Hui Zhu

Orcid: 0000-0002-5853-633X

Affiliations:
  • Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China


According to our database1, Hui Zhu authored at least 110 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EPSet: Efficient and Privacy-Preserving Set Similarity Range Query Over Encrypted Data.
IEEE Trans. Serv. Comput., 2024

Efficient and Accurate Cloud-Assisted Medical Pre-Diagnosis With Privacy Preservation.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Efficient and privacy-preserving tree-based inference via additive homomorphic encryption.
Inf. Sci., December, 2023

A Semantic-Preserving Scheme to Trajectory Synthesis Using Differential Privacy.
IEEE Internet Things J., August, 2023

An Accurate and Privacy-Preserving Retrieval Scheme Over Outsourced Medical Images.
IEEE Trans. Serv. Comput., 2023

Efficient and Privacy-Preserving Spatial-Feature-Based Reverse kNN Query.
IEEE Trans. Serv. Comput., 2023

Efficient and Privacy-Preserving Aggregated Reverse kNN Query Over Crowd-Sensed Data.
IEEE Trans. Inf. Forensics Secur., 2023

PGSim: Efficient and Privacy-Preserving Graph Similarity Query Over Encrypted Data in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

SetRkNN: Efficient and Privacy-Preserving Set Reverse kNN Query in Cloud.
IEEE Trans. Inf. Forensics Secur., 2023

SGBoost: An Efficient and Privacy-Preserving Vertical Federated Tree Boosting Framework.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient and Privacy-Preserving Arbitrary Polygon Range Query Scheme Over Dynamic and Time-Series Location Data.
IEEE Trans. Inf. Forensics Secur., 2023

PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2023

Efficient and Privacy-Preserving Similar Patients Query Scheme Over Outsourced Genomic Data.
IEEE Trans. Cloud Comput., 2023

VFLR: An Efficient and Privacy-Preserving Vertical Federated Framework for Logistic Regression.
IEEE Trans. Cloud Comput., 2023

PRRkNN: Efficient and Privacy-Preserving Range-Based Reverse kNN over Encrypted Data.
Proceedings of the IEEE International Conference on Communications, 2023

Efficient and Privacy-Preserving Geo-Social-Based POI Recommendation Over Encrypted Data.
Proceedings of the IEEE International Conference on Communications, 2023

PLPR: Towards Efficient and Privacy-Preserving LBSNs-Based POI Recommendation in Cloud.
Proceedings of the IEEE International Conference on Communications, 2023

Efficient and Privacy-Preserving Neural Network Prediction Scheme with TEE.
Proceedings of the IEEE International Conference on Communications, 2023

Towards Efficient and Privacy-Preserving Federated Learning for HMM Training.
Proceedings of the IEEE Global Communications Conference, 2023

Efficient and Privacy-Preserving Logistic Regression Prediction over Vertically Partitioned Data.
Proceedings of the IEEE Global Communications Conference, 2023

Efficient and Private Edit Distance Based Range Query over Encrypted String Sequences.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Achieving Practical Symmetric Searchable Encryption With Search Pattern Privacy Over Cloud.
IEEE Trans. Serv. Comput., 2022

Efficient Privacy-Preserving Similarity Range Query With Quadsector Tree in eHealthcare.
IEEE Trans. Serv. Comput., 2022

Achieving Efficient and Privacy-Preserving Set Containment Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2022

Efficient and Privacy-Preserving Similarity Query With Access Control in eHealthcare.
IEEE Trans. Inf. Forensics Secur., 2022

PVD-FL: A Privacy-Preserving and Verifiable Decentralized Federated Learning Framework.
IEEE Trans. Inf. Forensics Secur., 2022

Towards Practical and Privacy-Preserving Multi-Dimensional Range Query Over Cloud.
IEEE Trans. Dependable Secur. Comput., 2022

Achieving Efficient and Privacy-Preserving Exact Set Similarity Search over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient and Privacy-Preserving Similarity Range Query Over Encrypted Time Series Data.
IEEE Trans. Dependable Secur. Comput., 2022

Achieve Efficient and Privacy-Preserving Disease Risk Assessment Over Multi-Outsourced Vertical Datasets.
IEEE Trans. Dependable Secur. Comput., 2022

CORK: A privacy-preserving and lossless federated learning scheme for deep neural network.
Inf. Sci., 2022

Toward Privacy-Preserving Healthcare Monitoring Based on Time-Series Activities Over Cloud.
IEEE Internet Things J., 2022

PMRQ: Achieving Efficient and Privacy-Preserving Multidimensional Range Query in eHealthcare.
IEEE Internet Things J., 2022

FedSky: An Efficient and Privacy-Preserving Scheme for Federated Mobile Crowdsensing.
IEEE Internet Things J., 2022

An Efficient and Privacy-Preserving Route Matching Scheme for Carpooling Services.
IEEE Internet Things J., 2022

DLP: Achieve Customizable Location Privacy With Deceptive Dummy Techniques in LBS Applications.
IEEE Internet Things J., 2022

Everything you control is not everything: Achieving intention-concealed visit on social networks.
Comput. Secur., 2022

ACCEL: an efficient and privacy-preserving federated logistic regression scheme over vertically partitioned data.
Sci. China Inf. Sci., 2022

Efficient Server-Aided Personalized Treatment Recommendation with Privacy Preservation.
Proceedings of the IEEE Global Communications Conference, 2022

Efficiency-Improved Privacy-Preserving Weighted Similarity Query over Outsourced eHealthcare Data.
Proceedings of the IEEE Global Communications Conference, 2022

Efficient and Privacy-Preserving Fusion Based Multi-Biometric Recognition.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Efficient and Privacy-Preserving Online Fingerprint Authentication Scheme over Outsourced Data.
IEEE Trans. Cloud Comput., 2021

MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud.
Peer-to-Peer Netw. Appl., 2021

A privacy-preserving and non-interactive federated learning scheme for regression training with gradient descent.
Inf. Sci., 2021

Continuous Probabilistic Skyline Query for Secure Worker Selection in Mobile Crowdsensing.
IEEE Internet Things J., 2021

Detection and defense against network isolation attacks in software-defined networks.
Trans. Emerg. Telecommun. Technol., 2021

Blockchain-based privacy-preserving valet parking for self-driving vehicles.
Trans. Emerg. Telecommun. Technol., 2021

Voxstructor: Voice Reconstruction from Voiceprint.
Proceedings of the Information Security - 24th International Conference, 2021

2020
CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-<i>kNN</i>.
Inf. Sci., 2020

CAMPS: Efficient and privacy-preserving medical primary diagnosis over outsourced cloud.
Inf. Sci., 2020

Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS.
IEEE Internet Things J., 2020

2019
Energy-Aware Encryption for Securing Video Transmission in Internet of Multimedia Things.
IEEE Trans. Circuits Syst. Video Technol., 2019

The optimal upper bound of the number of queries for Laplace mechanism under differential privacy.
Inf. Sci., 2019

CINEMA: Efficient and Privacy-Preserving Online Medical Primary Diagnosis With Skyline Query.
IEEE Internet Things J., 2019

Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare.
IEEE Access, 2019

Achieving Privacy-Preserving Subset Aggregation in Fog-Enhanced IoT.
IEEE Access, 2019

Efficient and Privacy-Preserving Edit Distance Query Over Encrypted Genomic Data.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Achieve Secure and Efficient Skyline Computation for Worker Selection in Mobile Crowdsensing.
Proceedings of the 11th International Conference on Wireless Communications and Signal Processing, 2019

Spoofing Attacks on Speaker Verification Systems Based Generated Voice using Genetic Algorithm.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Task-Oriented Multilevel Cooperative Access Control Scheme for Environment with Virtualization and IoT.
Wirel. Commun. Mob. Comput., 2018

Efficient and Privacy-Preserving Dynamic Spatial Query Scheme for Ride-Hailing Services.
IEEE Trans. Veh. Technol., 2018

Efficient privacy-preserving online medical primary diagnosis scheme on naive bayesian classification.
Peer-to-Peer Netw. Appl., 2018

Efficient and Privacy-Preserving Proximity Detection Schemes for Social Applications.
IEEE Internet Things J., 2018

Achieving Secure and Privacy-Preserving Incentive in Vehicular Cloud Advertisement Dissemination.
IEEE Access, 2018

Efficient and Privacy-Preserving Online Face Recognition Over Encrypted Outsourced Data.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Achieve Efficient and Privacy-Preserving Medical Primary Diagnosis Based on kNN.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Attacking Network Isolation in Software-Defined Networks: New Attacks and Countermeasures.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

2017
Efficient and Privacy-Preserving Online Medical Prediagnosis Framework Using Nonlinear SVM.
IEEE J. Biomed. Health Informatics, 2017

Privacy-friendly spatial crowdsourcing in vehicular networks.
J. Commun. Inf. Networks, 2017

Efficient and Privacy-Preserving Polygons Spatial Query Framework for Location-Based Services.
IEEE Internet Things J., 2017

Achieve Secure Handover Session Key Management via Mobile Relay in LTE-Advanced Networks.
IEEE Internet Things J., 2017

Achieve Efficient and Privacy-Preserving Proximity Detection Scheme for Social Applications.
Proceedings of the Security and Privacy in Communication Networks, 2017

Achieve efficient and privacy-preserving online fingerprint authentication over encrypted outsourced data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
An Efficient Privacy-Preserving Location-Based Services Query Scheme in Outsourced Cloud.
IEEE Trans. Veh. Technol., 2016

Secure and Privacy-Preserving Body Sensor Data Collection and Query Scheme.
Sensors, 2016

EPCS: an efficient and privacy-preserving classification service query framework for SVM.
Secur. Commun. Networks, 2016

Security and Privacy Challenges in Vehicular Cloud Computing.
Mob. Inf. Syst., 2016

LSOT: A Lightweight Self-Organized Trust Model in VANETs.
Mob. Inf. Syst., 2016

PTFA: a secure and privacy-preserving traffic flow analysis scheme for intelligent transportation system.
Int. J. Embed. Syst., 2016

EPPD: Efficient and privacy-preserving proximity testing with differential privacy techniques.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

A Secure and Privacy-Preserving Incentive Framework for Vehicular Cloud on the Road.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

PTVC: Achieving Privacy-Preserving Trust-Based Verifiable Vehicular Cloud Computing.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Duth: a user-friendly dual-factor authentication for Android smartphone devices.
Secur. Commun. Networks, 2015

V-MGSM: A Multilevel and Grouping Security Virtualization Model for Mobile Internet Service.
Mob. Inf. Syst., 2015

Attribute Based Multisignature Scheme for Wireless Communications.
Mob. Inf. Syst., 2015

PAS: An Efficient Privacy-Preserving Multidimensional Aggregation Scheme for Smart Grid.
Int. J. Distributed Sens. Networks, 2015

Information Diffusion Model Based on Privacy Setting in Online Social Networking Services.
Comput. J., 2015

2014
Toward efficient and privacy-preserving computing in big data era.
IEEE Netw., 2014

Efficient attribute based sequential aggregate signature for wireless sensor networks.
Int. J. Sens. Networks, 2014

Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014

SPEMR: A new secure personal electronic medical record scheme with privilege separation.
Proceedings of the IEEE International Conference on Communications, 2014

MPPM: Malware propagation and prevention model in online SNS.
Proceedings of the IEEE International Conference on Communications, 2014

Key-Policy Weighted Attribute based Encryption for fine-grained access control.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

PPAS: privacy protection authentication scheme for VANET.
Clust. Comput., 2013

V-MLR: A Multilevel Security Model for Virtualization.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

RangeTree: A Feature Selection Algorithm for C4.5 Decision Tree.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

CSP-Based General Detection Model of Network Covert Storage Channels.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

UVHM: Model Checking Based Formal Analysis Scheme for Hypervisors.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Secure and Verifiable Outsourcing of Sequence Comparisons.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

A Lightweight Anonymous Authentication Scheme for VANET Based on Bilinear Pairing.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2010
A Stream Pattern Matching Method for Traffic Analysis.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
An Efficient Fast Authentication Protocol.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

Some Notes on Password Authenticated Key Exchange Based on RSA.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009


  Loading...