Følg
Zechao LIU
Zechao LIU
Verifisert e-postadresse på hrbeu.edu.cn
Tittel
Sitert av
Sitert av
År
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating
Z Liu, ZL Jiang, X Wang, SM Yiu
Journal of Network and Computer Applications 108, 112-123, 2018
1112018
Efficient two-party privacy-preserving collaborative k-means clustering protocol supporting both storage and computation outsourcing
ZL Jiang, N Guo, Y Jin, J Lv, Y Wu, Z Liu, J Fang, SM Yiu, X Wang
Information Sciences 518, 168-180, 2020
482020
Outsourcing two-party privacy preserving k-means clustering protocol in wireless sensor networks
X Liu, ZL Jiang, SM Yiu, X Wang, C Tan, Y Li, Z Liu, Y Jin, J Fang
2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN …, 2015
282015
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing
Y Yang, J Sun, Z Liu, YQ Qiao
Journal of Information Security and Applications 65, 103108, 2022
232022
Offline/online attribute‐based encryption with verifiable outsourced decryption
Z Liu, ZL Jiang, X Wang, X Huang, SM Yiu, K Sadakane
Concurrency and Computation: Practice and Experience 29 (7), e3915, 2017
222017
Dynamic attribute-based access control in cloud storage systems
Z Liu, ZL Jiang, X Wang, SM Yiu, C Zhang, X Zhao
2016 IEEE Trustcom/BigDataSE/ISPA, 129-137, 2016
192016
A traceable outsourcing cp-abe scheme with attribute revocation
R Zhang, L Hui, S Yiu, X Yu, Z Liu, ZL Jiang
2017 IEEE Trustcom/BigDataSE/ICESS, 363-370, 2017
182017
Multi-authority ciphertext policy attribute-based encryption scheme on ideal lattices
Z Liu, ZL Jiang, X Wang, Y Wu, SM Yiu
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
152018
PTKE: Translation-based temporal knowledge graph embedding in polar coordinate system
R Liu, G Yin, Z Liu, L Zhang
Neurocomputing 529, 80-91, 2023
102023
A temporal and spatial constrained attribute-based access control scheme for cloud storage
Z Liu, ZL Jiang, X Wang, SM Yiu, R Zhang, Y Wu
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
92018
Attribution rollout: a new way to interpret visual transformer
L Xu, X Yan, W Ding, Z Liu
Journal of Ambient Intelligence and Humanized Computing 14 (1), 163-173, 2023
82023
Practical multi-authority ciphertext policy attribute-based encryption from R-LWE
J Sun, Y Qiao, Z Liu, Y Chen, Y Yang
2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2021
82021
Nowhere to hide: A novel private protocol identification algorithm
J Shi, X Yu, Z Liu
Security and Communication Networks 2021 (1), 6672911, 2021
82021
A revocable outsourcing attribute-based encryption scheme
ZL Jiang, R Zhang, Z Liu, SM Yiu, LCK Hui, X Wang, J Fang
Cloud Computing, Security, Privacy in New Computing Environments: 7th …, 2018
82018
White-box traceable dynamic attribute based encryption
Z Liu, X Wang, L Cui, ZL Jiang, C Zhang
2017 International Conference on Security, Pattern Analysis, and Cybernetics …, 2017
72017
Lattice-based proxy signature scheme with reject sampling method
ZL Jiang, Y Liang, Z Liu, X Wang
2017 International Conference on Security, Pattern Analysis, and Cybernetics …, 2017
72017
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT
Y Yang, G Zhang, S Li, Z Liu
Frontiers of Computer Science 18 (3), 183817, 2024
52024
Design and Implementation of a Lightweight Security‐Enhanced Scheme for Modbus TCP Protocol
Z Liu, T Liang, W Wang, R Sun, S Li
Security and Communication Networks 2023 (1), 5486566, 2023
52023
Graph-based supervised discrete image hashing
J Guan, Y Li, J Sun, X Wang, H Zhao, J Zhang, Z Liu, S Qi
Journal of Visual Communication and Image Representation 58, 675-687, 2019
52019
Reinforcement learning with time intervals for temporal knowledge graph reasoning
R Liu, G Yin, Z Liu, Y Tian
Information Systems 120, 102292, 2024
42024
Systemet kan ikke utføre handlingen. Prøv på nytt senere.
Artikler 1–20