关注
Zhiwei Zhang
Zhiwei Zhang
在 xidian.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fedproc: Prototypical contrastive federated learning on non-iid data
X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang
Future Generation Computer Systems 143, 93-104, 2023
1322023
HVDB: a hierarchical verifiable database scheme with scalable updates
Z Zhang, X Chen, J Li, X Tao, J Ma
Journal of Ambient Intelligence and Humanized Computing 10, 3045-3057, 2019
202019
An associated deletion scheme for multi-copy in cloud storage
Dulin, Z Zhang, S Tan, J Wang, X Tao
International Conference on Algorithms and Architectures for Parallel …, 2018
172018
SLDS: Secure and location-sensitive data sharing scheme for cloud-assisted cyber-physical systems
Z Zhang, X Chen, J Ma, J Shen
Future Generation Computer Systems 108, 1338-1349, 2020
152020
New efficient constructions of verifiable data streaming with accountability
Z Zhang, X Chen, J Ma, X Tao
Annals of Telecommunications 74, 483-499, 2019
152019
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity
W Tong, X Dong, Y Shen, X Jiang, Z Zhang
Future Generation Computer Systems 135, 85-94, 2022
142022
The multimedia service session handoff method in heterogeneous wireless networks
Y Shen, Q Pei, Q Xu, Z Zhang
International Journal of Grid and Utility Computing 3 (1), 68-77, 2012
142012
Hierarchical Access Control with Scalable Data Sharing in Cloud Storage
Z Qiu, Z Zhang, S Tan, J Wang, X Tao
Journal of Internet Technology 20 (3), 663-676, 2019
72019
Private inference for deep neural networks: a secure, adaptive, and efficient realization
K Cheng, N Xi, X Liu, X Zhu, H Gao, Z Zhang, Y Shen
IEEE Transactions on Computers, 2023
52023
Manto: A practical and secure inference service of convolutional neural networks for iot
K Cheng, J Fu, Y Shen, H Gao, N Xi, Z Zhang, X Zhu
IEEE Internet of Things Journal 10 (16), 14856-14872, 2023
52023
Sustainable Intrusion Detection with New Attack Classification in Private Clouds
Y Jing, Z Zhang*, T Hu, Z Li, S Liu
Journal of Networking and Network Applications 1 (4), 150–159, 2022
52022
An almost non-interactive order preserving encryption scheme
J Guo, J Wang, Z Zhang, X Chen
International conference on information security practice and experience, 87-100, 2018
52018
Class continuous lod algorithm for lightweight webgl rendering optimization
J Wang, X Xia, Z Zhang, Y Zhang, Y Shen, B Ren
2022 International Conference on Networking and Network Applications (NaNA …, 2022
32022
Visualizable malware detection based on multi-dimension dynamic behaviors
Z Ma, Z Zhang, C Liu, T Hu, H Li, B Ren
2022 International Conference on Networking and Network Applications (NaNA …, 2022
32022
Multiple attributes based physical layer authentication through propagation scenario identification in the internet of vehicles
M Umar, J Wang, HK Ahmad, S Zhao, F Li, S Wang, M Zheng, Y Shen, ...
Vehicular Communications 45, 100708, 2024
22024
Physical layer authentication in the internet of vehicles through multiple vehicle-based physical attributes prediction
M Umar, J Wang, F Li, S Wang, M Zheng, Z Zhang, Y Shen
Ad Hoc Networks 152, 103303, 2024
22024
Wiretapping or jamming: On eavesdropper attacking strategy in mmWave ad hoc networks
Y Zhang, J He, Q Qu, Z Zhang
2021 International Conference on Networking and Network Applications (NaNA …, 2021
22021
Ms2hm: A multimedia service session handoff method between heterogeneous wireless networks
Y Shen, Z Zhang, J Ma, Q Pei, Q Xu, H Yin
2011 Third International Conference on Intelligent Networking and …, 2011
22011
Joint Controller Placement and Control-Service Connection in Hybrid-Band Control
X Dong, L Xue, Z Zhang, Y Zhang, T Li, Z You, Y Shen
IEEE Transactions on Cloud Computing 11 (3), 3139-3152, 2023
12023
An Unknown Protocol Identification Method for Industrial Internet
ZZ Xinghui Zhu,Ziheng Jiang, Qiyuan Zhang, Shuangrui Zhao
Wireless Communications and Mobile Computing, 2022
12022
系统目前无法执行此操作,请稍后再试。
文章 1–20