Minghao Zhao

Orcid: 0000-0001-9232-9185

Affiliations:
  • Tsinghua University, School of Software, Beijing, China
  • Shandong University, College of Computer Science and Technology, Jinan, China (former)


According to our database1, Minghao Zhao authored at least 46 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems.
Digit. Commun. Networks, October, 2023

Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training.
World Wide Web (WWW), September, 2023

Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis.
Inf. Sci., May, 2023

Memory-efficient Transformer-based network model for Traveling Salesman Problem.
Neural Networks, April, 2023

2022
UFC2: User-Friendly Collaborative Cloud.
IEEE Trans. Parallel Distributed Syst., 2022

BSM-ether: Bribery selfish mining in blockchain-based healthcare systems.
Inf. Sci., 2022

Label-only membership inference attacks on machine unlearning without dependence of posteriors.
Int. J. Intell. Syst., 2022

Improving transaction succeed ratio in payment channel networks via enhanced node connectivity and balanced channel capacity.
Int. J. Intell. Syst., 2022

Reinforcement-Mining: Protecting Reward in Selfish Mining.
Proceedings of the Provable and Practical Security, 2022

FP<sup>2</sup>-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning.
Proceedings of the Provable and Practical Security, 2022

2021
Corrigendum to "Rational Protocols and Attacks in Blockchain System".
Secur. Commun. Networks, 2021

Secure computation protocols under asymmetric scenarios in enterprise information system.
Enterp. Inf. Syst., 2021

Enabling Conflict-free Collaborations with Cloud Storage Services.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Markov chain analysis of evolutionary algorithms on OneMax function - From coupon collector's problem to (1 + 1) EA.
Theor. Comput. Sci., 2020

Rational Protocols and Attacks in Blockchain System.
Secur. Commun. Networks, 2020

Oblivious DFA evaluation on joint input and its applications.
Inf. Sci., 2020

Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer.
Inf. Sci., 2020

Blockchain-based fair payment smart contract for public cloud storage auditing.
Inf. Sci., 2020

Enabling cloud storage auditing with key-exposure resilience under continual key-leakage.
Inf. Sci., 2020

Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation.
Proceedings of the 18th USENIX Conference on File and Storage Technologies, 2020

2019
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019

Secure Multi-Party Computation: Theory, practice and applications.
Inf. Sci., 2019

Randomness invalidates criminal smart contracts.
Inf. Sci., 2019

Keyword guessing on multi-user searchable encryption.
Int. J. High Perform. Comput. Netw., 2019

An Efficient Lucas Sequence-Based Batch Auditing Scheme for the Internet of Medical Things.
IEEE Access, 2019

The Cask Effect of Multi-source Content Delivery: Measurement and Mitigation.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Body-Weight Estimation of Plateau Yak with Simple Dimensional Measurement.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Efficient and secure outsourced approximate pattern matching protocol.
Soft Comput., 2018

An ORAM-based privacy preserving data sharing scheme for cloud storage.
J. Inf. Secur. Appl., 2018

An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms.
Int. J. High Perform. Comput. Netw., 2018

Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency.
IACR Cryptol. ePrint Arch., 2018

Towards Security Authentication for IoT Devices with Lattice-Based ZK.
Proceedings of the Network and System Security - 12th International Conference, 2018

Minimizing the Cask Effect of Multi-Source Content Delivery.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

H2Cloud: Maintaining the Whole Filesystem in an Object Storage Cloud.
Proceedings of the 47th International Conference on Parallel Processing, 2018

2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Comput. Secur., 2017

Multi-user searchable encryption with a designated server.
Ann. des Télécommunications, 2017

Toward Proxy Re-encryption From Learning with Errors in the Exponent.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Improved Power Analysis Attack Based on the Preprocessed Power Traces.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Cut-and-Choose Bilateral Oblivious Transfer and Its Application.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Efficient ORAM Based on Binary Tree without Data Overflow and Evictions.
Proceedings of the Computational Intelligence and Intelligent Systems, 2015


  Loading...