BibTeX records: Mingwu Zhang

download as .bib file

@article{DBLP:journals/compsec/SongSZHWXZ24,
  author       = {Haina Song and
                  Hua Shen and
                  Nan Zhao and
                  Zhangqing He and
                  Minghu Wu and
                  Wei Xiong and
                  Mingwu Zhang},
  title        = {{APLDP:} Adaptive personalized local differential privacy data collection
                  in mobile crowdsensing},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103517},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103517},
  doi          = {10.1016/J.COSE.2023.103517},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SongSZHWXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenXLSMZ24,
  author       = {Gang Shen and
                  Chengliangyi Xia and
                  Yumei Li and
                  Hua Shen and
                  Weizhi Meng and
                  Mingwu Zhang},
  title        = {Traceable and Privacy-Preserving Authentication Scheme for Energy
                  Trading in {V2G} Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {4},
  pages        = {6664--6676},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3311800},
  doi          = {10.1109/JIOT.2023.3311800},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenXLSMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangTSZ24,
  author       = {Peiheng Zhang and
                  Min Tang and
                  Willy Susilo and
                  Mingwu Zhang},
  title        = {Efficient Noninteractive Polynomial Commitment Scheme in the Discrete
                  Logarithm Setting},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {5},
  pages        = {8078--8089},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3319338},
  doi          = {10.1109/JIOT.2023.3319338},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangTSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/QiaoMZYXYZ24,
  author       = {Zirui Qiao and
                  Kui Ma and
                  Yanwei Zhou and
                  Qiliang Yang and
                  Zhe Xia and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {An Anonymous and Efficient Certificate-Based Identity Authentication
                  Protocol for {VANET}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {11232--11245},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3330580},
  doi          = {10.1109/JIOT.2023.3330580},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/QiaoMZYXYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/HanZYXZ24,
  author       = {Yu Han and
                  Yanwei Zhou and
                  Bo Yang and
                  Zhe Xia and
                  Mingwu Zhang},
  title        = {An Efficient and Secure Lightweight Certificateless Hybrid Signcryption
                  Scheme},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {7},
  pages        = {12252--12265},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3332492},
  doi          = {10.1109/JIOT.2023.3332492},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/HanZYXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShenWZZ24,
  author       = {Hua Shen and
                  Zhiwei Wang and
                  Jixin Zhang and
                  Mingwu Zhang},
  title        = {L-Net: {A} lightweight convolutional neural network for devices with
                  low computing power},
  journal      = {Inf. Sci.},
  volume       = {660},
  pages        = {120131},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.ins.2024.120131},
  doi          = {10.1016/J.INS.2024.120131},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ShenWZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShenZWZ23,
  author       = {Hua Shen and
                  Jian Zhou and
                  Ge Wu and
                  Mingwu Zhang},
  title        = {Multi-Keywords Searchable Attribute-Based Encryption With Verification
                  and Attribute Revocation Over Cloud Data},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {139715--139727},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3334733},
  doi          = {10.1109/ACCESS.2023.3334733},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ShenZWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/PanLZLZWWWCLWG23,
  author       = {Junhang Pan and
                  Xiangchen Li and
                  Mingwu Zhang and
                  Yewei Lu and
                  Yelei Zhu and
                  Kunyang Wu and
                  Yiwen Wu and
                  Weixin Wang and
                  Bin Chen and
                  Zhengwei Liu and
                  Xiaomeng Wang and
                  Junshun Gao},
  title        = {TransFlow: a Snakemake workflow for transmission analysis of\emph{Mycobacterium
                  tuberculosis}whole-genome sequencing data},
  journal      = {Bioinform.},
  volume       = {39},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1093/bioinformatics/btac785},
  doi          = {10.1093/BIOINFORMATICS/BTAC785},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/PanLZLZWWWCLWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhouWQWYMZ23,
  author       = {Yanwei Zhou and
                  Zhaolong Wang and
                  Zirui Qiao and
                  Ying Wang and
                  Bo Yang and
                  Yi Mu and
                  Mingwu Zhang},
  title        = {Identity-Based Encryption With Continuous Leakage-Resilient {CCA}
                  Security From Static Complexity Assumption},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {4},
  pages        = {924--940},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxab205},
  doi          = {10.1093/COMJNL/BXAB205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhouWQWYMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/QiaoYZYZ23,
  author       = {Zirui Qiao and
                  Qiliang Yang and
                  Yanwei Zhou and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {A Novel Construction Of Certificateless Aggregate Signature Scheme
                  For Healthcare Wireless Medical Sensor Networks},
  journal      = {Comput. J.},
  volume       = {66},
  number       = {11},
  pages        = {2810--2824},
  year         = {2023},
  url          = {https://doi.org/10.1093/comjnl/bxac123},
  doi          = {10.1093/COMJNL/BXAC123},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/QiaoYZYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ZhouCYXGZ23,
  author       = {Yanwei Zhou and
                  Lei Cao and
                  Bo Yang and
                  Zhe Xia and
                  Chunxiang Gu and
                  Mingwu Zhang},
  title        = {A direct construction of continuous leakage-resilient {(H)IBE} scheme
                  with {CCA} security from dual system encryption},
  journal      = {Comput. Stand. Interfaces},
  volume       = {83},
  pages        = {103668},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103668},
  doi          = {10.1016/J.CSI.2022.103668},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/ZhouCYXGZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ZhangHSW23,
  author       = {Mingwu Zhang and
                  Shuo Huang and
                  Gang Shen and
                  Yuntao Wang},
  title        = {{PPNNP:} {A} privacy-preserving neural network prediction with separated
                  data providers using multi-client inner-product encryption},
  journal      = {Comput. Stand. Interfaces},
  volume       = {84},
  pages        = {103678},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103678},
  doi          = {10.1016/J.CSI.2022.103678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/ZhangHSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ChenSZYZ23,
  author       = {Shijin Chen and
                  Willy Susilo and
                  Yudi Zhang and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {Privacy-preserving anomaly counting for time-series data in edge-assisted
                  crowdsensing},
  journal      = {Comput. Stand. Interfaces},
  volume       = {85},
  pages        = {103707},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2022.103707},
  doi          = {10.1016/J.CSI.2022.103707},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/ChenSZYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ZhangLZ23,
  author       = {Mingwu Zhang and
                  Zhen{-}An Li and
                  Peiheng Zhang},
  title        = {A secure and privacy-preserving word vector training scheme based
                  on functional encryption with inner-product predicates},
  journal      = {Comput. Stand. Interfaces},
  volume       = {86},
  pages        = {103734},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.csi.2023.103734},
  doi          = {10.1016/J.CSI.2023.103734},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/ZhangLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouYQXZM23,
  author       = {Yanwei Zhou and
                  Bo Yang and
                  Zirui Qiao and
                  Zhe Xia and
                  Mingwu Zhang and
                  Yi Mu},
  title        = {Leakage-resilient identity-based cryptography from minimal assumptions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3757--3801},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01268-8},
  doi          = {10.1007/S10623-023-01268-8},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouYQXZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WangZQYGXZ23,
  author       = {Zhaolong Wang and
                  Yanwei Zhou and
                  Zirui Qiao and
                  Bo Yang and
                  Chunxiang Gu and
                  Yuan Xu and
                  Mingwu Zhang},
  title        = {An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle
                  Communications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {6, March 15},
  pages        = {5114--5127},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2022.3222469},
  doi          = {10.1109/JIOT.2022.3222469},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/WangZQYGXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhouCQXYZZ23,
  author       = {Yanwei Zhou and
                  Lei Cao and
                  Zirui Qiao and
                  Zhe Xia and
                  Bo Yang and
                  Mingwu Zhang and
                  Wenzheng Zhang},
  title        = {An Efficient Identity Authentication Scheme With Dynamic Anonymity
                  for VANETs},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {11},
  pages        = {10052--10065},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3236699},
  doi          = {10.1109/JIOT.2023.3236699},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhouCQXYZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhouWQYZ23,
  author       = {Yanwei Zhou and
                  Zhaolong Wang and
                  Zirui Qiao and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {An Efficient and Provably Secure Identity Authentication Scheme for
                  {VANET}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {19},
  pages        = {17170--17183},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3273234},
  doi          = {10.1109/JIOT.2023.3273234},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhouWQYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhouXQYXZ23,
  author       = {Yanwei Zhou and
                  Ran Xu and
                  Zirui Qiao and
                  Bo Yang and
                  Zhe Xia and
                  Mingwu Zhang},
  title        = {An Anonymous and Efficient Multimessage and Multireceiver Certificateless
                  Signcryption Scheme for {VANET}},
  journal      = {{IEEE} Internet Things J.},
  volume       = {10},
  number       = {24},
  pages        = {22823--22835},
  year         = {2023},
  url          = {https://doi.org/10.1109/JIOT.2023.3305489},
  doi          = {10.1109/JIOT.2023.3305489},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhouXQYXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/ShenLWZ23,
  author       = {Hua Shen and
                  Jiqiang Li and
                  Ge Wu and
                  Mingwu Zhang},
  title        = {Data release for machine learning via correlated differential privacy},
  journal      = {Inf. Process. Manag.},
  volume       = {60},
  number       = {3},
  pages        = {103349},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ipm.2023.103349},
  doi          = {10.1016/J.IPM.2023.103349},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipm/ShenLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangYSXW23,
  author       = {Mingwu Zhang and
                  Mingxuan Yang and
                  Gang Shen and
                  Zhe Xia and
                  Yuntao Wang},
  title        = {A verifiable and privacy-preserving cloud mining pool selection scheme
                  in blockchain of things},
  journal      = {Inf. Sci.},
  volume       = {623},
  pages        = {293--310},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2022.11.169},
  doi          = {10.1016/J.INS.2022.11.169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangYSXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShenFGSZ23,
  author       = {Gang Shen and
                  Zhiqiang Fu and
                  Yumin Gui and
                  Willy Susilo and
                  Mingwu Zhang},
  title        = {Efficient and privacy-preserving online diagnosis scheme based on
                  federated learning in e-healthcare system},
  journal      = {Inf. Sci.},
  volume       = {647},
  pages        = {119261},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ins.2023.119261},
  doi          = {10.1016/J.INS.2023.119261},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ShenFGSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/QiaoYZYZ23,
  author       = {Zirui Qiao and
                  Qiliang Yang and
                  Yanwei Zhou and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {A redesigned secure and efficient data transaction protocol for mobile
                  payment system},
  journal      = {J. Syst. Archit.},
  volume       = {143},
  pages        = {102964},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102964},
  doi          = {10.1016/J.SYSARC.2023.102964},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/QiaoYZYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/LiAZG23,
  author       = {Fagen Li and
                  Emmanuel Ahene and
                  Mingwu Zhang and
                  Fuchun Guo},
  title        = {Guest editorial: Special issue on frontiers in cyber security},
  journal      = {J. Syst. Archit.},
  volume       = {145},
  pages        = {103027},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.103027},
  doi          = {10.1016/J.SYSARC.2023.103027},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsa/LiAZG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/ShenWZ23,
  author       = {Hua Shen and
                  Yu Wang and
                  Mingwu Zhang},
  title        = {A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional
                  Sub-Trajectory Similarities},
  journal      = {Sensors},
  volume       = {23},
  number       = {24},
  pages        = {9652},
  year         = {2023},
  url          = {https://doi.org/10.3390/s23249652},
  doi          = {10.3390/S23249652},
  timestamp    = {Fri, 23 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/ShenWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/QiaoYZYXZW23,
  author       = {Zirui Qiao and
                  Qiliang Yang and
                  Yanwei Zhou and
                  Bo Yang and
                  Zhe Xia and
                  Mingwu Zhang and
                  Tao Wang},
  title        = {An Efficient Certificate-Based Aggregate Signature Scheme With Provable
                  Security for Industrial Internet of Things},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {1},
  pages        = {72--82},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2022.3188012},
  doi          = {10.1109/JSYST.2022.3188012},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/QiaoYZYXZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/XuZYQWXZ23,
  author       = {Yuan Xu and
                  Yanwei Zhou and
                  Bo Yang and
                  Zirui Qiao and
                  Zhaolong Wang and
                  Zhe Xia and
                  Mingwu Zhang},
  title        = {An Efficient Identity Authentication Scheme With Provable Security
                  and Anonymity for Mobile Edge Computing},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {1},
  pages        = {1012--1023},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2022.3185258},
  doi          = {10.1109/JSYST.2022.3185258},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/XuZYQWXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhuLHZ23,
  author       = {Boyao Zhu and
                  Yumei Li and
                  Guoxiong Hu and
                  Mingwu Zhang},
  title        = {A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder
                  Theorem in Mobile Crowdsensing System},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {3},
  pages        = {4257--4266},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3262321},
  doi          = {10.1109/JSYST.2023.3262321},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhuLHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/MaZWDXYZ23,
  author       = {Kui Ma and
                  Yanwei Zhou and
                  Ying Wang and
                  Chunsheng Dong and
                  Zhe Xia and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {An Efficient Certificateless Signature Scheme With Provably Security
                  and Its Applications},
  journal      = {{IEEE} Syst. J.},
  volume       = {17},
  number       = {4},
  pages        = {5636--5647},
  year         = {2023},
  url          = {https://doi.org/10.1109/JSYST.2023.3269597},
  doi          = {10.1109/JSYST.2023.3269597},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/MaZWDXYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangCS23,
  author       = {Mingwu Zhang and
                  Yu Chen and
                  Willy Susilo},
  title        = {Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {5},
  pages        = {3988--4001},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3219849},
  doi          = {10.1109/TDSC.2022.3219849},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenWXSZ23,
  author       = {Hua Shen and
                  Ge Wu and
                  Zhe Xia and
                  Willy Susilo and
                  Mingwu Zhang},
  title        = {A Privacy-Preserving and Verifiable Statistical Analysis Scheme for
                  an E-Commerce Platform},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {2637--2652},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3269669},
  doi          = {10.1109/TIFS.2023.3269669},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenWXSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangCSS23,
  author       = {Mingwu Zhang and
                  Shijin Chen and
                  Jian Shen and
                  Willy Susilo},
  title        = {PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in
                  Mobile Crowdsensing},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {18},
  pages        = {5804--5816},
  year         = {2023},
  url          = {https://doi.org/10.1109/TIFS.2023.3315526},
  doi          = {10.1109/TIFS.2023.3315526},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangCSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/DengTXZ23,
  author       = {Guoqiang Deng and
                  Min Tang and
                  Yuxing Xi and
                  Mingwu Zhang},
  title        = {Privacy-Preserving Online Medical Prediagnosis Training Model Based
                  on Soft-Margin {SVM}},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {3},
  pages        = {2072--2084},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2022.3194121},
  doi          = {10.1109/TSC.2022.3194121},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/DengTXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ShenWSZ23,
  author       = {Hua Shen and
                  Ge Wu and
                  Willy Susilo and
                  Mingwu Zhang},
  title        = {Data-Matching-Based Privacy-Preserving Statistics and Its Applications
                  in Digital Publishing Industry},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {6},
  pages        = {4554--4566},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3326497},
  doi          = {10.1109/TSC.2023.3326497},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsc/ShenWSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ChenXLZH23,
  author       = {Biwen Chen and
                  Tao Xiang and
                  Xiaoguo Li and
                  Mingwu Zhang and
                  Debiao He},
  title        = {Efficient Attribute-Based Signature With Collusion Resistance for
                  Internet of Vehicles},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {6},
  pages        = {7844--7856},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3240824},
  doi          = {10.1109/TVT.2023.3240824},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/ChenXLZH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/ZhangMZM23,
  author       = {Yuanyuan Zhang and
                  Lingzhe Meng and
                  Mingwu Zhang and
                  Weizhi Meng},
  title        = {A secure and lightweight batch authentication scheme for Internet
                  of Drones environment},
  journal      = {Veh. Commun.},
  volume       = {44},
  pages        = {100680},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.vehcom.2023.100680},
  doi          = {10.1016/J.VEHCOM.2023.100680},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/ZhangMZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangWZ23,
  author       = {Yuzhu Wang and
                  Xingbo Wang and
                  Mingwu Zhang},
  editor       = {Mingwu Zhang and
                  Man Ho Au and
                  Yudi Zhang},
  title        = {Homomorphic Witness Encryption from Indistinguishable Obfuscation},
  booktitle    = {Provable and Practical Security - 17th International Conference, ProvSec
                  2023, Wuhan, China, October 20-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14217},
  pages        = {231--250},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45513-1\_13},
  doi          = {10.1007/978-3-031-45513-1\_13},
  timestamp    = {Tue, 17 Oct 2023 11:27:43 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WangWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2023,
  editor       = {Mingwu Zhang and
                  Man Ho Au and
                  Yudi Zhang},
  title        = {Provable and Practical Security - 17th International Conference, ProvSec
                  2023, Wuhan, China, October 20-22, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14217},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45513-1},
  doi          = {10.1007/978-3-031-45513-1},
  isbn         = {978-3-031-45512-4},
  timestamp    = {Tue, 17 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangQYZZ22,
  author       = {Wenzheng Zhang and
                  Zirui Qiao and
                  Bo Yang and
                  Yanwei Zhou and
                  Mingwu Zhang},
  title        = {Continuous Leakage-Amplified Public-Key Encryption With {CCA} Security},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {7},
  pages        = {1760--1775},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxab017},
  doi          = {10.1093/COMJNL/BXAB017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangQYZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/KuSZLZ22,
  author       = {Hanchao Ku and
                  Willy Susilo and
                  Yudi Zhang and
                  Wenfen Liu and
                  Mingwu Zhang},
  title        = {Privacy-Preserving federated learning in medical diagnosis with homomorphic
                  re-Encryption},
  journal      = {Comput. Stand. Interfaces},
  volume       = {80},
  pages        = {103583},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.csi.2021.103583},
  doi          = {10.1016/J.CSI.2021.103583},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/KuSZLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/ZhangYS22,
  author       = {Mingwu Zhang and
                  Mingxuan Yang and
                  Gang Shen},
  title        = {{SSBAS-FA:} {A} secure sealed-bid e-auction scheme with fair arbitration
                  based on time-released blockchain},
  journal      = {J. Syst. Archit.},
  volume       = {129},
  pages        = {102619},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.sysarc.2022.102619},
  doi          = {10.1016/J.SYSARC.2022.102619},
  timestamp    = {Mon, 17 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/ZhangYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ShiLZ22,
  author       = {Run{-}Hua Shi and
                  Bai Liu and
                  Mingwu Zhang},
  title        = {Measurement-device-independent quantum secure multiparty summation},
  journal      = {Quantum Inf. Process.},
  volume       = {21},
  number       = {4},
  pages        = {122},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11128-022-03454-4},
  doi          = {10.1007/S11128-022-03454-4},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/ShiLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangSZ22,
  author       = {Mingwu Zhang and
                  Wenxiang Song and
                  Jixing Zhang},
  title        = {A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support
                  Vector Machine in Clouds},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {1},
  pages        = {67--78},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2020.3027758},
  doi          = {10.1109/JSYST.2020.3027758},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/QiaoYZZ22,
  author       = {Zirui Qiao and
                  Qiliang Yang and
                  Yanwei Zhou and
                  Mingwu Zhang},
  title        = {Improved Secure Transaction Scheme With Certificateless Cryptographic
                  Primitives for IoT-Based Mobile Payments},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {2},
  pages        = {1842--1850},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2020.3046450},
  doi          = {10.1109/JSYST.2020.3046450},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/QiaoYZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangZS22,
  author       = {Mingwu Zhang and
                  Yimeng Zhang and
                  Gang Shen},
  title        = {{PPDDS:} {A} Privacy-Preserving Disease Diagnosis Scheme Based on
                  the Secure Mahalanobis Distance Evaluation Model},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {3},
  pages        = {4552--4562},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2021.3093415},
  doi          = {10.1109/JSYST.2021.3093415},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/QiaoZYZWX22,
  author       = {Zirui Qiao and
                  Yanwei Zhou and
                  Bo Yang and
                  Mingwu Zhang and
                  Tao Wang and
                  Zhe Xia},
  title        = {Secure and Efficient Certificate-Based Proxy Signature Schemes for
                  Industrial Internet of Things},
  journal      = {{IEEE} Syst. J.},
  volume       = {16},
  number       = {3},
  pages        = {4719--4730},
  year         = {2022},
  url          = {https://doi.org/10.1109/JSYST.2021.3131589},
  doi          = {10.1109/JSYST.2021.3131589},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/QiaoZYZWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZhouSZ22,
  author       = {Yang Zhou and
                  Hua Shen and
                  Mingwu Zhang},
  title        = {A Distributed and Privacy-Preserving Random Forest Evaluation Scheme
                  with Fine Grained Access Control},
  journal      = {Symmetry},
  volume       = {14},
  number       = {2},
  pages        = {415},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14020415},
  doi          = {10.3390/SYM14020415},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZhouSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/ZhangZL022,
  author       = {Mingwu Zhang and
                  Boyao Zhu and
                  Yumei Li and
                  Yuntao Wang},
  title        = {TPM-Based Conditional Privacy-Preserving Authentication Protocol in
                  VANETs},
  journal      = {Symmetry},
  volume       = {14},
  number       = {6},
  pages        = {1123},
  year         = {2022},
  url          = {https://doi.org/10.3390/sym14061123},
  doi          = {10.3390/SYM14061123},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/ZhangZL022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiZZ22,
  author       = {Yumei Li and
                  Mingwu Zhang and
                  Futai Zhang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Structure-Preserving Linearly Homomorphic Signature with Designated
                  Combiner for Subspace},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_12},
  doi          = {10.1007/978-3-031-22301-3\_12},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsc/LianZZZ22,
  author       = {Yuewu Lian and
                  Haitao Zhan and
                  Peiheng Zhang and
                  Mingwu Zhang},
  title        = {Time-Lock Encryption for Multiple Consecutive Periods and its Application},
  booktitle    = {7th {IEEE} International Conference on Data Science in Cyberspace,
                  {DSC} 2022, Guilin, China, July 11-13, 2022},
  pages        = {620--626},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/DSC55868.2022.00094},
  doi          = {10.1109/DSC55868.2022.00094},
  timestamp    = {Tue, 11 Oct 2022 16:48:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dsc/LianZZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/XiaLHSZ22,
  author       = {Zhe Xia and
                  Shiyun Liu and
                  Yichen Huang and
                  Hua Shen and
                  Mingwu Zhang},
  editor       = {Jiageng Chen and
                  Debiao He and
                  Rongxing Lu},
  title        = {A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving
                  for Vehicle Networks},
  booktitle    = {Emerging Information Security and Applications - Third International
                  Conference, {EISA} 2022, Wuhan, China, October 29-30, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1641},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23098-1\_2},
  doi          = {10.1007/978-3-031-23098-1\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/XiaLHSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/LiuH0Z22,
  author       = {Yi Liu and
                  Guoxiong Hu and
                  Yudi Zhang and
                  Mingwu Zhang},
  editor       = {Emmanuel Ahene and
                  Fagen Li},
  title        = {{SVFLS:} {A} Secure and Verifiable Federated Learning Training Scheme},
  booktitle    = {Frontiers in Cyber Security - 5th International Conference, {FCS}
                  2022, Kumasi, Ghana, December 13-15, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1726},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-8445-7\_9},
  doi          = {10.1007/978-981-19-8445-7\_9},
  timestamp    = {Tue, 06 Dec 2022 11:18:03 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/LiuH0Z22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/LiuSZ22,
  author       = {Fengxiao Liu and
                  Gang Shen and
                  Mingwu Zhang},
  title        = {Privacy-Preserving Multi-party Neural Network Learning Over Incomplete
                  Data},
  booktitle    = {24th {IEEE} Int Conf on High Performance Computing {\&} Communications;
                  8th Int Conf on Data Science {\&} Systems; 20th Int Conf on Smart
                  City; 8th Int Conf on Dependability in Sensor, Cloud {\&} Big
                  Data Systems {\&} Application, HPCC/DSS/SmartCity/DependSys 2022,
                  Hainan, China, December 18-20, 2022},
  pages        = {1216--1221},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00191},
  doi          = {10.1109/HPCC-DSS-SMARTCITY-DEPENDSYS57074.2022.00191},
  timestamp    = {Thu, 06 Apr 2023 11:34:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/LiuSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WangZ22,
  author       = {Yuzhu Wang and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {Witness Encryption from Smooth Projective Hashing System},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {53--72},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_4},
  doi          = {10.1007/978-3-031-22390-7\_4},
  timestamp    = {Mon, 06 Nov 2023 13:38:03 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/WangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ChenZY22,
  author       = {Shijin Chen and
                  Mingwu Zhang and
                  Bo Yang},
  editor       = {Willy Susilo and
                  Xiaofeng Chen and
                  Fuchun Guo and
                  Yudi Zhang and
                  Rolly Intan},
  title        = {Bilateral Privacy-Preserving Task Assignment with Personalized Participant
                  Selection for Mobile Crowdsensing},
  booktitle    = {Information Security - 25th International Conference, {ISC} 2022,
                  Bali, Indonesia, December 18-22, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13640},
  pages        = {473--490},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22390-7\_28},
  doi          = {10.1007/978-3-031-22390-7\_28},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/ChenZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/ZhangLZ22,
  author       = {Mingwu Zhang and
                  Zhen{-}An Li and
                  Peihang Zhang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Miroslaw Kutylowski},
  title        = {A Secure Word Vector Training Scheme Based on Inner-Product Functional
                  Encryption},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 8th International
                  Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1663},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-7242-3\_5},
  doi          = {10.1007/978-981-19-7242-3\_5},
  timestamp    = {Mon, 17 Oct 2022 16:20:28 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/ZhangLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/ZhangC0Z22,
  author       = {Mingwu Zhang and
                  Chenmei Cui and
                  Gang Shen and
                  Yudi Zhang},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Miroslaw Kutylowski},
  title        = {A Privacy-Preserving Federated Learning with Mutual Verification on
                  Vector Spaces},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 8th International
                  Symposium, SocialSec 2022, Xi'an, China, October 16-18, 2022, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1663},
  pages        = {212--226},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-981-19-7242-3\_14},
  doi          = {10.1007/978-981-19-7242-3\_14},
  timestamp    = {Thu, 27 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/socialsec/ZhangC0Z22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShenZWGS21,
  author       = {Hua Shen and
                  Mingwu Zhang and
                  Hao Wang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Efficient and Privacy-Preserving Massive Data Processing for Smart
                  Grids},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {70616--70627},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3078629},
  doi          = {10.1109/ACCESS.2021.3078629},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShenZWGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/QiaoYZXZ21,
  author       = {Zirui Qiao and
                  Qiliang Yang and
                  Yanwei Zhou and
                  Zhe Xia and
                  Mingwu Zhang},
  title        = {Novel Public-Key Encryption with Continuous Leakage Amplification},
  journal      = {Comput. J.},
  volume       = {64},
  number       = {8},
  pages        = {1163--1177},
  year         = {2021},
  url          = {https://doi.org/10.1093/comjnl/bxaa124},
  doi          = {10.1093/COMJNL/BXAA124},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/QiaoYZXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/ChenKZ21,
  author       = {Yu Chen and
                  Hanchao Ku and
                  Mingwu Zhang},
  title        = {{PP-OCQ:} {A} distributed privacy-preserving optimal closeness query
                  scheme for social networks},
  journal      = {Comput. Stand. Interfaces},
  volume       = {74},
  pages        = {103484},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.csi.2020.103484},
  doi          = {10.1016/J.CSI.2020.103484},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/ChenKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouYXZM21,
  author       = {Yanwei Zhou and
                  Bo Yang and
                  Zhe Xia and
                  Mingwu Zhang and
                  Yi Mu},
  title        = {Novel generic construction of leakage-resilient {PKE} scheme with
                  {CCA} security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1575--1614},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00831-x},
  doi          = {10.1007/S10623-020-00831-X},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouYXZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangCL21,
  author       = {Mingwu Zhang and
                  Yu Chen and
                  Jingqiang Lin},
  title        = {A Privacy-Preserving Optimization of Neighborhood-Based Recommendation
                  for Medical-Aided Diagnosis and Treatment},
  journal      = {{IEEE} Internet Things J.},
  volume       = {8},
  number       = {13},
  pages        = {10830--10842},
  year         = {2021},
  url          = {https://doi.org/10.1109/JIOT.2021.3051060},
  doi          = {10.1109/JIOT.2021.3051060},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShenZWGS21,
  author       = {Hua Shen and
                  Mingwu Zhang and
                  Hao Wang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {A cloud-aided privacy-preserving multi-dimensional data comparison
                  protocol},
  journal      = {Inf. Sci.},
  volume       = {545},
  pages        = {739--752},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ins.2020.09.052},
  doi          = {10.1016/J.INS.2020.09.052},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ShenZWGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/ShiLZ21,
  author       = {Runhua Shi and
                  Bai Liu and
                  Mingwu Zhang},
  title        = {Secure two-party integer comparison protocol without any third party},
  journal      = {Quantum Inf. Process.},
  volume       = {20},
  number       = {12},
  pages        = {402},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11128-021-03344-1},
  doi          = {10.1007/S11128-021-03344-1},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/qip/ShiLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangCXDS21,
  author       = {Mingwu Zhang and
                  Yu Chen and
                  Zhe Xia and
                  Jiangyi Du and
                  Willy Susilo},
  title        = {{PPO-DFK:} {A} Privacy-Preserving Optimization of Distributed Fractional
                  Knapsack With Application in Secure Footballer Configurations},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {759--770},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2991928},
  doi          = {10.1109/JSYST.2020.2991928},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangCXDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangCH21,
  author       = {Mingwu Zhang and
                  Yu Chen and
                  Jiajun Huang},
  title        = {{SE-PPFM:} {A} Searchable Encryption Scheme Supporting Privacy-Preserving
                  Fuzzy Multikeyword in Cloud Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {2},
  pages        = {2980--2988},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2997932},
  doi          = {10.1109/JSYST.2020.2997932},
  timestamp    = {Fri, 12 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangCH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhouXQYZ21,
  author       = {Yanwei Zhou and
                  Yuan Xu and
                  Zirui Qiao and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {Continuous leakage-resilient certificate-based signcryption scheme
                  and application in cloud computing},
  journal      = {Theor. Comput. Sci.},
  volume       = {860},
  pages        = {1--22},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.01.024},
  doi          = {10.1016/J.TCS.2021.01.024},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhouXQYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/XiaSSZ21,
  author       = {Zhe Xia and
                  Yifeng Shu and
                  Hua Shen and
                  Mingwu Zhang},
  editor       = {Weizhi Meng and
                  Mauro Conti},
  title        = {A Federated Learning Assisted Conditional Privacy Preserving Scheme
                  for Vehicle Networks},
  booktitle    = {Cyberspace Safety and Security - 13th International Symposium, {CSS}
                  2021, Virtual Event, November 9-11, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13172},
  pages        = {16--35},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-94029-4\_2},
  doi          = {10.1007/978-3-030-94029-4\_2},
  timestamp    = {Fri, 14 Jan 2022 10:25:28 +0100},
  biburl       = {https://dblp.org/rec/conf/css/XiaSSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangWZH21,
  author       = {Lingfu Wang and
                  Jing Wang and
                  Mingwu Zhang and
                  Weijia Huang},
  editor       = {Yongxuan Lai and
                  Tian Wang and
                  Min Jiang and
                  Guangquan Xu and
                  Wei Liang and
                  Aniello Castiglione},
  title        = {A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix
                  Sharing Scheme},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 21st International
                  Conference, {ICA3PP} 2021, Virtual Event, December 3-5, 2021, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13157},
  pages        = {411--431},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-95391-1\_26},
  doi          = {10.1007/978-3-030-95391-1\_26},
  timestamp    = {Thu, 03 Mar 2022 10:25:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangWZH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhouSJRZ21,
  author       = {Tianqi Zhou and
                  Jian Shen and
                  Sai Ji and
                  Yongjun Ren and
                  Mingwu Zhang},
  editor       = {Qiong Huang and
                  Yu Yu},
  title        = {Key Exposure Resistant Group Key Agreement Protocol},
  booktitle    = {Provable and Practical Security - 15th International Conference, ProvSec
                  2021, Guangzhou, China, November 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13059},
  pages        = {83--97},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90402-9\_5},
  doi          = {10.1007/978-3-030-90402-9\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhouSJRZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ubisec/WangZZZ21,
  author       = {Yuzhu Wang and
                  Peiheng Zhang and
                  Haitao Zhan and
                  Mingwu Zhang},
  editor       = {Guojun Wang and
                  Kim{-}Kwang Raymond Choo and
                  Ryan K. L. Ko and
                  Yang Xu and
                  Bruno Crispo},
  title        = {Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature
                  Attacks in Smart Grids},
  booktitle    = {Ubiquitous Security - First International Conference, UbiSec 2021,
                  Guangzhou, China, December 28-31, 2021, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1557},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-981-19-0468-4\_11},
  doi          = {10.1007/978-981-19-0468-4\_11},
  timestamp    = {Wed, 25 May 2022 10:56:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ubisec/WangZZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HuangYZZH20,
  author       = {Meijuan Huang and
                  Bo Yang and
                  Mingwu Zhang and
                  Lina Zhang and
                  Hong{-}xia Hou},
  title        = {Updatable Lossy Trapdoor Functions Under Consecutive Leakage},
  journal      = {Comput. J.},
  volume       = {63},
  number       = {4},
  pages        = {648--656},
  year         = {2020},
  url          = {https://doi.org/10.1093/comjnl/bxz119},
  doi          = {10.1093/COMJNL/BXZ119},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HuangYZZH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangHZC20,
  author       = {Yudi Zhang and
                  Debiao He and
                  Mingwu Zhang and
                  Kim{-}Kwang Raymond Choo},
  title        = {A provable-secure and practical two-party distributed signing protocol
                  for {SM2} signature algorithm},
  journal      = {Frontiers Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {143803},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11704-018-8106-9},
  doi          = {10.1007/S11704-018-8106-9},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangHZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ShenZWGS20,
  author       = {Hua Shen and
                  Mingwu Zhang and
                  Hao Wang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {A Lightweight Privacy-Preserving Fair Meeting Location Determination
                  Scheme},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {3083--3093},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2965065},
  doi          = {10.1109/JIOT.2020.2965065},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ShenZWGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ZhangCS20,
  author       = {Mingwu Zhang and
                  Yu Chen and
                  Willy Susilo},
  title        = {{PPO-CPQ:} {A} Privacy-Preserving Optimization of Clinical Pathway
                  Query for E-Healthcare Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {10},
  pages        = {10660--10672},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.3007518},
  doi          = {10.1109/JIOT.2020.3007518},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ZhangCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShenLXZ20,
  author       = {Hua Shen and
                  Yajing Liu and
                  Zhe Xia and
                  Mingwu Zhang},
  title        = {An efficient aggregation scheme resisting on malicious data mining
                  attacks for smart grid},
  journal      = {Inf. Sci.},
  volume       = {526},
  pages        = {289--300},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2020.03.107},
  doi          = {10.1016/J.INS.2020.03.107},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShenLXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/SuSZ20,
  author       = {Yixin Su and
                  Gang Shen and
                  Mingwu Zhang},
  title        = {A Novel Privacy-Preserving Authentication Scheme for {V2G} Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {14},
  number       = {2},
  pages        = {1963--1971},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSYST.2019.2932127},
  doi          = {10.1109/JSYST.2019.2932127},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/SuSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangHLZC20,
  author       = {Yudi Zhang and
                  Debiao He and
                  Yumei Li and
                  Mingwu Zhang and
                  Kim{-}Kwang Raymond Choo},
  title        = {Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless
                  Body Area Networks},
  journal      = {{IEEE} Syst. J.},
  volume       = {14},
  number       = {4},
  pages        = {5320--5328},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSYST.2020.2974892},
  doi          = {10.1109/JSYST.2020.2974892},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangHLZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhouYXZM20,
  author       = {Yanwei Zhou and
                  Bo Yang and
                  Zhe Xia and
                  Mingwu Zhang and
                  Yi Mu},
  title        = {Identity-based encryption with leakage-amplified chosen-ciphertext
                  attacks security},
  journal      = {Theor. Comput. Sci.},
  volume       = {809},
  pages        = {277--295},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2019.12.018},
  doi          = {10.1016/J.TCS.2019.12.018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhouYXZM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/ZhangZ20,
  author       = {Mingwu Zhang and
                  Bingruolan Zhou},
  title        = {{PP-VCA:} {A} Privacy-Preserving and Verifiable Combinatorial Auction
                  Mechanism},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {2020},
  pages        = {8888284:1--8888284:11},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8888284},
  doi          = {10.1155/2020/8888284},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wicomm/ZhangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XiaYZZ020,
  author       = {Zhe Xia and
                  Bo Yang and
                  Yanwei Zhou and
                  Mingwu Zhang and
                  Yi Mu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Improvement of Attribute-Based Encryption Using Blakley Secret Sharing},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {631--641},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_33},
  doi          = {10.1007/978-3-030-55304-3\_33},
  timestamp    = {Wed, 17 Aug 2022 14:32:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XiaYZZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RuanWMZ19,
  author       = {Ou Ruan and
                  Zihao Wang and
                  Jing Mi and
                  Mingwu Zhang},
  title        = {New Approach to Set Representation and Practical Private Set-Intersection
                  Protocols},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {64897--64906},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2917057},
  doi          = {10.1109/ACCESS.2019.2917057},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RuanWMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShiZ19,
  author       = {Run{-}Hua Shi and
                  Mingwu Zhang},
  title        = {A Feasible Quantum Protocol for Private Set Intersection Cardinality},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {72105--72112},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2919119},
  doi          = {10.1109/ACCESS.2019.2919119},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShiZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/RuanWWZ19,
  author       = {Ou Ruan and
                  Zihao Wang and
                  Qingping Wang and
                  Mingwu Zhang},
  title        = {Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated
                  Key Exchange},
  journal      = {Int. J. Netw. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {861--871},
  year         = {2019},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v21-n5/ijns-2019-v21-n5-p861-871.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/RuanWWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangZJS19,
  author       = {Mingwu Zhang and
                  Yudi Zhang and
                  Yan Jiang and
                  Jian Shen},
  title        = {Obfuscating {EVES} Algorithm and Its Application in Fair Electronic
                  Transactions in Public Clouds},
  journal      = {{IEEE} Syst. J.},
  volume       = {13},
  number       = {2},
  pages        = {1478--1486},
  year         = {2019},
  url          = {https://doi.org/10.1109/JSYST.2019.2900723},
  doi          = {10.1109/JSYST.2019.2900723},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangPC19,
  author       = {Mingwu Zhang and
                  Bo Peng and
                  Yu Chen},
  editor       = {Peng Liu and
                  Yuqing Zhang},
  title        = {An Efficient Image Encryption Scheme for Industrial Internet-of-Things
                  Devices},
  booktitle    = {Proceedings of the 2nd International {ACM} Workshop on Security and
                  Privacy for the Internet-of-Things, IoT S{\&}P@CCS 2019, London,
                  UK, November 15, 2019},
  pages        = {38--43},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338507.3358620},
  doi          = {10.1145/3338507.3358620},
  timestamp    = {Thu, 18 Aug 2022 16:04:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/DengCXWZYLY19,
  author       = {Na Deng and
                  Xu Chen and
                  Caiquan Xiong and
                  Chunzhi Wang and
                  Mingwu Zhang and
                  Zhiwei Ye and
                  Desheng Li and
                  Xuehong Yang},
  editor       = {Leonard Barolli and
                  Farookh Khadeer Hussain and
                  Makoto Ikeda},
  title        = {A Method of Collecting Four Character Medicine Effect Phrases in {TCM}
                  Patents Based on Semi-supervised Learning},
  booktitle    = {Complex, Intelligent, and Software Intensive Systems - Proceedings
                  of the 13th International Conference on Complex, Intelligent, and
                  Software Intensive Systems, {CISIS} 2019, Sydney, NSW, Australia,
                  3-5 July 2019},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {993},
  pages        = {462--473},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22354-0\_41},
  doi          = {10.1007/978-3-030-22354-0\_41},
  timestamp    = {Tue, 25 Jun 2019 16:51:51 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis/DengCXWZYLY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/XiaHYZMSM19,
  author       = {Zhe Xia and
                  Lein Harn and
                  Bo Yang and
                  Mingwu Zhang and
                  Yi Mu and
                  Willy Susilo and
                  Weizhi Meng},
  editor       = {Jianying Zhou and
                  Xiapu Luo and
                  Qingni Shen and
                  Zhen Xu},
  title        = {Provably Secure Group Authentication in the Asynchronous Communication
                  Model},
  booktitle    = {Information and Communications Security - 21st International Conference,
                  {ICICS} 2019, Beijing, China, December 15-17, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11999},
  pages        = {324--340},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-41579-2\_19},
  doi          = {10.1007/978-3-030-41579-2\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/XiaHYZMSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/ShenSZZ19,
  author       = {Hua Shen and
                  Daijie Sun and
                  Lan Zhao and
                  Mingwu Zhang},
  editor       = {Weizhi Meng and
                  Piotr Cofta and
                  Christian Damsgaard Jensen and
                  Tyrone Grandison},
  title        = {A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater
                  Identifying},
  booktitle    = {Trust Management {XIII} - 13th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2019, Copenhagen, Denmark, July 17-19, 2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {563},
  pages        = {122--132},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33716-2\_10},
  doi          = {10.1007/978-3-030-33716-2\_10},
  timestamp    = {Tue, 15 Jun 2021 13:49:14 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/ShenSZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/ZhangCS019,
  author       = {Mingwu Zhang and
                  Xiao Chen and
                  Gang Shen and
                  Yong Ding},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {348--360},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_25},
  doi          = {10.1007/978-3-030-30619-9\_25},
  timestamp    = {Tue, 27 Sep 2022 14:19:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/ZhangCS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/RuanYZ19,
  author       = {Ou Ruan and
                  Yang Yang and
                  Mingwu Zhang},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {665--674},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_41},
  doi          = {10.1007/978-3-030-36938-5\_41},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/RuanYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Xia0ZZS019,
  author       = {Zhe Xia and
                  Bo Yang and
                  Yanwei Zhou and
                  Mingwu Zhang and
                  Hua Shen and
                  Yi Mu},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {Provably Secure Proactive Secret Sharing Without the Adjacent Assumption},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {247--264},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_14},
  doi          = {10.1007/978-3-030-31919-9\_14},
  timestamp    = {Thu, 26 Sep 2019 14:48:19 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Xia0ZZS019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/SunHXCZ19,
  author       = {Liuying Sun and
                  Anthony T. S. Ho and
                  Zhe Xia and
                  Jiageng Chen and
                  Mingwu Zhang},
  editor       = {Weizhi Meng and
                  Steven Furnell},
  title        = {Development of an Early Warning System for Network Intrusion Detection
                  Using Benford's Law Features},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 5th International
                  Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1095},
  pages        = {57--73},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0758-8\_5},
  doi          = {10.1007/978-981-15-0758-8\_5},
  timestamp    = {Mon, 22 Feb 2021 16:00:52 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/SunHXCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/Zhang19b,
  author       = {Mingwu Zhang},
  title        = {{PPO-DFK}},
  publisher    = {{IEEE} DataPort},
  year         = {2019},
  month        = oct,
  howpublished = {\url{https://doi.org/10.21227/nq3v-dq04}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/nq3v-dq04},
  doi          = {10.21227/NQ3V-DQ04},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/Zhang19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangLDT18,
  author       = {Mingwu Zhang and
                  Wentao Leng and
                  Yong Ding and
                  Chunming Tang},
  title        = {Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher
                  Leakage-Rate in Privacy-Aware Internet-of-Things},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {33859--33870},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2842713},
  doi          = {10.1109/ACCESS.2018.2842713},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangLDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangHSXD18,
  author       = {Mingwu Zhang and
                  Jiajun Huang and
                  Hua Shen and
                  Zhe Xia and
                  Yong Ding},
  title        = {Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions
                  and Application in Sensitive Big-Data Environments},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {43936--43945},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2864163},
  doi          = {10.1109/ACCESS.2018.2864163},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangHSXD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShenSZ18,
  author       = {Gang Shen and
                  Yixin Su and
                  Mingwu Zhang},
  title        = {Secure and Membership-Based Data Sharing Scheme in {V2G} Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {58450--58460},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2874622},
  doi          = {10.1109/ACCESS.2018.2874622},
  timestamp    = {Mon, 01 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShenSZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/SunXZCL18,
  author       = {Lixue Sun and
                  Chunxiang Xu and
                  Mingwu Zhang and
                  Kefei Chen and
                  Hongwei Li},
  title        = {Secure searchable public key encryption against insider keyword guessing
                  attacks from indistinguishability obfuscation},
  journal      = {Sci. China Inf. Sci.},
  volume       = {61},
  number       = {3},
  pages        = {038106:1--038106:3},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11432-017-9124-0},
  doi          = {10.1007/S11432-017-9124-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/chinaf/SunXZCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ShenZWZNY18,
  author       = {Yanping Shen and
                  Kangfeng Zheng and
                  Chunhua Wu and
                  Mingwu Zhang and
                  Xinxin Niu and
                  Yixian Yang},
  title        = {An Ensemble Method based on Selection Using Bat Algorithm for Intrusion
                  Detection},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {4},
  pages        = {526--538},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxx101},
  doi          = {10.1093/COMJNL/BXX101},
  timestamp    = {Tue, 24 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ShenZWZNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fuin/Zhang18,
  author       = {Mingwu Zhang},
  title        = {ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption
                  with Continual-leakage Tolerances},
  journal      = {Fundam. Informaticae},
  volume       = {157},
  number       = {1-2},
  pages        = {1--27},
  year         = {2018},
  url          = {https://doi.org/10.3233/FI-2018-1615},
  doi          = {10.3233/FI-2018-1615},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fuin/Zhang18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijiids/ChenZLCZ18,
  author       = {Yonghui Chen and
                  Cheng Zhang and
                  Wei Li and
                  Tingsong Chen and
                  Mingwu Zhang},
  title        = {A publicly verifiable network coding scheme with null-space {HMAC}},
  journal      = {Int. J. Intell. Inf. Database Syst.},
  volume       = {11},
  number       = {2/3},
  pages        = {117--131},
  year         = {2018},
  url          = {https://doi.org/10.1504/IJIIDS.2018.10013273},
  doi          = {10.1504/IJIIDS.2018.10013273},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijiids/ChenZLCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/LiMZ18,
  author       = {Sujuan Li and
                  Yi Mu and
                  Mingwu Zhang},
  title        = {Certificate-based Smooth Projective Hashing and Its Applications},
  journal      = {Int. J. Netw. Secur.},
  volume       = {20},
  number       = {2},
  pages        = {266--277},
  year         = {2018},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v20-n2/ijns-2018-v20-n2-p266-277.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/LiMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ShenSZZXZ18,
  author       = {Gang Shen and
                  Yixin Su and
                  Danhong Zhang and
                  Huajun Zhang and
                  Binyu Xiong and
                  Mingwu Zhang},
  title        = {Secure and Fine-grained Electricity Consumption Aggregation Scheme
                  for Smart Grid},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {12},
  number       = {4},
  pages        = {1553--1571},
  year         = {2018},
  url          = {https://doi.org/10.3837/tiis.2018.04.009},
  doi          = {10.3837/TIIS.2018.04.009},
  timestamp    = {Mon, 26 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/ShenSZZXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/ZhangYJLT18,
  author       = {Mingwu Zhang and
                  Yao Yao and
                  Yan Jiang and
                  Bingbing Li and
                  Chunming Tang},
  title        = {Accountable mobile E-commerce scheme in intelligent cloud system transactions},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {1889--1899},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12652-017-0672-4},
  doi          = {10.1007/S12652-017-0672-4},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/ZhangYJLT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/DengWZYXTLC18,
  author       = {Na Deng and
                  Chunzhi Wang and
                  Mingwu Zhang and
                  Zhiwei Ye and
                  Liang Xiao and
                  Jingbai Tian and
                  Desheng Li and
                  Xu Chen},
  title        = {A Semi-Automatic Annotation Method of Effect Clue Words for Chinese
                  Patents Based on Co-Training},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {14},
  number       = {4},
  pages        = {1--19},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJDWM.2018100101},
  doi          = {10.4018/IJDWM.2018100101},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jdwm/DengWZYXTLC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/RuanZZZH18,
  author       = {Ou Ruan and
                  Yuanyuan Zhang and
                  Mingwu Zhang and
                  Jing Zhou and
                  Lein Harn},
  title        = {After-the-Fact Leakage-Resilient Identity-Based Authenticated Key
                  Exchange},
  journal      = {{IEEE} Syst. J.},
  volume       = {12},
  number       = {2},
  pages        = {2017--2026},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSYST.2017.2685524},
  doi          = {10.1109/JSYST.2017.2685524},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/RuanZZZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiZWLLZ18,
  author       = {Xingxin Li and
                  Youwen Zhu and
                  Jian Wang and
                  Zhe Liu and
                  Yining Liu and
                  Mingwu Zhang},
  title        = {On the Soundness and Security of Privacy-Preserving {SVM} for Outsourcing
                  Data Classification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {5},
  pages        = {906--912},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2017.2682244},
  doi          = {10.1109/TDSC.2017.2682244},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiZWLLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XiaS0ZZ18,
  author       = {Zhe Xia and
                  Liuying Sun and
                  Bo Yang and
                  Yanwei Zhou and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications
                  to Optimal Resilient Proactive Cryptosystems},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {83--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_6},
  doi          = {10.1007/978-3-319-93638-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XiaS0ZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Jiageng Chen and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Secure Publicly Verifiable Computation with Polynomial Commitment
                  in Cloud Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {417--430},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_24},
  doi          = {10.1007/978-3-319-93638-3\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/ZhangJSLS18,
  author       = {Mingwu Zhang and
                  Yan Jiang and
                  Hua Shen and
                  Bingbing Li and
                  Willy Susilo},
  editor       = {Fuchun Guo and
                  Xinyi Huang and
                  Moti Yung},
  title        = {Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption
                  from Indistinguishability Obfuscation},
  booktitle    = {Information Security and Cryptology - 14th International Conference,
                  Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11449},
  pages        = {240--259},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-14234-6\_13},
  doi          = {10.1007/978-3-030-14234-6\_13},
  timestamp    = {Thu, 14 Jul 2022 16:21:07 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/ZhangJSLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/XiaYZM18,
  author       = {Zhe Xia and
                  Bo Yang and
                  Mingwu Zhang and
                  Yi Mu},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {An Efficient and Provably Secure Private Polynomial Evaluation Scheme},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {595--609},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_38},
  doi          = {10.1007/978-3-319-99807-7\_38},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/XiaYZM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eidwt/2017,
  editor       = {Leonard Barolli and
                  Mingwu Zhang and
                  Xu An Wang},
  title        = {Advances in Internetworking, Data {\&} Web Technologies, The 5th
                  International Conference on Emerging Internetworking, Data {\&}
                  Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {6},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-59463-7},
  doi          = {10.1007/978-3-319-59463-7},
  isbn         = {978-3-319-59462-0},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eidwt/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangJMS17,
  author       = {Mingwu Zhang and
                  Yan Jiang and
                  Yi Mu and
                  Willy Susilo},
  title        = {Obfuscating Re-encryption Algorithm With Flexible and Controllable
                  Multi-Hop on Untrusted Outsourcing Server},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {26419--26434},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2771335},
  doi          = {10.1109/ACCESS.2017.2771335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangJMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RuanCZ17,
  author       = {Ou Ruan and
                  Jing Chen and
                  Mingwu Zhang},
  title        = {Provably Leakage-Resilient Password-Based Authenticated Key Exchange
                  in the Standard Model},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {26832--26841},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2776160},
  doi          = {10.1109/ACCESS.2017.2776160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RuanCZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangMXZL17,
  author       = {Xu An Wang and
                  Jianfeng Ma and
                  Fatos Xhafa and
                  Mingwu Zhang and
                  Xiaoshuang Luo},
  title        = {Cost-effective secure E-health cloud system using identity based cryptographic
                  techniques},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {67},
  pages        = {242--254},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.08.008},
  doi          = {10.1016/J.FUTURE.2016.08.008},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangMXZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/WangMXQZ17,
  author       = {Xu An Wang and
                  Jianfeng Ma and
                  Fatos Xhafa and
                  Baodong Qin and
                  Mingwu Zhang},
  title        = {New efficient chosen ciphertext secure Elgamal encryption schemes
                  for secure Cloud storage service},
  journal      = {Int. J. Web Grid Serv.},
  volume       = {13},
  number       = {3},
  pages        = {246--269},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJWGS.2017.10006066},
  doi          = {10.1504/IJWGS.2017.10006066},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijwgs/WangMXQZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/information/LiMZZ17,
  author       = {Sujuan Li and
                  Yi Mu and
                  Mingwu Zhang and
                  Futai Zhang},
  title        = {Continuous Leakage Resilient Lossy Trapdoor Functions},
  journal      = {Inf.},
  volume       = {8},
  number       = {2},
  pages        = {38},
  year         = {2017},
  url          = {https://doi.org/10.3390/info8020038},
  doi          = {10.3390/INFO8020038},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/information/LiMZZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/ZhaoZSZ017,
  author       = {Ling Zhao and
                  Mingwu Zhang and
                  Hua Shen and
                  Yudi Zhang and
                  Jian Shen},
  title        = {Privacy-preserving Outsourcing Schemes of Modular Exponentiations
                  Using Single Untrusted Cloud Server},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {826--845},
  year         = {2017},
  url          = {https://doi.org/10.3837/tiis.2017.02.011},
  doi          = {10.3837/TIIS.2017.02.011},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itiis/ZhaoZSZ017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ZhangZSTH17,
  author       = {Mingwu Zhang and
                  Yudi Zhang and
                  Hua Shen and
                  Chunming Tang and
                  Lein Harn},
  title        = {Efficiently Obfuscating Anonymous Re-encryption Functionality with
                  Average-Case Virtual Black-Box Security},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {4},
  pages        = {993--1006},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=157\_2055},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ZhangZSTH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangZSHM17,
  author       = {Mingwu Zhang and
                  Yudi Zhang and
                  Yixin Su and
                  Qiong Huang and
                  Yi Mu},
  title        = {Attribute-Based Hash Proof System Under Learning-With-Errors Assumption
                  in Obfuscator-Free and Leakage-Resilient Environments},
  journal      = {{IEEE} Syst. J.},
  volume       = {11},
  number       = {2},
  pages        = {1018--1026},
  year         = {2017},
  url          = {https://doi.org/10.1109/JSYST.2015.2435518},
  doi          = {10.1109/JSYST.2015.2435518},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangZSHM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShenZS17,
  author       = {Hua Shen and
                  Mingwu Zhang and
                  Jian Shen},
  title        = {Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart
                  Grids},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {6},
  pages        = {1369--1381},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2656475},
  doi          = {10.1109/TIFS.2017.2656475},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShenZS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/ZhangJLZ17,
  author       = {Yudi Zhang and
                  Yan Jiang and
                  Bingbing Li and
                  Mingwu Zhang},
  editor       = {Leonard Barolli and
                  Mingwu Zhang and
                  Xu An Wang},
  title        = {An Efficient Identity-Based Homomorphic Signature Scheme for Network
                  Coding},
  booktitle    = {Advances in Internetworking, Data {\&} Web Technologies, The 5th
                  International Conference on Emerging Internetworking, Data {\&}
                  Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017},
  series       = {Lecture Notes on Data Engineering and Communications Technologies},
  volume       = {6},
  pages        = {524--531},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59463-7\_52},
  doi          = {10.1007/978-3-319-59463-7\_52},
  timestamp    = {Mon, 03 Apr 2023 12:49:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eidwt/ZhangJLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/RuanZC17,
  author       = {Ou Ruan and
                  Mingwu Zhang and
                  Jing Chen},
  editor       = {Shadi Ibrahim and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Yan and
                  Witold Pedrycz},
  title        = {Leakage-Resilient Password-Based Authenticated Key Exchange},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 17th International
                  Conference, {ICA3PP} 2017, Helsinki, Finland, August 21-23, 2017,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10393},
  pages        = {285--296},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-65482-9\_19},
  doi          = {10.1007/978-3-319-65482-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/RuanZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/ChenZX17,
  author       = {Yonghui Chen and
                  Mingwu Zhang and
                  Chao Xu},
  editor       = {Leonard Barolli and
                  Tomoya Enokido},
  title        = {Reliable Homomorphic Matrix Disguising Scheme},
  booktitle    = {Innovative Mobile and Internet Services in Ubiquitous Computing -
                  Proceedings of the 11th International Conference on Innovative Mobile
                  and Internet Services in Ubiquitous Computing (IMIS-2017), Torino,
                  Italy, 10-12 July 2017},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {612},
  pages        = {666--675},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61542-4\_66},
  doi          = {10.1007/978-3-319-61542-4\_66},
  timestamp    = {Wed, 05 Jul 2017 12:58:46 +0200},
  biburl       = {https://dblp.org/rec/conf/imis/ChenZX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangM16,
  author       = {Mingwu Zhang and
                  Yi Mu},
  title        = {Token-Leakage Tolerant and Vector Obfuscated {IPE} and Application
                  in Privacy-Preserving Two-Party Point/Polynomial Evaluations},
  journal      = {Comput. J.},
  volume       = {59},
  number       = {4},
  pages        = {493--507},
  year         = {2016},
  url          = {https://doi.org/10.1093/comjnl/bxv065},
  doi          = {10.1093/COMJNL/BXV065},
  timestamp    = {Mon, 24 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/0003ZD16,
  author       = {Bo Yang and
                  Mingwu Zhang and
                  Jun{-}Qiang Du},
  title        = {An error-tolerant keyword search scheme based on public-key encryption
                  in secure cloud computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {4},
  pages        = {1083--1093},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3521},
  doi          = {10.1002/CPE.3521},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/0003ZD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ZhangXYM16,
  author       = {Mingwu Zhang and
                  Yong Xia and
                  Ou Yuan and
                  Kirill Morozov},
  title        = {Privacy-friendly weighted-reputation aggregation protocols against
                  malicious adversaries in cloud services},
  journal      = {Int. J. Commun. Syst.},
  volume       = {29},
  number       = {12},
  pages        = {1863--1872},
  year         = {2016},
  url          = {https://doi.org/10.1002/dac.2817},
  doi          = {10.1002/DAC.2817},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ZhangXYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/RuanZZ16,
  author       = {Ou Ruan and
                  Jing Zhou and
                  Mingwu Zhang},
  title        = {An efficient resource-fair commit-prove-fair-open protocol},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {8},
  number       = {1},
  pages        = {17--34},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJESDF.2016.073729},
  doi          = {10.1504/IJESDF.2016.073729},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/RuanZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HarnHZHZ16,
  author       = {Lein Harn and
                  Ching{-}Fang Hsu and
                  Mingwu Zhang and
                  Tingting He and
                  Maoyuan Zhang},
  title        = {Realizing secret sharing with general access structure},
  journal      = {Inf. Sci.},
  volume       = {367-368},
  pages        = {209--220},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.ins.2016.06.006},
  doi          = {10.1016/J.INS.2016.06.006},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HarnHZHZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangY16,
  author       = {Mingwu Zhang and
                  Bo Yang},
  title        = {Continual key leakage tolerant encryption from extensible set delegation},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1638--1649},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.813},
  doi          = {10.1002/SEC.813},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangMSH16,
  author       = {Mingwu Zhang and
                  Yi Mu and
                  Jian Shen and
                  Xinyi Huang},
  title        = {Strongly average-case secure obfuscation: achieving input privacy
                  and circuit obscurity},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1737--1747},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1435},
  doi          = {10.1002/SEC.1435},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangMSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Willy Susilo and
                  Guomin Yang and
                  Fuchun Guo and
                  Mingwu Zhang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {One-Round Strong Oblivious Signature-Based Envelope},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_1},
  doi          = {10.1007/978-3-319-40367-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChenMYSGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Mingwu Zhang},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash
                  Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {844--876},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_31},
  doi          = {10.1007/978-3-662-53887-6\_31},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChenMYSGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiMZZ16,
  author       = {Sujuan Li and
                  Yi Mu and
                  Mingwu Zhang and
                  Futai Zhang},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {Updatable Lossy Trapdoor Functions and Its Application in Continuous
                  Leakage},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {309--319},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_18},
  doi          = {10.1007/978-3-319-47422-9\_18},
  timestamp    = {Wed, 14 Jul 2021 15:56:25 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiMZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenMYSGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Mingwu Zhang},
  title        = {Cryptographic Reverse Firewall via Malleable Smooth Projective Hash
                  Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenMYSGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangWTM15,
  author       = {Mingwu Zhang and
                  Chunzhi Wang and
                  Tsuyoshi Takagi and
                  Yi Mu},
  title        = {Functional Encryption Resilient to Hard-to-Invert Leakage},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {4},
  pages        = {735--749},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxt105},
  doi          = {10.1093/COMJNL/BXT105},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangWTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/MaZHY15,
  author       = {Sha Ma and
                  Mingwu Zhang and
                  Qiong Huang and
                  Bo Yang},
  title        = {Public Key Encryption with Delegated Equality Test in a Multi-User
                  Setting},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {4},
  pages        = {986--1002},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu026},
  doi          = {10.1093/COMJNL/BXU026},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/MaZHY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/HeZX15,
  author       = {Debiao He and
                  Mingwu Zhang and
                  Baowen Xu},
  title        = {Insecurity of an Efficient Identity-Based Proxy Signature in the Standard
                  Model},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {10},
  pages        = {2507--2508},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxu097},
  doi          = {10.1093/COMJNL/BXU097},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/HeZX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/PanLZWZ15,
  author       = {Chunhua Pan and
                  Shunpeng Li and
                  Qihui Zhu and
                  Chunzhi Wang and
                  Mingwu Zhang},
  title        = {Notes on Proxy Signcryption and Multi-proxy Signature Schemes},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {29--33},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n1/ijns-2015-v17-n1-p29-33.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/PanLZWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ShenHZ18,
  author       = {Hua Shen and
                  Yanxiang He and
                  Mingwu Zhang},
  title        = {{\unicode{22522}}{\unicode{20110}}Petri{\unicode{32593}}{\unicode{30340}}Web{\unicode{26381}}{\unicode{21153}}{\unicode{32452}}{\unicode{21512}}{\unicode{39564}}{\unicode{35777}}{\unicode{26041}}{\unicode{27861}}
                  (Verification Methods Based on Petri Networks for Web Services Composition)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {4},
  pages        = {111--115},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.04.021},
  doi          = {10.11896/J.ISSN.1002-137X.2015.04.021},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ShenHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ShenHZ15,
  author       = {Hua Shen and
                  Yanxiang He and
                  Mingwu Zhang},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{26381}}{\unicode{21153}}{\unicode{32452}}{\unicode{21512}}{\unicode{27169}}{\unicode{22411}}{\unicode{32467}}{\unicode{26500}}{\unicode{29305}}{\unicode{24449}}{\unicode{30340}}{\unicode{24615}}{\unicode{33021}}{\unicode{29942}}{\unicode{39048}}{\unicode{23450}}{\unicode{20301}}{\unicode{26041}}{\unicode{26696}}
                  (Performance Bottlenecks Location Scheme Based on Structural Features
                  of Service Composition Model)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {9},
  pages        = {107--117},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.09.022},
  doi          = {10.11896/J.ISSN.1002-137X.2015.09.022},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ShenHZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengJLZ15,
  author       = {Chi Cheng and
                  Tao Jiang and
                  Yining Liu and
                  Mingwu Zhang},
  title        = {Security analysis of a homomorphic signature scheme for network coding},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {18},
  pages        = {4053--4060},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1321},
  doi          = {10.1002/SEC.1321},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChengJLZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/MaHZY15,
  author       = {Sha Ma and
                  Qiong Huang and
                  Mingwu Zhang and
                  Bo Yang},
  title        = {Efficient Public Key Encryption With Equality Test Supporting Flexible
                  Authorization},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {3},
  pages        = {458--470},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2014.2378592},
  doi          = {10.1109/TIFS.2014.2378592},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/MaHZY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/ZhangCS15,
  author       = {Mingwu Zhang and
                  Biwen Chen and
                  Hua Shen},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {133--142},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_12},
  doi          = {10.1007/978-3-319-27161-3\_12},
  timestamp    = {Sat, 06 Aug 2022 22:05:44 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/ZhangCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/ZhangM14,
  author       = {Mingwu Zhang and
                  Yi Mu},
  title        = {Key continual-leakage resilient broadcast cryptosystem from dual system
                  in broadcast networks},
  journal      = {Frontiers Comput. Sci.},
  volume       = {8},
  number       = {3},
  pages        = {456--468},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11704-014-3271-y},
  doi          = {10.1007/S11704-014-3271-Y},
  timestamp    = {Mon, 24 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/ZhangM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangNYT14,
  author       = {Mingwu Zhang and
                  Takashi Nishide and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Anonymous encryption with partial-order subset delegation and its
                  application in privacy email systems},
  journal      = {{IET} Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {240--249},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0045},
  doi          = {10.1049/IET-IFS.2013.0045},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangNYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ZhangWYT14,
  author       = {Mingwu Zhang and
                  Chunzhi Wang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Fully secure constructions of spatial encryption with vector privacy},
  journal      = {Int. J. Commun. Syst.},
  volume       = {27},
  number       = {12},
  pages        = {4307--4327},
  year         = {2014},
  url          = {https://doi.org/10.1002/dac.2613},
  doi          = {10.1002/DAC.2613},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ZhangWYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhouZW014,
  author       = {Min Zhou and
                  Mingwu Zhang and
                  Chunzhi Wang and
                  Bo Yang},
  title        = {{CCLAS:} {A} Practical and Compact Certificateless Aggregate Signature
                  with Share Extraction},
  journal      = {Int. J. Netw. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {157--164},
  year         = {2014},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n2/ijns-2014-v16-n2-p157-164.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhouZW014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ChenLWZ14a,
  author       = {Zhenhua Chen and
                  Shundong Li and
                  Chunzhi Wang and
                  Mingwu Zhang},
  title        = {Comments on {FHH} Anonymous Multireceiver Encryption},
  journal      = {Int. J. Netw. Secur.},
  volume       = {16},
  number       = {5},
  pages        = {397--400},
  year         = {2014},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v16-n5/ijns-2014-v16-n5-p397-400.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ChenLWZ14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangYT14,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Anonymous spatial encryption under affine space delegation functionality
                  with full security},
  journal      = {Inf. Sci.},
  volume       = {277},
  pages        = {715--730},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.03.012},
  doi          = {10.1016/J.INS.2014.03.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaYZ14,
  author       = {Sha Ma and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {{PPGJ:} {A} privacy-preserving general join for outsourced encrypted
                  database},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1232--1244},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.854},
  doi          = {10.1002/SEC.854},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaYZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RuanCZCZ14,
  author       = {Ou Ruan and
                  Jing Chen and
                  Jing Zhou and
                  Yongquan Cui and
                  Mingwu Zhang},
  title        = {An efficient fair UC-secure protocol for two-party computation},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {8},
  pages        = {1253--1263},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.857},
  doi          = {10.1002/SEC.857},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RuanCZCZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhang0WT14,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Chunzhi Wang and
                  Tsuyoshi Takagi},
  title        = {Unbounded anonymous hierarchical {IBE} with continual-key-leakage
                  tolerance},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {1974--1987},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.912},
  doi          = {10.1002/SEC.912},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhang0WT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ZhangWM14,
  author       = {Mingwu Zhang and
                  Chunzhi Wang and
                  Kirill Morozov},
  title        = {{LR-FEAD:} leakage-tolerating and attribute-hiding functional encryption
                  mechanism with delegation in affine subspaces},
  journal      = {J. Supercomput.},
  volume       = {70},
  number       = {3},
  pages        = {1405--1432},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-014-1234-6},
  doi          = {10.1007/S11227-014-1234-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ZhangWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Zhang14,
  author       = {Mingwu Zhang},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {New Model and Construction of {ABE:} Achieving Key Resilient-Leakage
                  and Attribute Direct-Revocation},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {192--208},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_13},
  doi          = {10.1007/978-3-319-08344-5\_13},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/Zhang14,
  author       = {Mingwu Zhang},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {ACP-lrFEM: Functional Encryption Mechanism with Automatic Control
                  Policy in the Presence of Key Leakage},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {481--495},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_35},
  doi          = {10.1007/978-3-319-06320-1\_35},
  timestamp    = {Fri, 09 Apr 2021 18:45:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangYT13,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Bounded Leakage-Resilient Functional Encryption with Hidden Vector
                  Predicate},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {4},
  pages        = {464--477},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs133},
  doi          = {10.1093/COMJNL/BXS133},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangYT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYWT13,
  author       = {Mingwu Zhang and
                  Jintao Yao and
                  Chunzhi Wang and
                  Tsuyoshi Takagi},
  title        = {Public Key Replacement and Universal Forgery of a {SCLS} Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {133--138},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p133-138.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiZT13,
  author       = {Fagen Li and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Identity-based partially blind signature in the standard model for
                  electronic cash},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {196--203},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.07.009},
  doi          = {10.1016/J.MCM.2012.07.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYCT13,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Zhenhua Chen and
                  Tsuyoshi Takagi},
  title        = {Efficient and adaptively secure broadcast encryption systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1044--1052},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.678},
  doi          = {10.1002/SEC.678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangT13,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Efficient Constructions of Anonymous Multireceiver Encryption Protocol
                  and Their Deployment in Group E-mail Systems With Privacy Preservation},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {3},
  pages        = {410--419},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2012.2221893},
  doi          = {10.1109/JSYST.2012.2221893},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangSWCM13,
  author       = {Mingwu Zhang and
                  Wei Shi and
                  Chunzhi Wang and
                  Zhenhua Chen and
                  Yi Mu},
  editor       = {Robert H. Deng and
                  Tao Feng},
  title        = {Leakage-Resilient Attribute-Based Encryption with Fast Decryption:
                  Models, Analysis and Constructions},
  booktitle    = {Information Security Practice and Experience - 9th International Conference,
                  {ISPEC} 2013, Lanzhou, China, May 12-14, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7863},
  pages        = {75--90},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38033-4\_6},
  doi          = {10.1007/978-3-642-38033-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangSWCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangSWCM13,
  author       = {Mingwu Zhang and
                  Wei Shi and
                  Chunzhi Wang and
                  Zhenhua Chen and
                  Yi Mu},
  title        = {Leakage-resilient Attribute-based Encryptions with Fast Decryption:
                  Model, Analysis and Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {247},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/247},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangSWCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiZT12,
  author       = {Fagen Li and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Efficient signcryption in the standard model},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {24},
  number       = {17},
  pages        = {1977--1989},
  year         = {2012},
  url          = {https://doi.org/10.1002/cpe.1823},
  doi          = {10.1002/CPE.1823},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/gis/XuSZXZL12,
  author       = {Yuyue Xu and
                  Jiulin Sun and
                  Jinqu Zhang and
                  Yong Xu and
                  Mingwu Zhang and
                  Xiuying Liao},
  title        = {Combining {AHP} with {GIS} in synthetic evaluation of environmental
                  suitability for living in China's 35 major cities},
  journal      = {Int. J. Geogr. Inf. Sci.},
  volume       = {26},
  number       = {9},
  pages        = {1603--1623},
  year         = {2012},
  url          = {https://doi.org/10.1080/13658816.2011.642800},
  doi          = {10.1080/13658816.2011.642800},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/gis/XuSZXZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangTYL12,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi and
                  Bo Yang and
                  Fagen Li},
  title        = {Cryptanalysis of Strong Designated Verifier Signature Scheme with
                  Non-delegatability and Non-transferability},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {259--262},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.259},
  doi          = {10.1587/TRANSFUN.E95.A.259},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangTYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangLT12,
  author       = {Mingwu Zhang and
                  Fagen Li and
                  Tsuyoshi Takagi},
  title        = {Analysis and Improvement of a Secret Broadcast with Binding Encryption
                  in Broadcasting Networks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {2},
  pages        = {686--689},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.686},
  doi          = {10.1587/TRANSINF.E95.D.686},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/MeshramMZ12,
  author       = {Chandrashekhar Meshram and
                  Suchitra A. Meshram and
                  Mingwu Zhang},
  title        = {An ID-based cryptographic mechanisms based on {GDLP} and {IFP}},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {19},
  pages        = {753--758},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.06.018},
  doi          = {10.1016/J.IPL.2012.06.018},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/MeshramMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/ZhuHTZ12,
  author       = {Youwen Zhu and
                  Liusheng Huang and
                  Tsuyoshi Takagi and
                  Mingwu Zhang},
  title        = {Privacy-Preserving {OLAP} for Accurate Answer},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {21},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218126612500090},
  doi          = {10.1142/S0218126612500090},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/ZhuHTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYT12,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Reconciling and improving of multi-receiver signcryption protocols
                  with threshold decryption},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {12},
  pages        = {1430--1440},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.509},
  doi          = {10.1002/SEC.509},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YaoLZZ12,
  author       = {Jintao Yao and
                  Kangshun Li and
                  Mingwu Zhang and
                  Min Zhou},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {A Robust Fuzzy Extractor without ECCs},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {60--68},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_5},
  doi          = {10.1007/978-3-642-38519-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YaoLZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YangZ12,
  author       = {Bo Yang and
                  Mingwu Zhang},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {{LR-UESDE:} {A} Continual-Leakage Resilient Encryption with Unbounded
                  Extensible Set Delegation},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {125--142},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_9},
  doi          = {10.1007/978-3-642-33272-2\_9},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YangZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYZT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Wenzheng Zhang and
                  Tsuyoshi Takagi},
  title        = {Multibiometric Based Secure Encryption, Authentication Scheme with
                  Fuzzy Extractor},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {50--57},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p50-57.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYZLT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Yusheng Zhong and
                  Pengcheng Li and
                  Tsuyoshi Takagi},
  title        = {Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle
                  from Bilinear Parings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {130--136},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p130-136.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYZLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangYT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Group-oriented setting's multisigncryption scheme with threshold designcryption},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {18},
  pages        = {4041--4050},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.05.005},
  doi          = {10.1016/J.INS.2011.05.005},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangYT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangT11,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption
                  Systems},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_16},
  doi          = {10.1007/978-3-642-22497-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ZhangTY11,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi and
                  Bo Yang},
  editor       = {Michael Chau and
                  G. Alan Wang and
                  Xiaolong Zheng and
                  Hsinchun Chen and
                  Daniel Zeng and
                  Wenji Mao},
  title        = {Dual-Verifiers {DVS} with Message Recovery for Tolerant Routing in
                  Wireless Sensor Networks},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2011, Beijing, China, July 9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6749},
  pages        = {71--84},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22039-5\_8},
  doi          = {10.1007/978-3-642-22039-5\_8},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ZhangTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiMZT11,
  author       = {Fagen Li and
                  Fahad Bin Muhaya and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Efficient Identity-Based Signcryption in the Standard Model},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_10},
  doi          = {10.1007/978-3-642-24316-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiMZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangNYT11,
  author       = {Mingwu Zhang and
                  Takashi Nishide and
                  Bo Yang and
                  Tsuyoshi Takagi},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Anonymous Encryption with Partial-Order Subset Delegation Functionality},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_12},
  doi          = {10.1007/978-3-642-24316-5\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangNYT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdcta/JiangYZ10,
  author       = {Yajun Jiang and
                  Bo Yang and
                  Mingwu Zhang},
  title        = {A Classified Credential Selection Scheme with Disclosure-minimizing
                  Privacy},
  journal      = {J. Digit. Content Technol. its Appl.},
  volume       = {4},
  number       = {9},
  pages        = {201--211},
  year         = {2010},
  url          = {http://www.aicit.org/jdcta/ppl/25\_FASTJDCTA2-607143.pdf},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdcta/JiangYZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ZhangYTSZ10,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi and
                  Yanping Shen and
                  Wenzheng Zhang},
  editor       = {Hsinchun Chen and
                  Michael Chau and
                  Shu{-}Hsing Li and
                  Shalini R. Urs and
                  Srinath Srinivasa and
                  G. Alan Wang},
  title        = {Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the
                  Standard Model},
  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}
                  2010, Hyderabad, India, June 21, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6122},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13601-6\_10},
  doi          = {10.1007/978-3-642-13601-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ZhangYTSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ZhangLYWT10,
  author       = {Mingwu Zhang and
                  Pengcheng Li and
                  Bo Yang and
                  Hao Wang and
                  Tsuyoshi Takagi},
  editor       = {Hsinchun Chen and
                  Michael Chau and
                  Shu{-}Hsing Li and
                  Shalini R. Urs and
                  Srinath Srinivasa and
                  G. Alan Wang},
  title        = {Towards Confidentiality of ID-Based Signcryption Schemes under without
                  Random Oracle Model},
  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}
                  2010, Hyderabad, India, June 21, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6122},
  pages        = {98--104},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13601-6\_12},
  doi          = {10.1007/978-3-642-13601-6\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ZhangLYWT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYZZ09,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Shenglin Zhu and
                  Wenzheng Zhang},
  title        = {Ordered Semiring-based Trust Establish Model with Risk Evaluating},
  journal      = {Int. J. Netw. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {101--106},
  year         = {2009},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v8-n2/ijns-2009-v8-n2-p101-106.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYZZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icic/ZhangZYZ09,
  author       = {Mingwu Zhang and
                  Yusheng Zhong and
                  Bo Yang and
                  Wenzheng Zhang},
  editor       = {De{-}Shuang Huang and
                  Kang{-}Hyun Jo and
                  Hong{-}Hee Lee and
                  Hee{-}Jun Kang and
                  Vitoantonio Bevilacqua},
  title        = {Analysis and Improvement of an ID-Based Anonymous Signcryption Model},
  booktitle    = {Emerging Intelligent Computing Technology and Applications, 5th International
                  Conference on Intelligent Computing, {ICIC} 2009, Ulsan, South Korea,
                  September 16-19, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5754},
  pages        = {433--442},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04070-2\_49},
  doi          = {10.1007/978-3-642-04070-2\_49},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icic/ZhangZYZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangZLY09,
  author       = {Mingwu Zhang and
                  Yusheng Zhong and
                  Pengcheng Li and
                  Bo Yang},
  title        = {Analysis and Enhance of Anonymous Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangZLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcsb/ZhangOSKSPBBZ08,
  author       = {Mingwu Zhang and
                  Qi Ouyang and
                  Alan Stephenson and
                  Michael D. Kane and
                  David E. Salt and
                  Sunil Prabhakar and
                  John Burgner and
                  Charles R. Buck and
                  Xiang Zhang},
  title        = {Interactive analysis of systems biology molecular expression data},
  journal      = {{BMC} Syst. Biol.},
  volume       = {2},
  pages        = {23},
  year         = {2008},
  url          = {https://doi.org/10.1186/1752-0509-2-23},
  doi          = {10.1186/1752-0509-2-23},
  timestamp    = {Tue, 05 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcsb/ZhangOSKSPBBZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/ZhangYZZ08,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Shenglin Zhu and
                  Wenzheng Zhang},
  editor       = {Chunming Rong and
                  Martin Gilje Jaatun and
                  Frode Eika Sandnes and
                  Laurence Tianruo Yang and
                  Jianhua Ma},
  title        = {Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments},
  booktitle    = {Autonomic and Trusted Computing, 5th International Conference, {ATC}
                  2008, Oslo, Norway, June 23-25, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5060},
  pages        = {516--526},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69295-9\_41},
  doi          = {10.1007/978-3-540-69295-9\_41},
  timestamp    = {Thu, 01 Feb 2024 20:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/ZhangYZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/ZhangYZZ08,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Shenglin Zhu and
                  Wenzheng Zhang},
  editor       = {Christopher C. Yang and
                  Hsinchun Chen and
                  Michael Chau and
                  Kuiyu Chang and
                  Sheau{-}Dong Lang and
                  Patrick S. Chen and
                  Raymond Hsieh and
                  Daniel Zeng and
                  Fei{-}Yue Wang and
                  Kathleen M. Carley and
                  Wenji Mao and
                  Justin Zhan},
  title        = {Efficient Secret Authenticatable Anonymous Signcryption Scheme with
                  Identity Privacy},
  booktitle    = {Intelligence and Security Informatics, {IEEE} {ISI} 2008 International
                  Workshops: PAISI, PACCF, and {SOCO} 2008, Taipei, Taiwan, June 17,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5075},
  pages        = {126--137},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69304-8\_14},
  doi          = {10.1007/978-3-540-69304-8\_14},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/ZhangYZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/atc/YuYHZ07,
  author       = {Yong Yu and
                  Bo Yang and
                  Xinyi Huang and
                  Mingwu Zhang},
  editor       = {Bin Xiao and
                  Laurence Tianruo Yang and
                  Jianhua Ma and
                  Christian M{\"{u}}ller{-}Schloer and
                  Yu Hua},
  title        = {Efficient Identity-Based Signcryption Scheme for Multiple Receivers},
  booktitle    = {Autonomic and Trusted Computing, 4th International Conference, {ATC}
                  2007, Hong Kong, China, July 11-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4610},
  pages        = {13--21},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73547-2\_4},
  doi          = {10.1007/978-3-540-73547-2\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/atc/YuYHZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bibe/ZhangKP07,
  author       = {Mingwu Zhang and
                  Daisuke Kihara and
                  Sunil Prabhakar},
  title        = {Tracing Lineage in Multi-version Scientific Databases},
  booktitle    = {Proceedings of the 7th {IEEE} International Conference on Bioinformatics
                  and Bioengineering, {BIBE} 2007, October 14-17, 2007, Harvard Medical
                  School, Boston, MA, {USA}},
  pages        = {440--447},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/BIBE.2007.4375599},
  doi          = {10.1109/BIBE.2007.4375599},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bibe/ZhangKP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/ZhangJCP07,
  author       = {Mingwu Zhang and
                  Wei Jiang and
                  Chris Clifton and
                  Sunil Prabhakar},
  editor       = {Roland R. Wagner and
                  Norman Revell and
                  G{\"{u}}nther Pernul},
  title        = {Identifying Rare Classes with Sparse Training Data},
  booktitle    = {Database and Expert Systems Applications, 18th International Conference,
                  {DEXA} 2007, Regensburg, Germany, September 3-7, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4653},
  pages        = {751--760},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74469-6\_73},
  doi          = {10.1007/978-3-540-74469-6\_73},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/ZhangJCP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/ZhangYZZ07,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Shenglin Zhu and
                  Wenzheng Zhang},
  editor       = {Jingsheng Lei and
                  JingTao Yao and
                  Qingfu Zhang},
  title        = {Trust-based Distributed Authentication Middleware in Ubiquitous Mobile
                  Environments},
  booktitle    = {Third International Conference on Natural Computation, {ICNC} 2007,
                  Haikou, Hainan, China, 24-27 August 2007, Volume 5},
  pages        = {814--818},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICNC.2007.785},
  doi          = {10.1109/ICNC.2007.785},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnc/ZhangYZZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/ZhangYQZ07,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Yu Qi and
                  Wenzheng Zhang},
  editor       = {Wenying Feng and
                  Feng Gao},
  title        = {Using Trust Metric to Detect Malicious Behaviors in WSNs},
  booktitle    = {Proceedings of the 8th {ACIS} International Conference on Software
                  Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China},
  pages        = {104--108},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SNPD.2007.325},
  doi          = {10.1109/SNPD.2007.325},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/ZhangYQZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/ZhangZZP07,
  author       = {Mingwu Zhang and
                  Xiangyu Zhang and
                  Xiang Zhang and
                  Sunil Prabhakar},
  editor       = {Christoph Koch and
                  Johannes Gehrke and
                  Minos N. Garofalakis and
                  Divesh Srivastava and
                  Karl Aberer and
                  Anand Deshpande and
                  Daniela Florescu and
                  Chee Yong Chan and
                  Venkatesh Ganti and
                  Carl{-}Christian Kanne and
                  Wolfgang Klas and
                  Erich J. Neuhold},
  title        = {Tracing Lineage Beyond Relational Operators},
  booktitle    = {Proceedings of the 33rd International Conference on Very Large Data
                  Bases, University of Vienna, Austria, September 23-27, 2007},
  pages        = {1116--1127},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {http://www.vldb.org/conf/2007/papers/industrial/p1116-zhang.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vldb/ZhangZZP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics