Follow
Zhen Yang
Title
Cited by
Cited by
Year
A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing
X Qin, Y Huang, Z Yang, X Li
Journal of Systems Architecture 112, 101854, 2021
1072021
LBAC: A lightweight blockchain-based access control scheme for the internet of things
X Qin, Y Huang, Z Yang, X Li
Information Sciences 554, 222-235, 2021
802021
Efficient Secure Data Provenance Scheme in Multimedia Outsourcing and Sharing.
Z Yang, Y Huang, X Li, W Wang
Computers, Materials & Continua 56 (1), 2018
272018
Privacy-Preserving Public Auditing Scheme for Data Confidentiality and Accountability in Cloud Storage
YANG Zhen, WANG Wenyu, HUANG Yongfeng, LI Xing
Chinese Journal of Electronics 28 (1), 179-187, 2019
242019
Protecting world leader using facial speaking pattern against deepfakes
B Chu, W You, Z Yang, L Zhou, R Wang
IEEE Signal Processing Letters 29, 2078-2082, 2022
182022
Fake face images detection and identification of celebrities based on semantic segmentation
R Wang, Z Yang, W You, L Zhou, B Chu
IEEE Signal Processing Letters 29, 2018-2022, 2022
152022
An access control scheme with fine-grained time constrained attributes based on smart contract and trapdoor
X Qin, Y Huang, Z Yang, X Li
2019 26th International Conference on Telecommunications (ICT), 249-253, 2019
142019
Ensuring reliable logging for data accountability in untrusted cloud storage
Z Yang, W Wang, Y Huang
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
112017
CBFF: A cloud–blockchain fusion framework ensuring data accountability for multi-cloud environments
Q Li, Z Yang, X Qin, D Tao, H Pan, Y Huang
Journal of Systems Architecture 124, 102436, 2022
102022
Protecting personal sensitive data security in the cloud with blockchain
Z Yang, Y Chen, Y Huang, X Li
Advances in Computers 120, 195-231, 2021
102021
An unsupervised sentiment classification method based on multi-level fuzzy computing and multi-criteria fusion
B Wang, W He, Z Yang, S Xiong
IEEE Access 8, 145422-145434, 2020
92020
Blockchain-Based Light-Weighted Provable Data Possession for Low Performance Devices.
Y Qi, Z Yang, Y Luo, Y Huang, X Li
Computers, Materials & Continua 73 (2), 2022
72022
Fast detection of heterogeneous parallel steganography for streaming voice
H Wang, Z Yang, Y Hu, Z Yang, Y Huang
Proceedings of the 2021 ACM Workshop on Information Hiding and Multimedia …, 2021
72021
Digital copyright depository system enhanced by blockchain
W Yang, P He, Z Yang, X Yi, C Chen
2020 International Conference on Culture-oriented Science & Technology …, 2020
72020
A no-pairing proxy re-encryption scheme for data sharing in untrusted cloud
X Qian, Z Yang, S Wang, Y Huang
International Conference on Artificial Intelligence and Security, 85-96, 2019
62019
New advances in remote heart rate estimation and its application to deepfake detection
Y Xu, R Zhang, C Yang, Y Zhang, Z Yang, J Liu
2021 International Conference on Culture-oriented Science & Technology …, 2021
52021
A vehicle intrusion detection system based on time interval and data fields
X He, Z Yang, Y Huang
Artificial Intelligence and Security: 7th International Conference, ICAIS …, 2021
52021
A CNN based visual audio steganography model
R Zhang, H Dong, Z Yang, W Ying, J Liu
International Conference on Adaptive and Intelligent Systems, 431-442, 2022
42022
Attribute-based encryption with outsourced computation for access control in IoTs
X Qin, Z Yang, Q Li, H Pan, Z Yang, Y Huang
2022 3rd Asia Service Sciences and Software Engineering Conference, 66-73, 2022
42022
视觉深度伪造检测技术综述
王任颖, 储贝林, 杨震, 周琳娜
中国图象图形学报, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20