Yan Zhu

Orcid: 0000-0002-9159-745X

Affiliations:
  • University of Science and Technology Beijing, China
  • University of Michigan-Dearborn, MI, USA (2012)
  • Peking University, Beijing Key Laboratory of Internet Security Technology, China (2007 - 2012)
  • Harbin Engineering University, China (PhD 2005)


According to our database1, Yan Zhu authored at least 85 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Queries Using Multisource Private Data Counting on Real Numbers in IoT.
IEEE Internet Things J., April, 2024

Efficient Key Generation on Lattice Cryptography for Privacy Protection in Mobile IoT Crowdsourcing.
IEEE Internet Things J., January, 2024

Privacy-Preserving Collaborative Queries in Services Computing Using Multisource Private Data Counting.
IEEE Trans. Serv. Comput., 2024

2023
Efficient Multiparty Fully Homomorphic Encryption With Computation Fairness and Error Detection in Privacy Preserving Multisource Data Mining.
IEEE Trans. Reliab., December, 2023

SaaSC: Toward Pay-as-You-Go Mode for Software Service Transactions Based on Blockchain's Smart Legal Contracts.
IEEE Trans. Serv. Comput., 2023

Secure Remote Cloud File Sharing With Attribute-Based Access Control and Performance Optimization.
IEEE Trans. Cloud Comput., 2023

Remotely Controllable Data Self-Destruction for Privacy-Preserving Sensitive Data Services.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

2022
SPESC-Translator: Towards Automatically Smart Legal Contract Conversion for Blockchain-Based Auction Services.
IEEE Trans. Serv. Comput., 2022

Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols.
Peer-to-Peer Netw. Appl., 2022

Policy-driven Data Sharing over Attribute-Based Encryption supporting Dual Membership.
J. Syst. Softw., 2022

Attribute-Based Private Data Sharing With Script-Driven Programmable Ciphertext and Decentralized Key Management in Blockchain Internet of Things.
IEEE Internet Things J., 2022

Policychain: A Decentralized Authorization Service With Script-Driven Policy on Blockchain for Internet of Things.
IEEE Internet Things J., 2022

2021
TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain.
IEEE Trans. Reliab., 2021

Blockchain-Based Software Architecture Development for Service Requirements With Smart Contracts.
Computer, 2021

How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors.
Comput. Secur., 2021

2020
Zero-pole cancellation for identity-based aggregators: a constant-size designated verifier-set signature.
Frontiers Comput. Sci., 2020

Security Assessment of Blockchain in Chinese Classified Protection of Cybersecurity.
IEEE Access, 2020

A Privacy-Preserving Framework With Self-Governance and Permission Delegation in Online Social Networks.
IEEE Access, 2020

Token-Based Access Control.
IEEE Access, 2020

2019
Cryptographic Attribute-Based Access Control (ABAC) for Secure Decision Making of Dynamic Policy With Multiauthority Attribute Tokens.
IEEE Trans. Reliab., 2019

New instant confirmation mechanism based on interactive incontestable signature in consortium blockchain.
Frontiers Comput. Sci., 2019

Auditable zerocoin scheme with user awareness.
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019

From Data-Driven to Intelligent-Driven: Technology Evolution of Network Security in Big Data Era.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

FlashGhost: Data Sanitization with Privacy Protection Based on Frequent Colliding Hash Table.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
A Sequential Approach to Market State Modeling and Analysis in Online P2P Lending.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Attribute-based Access Control for ICN Naming Scheme.
IEEE Trans. Dependable Secur. Comput., 2018

PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud.
IEEE Trans. Cloud Comput., 2018

Verifiable random functions with Boolean function constraints.
Sci. China Inf. Sci., 2018

Dual-mode broadcast encryption.
Sci. China Inf. Sci., 2018

Provably Secure Cryptographic ABAC System to Enhance Reliability and Privacy Using Real-Time Token and Dynamic Policy.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Secure Smart Contract System Built on SMPC Over Blockchain.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

SPESC: A Specification Language for Smart Contracts.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

An Efficient Retrograde Storage for Self-Destructing Messages on Frequently Colliding Hash Table.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Digital Asset Management with Distributed Permission over Blockchain and Attribute-Based Access Control.
Proceedings of the 2018 IEEE International Conference on Services Computing, 2018

2017
Multi-Factor Synthesis Decision-Making for Trust-Based Access Control on Cloud.
Int. J. Cooperative Inf. Syst., 2017

BC-PDS: Protecting Privacy and Self-Sovereignty through BlockChains for OpenPDS.
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017

2016
A System View of Financial Blockchains.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

Exploring the Procrastination of College Students: A Data-Driven Behavioral Perspective.
Proceedings of the Database Systems for Advanced Applications, 2016

Interactive Incontestable Signature for Transactions Confirmation in Bitcoin Blockchain.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services.
IEEE Trans. Serv. Comput., 2015

Tap-Wave-Rub: Lightweight Human Interaction Approach to Curb Emerging Smartphone Malware.
IEEE Trans. Inf. Forensics Secur., 2015

Efficient Attribute-Based Comparable Data Access Control.
IEEE Trans. Computers, 2015

Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications.
Mob. Networks Appl., 2015

Identity-Set-based Broadcast Encryption supporting "Cut-or-Select" with Short Ciphertext.
IACR Cryptol. ePrint Arch., 2015

Secure Snaps: A New Forward Secrecy Cryptosystem for Self-Destructing Messages in Mobile Services.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

Traitor Tracing and Revocation for Secure Decoders in File Syncing-and-Sharing Service.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

A Provable Data Possession Scheme with Data Hierarchy in Cloud.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

2014
Secure and efficient random functions with variable-length output.
J. Netw. Comput. Appl., 2014

Lattice-based key exchange on small integer solution problem.
Sci. China Inf. Sci., 2014

Traitor Tracing Based on Partially-Ordered Hierarchical Encryption.
Proceedings of the Trusted Systems - 6th International Conference, 2014

Attribute-based access control for ICN naming scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Dynamic Audit Services for Outsourced Storages in Clouds.
IEEE Trans. Serv. Comput., 2013

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Inf. Forensics Secur., 2013

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy via Location Sensing.
IEEE Trans. Dependable Secur. Comput., 2013

Tap-Wave-Rub: lightweight malware prevention for smartphones using intuitive human gestures.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Efficient Identity-Based Encryption without Pairings and Key Escrow for Mobile Devices.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

Enabling secure location-based services in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

End-to-end aggregate authentication of time-series data.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

Cryptographic Spatio-temporal Predicates for Location-Based Services.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distributed Syst., 2012

Efficient audit service outsourcing for data integrity in clouds.
J. Syst. Softw., 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

Efficient construction of provably secure steganography under ordinary covert channels.
Sci. China Inf. Sci., 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Secure Data Retrieval of Outsourced Data with Complex Query Support.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Comparison-based encryption for fine-grained access control in clouds.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Provably Secure Role-Based Encryption with Revocation Mechanism.
J. Comput. Sci. Technol., 2011

Zero-knowledge proofs of retrievability.
Sci. China Inf. Sci., 2011

Dynamic audit services for integrity verification of outsourced storages in clouds.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Collaborative integrity verification in hybrid clouds.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: temporal attribute-based encryption in clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Attribute-Based Signature with Policy-and-Endorsement Mechanism.
J. Comput. Sci. Technol., 2010

Efficient provable data possession for hybrid clouds.
IACR Cryptol. ePrint Arch., 2010

A Collaborative Framework for Privacy Protection in Online Social Networks.
IACR Cryptol. ePrint Arch., 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy.
IACR Cryptol. ePrint Arch., 2010

Gradual Identity Exposure Using Attribute-Based Encryption.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

2007
Structural Digital Signature and Semi-Fragile Fingerprinting for Image Authentication in Wavelet Domain.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
A Secure Hierarchical Fragile Watermarking Method with Tamper Localization.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Collusion secure convolutional fingerprinting information codes.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Image-adaptive watermarking based on perceptually shaping watermark blockwise.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Collusion Secure Convolutional Spread Spectrum Fingerprinting.
Proceedings of the Digital Watermarking, 4th International Workshop, 2005


  Loading...