Hanlin Zhang

Orcid: 0000-0001-8869-6863

Affiliations:
  • Qingdao University, College of Computer Science and Technology, Qingdao, China
  • Towson University, Department of Computer and Information Sciences, Towson, MD, USA (PhD 2016)


According to our database1, Hanlin Zhang authored at least 76 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Privacy-Preserving Edge-Aided Eigenvalue Decomposition in Internet of Things.
IEEE Internet Things J., June, 2025

How to Securely Outsource the Multiple Kernel Fuzzy Clustering Task in Edge Computing.
IEEE Internet Things J., June, 2025

Rethinking the optimization objective for transferable adversarial examples from a fuzzy perspective.
Neural Networks, 2025

Enhancing adversarial transferability via transformation inference.
Neural Networks, 2025

Towards efficient privacy-preserving conjunctive keywords search over encrypted cloud data.
Future Gener. Comput. Syst., 2025

Fedai: Federated recommendation system with anonymized interactions.
Expert Syst. Appl., 2025

SMCD: Privacy-preserving deep learning based malicious code detection.
Comput. Secur., 2025

2024
MRFE: A Deep-Learning-Based Multidimensional Radio Frequency Fingerprinting Enhancement Approach for IoT Device Identification.
IEEE Internet Things J., September, 2024

Secure Edge-Aided Singular Value Decomposition in Internet of Things.
IEEE Internet Things J., July, 2024

Eliminating Rogue Access Point Attacks in IoT: A Deep Learning Approach With Physical-Layer Feature Purification and Device Identification.
IEEE Internet Things J., April, 2024

Secure Outsourcing Evaluation for Sparse Decision Trees.
IEEE Trans. Dependable Secur. Comput., 2024

Improving query efficiency of black-box attacks via the preference of deep learning models.
Inf. Sci., 2024

Bot-DM: A dual-modal botnet detection method based on the combination of implicit semantic expression and graphical expression.
Expert Syst. Appl., 2024

PVFL: Verifiable federated learning and prediction with privacy-preserving.
Comput. Secur., 2024

Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding.
Comput. Secur., 2024

Optimized verifiable delegated private set intersection on outsourced private datasets.
Comput. Secur., 2024

An auxiliary correction model implemented by the Correction Property of intermediate layer against adversarial examples.
Appl. Soft Comput., 2024

Privacy-preserving Deep Learning for Autism Spectrum Disorder Classification.
Proceedings of the 9th IEEE International Conference on Smart Cloud, 2024

Fast Distributed Polynomial Multiplication Algorithm for Lattice-based Cryptographic Decryption In Blockchain Systems.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

Privacy-Preserving Edge Assistance for Solving Matrix Eigenvalue Problem.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

Privacy-Preserving Group Closeness Maximization.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
A novel coalition game based distributed cooperative content caching in mobile edge networks.
Veh. Commun., December, 2023

Efficient, secure and verifiable outsourcing scheme for SVD-based collaborative filtering recommender system.
Future Gener. Comput. Syst., December, 2023

Improving the transferability of adversarial examples via direction tuning.
Inf. Sci., November, 2023

A Deep-Reinforcement-Learning-Based Computation Offloading With Mobile Vehicles in Vehicular Edge Computing.
IEEE Internet Things J., September, 2023

Action density based frame sampling for human action recognition in videos.
J. Vis. Commun. Image Represent., February, 2023

A verifiable and privacy-preserving framework for federated recommendation system.
J. Ambient Intell. Humaniz. Comput., 2023

Fuzziness-tuned: Improving the Transferability of Adversarial Examples.
CoRR, 2023

Efficient Privacy-Preserving Multi-Functional Data Aggregation Scheme for Multi-Tier IoT System.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

SecureGAN: Secure Three-Party GAN Training.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

2022
SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Novel Secure Outsourcing of Modular Inversion for Arbitrary and Variable Modulus.
IEEE Trans. Serv. Comput., 2022

Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression.
IEEE Trans. Netw. Sci. Eng., 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

An Improved Outsourcing Algorithm to Solve Quadratic Congruence Equations in Internet of Things.
IEEE Internet Things J., 2022

FACM: Correct the Output of Deep Neural Network with Middle Layers Features against Adversarial Samples.
CoRR, 2022

Mask-Guided Divergence Loss Improves the Generalization and Robustness of Deep Neural Network.
CoRR, 2022

Enhancing the Transferability of Adversarial Examples via a Few Queries.
CoRR, 2022

Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance.
Comput. Secur., 2022

Privacy-Preserving cloud-Aided broad learning system.
Comput. Secur., 2022

A Novel Lyapunov based Dynamic Resource Allocation for UAVs-assisted Edge Computing.
Comput. Networks, 2022

Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT.
Proceedings of the IEEE International Conference on Trust, 2022

MLPSI: Multi-party Privacy Set Intersection with Linear Complexity.
Proceedings of the 5th International Conference on Big Data Technologies, 2022

2021
Towards Achieving Keyword Search over Dynamic Encrypted Cloud Data with Symmetric-Key Based Verification.
IEEE Trans. Dependable Secur. Comput., 2021

Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures.
J. Comput. Syst. Sci., 2021

Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices.
IEEE Internet Things J., 2021

Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images.
IEEE Internet Things J., 2021

A novel Latency-Guaranteed based Resource Double Auction for market-oriented edge computing.
Comput. Networks, 2021

2020
An Edge Computing Based Public Vehicle System for Smart Transportation.
IEEE Trans. Veh. Technol., 2020

How to Securely Outsource Finding the Min-Cut of Undirected Edge-Weighted Graphs.
IEEE Trans. Inf. Forensics Secur., 2020

How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields.
Inf. Sci., 2020

Blockchain-based two-party fair contract signing scheme.
Inf. Sci., 2020

Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things.
IEEE Internet Things J., 2020

Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things.
IEEE Internet Things J., 2020

Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance.
IEEE Internet Things J., 2020

A novel multitype-users welfare equilibrium based real-time pricing in smart grid.
Future Gener. Comput. Syst., 2020

2019
Secure Outsourcing Algorithm for Signature Generation in Privacy-preserving Public Cloud Storage Auditing.
J. Inf. Sci. Eng., 2019

Practical and Secure Outsourcing Algorithms of Matrix Operations Based on a Novel Matrix Encryption Method.
IEEE Access, 2019

An Energy Scheduling Strategy With Priority Within Islanded Microgrids.
IEEE Access, 2019

Secure Outsourcing Algorithm for Bilinear Pairings without Pre-Computation.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Clust. Comput., 2018

Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

A Framework to Enable Multiple Coexisting Internet of Things Applications.
Proceedings of the 2018 International Conference on Computing, 2018

2017
How to securely outsource the inversion modulo a large composite number.
J. Syst. Softw., 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet Things J., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Gener. Comput. Syst., 2017

2016
A streaming-based network monitoring and threat detection system.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

Ultra-Dense Networks: Survey of State of the Art and Future Directions.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
A cloud computing based system for cyber security management.
Int. J. Parallel Emergent Distributed Syst., 2015

ScanMe mobile: a local and cloud hybrid service for analyzing APKs.
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 2015

2013
On effective data aggregation techniques in host-based intrusion detection in MANET.
Int. J. Secur. Networks, 2013

On behavior-based detection of malware on Android platform.
Proceedings of the 2013 IEEE Global Communications Conference, 2013


  Loading...