Wenzheng Zhang
Orcid: 0009-0004-7955-2138
According to our database1,
Wenzheng Zhang
authored at least 57 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., April, 2024
2023
Dual-Channel Semi-Supervised Adversarial Network for Building Segmentation from UAV-Captured Images.
Remote. Sens., December, 2023
Research on privacy information retrieval model based on hybrid homomorphic encryption.
Cybersecur., December, 2023
<i>Poly-ABE</i>: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems.
J. Syst. Archit., October, 2023
IEEE Syst. J., June, 2023
IEEE Internet Things J., June, 2023
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving.
IEEE Trans. Serv. Comput., 2023
Inf. Process. Lett., 2023
Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing, 2023
An improved chaotic-map based two-factor authentication and key agreement protocol for WSNs.
Proceedings of the 2nd International Conference on Algorithms, 2023
2022
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search.
Int. J. Intell. Syst., December, 2022
Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients.
Symmetry, 2022
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control.
J. Inf. Secur. Appl., 2022
Comput. Syst. Sci. Eng., 2022
Comput. J., 2022
Comput. Biol. Medicine, 2022
Proceedings of the Tenth International Conference on Learning Representations, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Secur. Commun. Networks, 2021
Building Outline Extraction Directly Using the U2-Net Semantic Segmentation Model from High-Resolution Aerial Images and a Comparison Study.
Remote. Sens., 2021
Phenomena of Bifurcation and Chaos in the Dynamically Loaded Hyperelastic Spherical Membrane Based on a Noninteger Power-Law Constitutive Model.
Int. J. Bifurc. Chaos, 2021
Public-key encryption with bidirectional keyword search and its application to encrypted emails.
Comput. Stand. Interfaces, 2021
Proceedings of the Natural Language Processing and Chinese Computing, 2021
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021
Interpretable Charge Prediction for Legal Cases based on Interdependent Legal Information.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Generalizing Message Passing Neural Networks to Heterophily Using Position Information.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021
2020
The physical pattern evaluation and identification method of infrared thermal image of human health state in Traditional Chinese Medicine.
Int. J. Comput. Appl. Technol., 2020
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
Proceedings of the 58th Annual Meeting of the Association for Computational Linguistics, 2020
2019
Int. J. Distributed Sens. Networks, 2019
2016
Secur. Commun. Networks, 2016
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing.
Discret. Appl. Math., 2016
Appl. Algebra Eng. Commun. Comput., 2016
2015
A Needs Analysis Survey for Open EAP Courses for Chinese Graduates on Overseas Exchange Programs.
Proceedings of the Workshop Proceedings of the 11th International Conference on Intelligent Environments, 2015
2014
J. Networks, 2014
Sci. China Inf. Sci., 2014
2013
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Threshold public key encryption scheme resilient against continual leakage without random oracles.
Frontiers Comput. Sci., 2013
Frontiers Comput. Sci., 2013
Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013
2012
Nonlinear Periodic Oscillation of a Cylindrical Microvoid Centered at an Isotropic Incompressible Ogden Cylinder.
J. Appl. Math., 2012
The global avalanche characteristics of two Boolean functions and algebraic immunity.
Int. J. Comput. Math., 2012
CoRR, 2012
Proceedings of the 7th International Conference on Communications and Networking in China, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
2011
Int. J. Netw. Secur., 2011
2010
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
2009
Int. J. Netw. Secur., 2009
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009
2008
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy.
Proceedings of the Intelligence and Security Informatics, 2008
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
Proceedings of the Third International Conference on Natural Computation, 2007