Wenying Zhang
Orcid: 0000-0003-4097-6238Affiliations:
- Shandong Normal University, School of Information Science and Engineering, Jinan, China
- Chinese Academy of Sciences, Institute of Software, Beijing, China
- PLA Information Engineering University, Zhengzhou, China (PhD 2004)
According to our database1,
Wenying Zhang
authored at least 29 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
PPSKSQ: Towards Efficient and Privacy-Preserving Spatial Keyword Similarity Query in Cloud.
IEEE Trans. Cloud Comput., 2025
2024
Privacy-Preserving Distributed Transfer Learning and Its Application in Intelligent Transportation.
IEEE Trans. Intell. Transp. Syst., March, 2024
SecKNN: FSS-Based Secure Multi-Party KNN Classification Under General Distance Functions.
IEEE Trans. Inf. Forensics Secur., 2024
Known-Key Attack on GIFT-64 and GIFT-64[g<sub>0<sup>c</sup></sub>] Based on Correlation Matrices.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Vulnerability Analysis of Chinese Digital Passwords Related to ATM PIN Using Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023
2022
Int. J. Intell. Syst., December, 2022
Understanding digit-only financial account passwords: ID card, structure, and security.
Int. J. Intell. Syst., 2022
2021
Proceedings of the Computer Security - ESORICS 2021, 2021
2020
Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP.
Wirel. Commun. Mob. Comput., 2020
Comput. Electr. Eng., 2020
2019
Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY.
IACR Trans. Symmetric Cryptol., 2019
IACR Trans. Symmetric Cryptol., 2019
KSII Trans. Internet Inf. Syst., 2019
IET Inf. Secur., 2019
IEEE Access, 2019
2018
Secur. Commun. Networks, 2018
J. Inf. Secur. Appl., 2018
Sci. China Inf. Sci., 2018
2017
Secur. Commun. Networks, 2017
Optimised the differential trail of the authenticated encryption algorithm Tiaoxin-346.
Int. J. High Perform. Comput. Netw., 2017
2016
Secur. Commun. Networks, 2016
2014
Proceedings of the Trusted Systems - 6th International Conference, 2014
2012
2009
Sci. China Ser. F Inf. Sci., 2009
2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2006
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.
Proceedings of the Sequences and Their Applications, 2006
2004
Appl. Algebra Eng. Commun. Comput., 2004