Follow
En Zhang
En Zhang
Professor, Henan Normal University
Verified email at htu.edu.cn
Title
Cited by
Cited by
Year
Reversible image steganography scheme based on a U-Net structure
X Duan, K Jia, B Li, D Guo, E Zhang, C Qin
Ieee Access 7, 9314-9323, 2019
1582019
Efficient multi-party private set intersection against malicious adversaries
E Zhang, FH Liu, Q Lai, G Jin, Y Li
Proceedings of the 2019 ACM SIGSAC conference on cloud computing security …, 2019
512019
Practical multi-party private collaborative k-means clustering
E Zhang, H Li, Y Huang, S Hong, L Zhao, C Ji
Neurocomputing 467, 256-265, 2022
432022
Fair hierarchical secret sharing scheme based on smart contract
E Zhang, M Li, SM Yiu, J Du, JZ Zhu, GG Jin
Information Sciences 546, 166-176, 2021
422021
Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter
H Fan, M Li, D Liu, E Zhang
Signal Processing 143, 28-41, 2018
372018
Server-aided private set intersection based on reputation
E Zhang, F Li, B Niu, Y Wang
Information Sciences 387, 180-194, 2017
342017
File fragment classification using grayscale image conversion and deep learning in digital forensics
Q Chen, Q Liao, ZL Jiang, J Fang, S Yiu, G Xi, R Li, Z Yi, X Wang, LCK Hui, ...
2018 IEEE Security and Privacy Workshops (SPW), 140-147, 2018
302018
Efficient image encryption and compression based on a VAE generative model
X Duan, J Liu, E Zhang
Journal of Real-Time Image Processing 16, 765-773, 2019
252019
AFNFS: Adaptive fuzzy neighborhood-based feature selection with adaptive synthetic over-sampling for imbalanced data
L Sun, M Li, W Ding, E Zhang, X Mu, J Xu
Information Sciences 612, 724-744, 2022
202022
Outsourcing secret sharing scheme based on homomorphism encryption
E Zhang, J Peng, M Li
IET Information Security 12 (1), 94-99, 2018
172018
Verifiable rational secret sharing scheme in mobile networks
E Zhang, P Yuan, J Du
Mobile Information Systems 2015, 2015
132015
Efficient threshold private set intersection
E Zhang, J Chang, Y Li
IEEE Access 9, 6560-6570, 2021
102021
A new rational secret sharing
E Zhang, YQ Cai
China Communications 7 (4), 18-22, 2010
92010
Securely outsourcing ID3 decision tree in cloud computing
Y Li, ZL Jiang, X Wang, J Fang, E Zhang, X Wang
Wireless Communications and Mobile Computing 2018, 2018
82018
Outsourcing hierarchical threshold secret sharing scheme based on reputation
E Zhang, JZ Zhu, GL Li, J Chang, Y Li
Security and Communication Networks 2019, 1-8, 2019
72019
Rational multi-secret sharing scheme in standard point-to-point communication networks
E Zhang, Y Cai
International Journal of Foundations of Computer Science 24 (06), 879-897, 2013
72013
A lattice-based searchable encryption scheme with the validity period control of files
E Zhang, Y Hou, G Li
Multimedia Tools and Applications 80 (3), 4655-4672, 2021
62021
Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and bloom filter
E ZHANG, G JIN
Journal of Computer Applications 38 (8), 2256, 2018
52018
Collusion-free rational secure sum protocol
Z En, CAI Yongquan
Chinese Journal of Electronics 22 (3), 563-566, 2013
52013
Accuracy rate maximization in edge federated learning with delay and energy constraints
P Yuan, R Huang, J Zhang, E Zhang, X Zhao
IEEE Systems Journal, 2022
42022
The system can't perform the operation now. Try again later.
Articles 1–20