
En Zhang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j18]En Zhang
, Jian Chang
, Yu Li
:
Efficient Threshold Private Set Intersection. IEEE Access 9: 6560-6570 (2021) - [j17]En Zhang
, Ming Li
, Siu-Ming Yiu, Jiao Du
, Jun-Zhe Zhu, Ganggang Jin:
Fair hierarchical secret sharing scheme based on smart contract. Inf. Sci. 546: 166-176 (2021) - [j16]En Zhang
, Yingying Hou, Gongli Li:
A lattice-based searchable encryption scheme with the validity period control of files. Multim. Tools Appl. 80(3): 4655-4672 (2021) - 2020
- [j15]Haiju Fan, Kanglei Zhou
, En Zhang, Wenying Wen, Ming Li
:
Subdata image encryption scheme based on compressive sensing and vector quantization. Neural Comput. Appl. 32(16): 12771-12787 (2020)
2010 – 2019
- 2019
- [j14]Xintao Duan
, Kai Jia, Baoxia Li, Daidou Guo, En Zhang
, Chuan Qin:
Reversible Image Steganography Scheme Based on a U-Net Structure. IEEE Access 7: 9314-9323 (2019) - [j13]Peiyan Yuan
, Xiaoxiao Pang
, Ping Liu, En Zhang:
FollowMe: One Social Importance-Based Collaborative Scheme in MONs. Future Internet 11(4): 98 (2019) - [j12]Xintao Duan
, Jingjing Liu, En Zhang:
Efficient image encryption and compression based on a VAE generative model. J. Real Time Image Process. 16(3): 765-773 (2019) - [j11]Ze Zhao, Pengcheng Chen, En Zhang, Guoyun Lu
:
Health Monitoring of Bolt Looseness in Timber Structures Using PZT-Enabled Time-Reversal Method. J. Sensors 2019: 2801638:1-2801638:8 (2019) - [j10]En Zhang
, Jun-Zhe Zhu, Gong-Li Li, Jian Chang, Yu Li:
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation. Secur. Commun. Networks 2019: 6989383:1-6989383:8 (2019) - [c4]En Zhang, Feng-Hao Liu, Qiqi Lai, Ganggang Jin, Yu Li:
Efficient Multi-Party Private Set Intersection Against Malicious Adversaries. CCSW@CCS 2019: 93-104 - [c3]Ying Lei, En Zhang:
Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era. DPTA 2019: 1613-1619 - 2018
- [j9]En Zhang, Jie Peng, Ming Li:
Outsourcing secret sharing scheme based on homomorphism encryption. IET Inf. Secur. 12(1): 94-99 (2018) - [j8]Ming Li
, Hua Ren
, En Zhang
, Wei Wang
, Lin Sun
, Di Xiao
:
A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution. Secur. Commun. Networks 2018: 4313769:1-4313769:11 (2018) - [j7]Haiju Fan, Ming Li, Dong Liu, En Zhang:
Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter. Signal Process. 143: 28-41 (2018) - [j6]Ye Li, Zoe Lin Jiang
, Xuan Wang
, Jun-bin Fang, En Zhang
, Xianmin Wang
:
Securely Outsourcing ID3 Decision Tree in Cloud Computing. Wirel. Commun. Mob. Comput. 2018: 2385150:1-2385150:10 (2018) - [c2]Xintao Duan, Jingjing Liu, En Zhang, Haoxian Song, Kai Jia:
Image Encryption and Compression Based on a VAE Generative Model. ICCCS (3) 2018: 79-89 - [c1]Qian Chen, Qing Liao, Zoe Lin Jiang, Junbin Fang, Siu-Ming Yiu, Guikai Xi, Rong Li, Zhengzhong Yi, Xuan Wang, Lucas C. K. Hui, Dong Liu, En Zhang:
File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics. IEEE Symposium on Security and Privacy Workshops 2018: 140-147 - 2017
- [j5]Peiyan Yuan, Shangwang Liu, En Zhang:
Modelling epidemic routing with heterogeneous infection rate. Int. J. High Perform. Comput. Netw. 10(3): 218-225 (2017) - [j4]En Zhang
, Fenghua Li, Ben Niu, Yanchao Wang:
Server-aided private set intersection based on reputation. Inf. Sci. 387: 180-194 (2017) - [i1]Xintao Duan, Haoxian Song, En Zhang, Jingjing Liu:
Image camouflage based on Generate Model. CoRR abs/1710.07782 (2017) - 2015
- [j3]En Zhang, Quandang Sun, Yapeng Liu:
抗合谋理性多秘密共享方案 (Collusion-free Rational Multi-secret Sharing Scheme). 计算机科学 42(10): 164-169 (2015) - [j2]En Zhang
, Peiyan Yuan
, Jiao Du
:
Verifiable Rational Secret Sharing Scheme in Mobile Networks. Mob. Inf. Syst. 2015: 462345:1-462345:7 (2015) - 2013
- [j1]En Zhang, Yongquan Cai:
Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks. Int. J. Found. Comput. Sci. 24(6): 879-898 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-27 21:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint