Jiang Zhang

According to our database1, Jiang Zhang authored at least 85 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Unraveling environmental justice in ambient PM2.5 exposure in Beijing: A big data approach.
Computers, Environment and Urban Systems, 2019

KDM security for identity-based encryption: Constructions and separations.
Inf. Sci., 2019

A novel learning-based global path planning algorithm for planetary rovers.
Neurocomputing, 2019

Improved Lattice-based CCA2-Secure PKE in the Standard Model.
IACR Cryptology ePrint Archive, 2019

Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.
IACR Cryptology ePrint Archive, 2019

Blind Source Separation for Satellite Communication Anti-jamming.
Proceedings of the Wireless and Satellite Systems, 2019

2018
Dynamic Load Balancing Based on Constrained K-D Tree Decomposition for Parallel Particle Tracing.
IEEE Trans. Vis. Comput. Graph., 2018

A survey of parallel particle tracing algorithms in flow visualization.
J. Visualization, 2018

Non-stationary sources separation based on maximum likelihood criterion using source temporal-spatial model.
Neurocomputing, 2018

Valiant's Universal Circuits Revisited: an Overall Improvement and a Lower Bound.
IACR Cryptology ePrint Archive, 2018

Digital Self-Interference Cancellation Based on Blind Source Separation and Spectral Efficiency Analysis for the Full-Duplex Communication Systems.
IEEE Access, 2018

Dynamic Similar Sub-Series Selection Method for Time Series Forecasting.
IEEE Access, 2018

On the Hardness of Learning Parity with Noise over Rings.
Proceedings of the Provable Security, 2018

Collaborative Detection and Caption Network.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Dynamic Data Repartitioning for Load-Balanced Parallel Particle Tracing.
Proceedings of the IEEE Pacific Visualization Symposium, 2018

Access Pattern Learning with Long Short-Term Memory for Parallel Particle Tracing.
Proceedings of the IEEE Pacific Visualization Symposium, 2018

2017
Anonymous Password Authenticated Key Exchange Protocol in the Standard Model.
Wireless Personal Communications, 2017

Towards Secure Data Distribution Systems in Mobile Cloud Computing.
IEEE Trans. Mob. Comput., 2017

An Efficient NIZK Scheme for Privacy-Preserving Transactions over Account-Model Blockchain.
IACR Cryptology ePrint Archive, 2017

Collision Resistant Hashing from Learning Parity with Noise.
IACR Cryptology ePrint Archive, 2017

Common patterns of online collective attention flow.
SCIENCE CHINA Information Sciences, 2017

Universally composable anonymous password authenticated key exchange.
SCIENCE CHINA Information Sciences, 2017

Two-Round PAKE from Approximate SPH and Instantiations from Lattices.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Fast Adaptive BSS Algorithm for Independent/Dependent Sources.
IEEE Communications Letters, 2016

KDM Security for Identity-Based Encryption: Constructions and Separations.
IACR Cryptology ePrint Archive, 2016

Generic constructions of integrated PKE and PEKS.
Des. Codes Cryptogr., 2016

Non-Malleable Functions and Their Applications.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Efficient unsteady flow visualization with high-order access dependencies.
Proceedings of the 2016 IEEE Pacific Visualization Symposium, 2016

Comparative visualization of vector field ensembles based on longest common subsequence.
Proceedings of the 2016 IEEE Pacific Visualization Symposium, 2016

2015
Quantifying the Influence of Websites Based on Online Collective Attention Flow.
J. Comput. Sci. Technol., 2015

Security of the SM2 Signature Scheme Against Generalized Key Substitution Attacks.
Proceedings of the Security Standardisation Research - Second International Conference, 2015

High performance flow field visualization with high-order access dependencies.
Proceedings of the 2015 IEEE Scientific Visualization Conference, 2015

Simpler Efficient Group Signatures from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Authenticated Key Exchange from Ideal Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Advection-Based Sparse Data Management for Visualizing Unsteady Flow.
IEEE Trans. Vis. Comput. Graph., 2014

PRE: Stronger security notions and efficient construction with non-interactive opening.
Theor. Comput. Sci., 2014

A computational study on fill rate expressions for single-stage periodic review under normal demand and constant lead time.
Oper. Res. Lett., 2014

An incentive-based method for hospital capacity management in a pandemic: the assignment approach.
IJMOR, 2014

Authenticated Key Exchange from Ideal Lattices.
IACR Cryptology ePrint Archive, 2014

Handedness- and Hemisphere-Related Differences in Small-World Brain Networks: A Diffusion Tensor Imaging Tractography Study.
Brain Connectivity, 2014

Security Analysis of EMV Channel Establishment Protocol in An Enhanced Security Model.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Proxy Re-encryption with Unforgeable Re-encryption Keys.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

Black-Box Separations for One-More (Static) CDH and Its Generalization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Scalable Lagrangian-Based Attribute Space Projection for Multivariate Unsteady Flow Data.
Proceedings of the IEEE Pacific Visualization Symposium, 2014

2013
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
IEEE Trans. Parallel Distrib. Syst., 2013

Dual-antenna-based blind joint hostile jamming cancellation and multi-user detection for uplink of asynchronous direct-sequence code-division multiple access systems.
IET Communications, 2013

A modified natural gradient algorithm for blind source separation using generalized constant modulus.
Proceedings of the 36th International Conference on Telecommunications and Signal Processing, 2013

Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Proceedings of the Provable Security - 7th International Conference, 2013

Feature Selection via Sparse Regression for Classification of Functional Brain Networks.
Proceedings of the Intelligence Science and Big Data Engineering, 2013

Secure and Efficient Data-Sharing in Clouds.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Interchanging fill rate constraints and backorder costs in inventory models.
IJMOR, 2012

PRE - Stronger Security Notion and Efficient Construction with New Property.
IACR Cryptology ePrint Archive, 2012

Integrated PKE and PEKS - Stronger Security Notions and New Constructions.
IACR Cryptology ePrint Archive, 2012

A novel algorithm of blind separation for delayed sources.
Proceedings of the International Conference on Wireless Communications and Signal Processing, 2012

Ciphertext policy attribute-based encryption from lattices.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Analysis of fMRI Data Using an Integrated Principal Component Analysis and Supervised Affinity Propagation Clustering Approach.
IEEE Trans. Biomed. Engineering, 2011

Two novel tunnel-based ring protection switching for MPLS-TP multicast services.
Proceedings of the 18th International Conference on Telecommunications, 2011

Developing a generic optical avionic network.
Proceedings of the 18th International Conference on Telecommunications, 2011

A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

2010
Convolution Power Spectrum Analysis for fMRI Data Based on Prior Image Signal.
IEEE Trans. Biomed. Engineering, 2010

Random yield supply chain with a yield dependent secondary market.
European Journal of Operational Research, 2010

Financially Optimal inventory Policies with Non-Linear replenishment Costs.
APJOR, 2010

Flow-Based End-to-End OAM Functions for the Multicast Service on the MPLS-TP Ring Network.
Proceedings of IEEE International Conference on Communications, 2010

Analytical Model of Adoption of Item Level RFID in a Two-Echelon Supply Chain with Shelf-Space and Price-Dependent Demand.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
Video Content Structuring.
Scholarpedia, 2009

Energy flows in complex ecological systems: a review.
J. Systems Science & Complexity, 2009

Pricing and two-tier advertising with one manufacturer and one retailer.
European Journal of Operational Research, 2009

Modeling Multi-species Interacting Ecosystem by a Simple Equation.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Allometric Scaling of Weighted Food Webs.
Proceedings of the Complex Sciences, 2009

2008
Complexity and Universality of Iterated Finite Automata.
Complex Systems, 2008

Ontology for Software Configuration Management - A Knowledge Management Framework for Software Configuration Management.
Proceedings of the ICSOFT 2008, 2008

A Knowledge Management Framework for Software Configuration Management.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2007
Fill rate of single-stage general periodic review inventory systems.
Oper. Res. Lett., 2007

D-VKT: A Scalable Distributed Key Agreement Scheme for Dynamic Collaborative Groups.
IEICE Transactions, 2007

Spectral Edit Distance Method for Image Clustering.
Proceedings of the Advances in Data and Web Management, 2007

Energy Flows and Maximum Power on an Evolutionary Ecological Network Model.
Proceedings of the Advances in Artificial Life, 9th European Conference, 2007

2006
SIKAS: A Scalable Distributed Key Management Scheme for Dynamic Collaborative Groups.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Evaluation of Practical Scalability of Overlay Networks in Providing Video-on-Demand Service.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

2005
Evolutionary Granular Computing Model and Applications.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

License management scheme with anonymous trust for digital rights management.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

1999
ATM switch buffer management for TCP traffic control.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field.
Proceedings of the Advances in Cryptology, 1999


  Loading...