Hanlin Zhang
Orcid: 0000-0001-8869-6863Affiliations:
- Qingdao University, College of Computer Science and Technology, Qingdao, China
- Towson University, Department of Computer and Information Sciences, Towson, MD, USA (PhD 2016)
According to our database1,
Hanlin Zhang
authored at least 76 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Internet Things J., June, 2025
How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing.
IEEE Internet Things J., June, 2025
Rethinking the optimization objective for transferable adversarial examples from a fuzzy perspective.
Neural Networks, 2025
Neural Networks, 2025
Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data.
Future Gener. Comput. Syst., 2025
Expert Syst. Appl., 2025
Comput. Secur., 2025
2024
MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification.
IEEE Internet Things J., September, 2024
IEEE Internet Things J., July, 2024
Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification.
IEEE Internet Things J., April, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Improving query efficiency of black-box attacks via the preference of deep learning models.
Inf. Sci., 2024
Bot-DM: A dual-modal botnet detection method based on the combination of implicit semantic expression and graphical expression.
Expert Syst. Appl., 2024
Comput. Secur., 2024
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024
Optimized verifiable delegated private set intersection on outsourced private datasets.
Comput. Secur., 2024
An auxiliary correction model implemented by the Correction Property of intermediate layer against adversarial examples.
Appl. Soft Comput., 2024
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024
Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
2023
A novel coalition game based distributed cooperative content caching in mobile edge networks.
Veh. Commun., December, 2023
Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023
Inf. Sci., November, 2023
A Deep-Reinforcement-Learning-Based Computation Offloading With Mobile Vehicles in Vehicular Edge Computing.
IEEE Internet Things J., September, 2023
J. Vis. Commun. Image Represent., February, 2023
J. Ambient Intell. Humaniz. Comput., 2023
Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
2022
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022
IEEE Trans. Serv. Comput., 2022
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Comput. Soc. Syst., 2022
An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022
FACM: Correct the Output of Deep Neural Network with Middle Layers Features against Adversarial Samples.
CoRR, 2022
Mask-Guided Divergence Loss Improves the Generalization and Robustness of Deep Neural Network.
CoRR, 2022
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022
Comput. Networks, 2022
Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 5th International Conference on Big Data Technologies, 2022
2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021
Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021
Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
A novel Latency-Guaranteed based Resource Double Auction for market-oriented edge computing.
Comput. Networks, 2021
2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Inf. Forensics Secur., 2020
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020
Future Gener. Comput. Syst., 2020
2019
Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019
Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018
Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018
Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018
Proceedings of the 2018 International Conference on Computing, 2018
2017
J. Syst. Softw., 2017
Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet Things J., 2017
Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017
2016
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016
2015
Int. J. Parallel Emergent Distributed Syst., 2015
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015
2013
Int. J. Secur. Networks, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013