Fedproc: Prototypical contrastive federated learning on non-iid data X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang Future Generation Computer Systems 143, 93-104, 2023 | 84 | 2023 |
HVDB: a hierarchical verifiable database scheme with scalable updates Z Zhang, X Chen, J Li, X Tao, J Ma Journal of Ambient Intelligence and Humanized Computing 10, 3045-3057, 2019 | 20 | 2019 |
An associated deletion scheme for multi-copy in cloud storage Dulin, Z Zhang, S Tan, J Wang, X Tao International Conference on Algorithms and Architectures for Parallel …, 2018 | 17 | 2018 |
New efficient constructions of verifiable data streaming with accountability Z Zhang, X Chen, J Ma, X Tao Annals of Telecommunications 74, 483-499, 2019 | 15 | 2019 |
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted cyber-physical systems Z Zhang, X Chen, J Ma, J Shen Future Generation Computer Systems 108, 1338-1349, 2020 | 14 | 2020 |
The multimedia service session handoff method in heterogeneous wireless networks Y Shen, Q Pei, Q Xu, Z Zhang International Journal of Grid and Utility Computing 3 (1), 68-77, 2012 | 14 | 2012 |
A blockchain-driven data exchange model in multi-domain iot with controllability and parallelity W Tong, X Dong, Y Shen, X Jiang, Z Zhang Future Generation Computer Systems 135, 85-94, 2022 | 8 | 2022 |
Hierarchical Access Control with Scalable Data Sharing in Cloud Storage Z Qiu, Z Zhang, S Tan, J Wang, X Tao Journal of Internet Technology 20 (3), 663-676, 2019 | 7 | 2019 |
Manto: A practical and secure inference service of convolutional neural networks for iot K Cheng, J Fu, Y Shen, H Gao, N Xi, Z Zhang, X Zhu IEEE Internet of Things Journal, 2023 | 5 | 2023 |
Sustainable Intrusion Detection with New Attack Classification in Private Clouds Y Jing, Z Zhang*, T Hu, Z Li, S Liu Journal of Networking and Network Applications 1 (4), 150–159, 2022 | 5 | 2022 |
An almost non-interactive order preserving encryption scheme J Guo, J Wang, Z Zhang, X Chen International conference on information security practice and experience, 87-100, 2018 | 5 | 2018 |
Private inference for deep neural networks: a secure, adaptive, and efficient realization K Cheng, N Xi, X Liu, X Zhu, H Gao, Z Zhang, Y Shen IEEE Transactions on Computers, 2023 | 3 | 2023 |
Visualizable Malware Detection based on Multi-dimension Dynamic Behaviors Z Ma, Z Zhang, C Liu, T Hu, H Li, B Ren 2022 International Conference on Networking and Network Applications (NaNA …, 2022 | 2 | 2022 |
Wiretapping or jamming: On eavesdropper attacking strategy in mmWave ad hoc networks Y Zhang, J He, Q Qu, Z Zhang 2021 International Conference on Networking and Network Applications (NaNA …, 2021 | 2 | 2021 |
Ms2hm: A multimedia service session handoff method between heterogeneous wireless networks Y Shen, Z Zhang, J Ma, Q Pei, Q Xu, H Yin 2011 Third International Conference on Intelligent Networking and …, 2011 | 2 | 2011 |
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction M Umar, J Wang, F Li, S Wang, M Zheng, Z Zhang, Y Shen Ad Hoc Networks 152, 103303, 2024 | 1 | 2024 |
You can see, but you cannot photograph: an intelligent content protection scheme for videos on screens Z Xu, K Lin, Z Zhang, W Xu, K Liu, B Wang, X Zhu, J Chen 2021 International Conference on Networking and Network Applications (NaNA …, 2021 | 1 | 2021 |
FO-Sketch: a fast oblivious sketch for secure network measurement service in the cloud L Liu, Y Shen, S Zeng, Z Zhang Electronics 10 (16), 2020, 2021 | 1 | 2021 |
TV-ADS: A Smarter Attack Detection Scheme Based on Traffic Visualization of Wireless Network Event Cell Z Zhang, G Tang, B Ren, H Li, Y Shen Journal of Internet Technology 25 (2), 301-311, 2024 | | 2024 |
VMD: A Visualizable Malware Detection Scheme Based on Multi-dimensional Dynamic Behavior Information Y Cui, Z Zhang, Z Ma, Z Chen, Y Wang, Y Shen Journal of Networking and Network Applications 4 (1), 11-20, 2024 | | 2024 |