Shibin Zhang

Orcid: 0000-0001-6323-9420

According to our database1, Shibin Zhang authored at least 51 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain data sharing scheme based on quantum re-encryption.
Quantum Inf. Process., August, 2024

Cryptographic enhancement of image data security through quantum-classical hybrid encryption with parameterized pixel ratios.
Quantum Inf. Process., July, 2024

New Quantum Private Comparison Using Four-Particle Cluster State.
Entropy, June, 2024

Efficient Quantum Private Comparison Based on GHZ States.
Entropy, May, 2024

Adversarial examples detection based on quantum fuzzy convolution neural network.
Quantum Inf. Process., April, 2024

A relational extraction approach based on multiple embedding representations and multi-head self-attention.
J. Intell. Fuzzy Syst., March, 2024

Privacy-Preserving and Poisoning-Defending Federated Learning in Fog Computing.
IEEE Internet Things J., February, 2024

Channel-augmented joint transformation for transferable adversarial attacks.
Appl. Intell., January, 2024

Shipment lead time hedging and coordination in prefabricated construction supply chain.
RAIRO Oper. Res., 2024

2023
Efficient multiparty quantum private comparison protocol based on single photons and rotation encryption.
Quantum Inf. Process., July, 2023

Quantum Fuzzy Support Vector Machine for Binary Classification.
Comput. Syst. Sci. Eng., 2023

2022
Automatic estimation of spatial spectra via smoothing splines.
Comput. Stat., 2022

Automatic Selection Attacks Framework for Hard Label Black-Box Models.
Proceedings of the IEEE INFOCOM 2022, 2022

BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain Cross-Chain Research Based on Verifiable Ring Signatures.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain-Based Efficient Incentive Mechanism in Crowdsensing.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Quantum Fuzzy K-Means Algorithm Based on Fuzzy Theory.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Semi-quantum private comparison protocol with three-particle G-like states.
Quantum Inf. Process., 2021

Research on information steganography based on network data stream.
Neural Comput. Appl., 2021

Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021

Clustering Collision Power Attack on RSA-CRT.
Comput. Syst. Sci. Eng., 2021

A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain.
Comput. Syst. Sci. Eng., 2021

Quantum Private Comparison Based on GHZ-type States.
Proceedings of the 2021 IEEE AFRICON, 2021

2020
Research and Analysis of Electromagnetic Trojan Detection Based on Deep Learning.
Secur. Commun. Networks, 2020

Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states.
Quantum Inf. Process., 2020

Quantum Secret Sharing Scheme with Credible Authentication based on Quantum Walk.
KSII Trans. Internet Inf. Syst., 2020

Corrigendum to "A New User Behavior Evaluation Method in Online Social Network" Journal of Information Security and Applications Volume 48 (2019) 102371.
J. Inf. Secur. Appl., 2020

Dynamic negotiation of user behaviour via blockchain technology in federated system.
Int. J. Comput. Sci. Eng., 2020

A multi-group e-commerce signature scheme based on quantum teleportation.
Int. J. Comput. Sci. Eng., 2020

Nonparametric Bayesian inference for the spectral density based on irregularly spaced data.
Comput. Stat. Data Anal., 2020

User Behavior Credibility Evaluation Model Based on Intuitionistic Fuzzy Analysis Hierarchy Process.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

A Quantum Proxy Arbitrated Signature Scheme Based on Two Three-Qubit GHZ States.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Multi-party Semi-quantum Secret Sharing Scheme Based on Bell States.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

An Improved Quantum Identity Authentication Protocol for Multi-party Secure Communication.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Design and Implementation of Heterogeneous Identity Alliance Risk Assessment System.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

A Semi-quantum Group Signature Scheme Based on Bell States.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
A new user behavior evaluation method in online social network.
J. Inf. Secur. Appl., 2019

An efficiency batch authentication scheme for smart grid using binary authentication tree.
Int. Arab J. Inf. Technol., 2019

Bayesian copula spectral analysis for stationary time series.
Comput. Stat. Data Anal., 2019

Energy Efficiency Optimization in Energy Harvesting Two-Hop Half-duplex Relay Systems.
Proceedings of the 29th International Telecommunication Networks and Applications Conference, 2019

Robust Audio Watermarking Algorithm Based on Moving Average and DCT.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Multi-function Quantum Cryptography Protocol Based on Bell State.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

2018
Numerical Simulation of Interior Turbulent Flow Regulation of Wet Submersible Motor.
Wirel. Pers. Commun., 2018

Semi-quantum protocol for deterministic secure quantum communication using Bell states.
Quantum Inf. Process., 2018

Detection of Android Applications with Malicious Behavior Based on Sparse Bayesian Learning Algorithm.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Comment on "flexible protocol for quantum private query based on B92 protocol".
Quantum Inf. Process., 2017

Comments on 'An improved authentication scheme for mobile satellite communication systems'.
Int. J. Electron. Secur. Digit. Forensics, 2017

A lightweight authentication and key agreement scheme for smart grid.
Int. J. Distributed Sens. Networks, 2017

2016
Quantum Private Query Protocol Based on Two Non-Orthogonal States.
Entropy, 2016

Adaptive spectral estimation for nonstationary multivariate time series.
Comput. Stat. Data Anal., 2016


  Loading...