Zijian Zhang
Orcid: 0000-0002-6313-4407Affiliations:
- Beijing Institute of Technology, Beijing, China
According to our database1,
Zijian Zhang
authored at least 112 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Trusted Execution Environment With Rollback Protection for Smart Contract-Based IoT Data Trading.
IEEE Internet Things J., October, 2024
RAC-Chain: An Asynchronous Consensus-based Cross-chain Approach to Scalable Blockchain for Metaverse.
ACM Trans. Multim. Comput. Commun. Appl., July, 2024
IEEE Internet Things J., June, 2024
IEEE Trans. Knowl. Data Eng., May, 2024
IEEE Trans. Serv. Comput., 2024
Time-Restricted, Verifiable, and Efficient Query Processing Over Encrypted Data on Cloud.
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Serv. Comput., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
A Generic Blockchain-based Steganography Framework with High Capacity via Reversible GAN.
Proceedings of the IEEE INFOCOM 2024, 2024
Secure, Available, Verifiable, and Efficient Range Query Processing on Outsourced Datasets.
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IEEE Trans. Comput. Soc. Syst., October, 2023
InFocus: Amplifying Critical Feature Influence on Non-Intrusive Load Monitoring Through Self-Attention Mechanisms.
IEEE Trans. Smart Grid, September, 2023
Mnemosyne: Privacy-Preserving Ride Matching With Collusion-Resistant Driver Exclusion.
IEEE Trans. Veh. Technol., April, 2023
Astraea: Anonymous and Secure Auditing Based on Private Smart Contracts for Donation Systems.
IEEE Trans. Dependable Secur. Comput., 2023
Guest Editorial Special Issue on Multi-Modal Biomedical Computing-Deep Transfer Learning.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
J. Netw. Comput. Appl., 2023
Future Gener. Comput. Syst., 2023
CoRR, 2023
A Survey on X.509 Public-Key Infrastructure, Certificate Revocation, and Their Modern Implementation on Blockchain and Ledger Technologies.
IEEE Commun. Surv. Tutorials, 2023
RSGNN: A Model-agnostic Approach for Enhancing the Robustness of Signed Graph Neural Networks.
Proceedings of the ACM Web Conference 2023, 2023
A Blockchain-Based Performance Monitoring Scheme for Network Function Virtualization in Space- Aerial- Terrestrial Integrated Networks.
Proceedings of the IEEE Globecom Workshops 2023, 2023
MSDC: Exploiting Multi-State Power Consumption in Non-intrusive Load Monitoring Based on a Dual-CNN Model.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
A Privacy-Preserving and Transparent Identity Management Scheme for Vehicular Social Networking.
IEEE Trans. Veh. Technol., 2022
IEEE/ACM Trans. Netw., 2022
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Towards Explainability in NLP: Analyzing and Calculating Word Saliency through Word Properties.
CoRR, 2022
IEEE Commun. Surv. Tutorials, 2022
Practical Blockchain-Based Steganographic Communication Via Adversarial AI: A Case Study In Bitcoin.
Comput. J., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 9th IEEE International Conference on Cyber Security and Cloud Computing, 2022
Proceedings of the 21st International Conference on Autonomous Agents and Multiagent Systems, 2022
2021
Anonymous and Verifiable Reputation System for E-Commerce Platforms Based on Blockchain.
IEEE Trans. Netw. Serv. Manag., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Neural Comput. Appl., 2021
Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid.
J. Parallel Distributed Comput., 2021
Exploring active attacks for three incorrect implementations of the ISO/IEC 9798 in satellite networks.
Comput. Commun., 2021
Proceedings of the Mobile Computing, Applications, and Services, 2021
Attacking Community Detectors: Mislead Detectors via Manipulating the Graph Structure.
Proceedings of the Mobile Computing, Applications, and Services, 2021
From Local to Global Norm Emergence: Dissolving Self-reinforcing Substructures with Incremental Social Instruments.
Proceedings of the 38th International Conference on Machine Learning, 2021
2020
Veh. Commun., 2020
Zero-to-Stable Driver Identification: A Non-Intrusive and Scalable Driver Identification Scheme.
IEEE Trans. Veh. Technol., 2020
Blockchain-Enabled Secure Energy Trading With Verifiable Fairness in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Dependable Secur. Comput., 2020
Pattern Recognit. Lett., 2020
IEEE Internet Things J., 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
2019
Achieving Privacy-Friendly Storage and Secure Statistics for Smart Meter Data on Outsourced Clouds.
IEEE Trans. Cloud Comput., 2019
Secure Fog-Assisted Crowdsensing With Collusion Resistance: From Data Reporting to Data Requesting.
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
IEEE Commun. Mag., 2019
Provable Data Integrity of Cloud Storage Service With Enhanced Security in the Internet of Things.
IEEE Access, 2019
Achieving Semantic Secure Search in Cloud Supported Information-Centric Internet of Things.
IEEE Access, 2019
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IEEE Wirel. Commun., 2018
Accountable and Transparent TLS Certificate Management: An Alternate Public-Key Infrastructure with Verifiable Trusted Parties.
Secur. Commun. Networks, 2018
Towards Delay-Tolerant Flexible Data Access Control for Smart Grid with Renewable Energy Resources.
CoRR, 2018
IEEE Access, 2018
SmartDetect: A Smart Detection Scheme for Malicious Web Shell Codes via Ensemble Learning.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018
A New Satellite Constellation Networking Certification and Reliable Maintenance Protocol (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
2017
Cost-Friendly Differential Privacy for Smart Meters: Exploiting the Dual Roles of the Noise.
IEEE Trans. Smart Grid, 2017
Toward Delay-Tolerant Flexible Data Access Control for Smart Grid With Renewable Energy Resources.
IEEE Trans. Ind. Informatics, 2017
Privacy Protection Using a Rechargeable Battery for Energy Consumption in Smart Grids.
IEEE Netw., 2017
Achieving differential privacy of trajectory data publishing in participatory sensing.
Inf. Sci., 2017
Sci. China Inf. Sci., 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017
Modeling anomalous attention over an online social network through read/post analytics.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Achieving Communication Effectiveness of Web Authentication Protocol with Key Update.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the Machine Learning and Intelligent Communications, 2017
Proceedings of the Machine Learning and Intelligent Communications, 2017
When privacy meets economics: Enabling differentially-private battery-supported meter reporting in smart grid.
Proceedings of the 25th IEEE/ACM International Symposium on Quality of Service, 2017
An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing.
Proceedings of the IEEE International Conference on Communications, 2017
Protecting user privacy based on secret sharing with fault tolerance for big data in smart grid.
Proceedings of the IEEE International Conference on Communications, 2017
A Novel Contributory Cross-Domain Group Password-Based Authenticated Key Exchange Protocol with Adaptive Security.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
A Privacy-Preserving and Vessel Authentication Scheme Using Automatic Identification System.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
From Secrete Admirer to Cyberstalker: A Measure of Online Interpersonal Surveillance.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017
2016
Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing.
Mob. Inf. Syst., 2016
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows.
Future Gener. Comput. Syst., 2016
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016
2015
Frontiers Comput. Sci., 2015
How to protect query and report privacy without sacrificing service quality in participatory sensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
2013
Enhanced Privacy Preserving Pattern-Code Based Data Aggregation in Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
2012
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings.
Inf. Sci., 2012
2011
Computationally Sound Symbolic Security Reduction Analysis of Group Key Exchange Protocol using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Trusted Systems - Third International Conference, 2011