Jianhong Zhang

Orcid: 0000-0001-8674-3988

According to our database1, Jianhong Zhang authored at least 149 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Pairing-Free Certificateless Signcryption Scheme for Secure Data Transmission in IoMT.
IEEE Internet Things J., February, 2024

CKAA: Certificateless key-agreement authentication scheme in digital twin telemedicine environment.
Trans. Emerg. Telecommun. Technol., January, 2024

2023
SE-P²μm: Secure and Efficient Privacy-Preserving User-Profile Matching Protocol for Social Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023

Recognizing Chaos by Deep Learning and Transfer Learning on Recurrence Plots.
Int. J. Bifurc. Chaos, August, 2023

Secure and Lightweight Data Aggregation Scheme for Anonymous Multi-Receivers in WBAN.
IEEE Trans. Netw. Sci. Eng., 2023

Comment on "Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs".
IEEE Trans. Inf. Forensics Secur., 2023

Privacy-preserving data aggregation scheme against deletion and tampering attacks from aggregators.
J. King Saud Univ. Comput. Inf. Sci., 2023

Classification and topic tracking of college students' cybersecurity education based on the internet.
J. Comput. Methods Sci. Eng., 2023

A Privacy-Preserving Remote Heart Rate Abnormality Monitoring System.
IEEE Access, 2023

On the Security of Privacy-preserving Data Aggregation Scheme Based on CRT in Mobile Crowdsensing System.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

Multi-mode signal fusion and improved residual dense network fault diagnosis of nuclear power plant.
Proceedings of the CAA Symposium on Fault Detection, 2023

2022
A Lightweight and Privacy-Friendly Data Aggregation Scheme against Abnormal Data.
Sensors, 2022

Corrigendum to "Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing".
Secur. Commun. Networks, 2022

Predicting Copper and Lead Concentration in Crops Using Reflectance Spectroscopy Associated With Intrinsic Wavelength-Scale Decomposition Spectral Transformation.
IEEE Access, 2022

On the Security of Verifiable Privacy-preserving Multi-type Data Aggregation Scheme in Smart Grid.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2022

2021
Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification.
Secur. Commun. Networks, 2021

Randomization-Based Dynamic Programming Offloading Algorithm for Mobile Fog Computing.
Secur. Commun. Networks, 2021

AdarGCN: Adaptive Aggregation GCN for Few-Shot Learning.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2021

A lightweight Data Sharing Scheme with Resisting Key Abuse in Mobile Edge Computing.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

IEPT: Instance-Level and Episode-Level Pretext Tasks for Few-Shot Learning.
Proceedings of the 9th International Conference on Learning Representations, 2021

Brain functional networks analysis of five fingers grasping in virtual reality environment.
Proceedings of the 43rd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2021

2020
Identity-based data storage scheme with anonymous key generation in fog computing.
Soft Comput., 2020

A Fog-Assisted Privacy-Preserving Task Allocation in Crowdsourcing.
IEEE Internet Things J., 2020

On the Security of a Practical Constant-Size Ring Signature Scheme.
Int. J. Netw. Secur., 2020

The <i>Wolfiporia cocos</i> Genome and Transcriptome Shed Light on the Formation of Its Edible and Medicinal Sclerotium.
Genom. Proteom. Bioinform., 2020

AdarGCN: Adaptive Aggregation GCN for Few-Shot Learning.
CoRR, 2020

Hand-oriented tasking assessment of fine movement control deficits in Alzheimer's Disease.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

2019
Improvement of ID-based proxy re-signature scheme with pairing-free.
Wirel. Networks, 2019

Privacy-Preserving Multi-Receiver Certificateless Broadcast Encryption Scheme with De-Duplication.
Sensors, 2019

Unsupervised segmentation and elm for fabric defect image classification.
Multim. Tools Appl., 2019

Genuine and secure public auditing for the outsourced data in cloud.
Int. J. High Perform. Comput. Netw., 2019

Identity-and-data privacy forward security public auditing protocol in the standard model.
Int. J. Commun. Syst., 2019

Non-Interactive ID-Based Proxy Re-Signature Scheme for IoT Based on Mobile Edge Computing.
IEEE Access, 2019

Joint Projection and Subspace Learning for Zero-Shot Recognition.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Zero-Shot Learning with Few Seen Class Samples.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Recursive Visual Attention in Visual Dialog.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019

Auto-encoder based Graph Convolutional Networks for Online Financial Anti-fraud.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019

Effects of Alzheimer's Disease on Reach-to-Pinch Performance with Multimodal Sensory Feedbacks.
Proceedings of the 12th International Congress on Image and Signal Processing, 2019

2018
S<sup>2</sup>PAD: secure self-certified public auditing for data integrity in cloud storage and its extension.
Int. J. Inf. Commun. Technol., 2018

On the Security of a Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018

On the Security of a Data Integrity Auditing Scheme in Mobile Multi-cloud Environment.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

Cyberbullying Intervention Based on Convolutional Neural Networks.
Proceedings of the First Workshop on Trolling, Aggression and Cyberbullying, 2018

2017
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment.
Secur. Commun. Networks, 2017

Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage.
Inf. Sci., 2017

On the Security of an Mutual Verifiable Provable Data Auditing in Public Cloud Storage.
Int. J. Netw. Secur., 2017

OGPADSM<sup>2</sup>: oriented-group public auditing for data sharing with multi-user modification.
Int. J. High Perform. Comput. Netw., 2017

Anonymous multi-receiver broadcast encryption scheme with strong security.
Int. J. Embed. Syst., 2017

Achieving public verifiability and data dynamics for cloud data in the standard model.
Clust. Comput., 2017

Using the entrapment sequence method as a standard to evaluate key steps of proteomics data analysis process.
BMC Genom., 2017

Public Auditing Scheme of Dynamic Data Sharing Suiting for Cloud-Based EHR System.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
Attack on Chen <i>et al.</i>'s certificateless aggregate signature scheme.
Secur. Commun. Networks, 2016

Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model.
J. Inf. Sci. Eng., 2016

Efficient ID-based public auditing for the outsourced data in cloud storage.
Inf. Sci., 2016

Efficient chameleon hashing-based privacy-preserving auditing in cloud storage.
Clust. Comput., 2016

Efficient public key encryption with revocable keyword search in cloud computing.
Clust. Comput., 2016

IPad: ID-based public auditing for the outsourced data in the standard model.
Clust. Comput., 2016

Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

On the Security of a Threshold Anonymous Authentication Protocol for VANETs.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure.
Proceedings of the Provable Security, 2016

On the security of a dynamic-hash-table based public auditing protocol.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

2015
On the security of Kim <i>et al</i>. two ID-based broadcast signcryption schemes.
Secur. Commun. Networks, 2015

Privacy-Preserving Public Auditing Scheme for Shared Data with Supporting Multi-function.
J. Commun., 2015

A novel authenticated encryption scheme and its extension.
Inf. Sci., 2015

An improved anonymous multi-receiver identity-based encryption scheme.
Int. J. Commun. Syst., 2015

An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

An efficient revocable certificateless signature scheme.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
On the Security of a Secure Batch Verification with Group Testing for VANET.
Int. J. Netw. Secur., 2014

Short computational Diffie-Hellman-based proxy signature scheme in the standard model.
Int. J. Commun. Syst., 2014

Privacy-preserving authentication protocols with efficient verification in VANETs.
Int. J. Commun. Syst., 2014

Efficient public verification proof of retrievability scheme in cloud.
Clust. Comput., 2014

Disturbance compensated adaptive backstepping control for an unmanned seaplane.
Proceedings of the 2014 IEEE International Conference on Robotics and Biomimetics, 2014

Practical Preserving Identity-Privacy Anonymous Data Sharing in Cloud Computing.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Self-Certified Public Auditing for Data Integrity in Cloud Storage.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
An ID-Based Server-Aided Verification Short Signature Scheme Avoid Key Escrow.
J. Inf. Sci. Eng., 2013

Augmented Broadcaster Identity-based Broadcast Encryption.
J. Digit. Inf. Manag., 2013

Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes.
Int. J. Intell. Inf. Database Syst., 2013

On the security of an ID-based anonymous proxy signature scheme and its improved scheme.
Int. J. Embed. Syst., 2013

SP<sup>2</sup>DAS: Self-certified PKC-Based Privacy-Preserving Data Aggregation Scheme in Smart Grid.
Int. J. Distributed Sens. Networks, 2013

An Efficient Privacy-Preserving Authentication Protocol in VANETs.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
An efficient RSA-based certificateless signature scheme.
J. Syst. Softw., 2012

Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Another Efficient Proxy Signature Scheme in the Standard Model.
J. Inf. Sci. Eng., 2011

Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes.
Proceedings of the Advances in Swarm Intelligence - Second International Conference, 2011

Forgeability Attack of Two Special Signature Schemes.
Proceedings of the Advanced Intelligent Computing - 7th International Conference, 2011

Fuzzy control of a four-rope-driven level-adjustment robot considering all constrained situations.
Proceedings of the American Control Conference, 2011

2010
An efficient secure proxy verifiably encrypted signature scheme.
J. Netw. Comput. Appl., 2010

On the Security of Convertible Multiauthenticated Encryption Scheme and Its Improved Scheme.
J. Digit. Content Technol. its Appl., 2010

Efficient Blind Signature Scheme based on Modified Generalized Bilinear Inversion for Multiple Signers.
J. Digit. Content Technol. its Appl., 2010

An Efficient Blind Ring Signature Scheme without Pairings.
Proceedings of the Web-Age Information Management, 2010

Efficient provable certificateless blind signature scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2010

A Controllable Anonymous Proxy Signature Scheme with Revocation.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

Efficient Strong Fair Concurrent Signature Scheme.
Proceedings of the International Conference on E-Business and E-Government, 2010

Security Analysis of Liu-Li Digital Signature Scheme.
Proceedings of the Communication and Networking, 2010

An Efficient Strong ID-Based Signature Scheme with Unforgeability.
Proceedings of the Fifth International Conference on Frontier of Computer Science and Technology, 2010

An Efficient Signcryption Schemes Based from Bilinear Maps in the Standard Model.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2009
A Novel Identity-Based Multi-Signcryption Scheme.
Int. J. Distributed Sens. Networks, 2009

Designated-Verifier Chameleon Proxy Signature.
Int. J. Distributed Sens. Networks, 2009

A novel identity-based multi-signcryption scheme.
Comput. Commun., 2009

A Novel ID-Based Anonymous Signcryption Scheme.
Proceedings of the Advances in Data and Web Management, Joint International Conferences, 2009

An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme.
Proceedings of the Advances in Information Security and Assurance, 2009

Intelligent control of a four-rope-driven level-adjustment device with constrained outputs.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2009

Efficient Provable Secure ID-Based Anonymous Signcryption Scheme.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

On the Security of a Certificate-Based Signature Scheme and Its Improvement with Pairings.
Proceedings of the Information Security Practice and Experience, 2009

Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle.
Proceedings of the Advances in Neural Networks, 2009

Fuzzy logic based adjustment control of a cable-driven auto-leveling parallel robot.
Proceedings of the 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2009

Comment on a Digital Signature Scheme with Using Self-Certified Public Keys.
Proceedings of the International Forum on Information Technology and Applications, 2009

On the Linkability and Security Analysis of Two Schnorr-Type Blind Signature Schemes.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

A Special Proxy Signature Scheme with Multi-warrant.
Proceedings of the Advances in Computer Science, 2009

Efficient and Provably Secure Self-certified Signature Scheme.
Proceedings of the Active Media Technology, 5th International Conference, 2009

Control of a rope-driven self-leveling device for leveling adjustment.
Proceedings of the American Control Conference, 2009

Cryptoanalysis of Two Signcryption Schemes.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
A novel ID-based designated verifier signature scheme.
Inf. Sci., 2008

On the Security of Group Signature Scheme and Designated Verifier Signature Scheme.
Proceedings of The 2008 IEEE International Conference on Networking, 2008

Security Analysis and their Improvement of Two Signature Schemes.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

On the Security of two Authenticated Encryption Schemes.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

On the Security of A Group Signature Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

An Efficient Proxy Signature Scheme with Full-delegation.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
On the Security of Huang-Chang Multi-signature Schemes.
Int. J. Netw. Secur., 2007

An Improved Designated-Verifier Proxy Signature Scheme.
Proceedings of the International Conference on Networking, 2007

A Novel Verifiably Encrypted Signature Scheme Without Random Oracle.
Proceedings of the Information Security Practice and Experience, 2007

A verifiably encrypted signature scheme with strong unforgeability.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Security Analysis of Two Signature Schemes and Their Improved Schemes.
Proceedings of the Computational Science and Its Applications, 2007

An Efficient Identity-Based Ring Signature Scheme and Its Extension.
Proceedings of the Computational Science and Its Applications, 2007

2006
Linkability of Two Blind Signature Schemes.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

Linkability of a Blind Signature Scheme and Its Improved Scheme.
Proceedings of the Computational Science and Its Applications, 2006

A Robust Verifiably Encrypted Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Linkability Analysis of Some Blind Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key.
Informatica (Slovenia), 2005

An Improved Nominative Proxy Signature for Mobile Communication.
IEICE Trans. Inf. Syst., 2005

On the Security of A Group Signature Scheme.
IACR Cryptol. ePrint Arch., 2005

An improved signature scheme without using one-way Hash functions.
Appl. Math. Comput., 2005

Two provably secure k-out-of-n oblivious transfer schemes.
Appl. Math. Comput., 2005

On the security of a convertible authenticated encryption.
Appl. Math. Comput., 2005

On the security of Miyaji et al. group signature scheme.
Appl. Math. Comput., 2005

A Convertible Limited Verifier Signature Scheme.
Proceedings of the Advances in Web-Age Information Management, 2005

An Improved Group Signature Scheme.
Proceedings of the Trust, 2005

A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005

Interactive Web Service Choice-Making Based on Extended QoS Model.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
A New Efficient Group Signature With Forward Security.
Informatica (Slovenia), 2004

Planning Based Service Composition System.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

An Improved Nominative Proxy Signature Scheme for Mobile Communication.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Provably Secure and ID-Based Group Signature Scheme.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Improved HTN Planning Approach for Service Composition.
Proceedings of the 2004 IEEE International Conference on Services Computing (SCC 2004), 2004

2003
Security analysis of the improved group signature.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

A Novel Efficient Group Signature Scheme with Forward Security.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Practical t-out-n Oblivious Transfer and Its Applications.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

2002
two attacks on xia-you Group Signature.
IACR Cryptol. ePrint Arch., 2002


  Loading...