En Zhang

Orcid: 0000-0003-4106-6877

According to our database1, En Zhang authored at least 42 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Time-Aware Dual LSTM Neural Network with Similarity Graph Learning for Remote Sensing Service Recommendation.
Sensors, February, 2024

2023
Heterogeneous cognitive learning particle swarm optimization for large-scale optimization problems.
Inf. Sci., July, 2023

Accuracy Rate Maximization in Edge Federated Learning With Delay and Energy Constraints.
IEEE Syst. J., June, 2023

Colorimetric Sensors for Chemical and Biological Sensing Applications.
Sensors, March, 2023

Group Cooperative Teaching Design With Knowledge Graphs in Project-Driven Learning.
Int. J. Inf. Commun. Technol. Educ., 2023

Underwater Image Enhancement Based on Optimal Contrast and Attenuation Difference.
IEEE Access, 2023

Stochastic Dominant Cognitive Experience Guided Particle Swarm Optimization.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

Efficient Multiparty Probabilistic Threshold Private Set Intersection.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
DIGDH: A Novel Framework of Difference Image Grafting Deep Hiding for Image Data Hiding.
Symmetry, 2022

AFNFS: Adaptive fuzzy neighborhood-based feature selection with adaptive synthetic over-sampling for imbalanced data.
Inf. Sci., 2022

Practical multi-party private collaborative k-means clustering.
Neurocomputing, 2022

Ant Colony optimization for Electric Vehicle Routing Problem with Capacity and Charging Time Constraints.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2022

Automatic Grading of Student Code with Similarity Measurement.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Research on the Teaching of Music Education in Colleges and Universities Under the Reflective Teaching Dimension.
Proceedings of the ICIEI 2022: The 7th International Conference on Information and Education Innovations, Belgrade, Serbia, April 14, 2022

MLadder: An Online Training System for Machine Learning and Data Science Education.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
A lattice-based searchable encryption scheme with the validity period control of files.
Multim. Tools Appl., 2021

Fair hierarchical secret sharing scheme based on smart contract.
Inf. Sci., 2021

Coverless Information Hiding Based on WGAN-GP Model.
Int. J. Digit. Crime Forensics, 2021

Efficient Threshold Private Set Intersection.
IEEE Access, 2021

Research on Music Education and Teaching in Colleges and Universities under the Dimension of Aesthetic Intersubjectivity.
Proceedings of the ICFET 2021: The 7th International Conference on Frontiers of Educational Technologies, Bangkok, Thailand, June 4, 2021

Topic Model based Ensemble Learning for Rating Prediction and Its Application.
Proceedings of the 6th IEEE/ACIS International Conference on Big Data, 2021

Covid-19 Related Topic Detection in Catering Industry with Online Review and Embedding.
Proceedings of the 6th IEEE/ACIS International Conference on Big Data, 2021

2020
Subdata image encryption scheme based on compressive sensing and vector quantization.
Neural Comput. Appl., 2020

2019
Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation.
Secur. Commun. Networks, 2019

Health Monitoring of Bolt Looseness in Timber Structures Using PZT-Enabled Time-Reversal Method.
J. Sensors, 2019

Efficient image encryption and compression based on a VAE generative model.
J. Real Time Image Process., 2019

FollowMe: One Social Importance-Based Collaborative Scheme in MONs.
Future Internet, 2019

Reversible Image Steganography Scheme Based on a U-Net Structure.
IEEE Access, 2019

Intervention Effect of Mindfulness Based Cognitive Therapy on College Students Dependent on Online Games in the Internet Era.
Proceedings of the Data Processing Techniques and Applications for Cyber-Physical Systems, 2019

Efficient Multi-Party Private Set Intersection Against Malicious Adversaries.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

2018
Securely Outsourcing ID3 Decision Tree in Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter.
Signal Process., 2018

A VQ-Based Joint Fingerprinting and Decryption Scheme for Secure and Efficient Image Distribution.
Secur. Commun. Networks, 2018

Outsourcing secret sharing scheme based on homomorphism encryption.
IET Inf. Secur., 2018

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Image Encryption and Compression Based on a VAE Generative Model.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Server-aided private set intersection based on reputation.
Inf. Sci., 2017

Modelling epidemic routing with heterogeneous infection rate.
Int. J. High Perform. Comput. Netw., 2017

Image camouflage based on Generate Model.
CoRR, 2017

2015
Verifiable Rational Secret Sharing Scheme in Mobile Networks.
Mob. Inf. Syst., 2015

抗合谋理性多秘密共享方案 (Collusion-free Rational Multi-secret Sharing Scheme).
计算机科学, 2015

2013
Rational Multi-Secret Sharing Scheme in Standard Point-to-Point Communication Networks.
Int. J. Found. Comput. Sci., 2013


  Loading...