Min Zhang

Orcid: 0009-0006-4415-3676

Affiliations:
  • Chinese Academy of Sciences, Institute of Software, Trusted Computing and Information Assurance Laboratory, Beijing, China
  • University of Chinese Academy of Sciences, Beijing, China (PhD 2007)


According to our database1, Min Zhang authored at least 28 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
AIPAG/DHAttack: v2.
Dataset, February, 2025

AIPAG/DHAttack: DHAttack.
Dataset, January, 2025

Efficient verifiable searchable encryption with search and access pattern privacy.
Secur. Saf., 2025

Trajectory-user linking via supervised encoding.
Secur. Saf., 2025

Revisiting EM-based Estimation for Locally Differentially Private Protocols.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025

2024
Privacy-Preserving Bilateral Multi-Receiver Matching With Revocability for Mobile Social Networks.
IEEE Trans. Mob. Comput., December, 2024

PANTHER: Private Approximate Nearest Neighbor Search in the Single Server Setting.
IACR Cryptol. ePrint Arch., 2024

TULAM: trajectory-user linking via attention mechanism.
Sci. China Inf. Sci., 2024

SeqMIA: Sequential-Metric Based Membership Inference Attack.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2021
Collecting Spatial Data Under Local Differential Privacy.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2019
Multiple Privacy Regimes Mechanism for Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2019

2017
How Well Can WordNet Measure Privacy: A Comparative Study?
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

Fast Multi-dimensional Range Queries on Encrypted Cloud Databases.
Proceedings of the Database Systems for Advanced Applications, 2017

2016
Fast Multi-keywords Search over Encrypted Cloud Data.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

2015
Privacy-Enhancing Range Query Processing over Encrypted Cloud Databases.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Access Control for Privacy Protection for Dynamic and Correlated Databases.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

A De-anonymization Attack on Geo-Located Data Considering Spatio-temporal Influences.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2014
Expressive and Secure Searchable Encryption in the Public Key Setting (Full Version).
IACR Cryptol. ePrint Arch., 2014

A Novel Privacy-Preserving Group Matching Scheme in Social Networks.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

Efficiently Attribute-Based Access Control for Mobile Cloud Storage System.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Expressive and Secure Searchable Encryption in the Public Key Setting.
Proceedings of the Information Security - 17th International Conference, 2014

A Clustering Approach for Privacy-Preserving in Social Networks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Multi-user Searchable Encryption with Efficient Access Control for Cloud Storage.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
A Secure Conjunctive Keywords Search over Encrypted Cloud Data Against Inclusion-Relation Attack.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
A secure and efficient revocation scheme for fine-grained access control in cloud storage.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

2011
A Secure and Efficient Role-Based Access Policy towards Cryptographic Cloud Storage.
Proceedings of the Web-Age Information Management - 12th International Conference, 2011

2010
Fine-Grained Cloud DB Damage Examination Based on Bloom Filters.
Proceedings of the Web-Age Information Management, 11th International Conference, 2010

2008
Research on Malicious Transaction Processing Method of Database System.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008


  Loading...