Yichen Zhang

According to our database1, Yichen Zhang authored at least 84 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Wideband Blind Source Separation Algorithm Based on Beamforming.
Wireless Personal Communications, 2019

High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction.
Quantum Information Processing, 2019

Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service.
TIIS, 2019

Key-policy attribute-based encryption against continual auxiliary input leakage.
Inf. Sci., 2019

Hierarchical attribute based encryption with continuous leakage-resilience.
Inf. Sci., 2019

Hazard Assessment of Earthquake Disaster Chains Based on a Bayesian Network Model and ArcGIS.
ISPRS Int. J. Geo-Information, 2019

A Method for Improving Controlling Factors Based on Information Fusion for Debris Flow Susceptibility Mapping: A Case Study in Jilin Province, China.
Entropy, 2019

Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution.
Entropy, 2019

Training convolutional neural networks with cheap convolutions and online distillation.
CoRR, 2019

Reconstruction of Natural Visual Scenes from Neural Spikes with Deep Neural Networks.
CoRR, 2019

Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure.
IEEE Access, 2019

SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search.
IEEE Access, 2019

Research on a New-Style Under-Actuated Omnidirectional Mobile Robot Based on Special Coupling Drive System.
IEEE Access, 2019

A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation.
IEEE Access, 2019

Experimental Implementation of Bias-free Quantum Random Number Generator based on Vacuum Fluctuation.
Proceedings of the 7th International Conference on Photonics, Optics and Laser Technology, 2019

Secondary Voltage Control Via Demand-Side Energy Storage with Temporal Logic Specifications.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2019

2018
Provably secure certificate-based encryption with leakage resilience.
Theor. Comput. Sci., 2018

User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage.
IEEE Systems Journal, 2018

Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key.
Security and Communication Networks, 2018

Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption.
TIIS, 2018

Identity-based broadcast encryption with continuous leakage resilience.
Inf. Sci., 2018

Anonymous certificate-based broadcast encryption with constant decryption cost.
Inf. Sci., 2018

Cryptanalysis and Improvement for Certificateless Aggregate Signature.
Fundam. Inform., 2018

First-order Newton-type Estimator for Distributed Estimation and Inference.
CoRR, 2018

Revealing Fine Structures of the Retinal Receptive Field by Deep Learning Networks.
CoRR, 2018

Synthesizing Distributed Energy Resources in Microgrids with Temporal Logic Specifications.
CoRR, 2018

Provision for Guaranteed Inertial Response in Diesel-Wind Systems via Model Reference Control.
CoRR, 2018

Set Theory-Based Safety Supervisory Control for Wind Turbines to Ensure Adequate Frequency Response.
CoRR, 2018

Battery Energy Storage Scheduling for Optimal Load Variance Minimization.
CoRR, 2018

Hybrid Controller for Wind Turbine Generators to Ensure Adequate Frequency Response in Power Networks.
CoRR, 2018

Deformable Feature Pyramid Network for Ship Recognition.
Proceedings of the Advances in Multimedia Information Processing - PCM 2018, 2018

Battery energy storage scheduling for optimal load variance minimization.
Proceedings of the 2018 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2018

2017
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing.
IEEE Trans. Services Computing, 2017

KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage.
IEEE Trans. Services Computing, 2017

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

Remote Sensing Image Change Detection Based on NSCT-HMT Model and Its Application.
Sensors, 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Security and Communication Networks, 2017

Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction.
Quantum Information Processing, 2017

Efficient rate-adaptive reconciliation for CV-QKD protocol.
Quantum Information & Computation, 2017

Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.
Int. J. Communication Systems, 2017

Hybrid Controller for Wind Turbine Generators to Ensure Adequate Frequency Response in Power Networks.
IEEE J. Emerg. Sel. Topics Circuits Syst., 2017

Performance Guaranteed Inertia Emulation for Diesel-Wind System Feed Microgrid via Model Reference Control.
CoRR, 2017

Performance guaranteed inertia emulation for diesel-wind system feed microgrid via model reference control.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2017

2016
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage.
Security and Communication Networks, 2016

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Security and Communication Networks, 2016

Certificate-based encryption resilient to key leakage.
Journal of Systems and Software, 2016

Provably Secure Certificate-based Conditional Proxy Re-encryption.
J. Inf. Sci. Eng., 2016

Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing.
TIIS, 2016

Continuous leakage-resilient certificate-based encryption.
Inf. Sci., 2016

Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks.
IACR Cryptology ePrint Archive, 2016

Emulated Inertia and Damping of Converter-Interfaced Power Source.
CoRR, 2016

A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme.
Comput. J., 2016

Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2016

An Efficient Certificate-Based Designated Verifier Signature Scheme.
Computing and Informatics, 2016

General Synthesized View Distortion Estimation for Depth Map Compression of FTV.
Proceedings of the 2016 Data Compression Conference, 2016

2015
Leakage-resilient certificate-based encryption.
Security and Communication Networks, 2015

Certificateless online/offline signcryption scheme.
Security and Communication Networks, 2015

Application of practical noiseless linear amplifier in no-switching continuous-variable quantum cryptography.
Quantum Information Processing, 2015

Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation.
Int. J. Inf. Sec., 2015

Certificate-Based Encryption Resilient to Key Leakage.
IACR Cryptology ePrint Archive, 2015

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution.
Entropy, 2015

A Forward-Secure Certificate-Based Signature Scheme.
Comput. J., 2015

The efficiency of view synthesis prediction for 3D video coding: A spectral domain analysis.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

On the Efficiency of View Synthesis Prediction for 3D Video Coding.
Proceedings of the 2015 Data Compression Conference, 2015

2014
Block-Based In-Loop View Synthesis for 3-D Video Coding.
IEEE Signal Process. Lett., 2014

Provably secure certificate-based key-insulated signature scheme.
Concurrency and Computation: Practice and Experience, 2014

The protein-protein interaction network of eyestalk, Y-organ and hepatopancreas in Chinese mitten crab Eriocheir sinensis.
BMC Systems Biology, 2014

Certificate-Based Conditional Proxy Re-Encryption.
Proceedings of the Network and System Security - 8th International Conference, 2014

On chi: Its Gestalt and Collocations.
Proceedings of the Chinese Lexical Semantics - 15th Workshop, 2014

The Ergativization of the Verb "死"[si](Die) in Chinese Language History.
Proceedings of the Chinese Lexical Semantics - 15th Workshop, 2014

2013
Certificate-Based Encryption Scheme without Pairing.
TIIS, 2013

Provably Secure Forward Secure Certificateless Proxy Signature Scheme.
TIIS, 2013

Provably secure certificate-based signature scheme without pairings.
Inf. Sci., 2013

Forward Secure Certificateless Proxy Signature Scheme.
Proceedings of the Network and System Security - 7th International Conference, 2013

Subjective study of binocular rivalry in stereoscopic images with transmission and compression artifacts.
Proceedings of the IEEE International Conference on Image Processing, 2013

Synthesized disparity vectors for 3D video coding.
Proceedings of the IEEE International Conference on Image Processing, 2013

Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

2012
An efficient short certificate-based signature scheme.
Journal of Systems and Software, 2012

Certificate-based signcryption with enhanced security features.
Computers & Mathematics with Applications, 2012

Certificate-Based Key-Insulated Signature.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

A Forward-Secure Certificate-Based Signature Scheme in the Standard Model.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

2009
Provably Secure Certificate-based Proxy Signature Schemes.
JCP, 2009

2006
Improvement of Threshold Signature Scheme Using Self-Certified Public Key.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2003
Nonrepudiable Proxy Multi-Signature Scheme.
J. Comput. Sci. Technol., 2003


  Loading...