Tao Zhang

Orcid: 0000-0001-5739-8038

Affiliations:
  • Xidian University, School of Computer Science and Technology, Xi'an, China (PhD 2015)


According to our database1, Tao Zhang authored at least 45 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FedPTA: Prior-Based Tensor Approximation for Detecting Malicious Clients in Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

FedDMC: Efficient and Robust Federated Learning via Detecting Malicious Clients.
IEEE Trans. Dependable Secur. Comput., 2024

Guard-FL: An UMAP-Assisted Robust Aggregation for Federated Learning.
IEEE Internet Things J., 2024

FBR-FL: Fair and Byzantine-Robust Federated Learning via SPD Manifold.
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024

2023
A Task-based Personalized Privacy-Preserving Participant Selection Mechanism for Mobile Crowdsensing.
Mob. Networks Appl., October, 2023

FedProc: Prototypical contrastive federated learning on non-IID data.
Future Gener. Comput. Syst., June, 2023

Privacy-preserving Federated Learning Against Byzantine Attack via Top-k Indexes.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT.
IEEE Trans. Ind. Informatics, 2022

Privacy-Preserving Asynchronous Grouped Federated Learning for IoT.
IEEE Internet Things J., 2022

Graph Analysis in Decentralized Online Social Networks with Fine-Grained Privacy Protection.
CoRR, 2022

HyperMean: Effective Multidimensional Mean Estimation with Local Differential Privacy.
Proceedings of the IEEE International Conference on Trust, 2022

OKV: Optimized Key-Value Data Collection with Local Differential Privacy.
Proceedings of the International Conference on Networking and Network Applications, 2022

Dual Adversarial Federated Learning on Non-IID Data.
Proceedings of the Knowledge Science, Engineering and Management, 2022

2021
Towards Time-Sensitive and Verifiable Data Aggregation for Mobile Crowdsensing.
Secur. Commun. Networks, 2021

Privacy-Preserving Federated Generative Adversarial Network for IoT.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Dual-Target Cross-Domain Bundle Recommendation.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing.
World Wide Web, 2020

A Traceable and Revocable Multiauthority Attribute-Based Encryption Scheme with Fast Access.
Secur. Commun. Networks, 2020

Location Privacy Protection in Mobile Social Networks Based on l -diversity.
J. Inf. Sci. Eng., 2020

A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud.
IEEE Access, 2020

HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth.
IEEE Access, 2020

On Jamming Power Optimization for Secure and QoS-Aware Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2020

$k$-Anonymity Based Location Data Query Privacy Protection Method in Mobile Social Networks.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing.
IEEE Trans. Veh. Technol., 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

Traceable Ciphertext-Policy Attribute-Based Encryption with Verifiable Outsourced Decryption in eHealth Cloud.
Wirel. Commun. Mob. Comput., 2018

Trust-based service composition and selection in service oriented architecture.
Peer-to-Peer Netw. Appl., 2018

A Situational Awareness Trust Evolution Model for Mobile Devices in D2D Communication.
IEEE Access, 2018

MicrothingsChain: Edge Computing and Decentralized IoT Architecture Based on Blockchain for Cross-Domain Data Shareing.
Proceedings of the International Conference on Networking and Network Applications, 2018

A Privacy-Preserving Incentive Mechanism on Multi-Bid Crowdsourced Spectrum Sensing.
Proceedings of the International Conference on Networking and Network Applications, 2018

2017
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J. Inf. Sci. Eng., 2017

Exploiting Content Delivery Networks for covert channel communications.
Comput. Commun., 2017

MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Commun. Mag., 2017

Reputation Propagation for Web Service Composition: A Shapley Value Approach.
Proceedings of the International Conference on Networking and Network Applications, 2017

CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX.
Proceedings of the International Conference on Networking and Network Applications, 2017

2014
Threshold attribute-based encryption with attribute hierarchy for lattices in the standard model.
IET Inf. Secur., 2014

Trust-based service composition in multi-domain environments under time constraint.
Sci. China Inf. Sci., 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

2013
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

Efficient Data Integrity Verification Using Attribute Based Multi-signature Scheme in Wireless Network.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Fully Secure Decentralized Key-Policy Attribute-Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing.
Proceedings of the Internet and Distributed Computing Systems, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

PRAM: privacy preserving access management scheme in cloud services.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013


  Loading...