Fedproc: Prototypical contrastive federated learning on non-iid data X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang Future Generation Computer Systems 143, 93-104, 2023 | 132 | 2023 |
HVDB: a hierarchical verifiable database scheme with scalable updates Z Zhang, X Chen, J Li, X Tao, J Ma Journal of Ambient Intelligence and Humanized Computing 10, 3045-3057, 2019 | 20 | 2019 |
An associated deletion scheme for multi-copy in cloud storage Dulin, Z Zhang, S Tan, J Wang, X Tao International Conference on Algorithms and Architectures for Parallel …, 2018 | 17 | 2018 |
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted cyber-physical systems Z Zhang, X Chen, J Ma, J Shen Future Generation Computer Systems 108, 1338-1349, 2020 | 15 | 2020 |
New efficient constructions of verifiable data streaming with accountability Z Zhang, X Chen, J Ma, X Tao Annals of Telecommunications 74, 483-499, 2019 | 15 | 2019 |
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity W Tong, X Dong, Y Shen, X Jiang, Z Zhang Future Generation Computer Systems 135, 85-94, 2022 | 14 | 2022 |
The multimedia service session handoff method in heterogeneous wireless networks Y Shen, Q Pei, Q Xu, Z Zhang International Journal of Grid and Utility Computing 3 (1), 68-77, 2012 | 14 | 2012 |
Hierarchical Access Control with Scalable Data Sharing in Cloud Storage Z Qiu, Z Zhang, S Tan, J Wang, X Tao Journal of Internet Technology 20 (3), 663-676, 2019 | 7 | 2019 |
Private inference for deep neural networks: a secure, adaptive, and efficient realization K Cheng, N Xi, X Liu, X Zhu, H Gao, Z Zhang, Y Shen IEEE Transactions on Computers, 2023 | 5 | 2023 |
Manto: A practical and secure inference service of convolutional neural networks for iot K Cheng, J Fu, Y Shen, H Gao, N Xi, Z Zhang, X Zhu IEEE Internet of Things Journal 10 (16), 14856-14872, 2023 | 5 | 2023 |
Sustainable Intrusion Detection with New Attack Classification in Private Clouds Y Jing, Z Zhang*, T Hu, Z Li, S Liu Journal of Networking and Network Applications 1 (4), 150–159, 2022 | 5 | 2022 |
An almost non-interactive order preserving encryption scheme J Guo, J Wang, Z Zhang, X Chen International conference on information security practice and experience, 87-100, 2018 | 5 | 2018 |
Class continuous lod algorithm for lightweight webgl rendering optimization J Wang, X Xia, Z Zhang, Y Zhang, Y Shen, B Ren 2022 International Conference on Networking and Network Applications (NaNA …, 2022 | 3 | 2022 |
Visualizable malware detection based on multi-dimension dynamic behaviors Z Ma, Z Zhang, C Liu, T Hu, H Li, B Ren 2022 International Conference on Networking and Network Applications (NaNA …, 2022 | 3 | 2022 |
Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles M Umar, J Wang, HK Ahmad, S Zhao, F Li, S Wang, M Zheng, Y Shen, ... Vehicular Communications 45, 100708, 2024 | 2 | 2024 |
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction M Umar, J Wang, F Li, S Wang, M Zheng, Z Zhang, Y Shen Ad Hoc Networks 152, 103303, 2024 | 2 | 2024 |
Wiretapping or jamming: On eavesdropper attacking strategy in mmWave ad hoc networks Y Zhang, J He, Q Qu, Z Zhang 2021 International Conference on Networking and Network Applications (NaNA …, 2021 | 2 | 2021 |
Ms2hm: A multimedia service session handoff method between heterogeneous wireless networks Y Shen, Z Zhang, J Ma, Q Pei, Q Xu, H Yin 2011 Third International Conference on Intelligent Networking and …, 2011 | 2 | 2011 |
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control X Dong, L Xue, Z Zhang, Y Zhang, T Li, Z You, Y Shen IEEE Transactions on Cloud Computing 11 (3), 3139-3152, 2023 | 1 | 2023 |
An Unknown Protocol Identification Method for Industrial Internet ZZ Xinghui Zhu,Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao Wireless Communications and Mobile Computing, 2022 | 1 | 2022 |