Zoe Lin Jiang
Orcid: 0000-0002-8944-7444
According to our database1,
Zoe Lin Jiang
authored at least 128 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework.
IEEE Internet Things J., July, 2024
VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks.
IEEE Internet Things J., May, 2024
IEEE Trans. Educ., February, 2024
Practical Privacy-Preserving Convolutional Neural Network Inference Framework With Edge Computing for Health Monitoring.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Netw. Sci. Eng., 2024
FSSiBNN: FSS-based Secure Binarized Neural Network Inference with Free Bitwidth Conversion.
IACR Cryptol. ePrint Arch., 2024
Practical Delegatable Attribute-Based Anonymous Credentials with Chainable Revocation.
IACR Cryptol. ePrint Arch., 2024
Lattice-Based Succinct Mercurial Functional Commitment for Circuits: Definitions and Constructions.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
Expert Syst. Appl., 2024
Reverse double auction mechanism: An efficient algorithm for E-commerce platform operations.
Electron. Commer. Res. Appl., 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Performance Analysis and Optimizations of Matrix Multiplications on ARMv8 Processors.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments.
Neural Comput. Appl., August, 2023
Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning.
Comput. J., March, 2023
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023
Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation.
CoRR, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023
Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
SFPDML: Securer and Faster Privacy-Preserving Distributed Machine Learning Based on MKTFHE.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
2022
Sensors, 2022
Blind reconciliation based on inverse encoding of polar codes with adaptive step sizes for quantum key distribution.
Quantum Inf. Process., 2022
Comput. Stand. Interfaces, 2022
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security.
Comput. Stand. Interfaces, 2022
MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
Proceedings of the IEEE International Conference on Trust, 2022
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
2021
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021
Self-supervised learning-based weight adaptive hashing for fast cross-modal retrieval.
Signal Image Video Process., 2021
Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021
Inf. Sci., 2021
Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021
2020
DP-FL: a novel differentially private federated learning framework for the unbalanced data.
World Wide Web, 2020
Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020
Explore instance similarity: An instance correlation based hashing method for multi-label cross-model retrieval.
Inf. Process. Manag., 2020
Comput. Secur., 2020
IEEE Access, 2020
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020
2019
Efficient quantum key distribution protocol based on classical-quantum polarized channels.
Quantum Inf. Process., 2019
Multim. Tools Appl., 2019
Int. J. Mach. Learn. Cybern., 2019
IEEE Internet Things J., 2019
Neurocomputing, 2019
Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties.
Clust. Comput., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Provable Security, 2019
SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019
2018
Wirel. Commun. Mob. Comput., 2018
Signal Process., 2018
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
J. Netw. Comput. Appl., 2018
Neurocomputing, 2018
Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties.
Int. J. High Perform. Comput. Netw., 2018
Int. J. Distributed Sens. Networks, 2018
A sensitive information protection scheme in wearable devices based on quantum entanglement.
Int. J. Distributed Sens. Networks, 2018
Decision Tree Based Approaches for Detecting Protein Complex in Protein Protein Interaction Network (PPI) via Link and Sequence Analysis.
IEEE Access, 2018
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Pers. Ubiquitous Comput., 2017
J. Comput. Syst. Sci., 2017
An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing.
Int. J. Distributed Sens. Networks, 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Feature selection for high dimensional imbalanced class data based on F-measure optimization.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
Key based data analytics across data centers considering bi-level resource provision in cloud computing.
Future Gener. Comput. Syst., 2016
Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Int. J. Pattern Recognit. Artif. Intell., 2015
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015
2014
IEEE Trans. Veh. Technol., 2014
Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013
2012
Proceedings of the Advances in Digital Forensics VIII, 2012
2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
2009
J. Softw. Eng. Appl., 2009
Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the Ad Hoc Networks, First International Conference, 2009
2008
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008
Proceedings of the Advances in Digital Forensics IV, 2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006