关注
Hui Zhu (朱辉)
Hui Zhu (朱辉)
其他姓名Zhu Hui, Hui Zhu
在 xidian.edu.cn 的电子邮件经过验证 - 首页
标题
引用次数
年份
A Blockchain-Integrated Divided-Block Sparse Matrix Transformation Differential Privacy Data Publishing Model
Y Hong, X Zhao, H Zhu, H Li
Security and Communication Networks 2021, 1-15, 2021
2021
A collaboration‐based scheme for location‐based services with incentive mechanism
S Wan, J Hua, H Zhu, H Wang, F Li
Chinese Journal of Electronics 27 (2), 310-317, 2018
62018
A lightweight anonymous authentication scheme for VANET based on bilinear pairing
H Zhu, W Pan, B Liu, H Li
2012 Fourth International Conference on Intelligent Networking and …, 2012
222012
A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J Wang, H Ma, Q Tang, J Li, H Zhu, S Ma, X Chen
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (4), 61-71, 2012
332012
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
Y Zhao, X Chen, H Ma, Q Tang, H Zhu
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3 (1/2), 72-81, 2012
622012
A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent
F Wang, H Zhu, R Lu, Y Zheng, H Li
Information Sciences 552, 183-200, 2021
552021
A secure and privacy-preserving incentive framework for vehicular cloud on the road
Q Kong, R Lu, H Zhu, A Alamer, X Lin
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
212016
A Stream Pattern Matching Method for Traffic Analysis
Z Hui, L Hui, M Can
CHINA COMMUNICATIONS 7 (6), 86-93, 2010
2010
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J Wang, X Chen, H Ma, Q Tang, J Li, H Zhu
J. Internet Serv. Inf. Secur. 2 (1/2), 49-58, 2012
242012
ACCEL: An efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data
J Zhao, H Zhu, F Wang, R Lu, H Li, Z Zhou, H Wan
Science China. Information Sciences 65 (7), 170307, 2022
62022
Achieve efficient and privacy-preserving disease risk assessment over multi-outsourced vertical datasets
F Wang, H Zhu, R Lu, Y Zheng, H Li
IEEE Transactions on Dependable and Secure Computing 19 (3), 1492-1504, 2020
192020
Achieve efficient and privacy-preserving medical primary diagnosis based on kNN
D Zhu, H Zhu, X Liu, H Li, F Wang, H Li
2018 27th International Conference on Computer Communication and Networks …, 2018
122018
Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data
Q Wei, H Zhu, R Lu, H Li
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
32017
Achieve efficient and privacy-preserving proximity detection scheme for social applications
F Wang, H Zhu, R Lu, F Liu, C Huang, H Li
Security and Privacy in Communication Networks: 13th International …, 2018
12018
Achieve secure and efficient skyline computation for worker selection in mobile crowdsensing
X Zhang, R Lu, J Shao, H Zhu, AA Ghorbani
2019 11th International Conference on Wireless Communications and Signal …, 2019
52019
Achieve secure handover session key management via mobile relay in LTE-advanced networks
Q Kong, R Lu, S Chen, H Zhu
IEEE internet of things journal 4 (1), 29-39, 2016
452016
Achieving efficient and privacy-preserving exact set similarity search over encrypted data
Y Zheng, R Lu, Y Guan, J Shao, H Zhu
IEEE Transactions on Dependable and Secure Computing 19 (2), 1090-1103, 2020
332020
Achieving efficient and privacy-preserving set containment search over encrypted data
Y Zheng, R Lu, Y Guan, J Shao, H Zhu
IEEE Transactions on Services Computing 15 (5), 2604-2618, 2021
132021
Achieving Practical and Privacy-Preserving kNN Query over Encrypted Data
Y Zheng, R Lu, S Zhang, J Shao, H Zhu
IEEE Transactions on Dependable and Secure Computing, 2024
2024
Achieving practical symmetric searchable encryption with search pattern privacy over cloud
Y Zheng, R Lu, J Shao, F Yin, H Zhu
IEEE Transactions on Services Computing 15 (3), 1358-1370, 2020
192020
系统目前无法执行此操作,请稍后再试。
文章 1–20