLS Certificate Transparency.
IEEE Access, 2020

Blockchain Meets DAG: A BlockDAG Consensus Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Whispers on Ethereum: Blockchain-based Covert Data Embedding Schemes.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020

2019
Achieving Privacy-Friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds.
IEEE Trans. Cloud Comput., 2019

Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting.
IEEE Internet Things J., 2019

An Efficient and Accurate Nonintrusive Load Monitoring Scheme for Power Consumption.
IEEE Internet Things J., 2019

Privacy-Preserving Authentication and Data Aggregation for Fog-Based Smart Grid.
IEEE Commun. Mag., 2019

Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019

Achieving Semantic Secure Search in Cloud Supported Information-Centric Internet of Things.
IEEE Access, 2019

REM: From Structural Entropy to Community Structure Deception.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

An Approach of Secure Two-Way-Pegged Multi-sidechain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

BanFEL: A Blockchain Based Smart Contract for Fair and Efficient Lottery Scheme.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

A New Complex Network Robustness Attack Algorithm.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

Non-intrusive Load Monitoring Algorithms for Privacy Mining in Smart Grid.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019

2018
Big Data Mining of Users' Energy Consumption Patterns in the Wireless Smart Grid.
IEEE Wirel. Commun., 2018

Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.
Secur. Commun. Networks, 2018

Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources.
CoRR, 2018

PROS: A Privacy-Preserving Route-Sharing Service via Vehicular Fog Computing.
IEEE Access, 2018

SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

A New Satellite Constellation Networking Certification and Reliable Maintenance Protocol (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017

Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Ind. Informatics, 2017

Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017

Achieving differential privacy of trajectory data publishing in participatory sensing.
Inf. Sci., 2017

A privacy-preserving video subscription scheme with the limitation of expire date.
Sci. China Inf. Sci., 2017

Utility-Privacy Tradeoff Based on Random Data Obfuscation in Internet of Energy.
IEEE Access, 2017

A Low-Latency Secure Data Outsourcing Scheme for Cloud-WSN.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Modeling anomalous attention over an online social network through read/post analytics.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Achieving Communication Effectiveness of Web Authentication Protocol with Key Update.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Facility Location Selection Using Community-Based Single Swap: A Case Study.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

An Efficient Sparse Coding-Based Data-Mining Scheme in Smart Grid.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A Novel Structure Digital Receiver.
Proceedings of the Machine Learning and Intelligent Communications, 2017

A Fine Carrier Phase Recovery Method for 32APSK.
Proceedings of the Machine Learning and Intelligent Communications, 2017

When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017

An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017

Protecting user privacy based on secret sharing with fault tolerance for big data in smart grid.
Proceedings of the IEEE International Conference on Communications, 2017

A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

From Secrete Admirer to Cyberstalker: A Measure of Online Interpersonal Surveillance.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
A Perturbed Compressed Sensing Protocol for Crowd Sensing.
Mob. Inf. Syst., 2016

Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing.
Mob. Inf. Syst., 2016

Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows.
Future Gener. Comput. Syst., 2016

Differentially Private Publication Scheme for Trajectory Data.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

An Anonymous Scheme for Current Taxi Applications.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
A survey of SCADA test bed.
Int. J. Wirel. Mob. Comput., 2015

Scalable protocol for cross-domain group password-based authenticated key exchange.
Frontiers Comput. Sci., 2015

How to protect query and report privacy without sacrificing service quality in participatory sensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

2013
Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings.
Inf. Sci., 2012

2011
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2011

Computationally Sound Symbolic Analysis of EAP-TNC Protocol.
Proceedings of the Trusted Systems - Third International Conference, 2011


  Loading...