Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mingwu Zhang
@article{DBLP:journals/compsec/SongSZHWXZ24, author = {Haina Song and Hua Shen and Nan Zhao and Zhangqing He and Minghu Wu and Wei Xiong and Mingwu Zhang}, title = {{APLDP:} Adaptive personalized local differential privacy data collection in mobile crowdsensing}, journal = {Comput. Secur.}, volume = {136}, pages = {103517}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103517}, doi = {10.1016/J.COSE.2023.103517}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SongSZHWXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShenXLSMZ24, author = {Gang Shen and Chengliangyi Xia and Yumei Li and Hua Shen and Weizhi Meng and Mingwu Zhang}, title = {Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in {V2G} Networks}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {4}, pages = {6664--6676}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3311800}, doi = {10.1109/JIOT.2023.3311800}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ShenXLSMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangTSZ24, author = {Peiheng Zhang and Min Tang and Willy Susilo and Mingwu Zhang}, title = {Efficient Noninteractive Polynomial Commitment Scheme in the Discrete Logarithm Setting}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {5}, pages = {8078--8089}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3319338}, doi = {10.1109/JIOT.2023.3319338}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhangTSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/QiaoMZYXYZ24, author = {Zirui Qiao and Kui Ma and Yanwei Zhou and Qiliang Yang and Zhe Xia and Bo Yang and Mingwu Zhang}, title = {An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for {VANET}}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {7}, pages = {11232--11245}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3330580}, doi = {10.1109/JIOT.2023.3330580}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/QiaoMZYXYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/HanZYXZ24, author = {Yu Han and Yanwei Zhou and Bo Yang and Zhe Xia and Mingwu Zhang}, title = {An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {7}, pages = {12252--12265}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3332492}, doi = {10.1109/JIOT.2023.3332492}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/HanZYXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShenWZZ24, author = {Hua Shen and Zhiwei Wang and Jixin Zhang and Mingwu Zhang}, title = {L-Net: {A} lightweight convolutional neural network for devices with low computing power}, journal = {Inf. Sci.}, volume = {660}, pages = {120131}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2024.120131}, doi = {10.1016/J.INS.2024.120131}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ShenWZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShenZWZ23, author = {Hua Shen and Jian Zhou and Ge Wu and Mingwu Zhang}, title = {Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data}, journal = {{IEEE} Access}, volume = {11}, pages = {139715--139727}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3334733}, doi = {10.1109/ACCESS.2023.3334733}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ShenZWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/PanLZLZWWWCLWG23, author = {Junhang Pan and Xiangchen Li and Mingwu Zhang and Yewei Lu and Yelei Zhu and Kunyang Wu and Yiwen Wu and Weixin Wang and Bin Chen and Zhengwei Liu and Xiaomeng Wang and Junshun Gao}, title = {TransFlow: a Snakemake workflow for transmission analysis of\emph{Mycobacterium tuberculosis}whole-genome sequencing data}, journal = {Bioinform.}, volume = {39}, number = {1}, year = {2023}, url = {https://doi.org/10.1093/bioinformatics/btac785}, doi = {10.1093/BIOINFORMATICS/BTAC785}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/PanLZLZWWWCLWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhouWQWYMZ23, author = {Yanwei Zhou and Zhaolong Wang and Zirui Qiao and Ying Wang and Bo Yang and Yi Mu and Mingwu Zhang}, title = {Identity-Based Encryption With Continuous Leakage-Resilient {CCA} Security From Static Complexity Assumption}, journal = {Comput. J.}, volume = {66}, number = {4}, pages = {924--940}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxab205}, doi = {10.1093/COMJNL/BXAB205}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhouWQWYMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/QiaoYZYZ23, author = {Zirui Qiao and Qiliang Yang and Yanwei Zhou and Bo Yang and Mingwu Zhang}, title = {A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks}, journal = {Comput. J.}, volume = {66}, number = {11}, pages = {2810--2824}, year = {2023}, url = {https://doi.org/10.1093/comjnl/bxac123}, doi = {10.1093/COMJNL/BXAC123}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/QiaoYZYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZhouCYXGZ23, author = {Yanwei Zhou and Lei Cao and Bo Yang and Zhe Xia and Chunxiang Gu and Mingwu Zhang}, title = {A direct construction of continuous leakage-resilient {(H)IBE} scheme with {CCA} security from dual system encryption}, journal = {Comput. Stand. Interfaces}, volume = {83}, pages = {103668}, year = {2023}, url = {https://doi.org/10.1016/j.csi.2022.103668}, doi = {10.1016/J.CSI.2022.103668}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ZhouCYXGZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZhangHSW23, author = {Mingwu Zhang and Shuo Huang and Gang Shen and Yuntao Wang}, title = {{PPNNP:} {A} privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption}, journal = {Comput. Stand. Interfaces}, volume = {84}, pages = {103678}, year = {2023}, url = {https://doi.org/10.1016/j.csi.2022.103678}, doi = {10.1016/J.CSI.2022.103678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ZhangHSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChenSZYZ23, author = {Shijin Chen and Willy Susilo and Yudi Zhang and Bo Yang and Mingwu Zhang}, title = {Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing}, journal = {Comput. Stand. Interfaces}, volume = {85}, pages = {103707}, year = {2023}, url = {https://doi.org/10.1016/j.csi.2022.103707}, doi = {10.1016/J.CSI.2022.103707}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ChenSZYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZhangLZ23, author = {Mingwu Zhang and Zhen{-}An Li and Peiheng Zhang}, title = {A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates}, journal = {Comput. Stand. Interfaces}, volume = {86}, pages = {103734}, year = {2023}, url = {https://doi.org/10.1016/j.csi.2023.103734}, doi = {10.1016/J.CSI.2023.103734}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ZhangLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouYQXZM23, author = {Yanwei Zhou and Bo Yang and Zirui Qiao and Zhe Xia and Mingwu Zhang and Yi Mu}, title = {Leakage-resilient identity-based cryptography from minimal assumptions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3757--3801}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01268-8}, doi = {10.1007/S10623-023-01268-8}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhouYQXZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WangZQYGXZ23, author = {Zhaolong Wang and Yanwei Zhou and Zirui Qiao and Bo Yang and Chunxiang Gu and Yuan Xu and Mingwu Zhang}, title = {An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {6, March 15}, pages = {5114--5127}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2022.3222469}, doi = {10.1109/JIOT.2022.3222469}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/WangZQYGXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouCQXYZZ23, author = {Yanwei Zhou and Lei Cao and Zirui Qiao and Zhe Xia and Bo Yang and Mingwu Zhang and Wenzheng Zhang}, title = {An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {11}, pages = {10052--10065}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3236699}, doi = {10.1109/JIOT.2023.3236699}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhouCQXYZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouWQYZ23, author = {Yanwei Zhou and Zhaolong Wang and Zirui Qiao and Bo Yang and Mingwu Zhang}, title = {An Efficient and Provably Secure Identity Authentication Scheme for {VANET}}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {19}, pages = {17170--17183}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3273234}, doi = {10.1109/JIOT.2023.3273234}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhouWQYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhouXQYXZ23, author = {Yanwei Zhou and Ran Xu and Zirui Qiao and Bo Yang and Zhe Xia and Mingwu Zhang}, title = {An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for {VANET}}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {24}, pages = {22823--22835}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3305489}, doi = {10.1109/JIOT.2023.3305489}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/ZhouXQYXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/ShenLWZ23, author = {Hua Shen and Jiqiang Li and Ge Wu and Mingwu Zhang}, title = {Data release for machine learning via correlated differential privacy}, journal = {Inf. Process. Manag.}, volume = {60}, number = {3}, pages = {103349}, year = {2023}, url = {https://doi.org/10.1016/j.ipm.2023.103349}, doi = {10.1016/J.IPM.2023.103349}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipm/ShenLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangYSXW23, author = {Mingwu Zhang and Mingxuan Yang and Gang Shen and Zhe Xia and Yuntao Wang}, title = {A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things}, journal = {Inf. Sci.}, volume = {623}, pages = {293--310}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2022.11.169}, doi = {10.1016/J.INS.2022.11.169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangYSXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShenFGSZ23, author = {Gang Shen and Zhiqiang Fu and Yumin Gui and Willy Susilo and Mingwu Zhang}, title = {Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system}, journal = {Inf. Sci.}, volume = {647}, pages = {119261}, year = {2023}, url = {https://doi.org/10.1016/j.ins.2023.119261}, doi = {10.1016/J.INS.2023.119261}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ShenFGSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/QiaoYZYZ23, author = {Zirui Qiao and Qiliang Yang and Yanwei Zhou and Bo Yang and Mingwu Zhang}, title = {A redesigned secure and efficient data transaction protocol for mobile payment system}, journal = {J. Syst. Archit.}, volume = {143}, pages = {102964}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.102964}, doi = {10.1016/J.SYSARC.2023.102964}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/QiaoYZYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/LiAZG23, author = {Fagen Li and Emmanuel Ahene and Mingwu Zhang and Fuchun Guo}, title = {Guest editorial: Special issue on frontiers in cyber security}, journal = {J. Syst. Archit.}, volume = {145}, pages = {103027}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.103027}, doi = {10.1016/J.SYSARC.2023.103027}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsa/LiAZG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/ShenWZ23, author = {Hua Shen and Yu Wang and Mingwu Zhang}, title = {A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities}, journal = {Sensors}, volume = {23}, number = {24}, pages = {9652}, year = {2023}, url = {https://doi.org/10.3390/s23249652}, doi = {10.3390/S23249652}, timestamp = {Fri, 23 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/ShenWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/QiaoYZYXZW23, author = {Zirui Qiao and Qiliang Yang and Yanwei Zhou and Bo Yang and Zhe Xia and Mingwu Zhang and Tao Wang}, title = {An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {1}, pages = {72--82}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2022.3188012}, doi = {10.1109/JSYST.2022.3188012}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/QiaoYZYXZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/XuZYQWXZ23, author = {Yuan Xu and Yanwei Zhou and Bo Yang and Zirui Qiao and Zhaolong Wang and Zhe Xia and Mingwu Zhang}, title = {An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {1}, pages = {1012--1023}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2022.3185258}, doi = {10.1109/JSYST.2022.3185258}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/XuZYQWXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhuLHZ23, author = {Boyao Zhu and Yumei Li and Guoxiong Hu and Mingwu Zhang}, title = {A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder Theorem in Mobile Crowdsensing System}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {3}, pages = {4257--4266}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3262321}, doi = {10.1109/JSYST.2023.3262321}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhuLHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/MaZWDXYZ23, author = {Kui Ma and Yanwei Zhou and Ying Wang and Chunsheng Dong and Zhe Xia and Bo Yang and Mingwu Zhang}, title = {An Efficient Certificateless Signature Scheme With Provably Security and Its Applications}, journal = {{IEEE} Syst. J.}, volume = {17}, number = {4}, pages = {5636--5647}, year = {2023}, url = {https://doi.org/10.1109/JSYST.2023.3269597}, doi = {10.1109/JSYST.2023.3269597}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/MaZWDXYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangCS23, author = {Mingwu Zhang and Yu Chen and Willy Susilo}, title = {Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {3988--4001}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3219849}, doi = {10.1109/TDSC.2022.3219849}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenWXSZ23, author = {Hua Shen and Ge Wu and Zhe Xia and Willy Susilo and Mingwu Zhang}, title = {A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {2637--2652}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3269669}, doi = {10.1109/TIFS.2023.3269669}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenWXSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangCSS23, author = {Mingwu Zhang and Shijin Chen and Jian Shen and Willy Susilo}, title = {PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {18}, pages = {5804--5816}, year = {2023}, url = {https://doi.org/10.1109/TIFS.2023.3315526}, doi = {10.1109/TIFS.2023.3315526}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangCSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/DengTXZ23, author = {Guoqiang Deng and Min Tang and Yuxing Xi and Mingwu Zhang}, title = {Privacy-Preserving Online Medical Prediagnosis Training Model Based on Soft-Margin {SVM}}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {3}, pages = {2072--2084}, year = {2023}, url = {https://doi.org/10.1109/TSC.2022.3194121}, doi = {10.1109/TSC.2022.3194121}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/DengTXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ShenWSZ23, author = {Hua Shen and Ge Wu and Willy Susilo and Mingwu Zhang}, title = {Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {6}, pages = {4554--4566}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3326497}, doi = {10.1109/TSC.2023.3326497}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/ShenWSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ChenXLZH23, author = {Biwen Chen and Tao Xiang and Xiaoguo Li and Mingwu Zhang and Debiao He}, title = {Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {6}, pages = {7844--7856}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3240824}, doi = {10.1109/TVT.2023.3240824}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/ChenXLZH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vcomm/ZhangMZM23, author = {Yuanyuan Zhang and Lingzhe Meng and Mingwu Zhang and Weizhi Meng}, title = {A secure and lightweight batch authentication scheme for Internet of Drones environment}, journal = {Veh. Commun.}, volume = {44}, pages = {100680}, year = {2023}, url = {https://doi.org/10.1016/j.vehcom.2023.100680}, doi = {10.1016/J.VEHCOM.2023.100680}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vcomm/ZhangMZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WangWZ23, author = {Yuzhu Wang and Xingbo Wang and Mingwu Zhang}, editor = {Mingwu Zhang and Man Ho Au and Yudi Zhang}, title = {Homomorphic Witness Encryption from Indistinguishable Obfuscation}, booktitle = {Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14217}, pages = {231--250}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45513-1\_13}, doi = {10.1007/978-3-031-45513-1\_13}, timestamp = {Tue, 17 Oct 2023 11:27:43 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WangWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2023, editor = {Mingwu Zhang and Man Ho Au and Yudi Zhang}, title = {Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14217}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-45513-1}, doi = {10.1007/978-3-031-45513-1}, isbn = {978-3-031-45512-4}, timestamp = {Tue, 17 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangQYZZ22, author = {Wenzheng Zhang and Zirui Qiao and Bo Yang and Yanwei Zhou and Mingwu Zhang}, title = {Continuous Leakage-Amplified Public-Key Encryption With {CCA} Security}, journal = {Comput. J.}, volume = {65}, number = {7}, pages = {1760--1775}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxab017}, doi = {10.1093/COMJNL/BXAB017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangQYZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KuSZLZ22, author = {Hanchao Ku and Willy Susilo and Yudi Zhang and Wenfen Liu and Mingwu Zhang}, title = {Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption}, journal = {Comput. Stand. Interfaces}, volume = {80}, pages = {103583}, year = {2022}, url = {https://doi.org/10.1016/j.csi.2021.103583}, doi = {10.1016/J.CSI.2021.103583}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KuSZLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/ZhangYS22, author = {Mingwu Zhang and Mingxuan Yang and Gang Shen}, title = {{SSBAS-FA:} {A} secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain}, journal = {J. Syst. Archit.}, volume = {129}, pages = {102619}, year = {2022}, url = {https://doi.org/10.1016/j.sysarc.2022.102619}, doi = {10.1016/J.SYSARC.2022.102619}, timestamp = {Mon, 17 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/ZhangYS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ShiLZ22, author = {Run{-}Hua Shi and Bai Liu and Mingwu Zhang}, title = {Measurement-device-independent quantum secure multiparty summation}, journal = {Quantum Inf. Process.}, volume = {21}, number = {4}, pages = {122}, year = {2022}, url = {https://doi.org/10.1007/s11128-022-03454-4}, doi = {10.1007/S11128-022-03454-4}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/ShiLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangSZ22, author = {Mingwu Zhang and Wenxiang Song and Jixing Zhang}, title = {A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support Vector Machine in Clouds}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {1}, pages = {67--78}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2020.3027758}, doi = {10.1109/JSYST.2020.3027758}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/QiaoYZZ22, author = {Zirui Qiao and Qiliang Yang and Yanwei Zhou and Mingwu Zhang}, title = {Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {2}, pages = {1842--1850}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2020.3046450}, doi = {10.1109/JSYST.2020.3046450}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/QiaoYZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangZS22, author = {Mingwu Zhang and Yimeng Zhang and Gang Shen}, title = {{PPDDS:} {A} Privacy-Preserving Disease Diagnosis Scheme Based on the Secure Mahalanobis Distance Evaluation Model}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {3}, pages = {4552--4562}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2021.3093415}, doi = {10.1109/JSYST.2021.3093415}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/QiaoZYZWX22, author = {Zirui Qiao and Yanwei Zhou and Bo Yang and Mingwu Zhang and Tao Wang and Zhe Xia}, title = {Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things}, journal = {{IEEE} Syst. J.}, volume = {16}, number = {3}, pages = {4719--4730}, year = {2022}, url = {https://doi.org/10.1109/JSYST.2021.3131589}, doi = {10.1109/JSYST.2021.3131589}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/QiaoZYZWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ZhouSZ22, author = {Yang Zhou and Hua Shen and Mingwu Zhang}, title = {A Distributed and Privacy-Preserving Random Forest Evaluation Scheme with Fine Grained Access Control}, journal = {Symmetry}, volume = {14}, number = {2}, pages = {415}, year = {2022}, url = {https://doi.org/10.3390/sym14020415}, doi = {10.3390/SYM14020415}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ZhouSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/ZhangZL022, author = {Mingwu Zhang and Boyao Zhu and Yumei Li and Yuntao Wang}, title = {TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs}, journal = {Symmetry}, volume = {14}, number = {6}, pages = {1123}, year = {2022}, url = {https://doi.org/10.3390/sym14061123}, doi = {10.3390/SYM14061123}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/ZhangZL022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/LiZZ22, author = {Yumei Li and Mingwu Zhang and Futai Zhang}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {229--243}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_12}, doi = {10.1007/978-3-031-22301-3\_12}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/LiZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsc/LianZZZ22, author = {Yuewu Lian and Haitao Zhan and Peiheng Zhang and Mingwu Zhang}, title = {Time-Lock Encryption for Multiple Consecutive Periods and its Application}, booktitle = {7th {IEEE} International Conference on Data Science in Cyberspace, {DSC} 2022, Guilin, China, July 11-13, 2022}, pages = {620--626}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/DSC55868.2022.00094}, doi = {10.1109/DSC55868.2022.00094}, timestamp = {Tue, 11 Oct 2022 16:48:00 +0200}, biburl = {https://dblp.org/rec/conf/dsc/LianZZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisa/XiaLHSZ22, author = {Zhe Xia and Shiyun Liu and Yichen Huang and Hua Shen and Mingwu Zhang}, editor = {Jiageng Chen and Debiao He and Rongxing Lu}, title = {A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks}, booktitle = {Emerging Information Security and Applications - Third International Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1641}, pages = {21--36}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23098-1\_2}, doi = {10.1007/978-3-031-23098-1\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eisa/XiaLHSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/LiuH0Z22, author = {Yi Liu and Guoxiong Hu and Yudi Zhang and Mingwu Zhang}, editor = {Emmanuel Ahene and Fagen Li}, title = {{SVFLS:} {A} Secure and Verifiable Federated Learning Training Scheme}, booktitle = {Frontiers in Cyber Security - 5th International Conference, {FCS} 2022, Kumasi, Ghana, December 13-15, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1726}, pages = {134--148}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-8445-7\_9}, doi = {10.1007/978-981-19-8445-7\_9}, timestamp = {Tue, 06 Dec 2022 11:18:03 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/LiuH0Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/LiuSZ22, author = {Fengxiao Liu and Gang Shen and Mingwu Zhang}, title = {Privacy-Preserving Multi-party Neural Network Learning Over Incomplete Data}, booktitle = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications; 8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022, Hainan, China, December 18-20, 2022}, pages = {1216--1221}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00191}, doi = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00191}, timestamp = {Thu, 06 Apr 2023 11:34:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/LiuSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WangZ22, author = {Yuzhu Wang and Mingwu Zhang}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {Witness Encryption from Smooth Projective Hashing System}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {53--72}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_4}, doi = {10.1007/978-3-031-22390-7\_4}, timestamp = {Mon, 06 Nov 2023 13:38:03 +0100}, biburl = {https://dblp.org/rec/conf/isw/WangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/ChenZY22, author = {Shijin Chen and Mingwu Zhang and Bo Yang}, editor = {Willy Susilo and Xiaofeng Chen and Fuchun Guo and Yudi Zhang and Rolly Intan}, title = {Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing}, booktitle = {Information Security - 25th International Conference, {ISC} 2022, Bali, Indonesia, December 18-22, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13640}, pages = {473--490}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22390-7\_28}, doi = {10.1007/978-3-031-22390-7\_28}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/ChenZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/ZhangLZ22, author = {Mingwu Zhang and Zhen{-}An Li and Peihang Zhang}, editor = {Xiaofeng Chen and Xinyi Huang and Miroslaw Kutylowski}, title = {A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption}, booktitle = {Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1663}, pages = {65--82}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-7242-3\_5}, doi = {10.1007/978-981-19-7242-3\_5}, timestamp = {Mon, 17 Oct 2022 16:20:28 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/ZhangLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/ZhangC0Z22, author = {Mingwu Zhang and Chenmei Cui and Gang Shen and Yudi Zhang}, editor = {Xiaofeng Chen and Xinyi Huang and Miroslaw Kutylowski}, title = {A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces}, booktitle = {Security and Privacy in Social Networks and Big Data - 8th International Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1663}, pages = {212--226}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-981-19-7242-3\_14}, doi = {10.1007/978-981-19-7242-3\_14}, timestamp = {Thu, 27 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/socialsec/ZhangC0Z22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShenZWGS21, author = {Hua Shen and Mingwu Zhang and Hao Wang and Fuchun Guo and Willy Susilo}, title = {Efficient and Privacy-Preserving Massive Data Processing for Smart Grids}, journal = {{IEEE} Access}, volume = {9}, pages = {70616--70627}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3078629}, doi = {10.1109/ACCESS.2021.3078629}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShenZWGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/QiaoYZXZ21, author = {Zirui Qiao and Qiliang Yang and Yanwei Zhou and Zhe Xia and Mingwu Zhang}, title = {Novel Public-Key Encryption with Continuous Leakage Amplification}, journal = {Comput. J.}, volume = {64}, number = {8}, pages = {1163--1177}, year = {2021}, url = {https://doi.org/10.1093/comjnl/bxaa124}, doi = {10.1093/COMJNL/BXAA124}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/QiaoYZXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChenKZ21, author = {Yu Chen and Hanchao Ku and Mingwu Zhang}, title = {{PP-OCQ:} {A} distributed privacy-preserving optimal closeness query scheme for social networks}, journal = {Comput. Stand. Interfaces}, volume = {74}, pages = {103484}, year = {2021}, url = {https://doi.org/10.1016/j.csi.2020.103484}, doi = {10.1016/J.CSI.2020.103484}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ChenKZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouYXZM21, author = {Yanwei Zhou and Bo Yang and Zhe Xia and Mingwu Zhang and Yi Mu}, title = {Novel generic construction of leakage-resilient {PKE} scheme with {CCA} security}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1575--1614}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00831-x}, doi = {10.1007/S10623-020-00831-X}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouYXZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangCL21, author = {Mingwu Zhang and Yu Chen and Jingqiang Lin}, title = {A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment}, journal = {{IEEE} Internet Things J.}, volume = {8}, number = {13}, pages = {10830--10842}, year = {2021}, url = {https://doi.org/10.1109/JIOT.2021.3051060}, doi = {10.1109/JIOT.2021.3051060}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShenZWGS21, author = {Hua Shen and Mingwu Zhang and Hao Wang and Fuchun Guo and Willy Susilo}, title = {A cloud-aided privacy-preserving multi-dimensional data comparison protocol}, journal = {Inf. Sci.}, volume = {545}, pages = {739--752}, year = {2021}, url = {https://doi.org/10.1016/j.ins.2020.09.052}, doi = {10.1016/J.INS.2020.09.052}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ShenZWGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/ShiLZ21, author = {Runhua Shi and Bai Liu and Mingwu Zhang}, title = {Secure two-party integer comparison protocol without any third party}, journal = {Quantum Inf. Process.}, volume = {20}, number = {12}, pages = {402}, year = {2021}, url = {https://doi.org/10.1007/s11128-021-03344-1}, doi = {10.1007/S11128-021-03344-1}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/qip/ShiLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangCXDS21, author = {Mingwu Zhang and Yu Chen and Zhe Xia and Jiangyi Du and Willy Susilo}, title = {{PPO-DFK:} {A} Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {759--770}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2991928}, doi = {10.1109/JSYST.2020.2991928}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangCXDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangCH21, author = {Mingwu Zhang and Yu Chen and Jiajun Huang}, title = {{SE-PPFM:} {A} Searchable Encryption Scheme Supporting Privacy-Preserving Fuzzy Multikeyword in Cloud Systems}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {2}, pages = {2980--2988}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2997932}, doi = {10.1109/JSYST.2020.2997932}, timestamp = {Fri, 12 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhouXQYZ21, author = {Yanwei Zhou and Yuan Xu and Zirui Qiao and Bo Yang and Mingwu Zhang}, title = {Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing}, journal = {Theor. Comput. Sci.}, volume = {860}, pages = {1--22}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.01.024}, doi = {10.1016/J.TCS.2021.01.024}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ZhouXQYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/XiaSSZ21, author = {Zhe Xia and Yifeng Shu and Hua Shen and Mingwu Zhang}, editor = {Weizhi Meng and Mauro Conti}, title = {A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks}, booktitle = {Cyberspace Safety and Security - 13th International Symposium, {CSS} 2021, Virtual Event, November 9-11, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13172}, pages = {16--35}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-94029-4\_2}, doi = {10.1007/978-3-030-94029-4\_2}, timestamp = {Fri, 14 Jan 2022 10:25:28 +0100}, biburl = {https://dblp.org/rec/conf/css/XiaSSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangWZH21, author = {Lingfu Wang and Jing Wang and Mingwu Zhang and Weijia Huang}, editor = {Yongxuan Lai and Tian Wang and Min Jiang and Guangquan Xu and Wei Liang and Aniello Castiglione}, title = {A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme}, booktitle = {Algorithms and Architectures for Parallel Processing - 21st International Conference, {ICA3PP} 2021, Virtual Event, December 3-5, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13157}, pages = {411--431}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-95391-1\_26}, doi = {10.1007/978-3-030-95391-1\_26}, timestamp = {Thu, 03 Mar 2022 10:25:35 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/WangWZH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhouSJRZ21, author = {Tianqi Zhou and Jian Shen and Sai Ji and Yongjun Ren and Mingwu Zhang}, editor = {Qiong Huang and Yu Yu}, title = {Key Exposure Resistant Group Key Agreement Protocol}, booktitle = {Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13059}, pages = {83--97}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90402-9\_5}, doi = {10.1007/978-3-030-90402-9\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhouSJRZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ubisec/WangZZZ21, author = {Yuzhu Wang and Peiheng Zhang and Haitao Zhan and Mingwu Zhang}, editor = {Guojun Wang and Kim{-}Kwang Raymond Choo and Ryan K. L. Ko and Yang Xu and Bruno Crispo}, title = {Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids}, booktitle = {Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1557}, pages = {145--158}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-981-19-0468-4\_11}, doi = {10.1007/978-981-19-0468-4\_11}, timestamp = {Wed, 25 May 2022 10:56:01 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/WangZZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HuangYZZH20, author = {Meijuan Huang and Bo Yang and Mingwu Zhang and Lina Zhang and Hong{-}xia Hou}, title = {Updatable Lossy Trapdoor Functions Under Consecutive Leakage}, journal = {Comput. J.}, volume = {63}, number = {4}, pages = {648--656}, year = {2020}, url = {https://doi.org/10.1093/comjnl/bxz119}, doi = {10.1093/COMJNL/BXZ119}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HuangYZZH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangHZC20, author = {Yudi Zhang and Debiao He and Mingwu Zhang and Kim{-}Kwang Raymond Choo}, title = {A provable-secure and practical two-party distributed signing protocol for {SM2} signature algorithm}, journal = {Frontiers Comput. Sci.}, volume = {14}, number = {3}, pages = {143803}, year = {2020}, url = {https://doi.org/10.1007/s11704-018-8106-9}, doi = {10.1007/S11704-018-8106-9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangHZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ShenZWGS20, author = {Hua Shen and Mingwu Zhang and Hao Wang and Fuchun Guo and Willy Susilo}, title = {A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {3083--3093}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2965065}, doi = {10.1109/JIOT.2020.2965065}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ShenZWGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ZhangCS20, author = {Mingwu Zhang and Yu Chen and Willy Susilo}, title = {{PPO-CPQ:} {A} Privacy-Preserving Optimization of Clinical Pathway Query for E-Healthcare Systems}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {10}, pages = {10660--10672}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.3007518}, doi = {10.1109/JIOT.2020.3007518}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ZhangCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShenLXZ20, author = {Hua Shen and Yajing Liu and Zhe Xia and Mingwu Zhang}, title = {An efficient aggregation scheme resisting on malicious data mining attacks for smart grid}, journal = {Inf. Sci.}, volume = {526}, pages = {289--300}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2020.03.107}, doi = {10.1016/J.INS.2020.03.107}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShenLXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/SuSZ20, author = {Yixin Su and Gang Shen and Mingwu Zhang}, title = {A Novel Privacy-Preserving Authentication Scheme for {V2G} Networks}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {2}, pages = {1963--1971}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2019.2932127}, doi = {10.1109/JSYST.2019.2932127}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/SuSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangHLZC20, author = {Yudi Zhang and Debiao He and Yumei Li and Mingwu Zhang and Kim{-}Kwang Raymond Choo}, title = {Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {4}, pages = {5320--5328}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2020.2974892}, doi = {10.1109/JSYST.2020.2974892}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangHLZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhouYXZM20, author = {Yanwei Zhou and Bo Yang and Zhe Xia and Mingwu Zhang and Yi Mu}, title = {Identity-based encryption with leakage-amplified chosen-ciphertext attacks security}, journal = {Theor. Comput. Sci.}, volume = {809}, pages = {277--295}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2019.12.018}, doi = {10.1016/J.TCS.2019.12.018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/ZhouYXZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/ZhangZ20, author = {Mingwu Zhang and Bingruolan Zhou}, title = {{PP-VCA:} {A} Privacy-Preserving and Verifiable Combinatorial Auction Mechanism}, journal = {Wirel. Commun. Mob. Comput.}, volume = {2020}, pages = {8888284:1--8888284:11}, year = {2020}, url = {https://doi.org/10.1155/2020/8888284}, doi = {10.1155/2020/8888284}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wicomm/ZhangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XiaYZZ020, author = {Zhe Xia and Bo Yang and Yanwei Zhou and Mingwu Zhang and Yi Mu}, editor = {Joseph K. Liu and Hui Cui}, title = {Improvement of Attribute-Based Encryption Using Blakley Secret Sharing}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {631--641}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_33}, doi = {10.1007/978-3-030-55304-3\_33}, timestamp = {Wed, 17 Aug 2022 14:32:12 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XiaYZZ020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RuanWMZ19, author = {Ou Ruan and Zihao Wang and Jing Mi and Mingwu Zhang}, title = {New Approach to Set Representation and Practical Private Set-Intersection Protocols}, journal = {{IEEE} Access}, volume = {7}, pages = {64897--64906}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2917057}, doi = {10.1109/ACCESS.2019.2917057}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RuanWMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShiZ19, author = {Run{-}Hua Shi and Mingwu Zhang}, title = {A Feasible Quantum Protocol for Private Set Intersection Cardinality}, journal = {{IEEE} Access}, volume = {7}, pages = {72105--72112}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2919119}, doi = {10.1109/ACCESS.2019.2919119}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/RuanWWZ19, author = {Ou Ruan and Zihao Wang and Qingping Wang and Mingwu Zhang}, title = {Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange}, journal = {Int. J. Netw. Secur.}, volume = {21}, number = {5}, pages = {861--871}, year = {2019}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p861-871.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/RuanWWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangZJS19, author = {Mingwu Zhang and Yudi Zhang and Yan Jiang and Jian Shen}, title = {Obfuscating {EVES} Algorithm and Its Application in Fair Electronic Transactions in Public Clouds}, journal = {{IEEE} Syst. J.}, volume = {13}, number = {2}, pages = {1478--1486}, year = {2019}, url = {https://doi.org/10.1109/JSYST.2019.2900723}, doi = {10.1109/JSYST.2019.2900723}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangPC19, author = {Mingwu Zhang and Bo Peng and Yu Chen}, editor = {Peng Liu and Yuqing Zhang}, title = {An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices}, booktitle = {Proceedings of the 2nd International {ACM} Workshop on Security and Privacy for the Internet-of-Things, IoT S{\&}P@CCS 2019, London, UK, November 15, 2019}, pages = {38--43}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338507.3358620}, doi = {10.1145/3338507.3358620}, timestamp = {Thu, 18 Aug 2022 16:04:01 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/DengCXWZYLY19, author = {Na Deng and Xu Chen and Caiquan Xiong and Chunzhi Wang and Mingwu Zhang and Zhiwei Ye and Desheng Li and Xuehong Yang}, editor = {Leonard Barolli and Farookh Khadeer Hussain and Makoto Ikeda}, title = {A Method of Collecting Four Character Medicine Effect Phrases in {TCM} Patents Based on Semi-supervised Learning}, booktitle = {Complex, Intelligent, and Software Intensive Systems - Proceedings of the 13th International Conference on Complex, Intelligent, and Software Intensive Systems, {CISIS} 2019, Sydney, NSW, Australia, 3-5 July 2019}, series = {Advances in Intelligent Systems and Computing}, volume = {993}, pages = {462--473}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22354-0\_41}, doi = {10.1007/978-3-030-22354-0\_41}, timestamp = {Tue, 25 Jun 2019 16:51:51 +0200}, biburl = {https://dblp.org/rec/conf/cisis/DengCXWZYLY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/XiaHYZMSM19, author = {Zhe Xia and Lein Harn and Bo Yang and Mingwu Zhang and Yi Mu and Willy Susilo and Weizhi Meng}, editor = {Jianying Zhou and Xiapu Luo and Qingni Shen and Zhen Xu}, title = {Provably Secure Group Authentication in the Asynchronous Communication Model}, booktitle = {Information and Communications Security - 21st International Conference, {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11999}, pages = {324--340}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-41579-2\_19}, doi = {10.1007/978-3-030-41579-2\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/XiaHYZMSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/ShenSZZ19, author = {Hua Shen and Daijie Sun and Lan Zhao and Mingwu Zhang}, editor = {Weizhi Meng and Piotr Cofta and Christian Damsgaard Jensen and Tyrone Grandison}, title = {A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying}, booktitle = {Trust Management {XIII} - 13th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {563}, pages = {122--132}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33716-2\_10}, doi = {10.1007/978-3-030-33716-2\_10}, timestamp = {Tue, 15 Jun 2021 13:49:14 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/ShenSZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/ZhangCS019, author = {Mingwu Zhang and Xiao Chen and Gang Shen and Yong Ding}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {348--360}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_25}, doi = {10.1007/978-3-030-30619-9\_25}, timestamp = {Tue, 27 Sep 2022 14:19:43 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/ZhangCS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/RuanYZ19, author = {Ou Ruan and Yang Yang and Mingwu Zhang}, editor = {Joseph K. Liu and Xinyi Huang}, title = {An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {665--674}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_41}, doi = {10.1007/978-3-030-36938-5\_41}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/RuanYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Xia0ZZS019, author = {Zhe Xia and Bo Yang and Yanwei Zhou and Mingwu Zhang and Hua Shen and Yi Mu}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Provably Secure Proactive Secret Sharing Without the Adjacent Assumption}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {247--264}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_14}, doi = {10.1007/978-3-030-31919-9\_14}, timestamp = {Thu, 26 Sep 2019 14:48:19 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Xia0ZZS019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/SunHXCZ19, author = {Liuying Sun and Anthony T. S. Ho and Zhe Xia and Jiageng Chen and Mingwu Zhang}, editor = {Weizhi Meng and Steven Furnell}, title = {Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features}, booktitle = {Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1095}, pages = {57--73}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0758-8\_5}, doi = {10.1007/978-981-15-0758-8\_5}, timestamp = {Mon, 22 Feb 2021 16:00:52 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/SunHXCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@misc{DBLP:data/10/Zhang19b, author = {Mingwu Zhang}, title = {{PPO-DFK}}, publisher = {{IEEE} DataPort}, year = {2019}, month = oct, howpublished = {\url{https://doi.org/10.21227/nq3v-dq04}}, note = {Accessed on YYYY-MM-DD.}, url = {https://doi.org/10.21227/nq3v-dq04}, doi = {10.21227/NQ3V-DQ04}, timestamp = {Wed, 15 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/data/10/Zhang19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangLDT18, author = {Mingwu Zhang and Wentao Leng and Yong Ding and Chunming Tang}, title = {Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things}, journal = {{IEEE} Access}, volume = {6}, pages = {33859--33870}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2842713}, doi = {10.1109/ACCESS.2018.2842713}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangLDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangHSXD18, author = {Mingwu Zhang and Jiajun Huang and Hua Shen and Zhe Xia and Yong Ding}, title = {Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments}, journal = {{IEEE} Access}, volume = {6}, pages = {43936--43945}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2864163}, doi = {10.1109/ACCESS.2018.2864163}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangHSXD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShenSZ18, author = {Gang Shen and Yixin Su and Mingwu Zhang}, title = {Secure and Membership-Based Data Sharing Scheme in {V2G} Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {58450--58460}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2874622}, doi = {10.1109/ACCESS.2018.2874622}, timestamp = {Mon, 01 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShenSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/SunXZCL18, author = {Lixue Sun and Chunxiang Xu and Mingwu Zhang and Kefei Chen and Hongwei Li}, title = {Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation}, journal = {Sci. China Inf. Sci.}, volume = {61}, number = {3}, pages = {038106:1--038106:3}, year = {2018}, url = {https://doi.org/10.1007/s11432-017-9124-0}, doi = {10.1007/S11432-017-9124-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/SunXZCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ShenZWZNY18, author = {Yanping Shen and Kangfeng Zheng and Chunhua Wu and Mingwu Zhang and Xinxin Niu and Yixian Yang}, title = {An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection}, journal = {Comput. J.}, volume = {61}, number = {4}, pages = {526--538}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxx101}, doi = {10.1093/COMJNL/BXX101}, timestamp = {Tue, 24 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ShenZWZNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fuin/Zhang18, author = {Mingwu Zhang}, title = {ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances}, journal = {Fundam. Informaticae}, volume = {157}, number = {1-2}, pages = {1--27}, year = {2018}, url = {https://doi.org/10.3233/FI-2018-1615}, doi = {10.3233/FI-2018-1615}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fuin/Zhang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijiids/ChenZLCZ18, author = {Yonghui Chen and Cheng Zhang and Wei Li and Tingsong Chen and Mingwu Zhang}, title = {A publicly verifiable network coding scheme with null-space {HMAC}}, journal = {Int. J. Intell. Inf. Database Syst.}, volume = {11}, number = {2/3}, pages = {117--131}, year = {2018}, url = {https://doi.org/10.1504/IJIIDS.2018.10013273}, doi = {10.1504/IJIIDS.2018.10013273}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijiids/ChenZLCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/LiMZ18, author = {Sujuan Li and Yi Mu and Mingwu Zhang}, title = {Certificate-based Smooth Projective Hashing and Its Applications}, journal = {Int. J. Netw. Secur.}, volume = {20}, number = {2}, pages = {266--277}, year = {2018}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p266-277.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/LiMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ShenSZZXZ18, author = {Gang Shen and Yixin Su and Danhong Zhang and Huajun Zhang and Binyu Xiong and Mingwu Zhang}, title = {Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {12}, number = {4}, pages = {1553--1571}, year = {2018}, url = {https://doi.org/10.3837/tiis.2018.04.009}, doi = {10.3837/TIIS.2018.04.009}, timestamp = {Mon, 26 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/ShenSZZXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/ZhangYJLT18, author = {Mingwu Zhang and Yao Yao and Yan Jiang and Bingbing Li and Chunming Tang}, title = {Accountable mobile E-commerce scheme in intelligent cloud system transactions}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {9}, number = {6}, pages = {1889--1899}, year = {2018}, url = {https://doi.org/10.1007/s12652-017-0672-4}, doi = {10.1007/S12652-017-0672-4}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/ZhangYJLT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/DengWZYXTLC18, author = {Na Deng and Chunzhi Wang and Mingwu Zhang and Zhiwei Ye and Liang Xiao and Jingbai Tian and Desheng Li and Xu Chen}, title = {A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training}, journal = {Int. J. Data Warehous. Min.}, volume = {14}, number = {4}, pages = {1--19}, year = {2018}, url = {https://doi.org/10.4018/IJDWM.2018100101}, doi = {10.4018/IJDWM.2018100101}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jdwm/DengWZYXTLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/RuanZZZH18, author = {Ou Ruan and Yuanyuan Zhang and Mingwu Zhang and Jing Zhou and Lein Harn}, title = {After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange}, journal = {{IEEE} Syst. J.}, volume = {12}, number = {2}, pages = {2017--2026}, year = {2018}, url = {https://doi.org/10.1109/JSYST.2017.2685524}, doi = {10.1109/JSYST.2017.2685524}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/RuanZZZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiZWLLZ18, author = {Xingxin Li and Youwen Zhu and Jian Wang and Zhe Liu and Yining Liu and Mingwu Zhang}, title = {On the Soundness and Security of Privacy-Preserving {SVM} for Outsourcing Data Classification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {5}, pages = {906--912}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2017.2682244}, doi = {10.1109/TDSC.2017.2682244}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiZWLLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XiaS0ZZ18, author = {Zhe Xia and Liuying Sun and Bo Yang and Yanwei Zhou and Mingwu Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {83--100}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_6}, doi = {10.1007/978-3-319-93638-3\_6}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XiaS0ZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18, author = {Jian Shen and Dengzhi Liu and Xiaofeng Chen and Xinyi Huang and Jiageng Chen and Mingwu Zhang}, editor = {Willy Susilo and Guomin Yang}, title = {Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {417--430}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_24}, doi = {10.1007/978-3-319-93638-3\_24}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangJSLS18, author = {Mingwu Zhang and Yan Jiang and Hua Shen and Bingbing Li and Willy Susilo}, editor = {Fuchun Guo and Xinyi Huang and Moti Yung}, title = {Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation}, booktitle = {Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11449}, pages = {240--259}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-14234-6\_13}, doi = {10.1007/978-3-030-14234-6\_13}, timestamp = {Thu, 14 Jul 2022 16:21:07 +0200}, biburl = {https://dblp.org/rec/conf/cisc/ZhangJSLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/XiaYZM18, author = {Zhe Xia and Bo Yang and Mingwu Zhang and Yi Mu}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {An Efficient and Provably Secure Private Polynomial Evaluation Scheme}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {595--609}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_38}, doi = {10.1007/978-3-319-99807-7\_38}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/XiaYZM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eidwt/2017, editor = {Leonard Barolli and Mingwu Zhang and Xu An Wang}, title = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International Conference on Emerging Internetworking, Data {\&} Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {6}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-59463-7}, doi = {10.1007/978-3-319-59463-7}, isbn = {978-3-319-59462-0}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eidwt/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangJMS17, author = {Mingwu Zhang and Yan Jiang and Yi Mu and Willy Susilo}, title = {Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server}, journal = {{IEEE} Access}, volume = {5}, pages = {26419--26434}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2771335}, doi = {10.1109/ACCESS.2017.2771335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangJMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/RuanCZ17, author = {Ou Ruan and Jing Chen and Mingwu Zhang}, title = {Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model}, journal = {{IEEE} Access}, volume = {5}, pages = {26832--26841}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2776160}, doi = {10.1109/ACCESS.2017.2776160}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/RuanCZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangMXZL17, author = {Xu An Wang and Jianfeng Ma and Fatos Xhafa and Mingwu Zhang and Xiaoshuang Luo}, title = {Cost-effective secure E-health cloud system using identity based cryptographic techniques}, journal = {Future Gener. Comput. Syst.}, volume = {67}, pages = {242--254}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.08.008}, doi = {10.1016/J.FUTURE.2016.08.008}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangMXZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijwgs/WangMXQZ17, author = {Xu An Wang and Jianfeng Ma and Fatos Xhafa and Baodong Qin and Mingwu Zhang}, title = {New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service}, journal = {Int. J. Web Grid Serv.}, volume = {13}, number = {3}, pages = {246--269}, year = {2017}, url = {https://doi.org/10.1504/IJWGS.2017.10006066}, doi = {10.1504/IJWGS.2017.10006066}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijwgs/WangMXQZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/information/LiMZZ17, author = {Sujuan Li and Yi Mu and Mingwu Zhang and Futai Zhang}, title = {Continuous Leakage Resilient Lossy Trapdoor Functions}, journal = {Inf.}, volume = {8}, number = {2}, pages = {38}, year = {2017}, url = {https://doi.org/10.3390/info8020038}, doi = {10.3390/INFO8020038}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/information/LiMZZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/ZhaoZSZ017, author = {Ling Zhao and Mingwu Zhang and Hua Shen and Yudi Zhang and Jian Shen}, title = {Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {11}, number = {2}, pages = {826--845}, year = {2017}, url = {https://doi.org/10.3837/tiis.2017.02.011}, doi = {10.3837/TIIS.2017.02.011}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/ZhaoZSZ017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZhangZSTH17, author = {Mingwu Zhang and Yudi Zhang and Hua Shen and Chunming Tang and Lein Harn}, title = {Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {4}, pages = {993--1006}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2055}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ZhangZSTH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangZSHM17, author = {Mingwu Zhang and Yudi Zhang and Yixin Su and Qiong Huang and Yi Mu}, title = {Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {2}, pages = {1018--1026}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2015.2435518}, doi = {10.1109/JSYST.2015.2435518}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangZSHM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShenZS17, author = {Hua Shen and Mingwu Zhang and Jian Shen}, title = {Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {6}, pages = {1369--1381}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2656475}, doi = {10.1109/TIFS.2017.2656475}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShenZS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/ZhangJLZ17, author = {Yudi Zhang and Yan Jiang and Bingbing Li and Mingwu Zhang}, editor = {Leonard Barolli and Mingwu Zhang and Xu An Wang}, title = {An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding}, booktitle = {Advances in Internetworking, Data {\&} Web Technologies, The 5th International Conference on Emerging Internetworking, Data {\&} Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017}, series = {Lecture Notes on Data Engineering and Communications Technologies}, volume = {6}, pages = {524--531}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59463-7\_52}, doi = {10.1007/978-3-319-59463-7\_52}, timestamp = {Mon, 03 Apr 2023 12:49:11 +0200}, biburl = {https://dblp.org/rec/conf/eidwt/ZhangJLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/RuanZC17, author = {Ou Ruan and Mingwu Zhang and Jing Chen}, editor = {Shadi Ibrahim and Kim{-}Kwang Raymond Choo and Zheng Yan and Witold Pedrycz}, title = {Leakage-Resilient Password-Based Authenticated Key Exchange}, booktitle = {Algorithms and Architectures for Parallel Processing - 17th International Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10393}, pages = {285--296}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-65482-9\_19}, doi = {10.1007/978-3-319-65482-9\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/RuanZC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/ChenZX17, author = {Yonghui Chen and Mingwu Zhang and Chao Xu}, editor = {Leonard Barolli and Tomoya Enokido}, title = {Reliable Homomorphic Matrix Disguising Scheme}, booktitle = {Innovative Mobile and Internet Services in Ubiquitous Computing - Proceedings of the 11th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2017), Torino, Italy, 10-12 July 2017}, series = {Advances in Intelligent Systems and Computing}, volume = {612}, pages = {666--675}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61542-4\_66}, doi = {10.1007/978-3-319-61542-4\_66}, timestamp = {Wed, 05 Jul 2017 12:58:46 +0200}, biburl = {https://dblp.org/rec/conf/imis/ChenZX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangM16, author = {Mingwu Zhang and Yi Mu}, title = {Token-Leakage Tolerant and Vector Obfuscated {IPE} and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations}, journal = {Comput. J.}, volume = {59}, number = {4}, pages = {493--507}, year = {2016}, url = {https://doi.org/10.1093/comjnl/bxv065}, doi = {10.1093/COMJNL/BXV065}, timestamp = {Mon, 24 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/0003ZD16, author = {Bo Yang and Mingwu Zhang and Jun{-}Qiang Du}, title = {An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {4}, pages = {1083--1093}, year = {2016}, url = {https://doi.org/10.1002/cpe.3521}, doi = {10.1002/CPE.3521}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/0003ZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ZhangXYM16, author = {Mingwu Zhang and Yong Xia and Ou Yuan and Kirill Morozov}, title = {Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services}, journal = {Int. J. Commun. Syst.}, volume = {29}, number = {12}, pages = {1863--1872}, year = {2016}, url = {https://doi.org/10.1002/dac.2817}, doi = {10.1002/DAC.2817}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ZhangXYM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/RuanZZ16, author = {Ou Ruan and Jing Zhou and Mingwu Zhang}, title = {An efficient resource-fair commit-prove-fair-open protocol}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {8}, number = {1}, pages = {17--34}, year = {2016}, url = {https://doi.org/10.1504/IJESDF.2016.073729}, doi = {10.1504/IJESDF.2016.073729}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/RuanZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HarnHZHZ16, author = {Lein Harn and Ching{-}Fang Hsu and Mingwu Zhang and Tingting He and Maoyuan Zhang}, title = {Realizing secret sharing with general access structure}, journal = {Inf. Sci.}, volume = {367-368}, pages = {209--220}, year = {2016}, url = {https://doi.org/10.1016/j.ins.2016.06.006}, doi = {10.1016/J.INS.2016.06.006}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HarnHZHZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangY16, author = {Mingwu Zhang and Bo Yang}, title = {Continual key leakage tolerant encryption from extensible set delegation}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1638--1649}, year = {2016}, url = {https://doi.org/10.1002/sec.813}, doi = {10.1002/SEC.813}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangMSH16, author = {Mingwu Zhang and Yi Mu and Jian Shen and Xinyi Huang}, title = {Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1737--1747}, year = {2016}, url = {https://doi.org/10.1002/sec.1435}, doi = {10.1002/SEC.1435}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangMSH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16, author = {Rongmao Chen and Yi Mu and Willy Susilo and Guomin Yang and Fuchun Guo and Mingwu Zhang}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {One-Round Strong Oblivious Signature-Based Envelope}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {3--20}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_1}, doi = {10.1007/978-3-319-40367-0\_1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenMYSGZ16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {844--876}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_31}, doi = {10.1007/978-3-662-53887-6\_31}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenMYSGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiMZZ16, author = {Sujuan Li and Yi Mu and Mingwu Zhang and Futai Zhang}, editor = {Liqun Chen and Jinguang Han}, title = {Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {309--319}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_18}, doi = {10.1007/978-3-319-47422-9\_18}, timestamp = {Wed, 14 Jul 2021 15:56:25 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiMZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenMYSGZ16, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Mingwu Zhang}, title = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2016}, url = {http://eprint.iacr.org/2016/873}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenMYSGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWTM15, author = {Mingwu Zhang and Chunzhi Wang and Tsuyoshi Takagi and Yi Mu}, title = {Functional Encryption Resilient to Hard-to-Invert Leakage}, journal = {Comput. J.}, volume = {58}, number = {4}, pages = {735--749}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxt105}, doi = {10.1093/COMJNL/BXT105}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MaZHY15, author = {Sha Ma and Mingwu Zhang and Qiong Huang and Bo Yang}, title = {Public Key Encryption with Delegated Equality Test in a Multi-User Setting}, journal = {Comput. J.}, volume = {58}, number = {4}, pages = {986--1002}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu026}, doi = {10.1093/COMJNL/BXU026}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/MaZHY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/HeZX15, author = {Debiao He and Mingwu Zhang and Baowen Xu}, title = {Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model}, journal = {Comput. J.}, volume = {58}, number = {10}, pages = {2507--2508}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxu097}, doi = {10.1093/COMJNL/BXU097}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/HeZX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/PanLZWZ15, author = {Chunhua Pan and Shunpeng Li and Qihui Zhu and Chunzhi Wang and Mingwu Zhang}, title = {Notes on Proxy Signcryption and Multi-proxy Signature Schemes}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {1}, pages = {29--33}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p29-33.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/PanLZWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ShenHZ18, author = {Hua Shen and Yanxiang He and Mingwu Zhang}, title = {{\unicode{22522}}{\unicode{20110}}Petri{\unicode{32593}}{\unicode{30340}}Web{\unicode{26381}}{\unicode{21153}}{\unicode{32452}}{\unicode{21512}}{\unicode{39564}}{\unicode{35777}}{\unicode{26041}}{\unicode{27861}} (Verification Methods Based on Petri Networks for Web Services Composition)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {4}, pages = {111--115}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.04.021}, doi = {10.11896/J.ISSN.1002-137X.2015.04.021}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/ShenHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ShenHZ15, author = {Hua Shen and Yanxiang He and Mingwu Zhang}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{26381}}{\unicode{21153}}{\unicode{32452}}{\unicode{21512}}{\unicode{27169}}{\unicode{22411}}{\unicode{32467}}{\unicode{26500}}{\unicode{29305}}{\unicode{24449}}{\unicode{30340}}{\unicode{24615}}{\unicode{33021}}{\unicode{29942}}{\unicode{39048}}{\unicode{23450}}{\unicode{20301}}{\unicode{26041}}{\unicode{26696}} (Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {9}, pages = {107--117}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.09.022}, doi = {10.11896/J.ISSN.1002-137X.2015.09.022}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/ShenHZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengJLZ15, author = {Chi Cheng and Tao Jiang and Yining Liu and Mingwu Zhang}, title = {Security analysis of a homomorphic signature scheme for network coding}, journal = {Secur. Commun. Networks}, volume = {8}, number = {18}, pages = {4053--4060}, year = {2015}, url = {https://doi.org/10.1002/sec.1321}, doi = {10.1002/SEC.1321}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChengJLZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/MaHZY15, author = {Sha Ma and Qiong Huang and Mingwu Zhang and Bo Yang}, title = {Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {3}, pages = {458--470}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2014.2378592}, doi = {10.1109/TIFS.2014.2378592}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/MaHZY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/ZhangCS15, author = {Mingwu Zhang and Biwen Chen and Hua Shen}, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption}, booktitle = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9532}, pages = {133--142}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27161-3\_12}, doi = {10.1007/978-3-319-27161-3\_12}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/ZhangCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/ZhangM14, author = {Mingwu Zhang and Yi Mu}, title = {Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks}, journal = {Frontiers Comput. Sci.}, volume = {8}, number = {3}, pages = {456--468}, year = {2014}, url = {https://doi.org/10.1007/s11704-014-3271-y}, doi = {10.1007/S11704-014-3271-Y}, timestamp = {Mon, 24 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/ZhangM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangNYT14, author = {Mingwu Zhang and Takashi Nishide and Bo Yang and Tsuyoshi Takagi}, title = {Anonymous encryption with partial-order subset delegation and its application in privacy email systems}, journal = {{IET} Inf. Secur.}, volume = {8}, number = {4}, pages = {240--249}, year = {2014}, url = {https://doi.org/10.1049/iet-ifs.2013.0045}, doi = {10.1049/IET-IFS.2013.0045}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangNYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ZhangWYT14, author = {Mingwu Zhang and Chunzhi Wang and Bo Yang and Tsuyoshi Takagi}, title = {Fully secure constructions of spatial encryption with vector privacy}, journal = {Int. J. Commun. Syst.}, volume = {27}, number = {12}, pages = {4307--4327}, year = {2014}, url = {https://doi.org/10.1002/dac.2613}, doi = {10.1002/DAC.2613}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ZhangWYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhouZW014, author = {Min Zhou and Mingwu Zhang and Chunzhi Wang and Bo Yang}, title = {{CCLAS:} {A} Practical and Compact Certificateless Aggregate Signature with Share Extraction}, journal = {Int. J. Netw. Secur.}, volume = {16}, number = {2}, pages = {157--164}, year = {2014}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n2/ijns-2014-v16-n2-p157-164.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhouZW014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ChenLWZ14a, author = {Zhenhua Chen and Shundong Li and Chunzhi Wang and Mingwu Zhang}, title = {Comments on {FHH} Anonymous Multireceiver Encryption}, journal = {Int. J. Netw. Secur.}, volume = {16}, number = {5}, pages = {397--400}, year = {2014}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n5/ijns-2014-v16-n5-p397-400.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ChenLWZ14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangYT14, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Anonymous spatial encryption under affine space delegation functionality with full security}, journal = {Inf. Sci.}, volume = {277}, pages = {715--730}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.03.012}, doi = {10.1016/J.INS.2014.03.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaYZ14, author = {Sha Ma and Bo Yang and Mingwu Zhang}, title = {{PPGJ:} {A} privacy-preserving general join for outsourced encrypted database}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1232--1244}, year = {2014}, url = {https://doi.org/10.1002/sec.854}, doi = {10.1002/SEC.854}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RuanCZCZ14, author = {Ou Ruan and Jing Chen and Jing Zhou and Yongquan Cui and Mingwu Zhang}, title = {An efficient fair UC-secure protocol for two-party computation}, journal = {Secur. Commun. Networks}, volume = {7}, number = {8}, pages = {1253--1263}, year = {2014}, url = {https://doi.org/10.1002/sec.857}, doi = {10.1002/SEC.857}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RuanCZCZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhang0WT14, author = {Mingwu Zhang and Bo Yang and Chunzhi Wang and Tsuyoshi Takagi}, title = {Unbounded anonymous hierarchical {IBE} with continual-key-leakage tolerance}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {1974--1987}, year = {2014}, url = {https://doi.org/10.1002/sec.912}, doi = {10.1002/SEC.912}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhang0WT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ZhangWM14, author = {Mingwu Zhang and Chunzhi Wang and Kirill Morozov}, title = {{LR-FEAD:} leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces}, journal = {J. Supercomput.}, volume = {70}, number = {3}, pages = {1405--1432}, year = {2014}, url = {https://doi.org/10.1007/s11227-014-1234-6}, doi = {10.1007/S11227-014-1234-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ZhangWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Zhang14, author = {Mingwu Zhang}, editor = {Willy Susilo and Yi Mu}, title = {New Model and Construction of {ABE:} Achieving Key Resilient-Leakage and Attribute Direct-Revocation}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {192--208}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_13}, doi = {10.1007/978-3-319-08344-5\_13}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/Zhang14, author = {Mingwu Zhang}, editor = {Xinyi Huang and Jianying Zhou}, title = {ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {481--495}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_35}, doi = {10.1007/978-3-319-06320-1\_35}, timestamp = {Fri, 09 Apr 2021 18:45:22 +0200}, biburl = {https://dblp.org/rec/conf/ispec/Zhang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangYT13, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate}, journal = {Comput. J.}, volume = {56}, number = {4}, pages = {464--477}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs133}, doi = {10.1093/COMJNL/BXS133}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangYWT13, author = {Mingwu Zhang and Jintao Yao and Chunzhi Wang and Tsuyoshi Takagi}, title = {Public Key Replacement and Universal Forgery of a {SCLS} Scheme}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {2}, pages = {133--138}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p133-138.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangYWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LiZT13, author = {Fagen Li and Mingwu Zhang and Tsuyoshi Takagi}, title = {Identity-based partially blind signature in the standard model for electronic cash}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {196--203}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.07.009}, doi = {10.1016/J.MCM.2012.07.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LiZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYCT13, author = {Mingwu Zhang and Bo Yang and Zhenhua Chen and Tsuyoshi Takagi}, title = {Efficient and adaptively secure broadcast encryption systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {1044--1052}, year = {2013}, url = {https://doi.org/10.1002/sec.678}, doi = {10.1002/SEC.678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangT13, author = {Mingwu Zhang and Tsuyoshi Takagi}, title = {Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {3}, pages = {410--419}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2012.2221893}, doi = {10.1109/JSYST.2012.2221893}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangSWCM13, author = {Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu}, editor = {Robert H. Deng and Tao Feng}, title = {Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions}, booktitle = {Information Security Practice and Experience - 9th International Conference, {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7863}, pages = {75--90}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38033-4\_6}, doi = {10.1007/978-3-642-38033-4\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangSWCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangSWCM13, author = {Mingwu Zhang and Wei Shi and Chunzhi Wang and Zhenhua Chen and Yi Mu}, title = {Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {247}, year = {2013}, url = {http://eprint.iacr.org/2013/247}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangSWCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiZT12, author = {Fagen Li and Mingwu Zhang and Tsuyoshi Takagi}, title = {Efficient signcryption in the standard model}, journal = {Concurr. Comput. Pract. Exp.}, volume = {24}, number = {17}, pages = {1977--1989}, year = {2012}, url = {https://doi.org/10.1002/cpe.1823}, doi = {10.1002/CPE.1823}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LiZT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/gis/XuSZXZL12, author = {Yuyue Xu and Jiulin Sun and Jinqu Zhang and Yong Xu and Mingwu Zhang and Xiuying Liao}, title = {Combining {AHP} with {GIS} in synthetic evaluation of environmental suitability for living in China's 35 major cities}, journal = {Int. J. Geogr. Inf. Sci.}, volume = {26}, number = {9}, pages = {1603--1623}, year = {2012}, url = {https://doi.org/10.1080/13658816.2011.642800}, doi = {10.1080/13658816.2011.642800}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/gis/XuSZXZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangTYL12, author = {Mingwu Zhang and Tsuyoshi Takagi and Bo Yang and Fagen Li}, title = {Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {259--262}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.259}, doi = {10.1587/TRANSFUN.E95.A.259}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangTYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangLT12, author = {Mingwu Zhang and Fagen Li and Tsuyoshi Takagi}, title = {Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {2}, pages = {686--689}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.686}, doi = {10.1587/TRANSINF.E95.D.686}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/MeshramMZ12, author = {Chandrashekhar Meshram and Suchitra A. Meshram and Mingwu Zhang}, title = {An ID-based cryptographic mechanisms based on {GDLP} and {IFP}}, journal = {Inf. Process. Lett.}, volume = {112}, number = {19}, pages = {753--758}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.06.018}, doi = {10.1016/J.IPL.2012.06.018}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/MeshramMZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/ZhuHTZ12, author = {Youwen Zhu and Liusheng Huang and Tsuyoshi Takagi and Mingwu Zhang}, title = {Privacy-Preserving {OLAP} for Accurate Answer}, journal = {J. Circuits Syst. Comput.}, volume = {21}, number = {1}, year = {2012}, url = {https://doi.org/10.1142/S0218126612500090}, doi = {10.1142/S0218126612500090}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/ZhuHTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYT12, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Reconciling and improving of multi-receiver signcryption protocols with threshold decryption}, journal = {Secur. Commun. Networks}, volume = {5}, number = {12}, pages = {1430--1440}, year = {2012}, url = {https://doi.org/10.1002/sec.509}, doi = {10.1002/SEC.509}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YaoLZZ12, author = {Jintao Yao and Kangshun Li and Mingwu Zhang and Min Zhou}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {A Robust Fuzzy Extractor without ECCs}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {60--68}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_5}, doi = {10.1007/978-3-642-38519-3\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YaoLZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YangZ12, author = {Bo Yang and Mingwu Zhang}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {{LR-UESDE:} {A} Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {125--142}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_9}, doi = {10.1007/978-3-642-33272-2\_9}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YangZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangYZT11, author = {Mingwu Zhang and Bo Yang and Wenzheng Zhang and Tsuyoshi Takagi}, title = {Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor}, journal = {Int. J. Netw. Secur.}, volume = {12}, number = {1}, pages = {50--57}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p50-57.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangYZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangYZLT11, author = {Mingwu Zhang and Bo Yang and Yusheng Zhong and Pengcheng Li and Tsuyoshi Takagi}, title = {Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings}, journal = {Int. J. Netw. Secur.}, volume = {12}, number = {3}, pages = {130--136}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p130-136.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangYZLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangYT11, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Group-oriented setting's multisigncryption scheme with threshold designcryption}, journal = {Inf. Sci.}, volume = {181}, number = {18}, pages = {4041--4050}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.05.005}, doi = {10.1016/J.INS.2011.05.005}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangYT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangT11, author = {Mingwu Zhang and Tsuyoshi Takagi}, editor = {Udaya Parampalli and Philip Hawkes}, title = {GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {241--258}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_16}, doi = {10.1007/978-3-642-22497-3\_16}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ZhangTY11, author = {Mingwu Zhang and Tsuyoshi Takagi and Bo Yang}, editor = {Michael Chau and G. Alan Wang and Xiaolong Zheng and Hsinchun Chen and Daniel Zeng and Wenji Mao}, title = {Dual-Verifiers {DVS} with Message Recovery for Tolerant Routing in Wireless Sensor Networks}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2011, Beijing, China, July 9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6749}, pages = {71--84}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22039-5\_8}, doi = {10.1007/978-3-642-22039-5\_8}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ZhangTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiMZT11, author = {Fagen Li and Fahad Bin Muhaya and Mingwu Zhang and Tsuyoshi Takagi}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Efficient Identity-Based Signcryption in the Standard Model}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {120--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_10}, doi = {10.1007/978-3-642-24316-5\_10}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiMZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangNYT11, author = {Mingwu Zhang and Takashi Nishide and Bo Yang and Tsuyoshi Takagi}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Anonymous Encryption with Partial-Order Subset Delegation Functionality}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {154--169}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_12}, doi = {10.1007/978-3-642-24316-5\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhangNYT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdcta/JiangYZ10, author = {Yajun Jiang and Bo Yang and Mingwu Zhang}, title = {A Classified Credential Selection Scheme with Disclosure-minimizing Privacy}, journal = {J. Digit. Content Technol. its Appl.}, volume = {4}, number = {9}, pages = {201--211}, year = {2010}, url = {http://www.aicit.org/jdcta/ppl/25\_FASTJDCTA2-607143.pdf}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdcta/JiangYZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ZhangYTSZ10, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi and Yanping Shen and Wenzheng Zhang}, editor = {Hsinchun Chen and Michael Chau and Shu{-}Hsing Li and Shalini R. Urs and Srinath Srinivasa and G. Alan Wang}, title = {Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI} 2010, Hyderabad, India, June 21, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6122}, pages = {77--87}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13601-6\_10}, doi = {10.1007/978-3-642-13601-6\_10}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ZhangYTSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ZhangLYWT10, author = {Mingwu Zhang and Pengcheng Li and Bo Yang and Hao Wang and Tsuyoshi Takagi}, editor = {Hsinchun Chen and Michael Chau and Shu{-}Hsing Li and Shalini R. Urs and Srinath Srinivasa and G. Alan Wang}, title = {Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI} 2010, Hyderabad, India, June 21, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6122}, pages = {98--104}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13601-6\_12}, doi = {10.1007/978-3-642-13601-6\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ZhangLYWT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangYZZ09, author = {Mingwu Zhang and Bo Yang and Shenglin Zhu and Wenzheng Zhang}, title = {Ordered Semiring-based Trust Establish Model with Risk Evaluating}, journal = {Int. J. Netw. Secur.}, volume = {8}, number = {2}, pages = {101--106}, year = {2009}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n2/ijns-2009-v8-n2-p101-106.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangYZZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ZhangZYZ09, author = {Mingwu Zhang and Yusheng Zhong and Bo Yang and Wenzheng Zhang}, editor = {De{-}Shuang Huang and Kang{-}Hyun Jo and Hong{-}Hee Lee and Hee{-}Jun Kang and Vitoantonio Bevilacqua}, title = {Analysis and Improvement of an ID-Based Anonymous Signcryption Model}, booktitle = {Emerging Intelligent Computing Technology and Applications, 5th International Conference on Intelligent Computing, {ICIC} 2009, Ulsan, South Korea, September 16-19, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5754}, pages = {433--442}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04070-2\_49}, doi = {10.1007/978-3-642-04070-2\_49}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icic/ZhangZYZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangZLY09, author = {Mingwu Zhang and Yusheng Zhong and Pengcheng Li and Bo Yang}, title = {Analysis and Enhance of Anonymous Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2009}, url = {http://eprint.iacr.org/2009/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangZLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcsb/ZhangOSKSPBBZ08, author = {Mingwu Zhang and Qi Ouyang and Alan Stephenson and Michael D. Kane and David E. Salt and Sunil Prabhakar and John Burgner and Charles R. Buck and Xiang Zhang}, title = {Interactive analysis of systems biology molecular expression data}, journal = {{BMC} Syst. Biol.}, volume = {2}, pages = {23}, year = {2008}, url = {https://doi.org/10.1186/1752-0509-2-23}, doi = {10.1186/1752-0509-2-23}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcsb/ZhangOSKSPBBZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/ZhangYZZ08, author = {Mingwu Zhang and Bo Yang and Shenglin Zhu and Wenzheng Zhang}, editor = {Chunming Rong and Martin Gilje Jaatun and Frode Eika Sandnes and Laurence Tianruo Yang and Jianhua Ma}, title = {Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments}, booktitle = {Autonomic and Trusted Computing, 5th International Conference, {ATC} 2008, Oslo, Norway, June 23-25, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5060}, pages = {516--526}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69295-9\_41}, doi = {10.1007/978-3-540-69295-9\_41}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/ZhangYZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/ZhangYZZ08, author = {Mingwu Zhang and Bo Yang and Shenglin Zhu and Wenzheng Zhang}, editor = {Christopher C. Yang and Hsinchun Chen and Michael Chau and Kuiyu Chang and Sheau{-}Dong Lang and Patrick S. Chen and Raymond Hsieh and Daniel Zeng and Fei{-}Yue Wang and Kathleen M. Carley and Wenji Mao and Justin Zhan}, title = {Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy}, booktitle = {Intelligence and Security Informatics, {IEEE} {ISI} 2008 International Workshops: PAISI, PACCF, and {SOCO} 2008, Taipei, Taiwan, June 17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5075}, pages = {126--137}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-69304-8\_14}, doi = {10.1007/978-3-540-69304-8\_14}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/isi/ZhangYZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/YuYHZ07, author = {Yong Yu and Bo Yang and Xinyi Huang and Mingwu Zhang}, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {Efficient Identity-Based Signcryption Scheme for Multiple Receivers}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, pages = {13--21}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_4}, doi = {10.1007/978-3-540-73547-2\_4}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atc/YuYHZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bibe/ZhangKP07, author = {Mingwu Zhang and Daisuke Kihara and Sunil Prabhakar}, title = {Tracing Lineage in Multi-version Scientific Databases}, booktitle = {Proceedings of the 7th {IEEE} International Conference on Bioinformatics and Bioengineering, {BIBE} 2007, October 14-17, 2007, Harvard Medical School, Boston, MA, {USA}}, pages = {440--447}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/BIBE.2007.4375599}, doi = {10.1109/BIBE.2007.4375599}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bibe/ZhangKP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/ZhangJCP07, author = {Mingwu Zhang and Wei Jiang and Chris Clifton and Sunil Prabhakar}, editor = {Roland R. Wagner and Norman Revell and G{\"{u}}nther Pernul}, title = {Identifying Rare Classes with Sparse Training Data}, booktitle = {Database and Expert Systems Applications, 18th International Conference, {DEXA} 2007, Regensburg, Germany, September 3-7, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4653}, pages = {751--760}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74469-6\_73}, doi = {10.1007/978-3-540-74469-6\_73}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/dexa/ZhangJCP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/ZhangYZZ07, author = {Mingwu Zhang and Bo Yang and Shenglin Zhu and Wenzheng Zhang}, editor = {Jingsheng Lei and JingTao Yao and Qingfu Zhang}, title = {Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments}, booktitle = {Third International Conference on Natural Computation, {ICNC} 2007, Haikou, Hainan, China, 24-27 August 2007, Volume 5}, pages = {814--818}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICNC.2007.785}, doi = {10.1109/ICNC.2007.785}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnc/ZhangYZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/ZhangYQZ07, author = {Mingwu Zhang and Bo Yang and Yu Qi and Wenzheng Zhang}, editor = {Wenying Feng and Feng Gao}, title = {Using Trust Metric to Detect Malicious Behaviors in WSNs}, booktitle = {Proceedings of the 8th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China}, pages = {104--108}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SNPD.2007.325}, doi = {10.1109/SNPD.2007.325}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/ZhangYQZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/ZhangZZP07, author = {Mingwu Zhang and Xiangyu Zhang and Xiang Zhang and Sunil Prabhakar}, editor = {Christoph Koch and Johannes Gehrke and Minos N. Garofalakis and Divesh Srivastava and Karl Aberer and Anand Deshpande and Daniela Florescu and Chee Yong Chan and Venkatesh Ganti and Carl{-}Christian Kanne and Wolfgang Klas and Erich J. Neuhold}, title = {Tracing Lineage Beyond Relational Operators}, booktitle = {Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, September 23-27, 2007}, pages = {1116--1127}, publisher = {{ACM}}, year = {2007}, url = {http://www.vldb.org/conf/2007/papers/industrial/p1116-zhang.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vldb/ZhangZZP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.