Follow
Zhiwei Zhang
Zhiwei Zhang
Verified email at xidian.edu.cn
Title
Cited by
Cited by
Year
Fedproc: Prototypical contrastive federated learning on non-iid data
X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang
Future Generation Computer Systems 143, 93-104, 2023
842023
HVDB: a hierarchical verifiable database scheme with scalable updates
Z Zhang, X Chen, J Li, X Tao, J Ma
Journal of Ambient Intelligence and Humanized Computing 10, 3045-3057, 2019
202019
An associated deletion scheme for multi-copy in cloud storage
Dulin, Z Zhang, S Tan, J Wang, X Tao
International Conference on Algorithms and Architectures for Parallel …, 2018
172018
New efficient constructions of verifiable data streaming with accountability
Z Zhang, X Chen, J Ma, X Tao
Annals of Telecommunications 74, 483-499, 2019
152019
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted cyber-physical systems
Z Zhang, X Chen, J Ma, J Shen
Future Generation Computer Systems 108, 1338-1349, 2020
142020
The multimedia service session handoff method in heterogeneous wireless networks
Y Shen, Q Pei, Q Xu, Z Zhang
International Journal of Grid and Utility Computing 3 (1), 68-77, 2012
142012
A blockchain-driven data exchange model in multi-domain iot with controllability and parallelity
W Tong, X Dong, Y Shen, X Jiang, Z Zhang
Future Generation Computer Systems 135, 85-94, 2022
82022
Hierarchical Access Control with Scalable Data Sharing in Cloud Storage
Z Qiu, Z Zhang, S Tan, J Wang, X Tao
Journal of Internet Technology 20 (3), 663-676, 2019
72019
Manto: A practical and secure inference service of convolutional neural networks for iot
K Cheng, J Fu, Y Shen, H Gao, N Xi, Z Zhang, X Zhu
IEEE Internet of Things Journal, 2023
52023
Sustainable Intrusion Detection with New Attack Classification in Private Clouds
Y Jing, Z Zhang*, T Hu, Z Li, S Liu
Journal of Networking and Network Applications 1 (4), 150–159, 2022
52022
An almost non-interactive order preserving encryption scheme
J Guo, J Wang, Z Zhang, X Chen
International conference on information security practice and experience, 87-100, 2018
52018
Private inference for deep neural networks: a secure, adaptive, and efficient realization
K Cheng, N Xi, X Liu, X Zhu, H Gao, Z Zhang, Y Shen
IEEE Transactions on Computers, 2023
32023
Visualizable Malware Detection based on Multi-dimension Dynamic Behaviors
Z Ma, Z Zhang, C Liu, T Hu, H Li, B Ren
2022 International Conference on Networking and Network Applications (NaNA …, 2022
22022
Wiretapping or jamming: On eavesdropper attacking strategy in mmWave ad hoc networks
Y Zhang, J He, Q Qu, Z Zhang
2021 International Conference on Networking and Network Applications (NaNA …, 2021
22021
Ms2hm: A multimedia service session handoff method between heterogeneous wireless networks
Y Shen, Z Zhang, J Ma, Q Pei, Q Xu, H Yin
2011 Third International Conference on Intelligent Networking and …, 2011
22011
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction
M Umar, J Wang, F Li, S Wang, M Zheng, Z Zhang, Y Shen
Ad Hoc Networks 152, 103303, 2024
12024
You can see, but you cannot photograph: an intelligent content protection scheme for videos on screens
Z Xu, K Lin, Z Zhang, W Xu, K Liu, B Wang, X Zhu, J Chen
2021 International Conference on Networking and Network Applications (NaNA …, 2021
12021
FO-Sketch: a fast oblivious sketch for secure network measurement service in the cloud
L Liu, Y Shen, S Zeng, Z Zhang
Electronics 10 (16), 2020, 2021
12021
TV-ADS: A Smarter Attack Detection Scheme Based on Traffic Visualization of Wireless Network Event Cell
Z Zhang, G Tang, B Ren, H Li, Y Shen
Journal of Internet Technology 25 (2), 301-311, 2024
2024
VMD: A Visualizable Malware Detection Scheme Based on Multi-dimensional Dynamic Behavior Information
Y Cui, Z Zhang, Z Ma, Z Chen, Y Wang, Y Shen
Journal of Networking and Network Applications 4 (1), 11-20, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20