Jixin Zhang

According to our database1, Jixin Zhang authored at least 33 papers between 2013 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
A Time-Sensitive Token-Based Anonymous Authentication and Dynamic Group Key Agreement Scheme for Industry 5.0.
IEEE Trans. Ind. Informatics, 2022

Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Keyword Similarity Search Over Encrypted Spatial Data in Cloud Computing.
IEEE Internet Things J., 2022

A Heterogeneous Feature Ensemble Learning based Deepfake Detection Method.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Privacy-Preserving Task Matching With Threshold Similarity Search via Vehicular Crowdsourcing.
IEEE Trans. Veh. Technol., 2021

A Distributed Framework for EA-Based NAS.
IEEE Trans. Parallel Distributed Syst., 2021

Hierarchical Bidirectional RNN for Safety-Enhanced B5G Heterogeneous Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Achieving Secure, Universal, and Fine-Grained Query Results Verification for Secure Search Scheme Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2021

Anonymous Asynchronous Ratchet Tree Protocol for Group Messaging.
Sensors, 2021

A knowledge graph based question answering method for medical domain.
PeerJ Comput. Sci., 2021

Efficient Attribute-Based Signature for Monotone Predicates.
Proceedings of the Provable and Practical Security, 2021

An optimized 3D Astar algorithm for multi-layer PCB automatic routing.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

Practical and Provable Secure Vehicular Component Protection Scheme.
Proceedings of the Emerging Information Security and Applications, 2021

2020
A Blockchain-Based Authentication and Dynamic Group Key Agreement Protocol.
Sensors, 2020

A fine-grained authorized keyword secure search scheme with efficient search permission update in cloud computing.
J. Parallel Distributed Comput., 2020

Privacy-preserving range query over multi-source electronic health records in public clouds.
J. Parallel Distributed Comput., 2020

A malware variants detection methodology with an opcode-based feature learning method and a fast density-based clustering algorithm.
Int. J. Comput. Sci. Eng., 2020

Efficient and Privacy-preserving Outsourced Image Retrieval in Public Clouds.
Proceedings of the IEEE Global Communications Conference, 2020

A Blockchain-Based Distributed Authentication and Dynamic Group Key Agreement Protocol.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Secure conjunctive multi-keyword ranked search over encrypted cloud data for multiple data owners.
Future Gener. Comput. Syst., 2019

A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding.
Comput. Secur., 2019

CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme.
IEEE Access, 2019

An Optimized Positive-Unlabeled Learning Method for Detecting a Large Scale of Malware Variants.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Sensitive system calls based packed malware variants detection using principal component initialized MultiLayers neural networks.
Cybersecur., 2018

Dalvik Opcode Graph Based Android Malware Variants Detection Using Global Topology Features.
IEEE Access, 2018

2017
Malware Variants Detection Using Density Based Spatial Clustering with Global Opcode Matrix.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

MPOPE: Multi-provider Order-Preserving Encryption for Cloud Data Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2017

2016
IRMD: Malware Variant Detection Using Opcode Image Recognition.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Secure Conjunctive Multi-Keyword Search for Multiple Data Owners in Cloud Computing.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

A malware variants detection methodology with an opcode based feature method and a fast density based clustering algorithm.
Proceedings of the 12th International Conference on Natural Computation, 2016

Malware Variant Detection Using Opcode Image Recognition with Small Training Sets.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
A Secure and Fine-Grained Query Results Verification Scheme for Private Search Over Encrypted Cloud Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2013
Data dependency aware prefetch scheduling for Dynamic Partial reconfigurable designs.
Proceedings of the IEEE 10th International Conference on ASIC, 2013


  Loading...