Reversible image steganography scheme based on a U-Net structure X Duan, K Jia, B Li, D Guo, E Zhang, C Qin Ieee Access 7, 9314-9323, 2019 | 158 | 2019 |
Efficient multi-party private set intersection against malicious adversaries E Zhang, FH Liu, Q Lai, G Jin, Y Li Proceedings of the 2019 ACM SIGSAC conference on cloud computing security …, 2019 | 51 | 2019 |
Practical multi-party private collaborative k-means clustering E Zhang, H Li, Y Huang, S Hong, L Zhao, C Ji Neurocomputing 467, 256-265, 2022 | 43 | 2022 |
Fair hierarchical secret sharing scheme based on smart contract E Zhang, M Li, SM Yiu, J Du, JZ Zhu, GG Jin Information Sciences 546, 166-176, 2021 | 42 | 2021 |
Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter H Fan, M Li, D Liu, E Zhang Signal Processing 143, 28-41, 2018 | 37 | 2018 |
Server-aided private set intersection based on reputation E Zhang, F Li, B Niu, Y Wang Information Sciences 387, 180-194, 2017 | 34 | 2017 |
File fragment classification using grayscale image conversion and deep learning in digital forensics Q Chen, Q Liao, ZL Jiang, J Fang, S Yiu, G Xi, R Li, Z Yi, X Wang, LCK Hui, ... 2018 IEEE Security and Privacy Workshops (SPW), 140-147, 2018 | 30 | 2018 |
Efficient image encryption and compression based on a VAE generative model X Duan, J Liu, E Zhang Journal of Real-Time Image Processing 16, 765-773, 2019 | 25 | 2019 |
AFNFS: Adaptive fuzzy neighborhood-based feature selection with adaptive synthetic over-sampling for imbalanced data L Sun, M Li, W Ding, E Zhang, X Mu, J Xu Information Sciences 612, 724-744, 2022 | 20 | 2022 |
Outsourcing secret sharing scheme based on homomorphism encryption E Zhang, J Peng, M Li IET Information Security 12 (1), 94-99, 2018 | 17 | 2018 |
Verifiable rational secret sharing scheme in mobile networks E Zhang, P Yuan, J Du Mobile Information Systems 2015, 2015 | 13 | 2015 |
Efficient threshold private set intersection E Zhang, J Chang, Y Li IEEE Access 9, 6560-6570, 2021 | 10 | 2021 |
A new rational secret sharing E Zhang, YQ Cai China Communications 7 (4), 18-22, 2010 | 9 | 2010 |
Securely outsourcing ID3 decision tree in cloud computing Y Li, ZL Jiang, X Wang, J Fang, E Zhang, X Wang Wireless Communications and Mobile Computing 2018, 2018 | 8 | 2018 |
Outsourcing hierarchical threshold secret sharing scheme based on reputation E Zhang, JZ Zhu, GL Li, J Chang, Y Li Security and Communication Networks 2019, 1-8, 2019 | 7 | 2019 |
Rational multi-secret sharing scheme in standard point-to-point communication networks E Zhang, Y Cai International Journal of Foundations of Computer Science 24 (06), 879-897, 2013 | 7 | 2013 |
A lattice-based searchable encryption scheme with the validity period control of files E Zhang, Y Hou, G Li Multimedia Tools and Applications 80 (3), 4655-4672, 2021 | 6 | 2021 |
Cloud outsourcing multiparty private set intersection protocol based on homomorphic encryption and bloom filter E ZHANG, G JIN Journal of Computer Applications 38 (8), 2256, 2018 | 5 | 2018 |
Collusion-free rational secure sum protocol Z En, CAI Yongquan Chinese Journal of Electronics 22 (3), 563-566, 2013 | 5 | 2013 |
Accuracy rate maximization in edge federated learning with delay and energy constraints P Yuan, R Huang, J Zhang, E Zhang, X Zhao IEEE Systems Journal, 2022 | 4 | 2022 |