Jindan Zhang

Orcid: 0000-0002-1499-8460

According to our database1, Jindan Zhang authored at least 43 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved secure PCA and LDA algorithms for intelligent computing in IoT-to-cloud setting.
Comput. Intell., February, 2024

2023
A certificate-based proxy re-encryption plus scheme for secure medical data sharing.
Internet Things, October, 2023

Privacy protection framework for face recognition in edge-based Internet of Things.
Clust. Comput., October, 2023

Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage.
Int. J. Grid Util. Comput., 2023

An Improved Data Integrity Verification Scheme for Cloud Storage.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

On the Security of a Cloud Auditing Storage Protocol.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2023

2022
Vehicle and Pedestrian Detection Algorithm Based on Lightweight YOLOv3-Promote and Semi-Precision Acceleration.
IEEE Trans. Intell. Transp. Syst., 2022

A privacy preserving homomorphic computing toolkit for predictive computation.
Inf. Process. Manag., 2022

Wireless Sensor Network coverage optimization based on Yin-Yang pigeon-inspired optimization algorithm for Internet of Things.
Internet Things, 2022

2021
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage".
IEEE Trans. Inf. Forensics Secur., 2021

New digital signature algorithm based on ECC and its application in bitcoin and IoT.
Int. J. High Perform. Syst. Archit., 2021

Improved publicly verifiable auditing protocol for cloud storage.
Concurr. Comput. Pract. Exp., 2021

Customer-oriented sales modeling strategy in a big data environment.
Concurr. Comput. Pract. Exp., 2021

Differential privacy distributed learning under chaotic quantum particle swarm optimization.
Computing, 2021

Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation.
Inf. Process. Manag., 2020

New group user based privacy preserving cloud auditing protocol.
Future Gener. Comput. Syst., 2020

New public auditing protocol based on homomorphic tags for secure cloud storage.
Concurr. Comput. Pract. Exp., 2020

2019
Improved secure fuzzy auditing protocol for cloud data storage.
Soft Comput., 2019

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation.
J. Ambient Intell. Humaniz. Comput., 2019

An improved public auditing protocol for cloud storage integrity checking.
Int. J. Web Grid Serv., 2019

Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting.
Computing, 2019

2018
An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking.
Fundam. Informaticae, 2018

Improved group-oriented proofs of cloud storage in IoT setting.
Concurr. Comput. Pract. Exp., 2018

Improved Functional Encryption Schemes by Using Novel Techniques.
Proceedings of the Advances in Intelligent Networking and Collaborative Systems, 2018

Combining Vector Space Features and Convolution Neural Network for Text Sentiment Analysis.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

Network Malicious Behavior Detection Using Bidirectional LSTM.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2018

2017
Improved Online/Offline Attribute Based Encryption and More.
Proceedings of the Advances in Internetworking, 2017

On the Security of a Cloud Data Storage Auditing Protocol IPAD.
Proceedings of the Advances in Internetworking, 2017

2016
On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing.
Proceedings of the Advances on P2P, 2016

2015
Data Owner Based Attribute Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2013
DDos Attack against Proxy in PRE and PRS.
J. Softw., 2013

Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes.
J. Comput., 2013

Hybrid Proxy Re-encryption Between IBE And CBE.
J. Comput., 2013

Identity Based Proxy Re-encryption From BB1 IBE.
J. Comput., 2013

Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG.
J. Comput., 2013

On the security of two multi-use CCA-secure proxy re-encryption schemes.
Int. J. Intell. Inf. Database Syst., 2013

New Construction of PVPKE Scheme Based on Signed Quadratic Residues.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Yet Another Way to Construct Digital Signature in the Standard Model.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

2012
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2010
Provable Secure Generalized Signcryption.
J. Comput., 2010


  Loading...