Wenzheng Zhang

Orcid: 0009-0004-7955-2138

According to our database1, Wenzheng Zhang authored at least 57 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Small-Size FHE Scheme for Better Privacy Protection of IoT.
IEEE Internet Things J., April, 2024

2023
Dual-Channel Semi-Supervised Adversarial Network for Building Segmentation from UAV-Captured Images.
Remote. Sens., December, 2023

Research on privacy information retrieval model based on hybrid homomorphic encryption.
Cybersecur., December, 2023

<i>Poly-ABE</i>: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems.
J. Syst. Archit., October, 2023

Multiauthority Attribute-Based Encryption for Assuring Data Deletion.
IEEE Syst. J., June, 2023

An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs.
IEEE Internet Things J., June, 2023

ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving.
IEEE Trans. Serv. Comput., 2023

Public-key encryption scheme with optimal continuous leakage resilience.
Inf. Process. Lett., 2023

Improving Multitask Retrieval by Promoting Task Specialization.
CoRR, 2023

Seq2seq is All You Need for Coreference Resolution.
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023

An improved chaotic-map based two-factor authentication and key agreement protocol for WSNs.
Proceedings of the 2nd International Conference on Algorithms, 2023

2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022

Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients.
Symmetry, 2022

A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control.
J. Inf. Secur. Appl., 2022

A Real-time Cutting Model Based on Finite Element and Order Reduction.
Comput. Syst. Sci. Eng., 2022

Continuous Leakage-Amplified Public-Key Encryption With CCA Security.
Comput. J., 2022

A new soft tissue deformation model based on Runge-Kutta: Application in lung.
Comput. Biol. Medicine, 2022

EntQA: Entity Linking as Question Answering.
Proceedings of the Tenth International Conference on Learning Representations, 2022

Multi-Scale Distillation from Multiple Graph Neural Networks.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
On the Modified Transparency Order of n , m -Functions.
Secur. Commun. Networks, 2021

Building Outline Extraction Directly Using the U2-Net Semantic Segmentation Model from High-Resolution Aerial Images and a Comparison Study.
Remote. Sens., 2021

Phenomena of Bifurcation and Chaos in the Dynamically Loaded Hyperelastic Spherical Membrane Based on a Noninteger Power-Law Constitutive Model.
Int. J. Bifurc. Chaos, 2021

Public-key encryption with bidirectional keyword search and its application to encrypted emails.
Comput. Stand. Interfaces, 2021

A Residual Dynamic Graph Convolutional Network for Multi-label Text Classification.
Proceedings of the Natural Language Processing and Chinese Computing, 2021

Understanding Hard Negatives in Noise Contrastive Estimation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

Interpretable Charge Prediction for Legal Cases based on Interdependent Legal Information.
Proceedings of the International Joint Conference on Neural Networks, 2021

Learning Multi-Graph Neural Network for Data-Driven Job Skill Prediction.
Proceedings of the International Joint Conference on Neural Networks, 2021

Generalizing Message Passing Neural Networks to Heterophily Using Position Information.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Fast MILP Modelings for Sboxes.
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021

2020
The physical pattern evaluation and identification method of infrared thermal image of human health state in Traditional Chinese Medicine.
Int. J. Comput. Appl. Technol., 2020

Hiring Now: A Skill-Aware Multi-Attention Model for Job Posting Generation.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

Synchronous Double-channel Recurrent Network for Aspect-Opinion Pair Extraction.
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020

2019
Accurate detection of selective forwarding attack in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2019

2016
CCA2 secure public-key encryption scheme tolerating continual leakage attacks.
Secur. Commun. Networks, 2016

Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing.
Discret. Appl. Math., 2016

New secondary constructions of Bent functions.
Appl. Algebra Eng. Commun. Comput., 2016

2015
A Needs Analysis Survey for Open EAP Courses for Chinese Graduates on Overseas Exchange Programs.
Proceedings of the Workshop Proceedings of the 11th International Conference on Intelligent Environments, 2015

2014
A Near-Infrared Face Detection and Recognition System Using ASM and PCA+LDA.
J. Networks, 2014

Gaussian sampling of lattices for cryptographic applications.
Sci. China Inf. Sci., 2014

2013
Hard fault analysis of Trivium.
Inf. Sci., 2013

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013

New forward-secure signature schemes with untrusted update.
Frontiers Comput. Sci., 2013

Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Nonlinear Periodic Oscillation of a Cylindrical Microvoid Centered at an Isotropic Incompressible Ogden Cylinder.
J. Appl. Math., 2012

The global avalanche characteristics of two Boolean functions and algebraic immunity.
Int. J. Comput. Math., 2012

Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions
CoRR, 2012

New bounds on the sum-of-squares indicator.
Proceedings of the 7th International Conference on Communications and Networking in China, 2012

Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

2011
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
Int. J. Netw. Secur., 2011

2010
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

2009
Ordered Semiring-based Trust Establish Model with Risk Evaluating.
Int. J. Netw. Secur., 2009

Analysis and Improvement of an ID-Based Anonymous Signcryption Model.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

2008
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008

Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

2007
Using Trust Metric to Detect Malicious Behaviors in WSNs.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments.
Proceedings of the Third International Conference on Natural Computation, 2007


  Loading...