Wenzheng Zhang
This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.
Known people with the same name:
- Wenzheng Zhang 001 (Science and Technology on Communication Security Laboratory, Chengdu, China)
- Wenzheng Zhang 002 (Nankai University, College of Artificial Intelligence, Tianjin, China)
- Wenzheng Zhang 003 (Rutgers University, Department of Computer Science, Piscataway, NJ, USA)
Bibliography
2025
Adaptive Smith Predictive Active Disturbance Rejection Control of Magnetic Suspended Rotor System Considering Time Delay.
IEEE Trans. Ind. Electron., September, 2025
Optimization of multi-objective feature regression models for designing performance assessment methods in college and university educational reform.
PeerJ Comput. Sci., 2025
A dual-index Boolean retrieval scheme with dynamic and revocable attribute-based policies.
J. Syst. Archit., 2025
Encryption Algorithm MLOL: Security and Efficiency Enhancement Based on the LOL Framework.
Cryptogr., 2025
PGrid-Align: An Efficient Fine-tuning Method for Large-scale Language Models via Sparse Power Grid Operations Data.
Proceedings of the 11th IEEE Conference on Big Data Security on Cloud, 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Proceedings of the 2024 IEEE Global Communications Conference, 2024
2023
Dual-Channel Semi-Supervised Adversarial Network for Building Segmentation from UAV-Captured Images.
Remote. Sens., December, 2023
Research on privacy information retrieval model based on hybrid homomorphic encryption.
Cybersecur., December, 2023
<i>Poly-ABE</i>: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems.
J. Syst. Archit., October, 2023
IEEE Syst. J., June, 2023
An improved chaotic-map based two-factor authentication and key agreement protocol for WSNs.
Proceedings of the 2nd International Conference on Algorithms, 2023
2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022
Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients.
Symmetry, 2022
Comput. Syst. Sci. Eng., 2022
Comput. Biol. Medicine, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Secur. Commun. Networks, 2021
Building Outline Extraction Directly Using the U2-Net Semantic Segmentation Model from High-Resolution Aerial Images and a Comparison Study.
Remote. Sens., 2021
Phenomena of Bifurcation and Chaos in the Dynamically Loaded Hyperelastic Spherical Membrane Based on a Noninteger Power-Law Constitutive Model.
Int. J. Bifurc. Chaos, 2021
Public-key encryption with bidirectional keyword search and its application to encrypted emails.
Comput. Stand. Interfaces, 2021
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
Generalizing Message Passing Neural Networks to Heterophily Using Position Information.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021
2020
The physical pattern evaluation and identification method of infrared thermal image of human health state in Traditional Chinese Medicine.
Int. J. Comput. Appl. Technol., 2020
2019
Int. J. Distributed Sens. Networks, 2019
2016
Appl. Algebra Eng. Commun. Comput., 2016
2015
An automatic and simple method for specifying dislocation features in atomistic simulations.
Comput. Phys. Commun., 2015
A Needs Analysis Survey for Open EAP Courses for Chinese Graduates on Overseas Exchange Programs.
Proceedings of the Workshop Proceedings of the 11th International Conference on Intelligent Environments, 2015
2014
J. Networks, 2014
Sci. China Inf. Sci., 2014
2013
Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013
Frontiers Comput. Sci., 2013
Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
Nonlinear Periodic Oscillation of a Cylindrical Microvoid Centered at an Isotropic Incompressible Ogden Cylinder.
J. Appl. Math., 2012
The global avalanche characteristics of two Boolean functions and algebraic immunity.
Int. J. Comput. Math., 2012
CoRR, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012