Kai Zhang
Orcid: 0000-0001-9728-4051Affiliations:
- Shanghai University of Electric Power, Department of Information Security, China
- East China Normal University, Department of Computer Science and Technology, Shanghai, China (former)
  According to our database1,
  Kai Zhang
  authored at least 91 papers
  between 2015 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
On csauthors.net:
Bibliography
  2025
A Security-Enhanced Pairing-Free Certificateless Aggregate Signcryption Scheme for Decentralized Vehicular Sensor Networks.
    
  
    IEEE Internet Things J., October, 2025
    
  
PPFL: Privacy-Preserving Federated Learning Based on Differential Privacy and Personalized Data Transformation.
    
  
    IEEE Internet Things J., October, 2025
    
  
Time-controllable keyword search with aggregate keys and multi-delegation for secure cloud storage.
    
  
    Clust. Comput., September, 2025
    
  
Blockchain-Based Revocable Key-Aggregate Searchable Encryption for Group Data Sharing in Cloud-Assisted Industrial IoT.
    
  
    IEEE Internet Things J., June, 2025
    
  
Pattern Hiding and Authorized Searchable Encryption for Data Sharing in Cloud Storage.
    
  
    IEEE Trans. Knowl. Data Eng., May, 2025
    
  
BPRM: Blockchain-Based Privacy Preserving and Robust Data Aggregation Supporting Multifunctionality for Fog-Assisted Smart Grid.
    
  
    IEEE Internet Things J., May, 2025
    
  
    IEEE Trans. Veh. Technol., April, 2025
    
  
Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT.
    
  
    Peer Peer Netw. Appl., April, 2025
    
  
PCIR: Privacy-Preserving Convolutional Neural Network Inference With Rapid Responsiveness.
    
  
    Comput. Intell., April, 2025
    
  
    IEEE Internet Things J., March, 2025
    
  
KA$^{2}$2SE: Key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor Networks.
    
  
    IEEE Trans. Serv. Comput., 2025
    
  
Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption.
    
  
    IEEE Trans. Inf. Forensics Secur., 2025
    
  
PrivBox: Privacy-Preserving Deep Packet Inspection With Dual Double-Masking Obfuscated Rule Generation.
    
  
    IEEE Trans. Dependable Secur. Comput., 2025
    
  
Refrain From Inquiring About My Scalable Storage and Boolean Queries for Secure Cloud.
    
  
    IEEE Trans. Cloud Comput., 2025
    
  
VMC2-PS: Blockchain-based multi-copy data Pub/Sub service with fine-grained access control for multi-cloud storage.
    
  
    J. Inf. Secur. Appl., 2025
    
  
TBFL: blockchain-enabled trusted byzantine-robust federated learning framework for photovoltaic power generation forecasting.
    
  
    Comput. J., 2025
    
  
  2024
Fine-Grained and Sanitizable Access Control Service for IoT-Based Digital Subscriptions.
    
  
    IEEE Internet Things J., October, 2024
    
  
Lightweight, verifiable and revocable EHRs sharing with fine-grained bilateral access control.
    
  
    Clust. Comput., October, 2024
    
  
Secure multi-asks/bids with verifiable equality retrieval for double auction in smart grid.
    
  
    Peer Peer Netw. Appl., September, 2024
    
  
A Security-Enhanced Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme for Vehicular Ad-Hoc Networks.
    
  
    IEEE Internet Things J., April, 2024
    
  
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks.
    
  
    Peer Peer Netw. Appl., March, 2024
    
  
    Theor. Comput. Sci., February, 2024
    
  
FPCNN: A fast privacy-preserving outsourced convolutional neural network with low-bandwidth.
    
  
    Knowl. Based Syst., January, 2024
    
  
Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-Based Industrial IoT.
    
  
    IEEE Internet Things J., January, 2024
    
  
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
    
  
    Comput. J., January, 2024
    
  
Lavida: Large-Universe, Verifiable, and Dynamic Fine-Grained Access Control for E-Health Cloud.
    
  
    IEEE Trans. Inf. Forensics Secur., 2024
    
  
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage.
    
  
    IEEE Trans. Inf. Forensics Secur., 2024
    
  
    IEEE Trans. Dependable Secur. Comput., 2024
    
  
TRA-PS: Accountable data Pub/Sub service with fast and fine-grained controllable subscription.
    
  
    J. Syst. Archit., 2024
    
  
Designated server proxy re-encryption with boolean keyword search for E-Health Clouds.
    
  
    J. Inf. Secur. Appl., 2024
    
  
Revocable certificateless Provable Data Possession with identity privacy in cloud storage.
    
  
    Comput. Stand. Interfaces, 2024
    
  
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
    
  
    Comput. J., 2024
    
  
EFTA: An Efficient and Fault-Tolerant Data Aggregation Scheme without TTP in Smart Grid.
    
  
    Comput. J., 2024
    
  
    Comput. J., 2024
    
  
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions.
    
  
    Proceedings of the Public-Key Cryptography - PKC 2024, 2024
    
  
    Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
    
  
    Proceedings of the Information Security and Cryptology - 20th International Conference, 2024
    
  
  2023
FedLVR: a federated learning-based fine-grained vehicle recognition scheme in intelligent traffic system.
    
  
    Multim. Tools Appl., October, 2023
    
  
Verifiable Conjunctive Dynamic Searchable Symmetric Encryption With Forward and Backward Privacy.
    
  
    Comput. J., October, 2023
    
  
    Comput. J., September, 2023
    
  
    IET Inf. Secur., July, 2023
    
  
    Theor. Comput. Sci., June, 2023
    
  
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving.
    
  
    Peer Peer Netw. Appl., January, 2023
    
  
    Peer Peer Netw. Appl., January, 2023
    
  
    IEEE Trans. Inf. Forensics Secur., 2023
    
  
Secure Cloud-Assisted Data Pub/Sub Service With Fine-Grained Bilateral Access Control.
    
  
    IEEE Trans. Inf. Forensics Secur., 2023
    
  
    IEEE Trans. Inf. Forensics Secur., 2023
    
  
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
    
  
    IEEE Trans. Dependable Secur. Comput., 2023
    
  
    IEEE Trans. Cloud Comput., 2023
    
  
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
    
  
    IEEE Trans. Cloud Comput., 2023
    
  
RDIMM: Revocable and dynamic identity-based multi-copy data auditing for multi-cloud storage.
    
  
    J. Syst. Archit., 2023
    
  
    Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
    
  
  2022
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage.
    
  
    IEEE Trans. Inf. Forensics Secur., 2022
    
  
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage.
    
  
    IEEE Trans. Cloud Comput., 2022
    
  
    Peer-to-Peer Netw. Appl., 2022
    
  
An efficient conditional privacy-preserving authentication scheme with scalable revocation for VANETs.
    
  
    J. Syst. Archit., 2022
    
  
FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid.
    
  
    IEEE Internet Things J., 2022
    
  
    IEEE Internet Things J., 2022
    
  
A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs.
    
  
    IEEE Access, 2022
    
  
  2021
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
    
  
    IEEE Trans. Dependable Secur. Comput., 2021
    
  
    Secur. Commun. Networks, 2021
    
  
    Multim. Tools Appl., 2021
    
  
    Proceedings of the Information and Communications Security - 23rd International Conference, 2021
    
  
Towards Requester-Provider Bilateral Utility Maximization and Collision Resistance in Blockchain-Based Microgrid Energy Trading.
    
  
    Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
    
  
Verifiable Dynamic Searchable Symmetric Encryption with Forward Privacy in Cloud-Assisted E-Healthcare Systems.
    
  
    Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
    
  
  2020
    Theor. Comput. Sci., 2020
    
  
    IET Inf. Secur., 2020
    
  
An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
    
  
    IEEE Access, 2020
    
  
Privacy-Preserving Locally Weighted Linear Regression Over Encrypted Millions of Data.
    
  
    IEEE Access, 2020
    
  
  2019
    Theor. Comput. Sci., 2019
    
  
    Theor. Comput. Sci., 2019
    
  
    IEEE Internet Things J., 2019
    
  
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications.
    
  
    Comput. J., 2019
    
  
    IEEE Access, 2019
    
  
  2018
    Pervasive Mob. Comput., 2018
    
  
    Int. J. High Perform. Comput. Netw., 2018
    
  
A Secure Data Forwarding Protocol for Data Statistic Services in Multi-Hop Marine Sensor Networks.
    
  
    Fundam. Informaticae, 2018
    
  
    Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
    
  
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017.
    
  
    Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
    
  
  2017
Scalable and Soundness Verifiable Outsourcing Computation in Marine Mobile Computing.
    
  
    Wirel. Commun. Mob. Comput., 2017
    
  
PSDAAP: Provably Secure Data Authenticated Aggregation Protocols Using Identity-Based Multi-Signature in Marine WSNs.
    
  
    Sensors, 2017
    
  
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks.
    
  
    Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
    
  
Efficient and provably secure identity-based multi-signature schemes for data aggregation in marine wireless sensor networks.
    
  
    Proceedings of the 14th IEEE International Conference on Networking, Sensing and Control, 2017
    
  
  2016
MEDAPs: secure multi-entities delegated authentication protocols for mobile cloud computing.
    
  
    Secur. Commun. Networks, 2016
    
  
New application of partitioning methodology: identity-based dual receiver encryption.
    
  
    Secur. Commun. Networks, 2016
    
  
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption.
    
  
    Sci. China Inf. Sci., 2016
    
  
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation.
    
  
    Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
    
  
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
    
  
    Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
    
  
  2015
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.
    
  
    Trans. Comput. Collect. Intell., 2015
    
  
An Efficient and Secure Delegated Multi-authentication Protocol for Mobile Data Owners in Cloud.
    
  
    Proceedings of the Wireless Algorithms, Systems, and Applications, 2015