Jun Zhang

Orcid: 0000-0001-9033-3199

Affiliations:
  • Shenzhen University, Educational Technology Department, China
  • University of Hong Kong, Department of Computer Science, Hong Kong (PhD 2018)


According to our database1, Jun Zhang authored at least 17 papers between 2016 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Privacy-preserving multikey computing framework for encrypted data in the cloud.
Inf. Sci., 2021

Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

2020
Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks.
IEEE Access, 2020

Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

2019
From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Privacy-preserving verifiable elastic net among multiple institutions in the cloud.
J. Comput. Secur., 2018

Secure Compression and Pattern Matching Based on Burrows-Wheeler Transform.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

A New Privacy-Preserving Searching Model on Blockchain.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Outsourced Privacy Preserving SVM with Multiple Keys.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
A Nonoutsourceable Puzzle Under GHOST Rule.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

A Privacy-Preserving Multi-Pattern Matching Scheme for Searching Strings in Cloud Database.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Privacy-Preserving Disease Risk Test Based on Bloom Filters.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Privacy-Preserving Elastic Net for Data Encrypted by Different Keys - With an Application on Biomarker Discovery.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Dynamic Proofs of Retrievability with improved worst case overhead.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016


  Loading...