Yinghui Zhang

According to our database1, Yinghui Zhang authored at least 86 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Feature augmentation for imbalanced classification with conditional mixture WGANs.
Sig. Proc.: Image Comm., 2019

DABKE: Secure deniable attribute-based key exchange framework.
Journal of Computer Security, 2019

A factor graph model for unsupervised feature selection.
Inf. Sci., 2019

Comments on "A Large-Scale Concurrent Data Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing".
IEEE Internet of Things Journal, 2019

SybSub: Privacy-Preserving Expressive Task Subscription With Sybil Detection in Crowdsourcing.
IEEE Internet of Things Journal, 2019

A Near-Optimal Iterative Linear Precoding With Low Complexity for Massive MIMO Systems.
IEEE Communications Letters, 2019

Cyclostationarity-based DOA estimation algorithms for coherent signals in impulsive noise environments.
EURASIP J. Wireless Comm. and Networking, 2019

An automatic diagnostic network using skew-robust adversarial discriminative domain adaptation to evaluate the severity of depression.
Computer Methods and Programs in Biomedicine, 2019

Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things.
Annales des Télécommunications, 2019

Efficient and privacy-preserving traceable attribute-based encryption in blockchain.
Annales des Télécommunications, 2019

PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks.
Ad Hoc Networks, 2019

Energy-Efficient Multilevel Heterogeneous Routing Protocol for Wireless Sensor Networks.
IEEE Access, 2019

Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace.
IEEE Access, 2019

ObliDC: An SGX-based Oblivious Distributed Computing Framework with Formal Proof.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Efficient and secure big data storage system with leakage resilience in cloud computing.
Soft Comput., 2018

Privacy-Preserving Data Aggregation against False Data Injection Attacks in Fog Computing.
Sensors, 2018

Hidden Policy Attribute-Based Data Sharing with Direct Revocation and Keyword Search in Cloud Computing.
Sensors, 2018

Secure Deduplication Based on Rabin Fingerprinting over Wireless Sensing Data in Cloud Computing.
Security and Communication Networks, 2018

A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience.
Security and Communication Networks, 2018

Optimal design of energy efficient two-tier HetNets with massive MIMO by coordinated multipoint beamforming.
Physical Communication, 2018

Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice.
J. Network and Computer Applications, 2018

Secure smart health with privacy-aware aggregate authentication and access control in Internet of Things.
J. Network and Computer Applications, 2018

Dual-side privacy-preserving task matching for spatial crowdsourcing.
J. Network and Computer Applications, 2018

Efficient and privacy-aware attribute-based data sharing in mobile cloud computing.
J. Ambient Intelligence and Humanized Computing, 2018

Blockchain based efficient and robust fair payment for outsourcing services in cloud computing.
Inf. Sci., 2018

Security and Privacy in Smart Health: Efficient Policy-Hiding Attribute-Based Access Control.
IEEE Internet of Things Journal, 2018

A Mixture Model for Image Boundary Detection Fusion.
IEICE Transactions, 2018

Secure and fine-grained access control on e-healthcare records in mobile cloud computing.
Future Generation Comp. Syst., 2018

Efficient and robust attribute-based encryption supporting access policy hiding in Internet of Things.
Future Generation Comp. Syst., 2018

Improved time difference of arrival estimation algorithms for cyclostationary signals in α-stable impulsive noise.
Digital Signal Processing, 2018

Secure attribute-based data sharing for resource-limited users in cloud computing.
Computers & Security, 2018

Fine-Grained Access Control Systems Suitable for Resource-Constrained Users in Cloud Computing.
Computing and Informatics, 2018

Efficient and Privacy-Preserving Medical Data Sharing in Internet of Things With Limited Computing Power.
IEEE Access, 2018

Decorrelating Receiver of Interference Mitigation in MMwave Small Cells Networks.
IEEE Access, 2018

TKSE: Trustworthy Keyword Search Over Encrypted Data With Two-Side Verifiability via Blockchain.
IEEE Access, 2018

A Novel Diversity Receiver Design for Cooperative Transmission System.
IEEE Access, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

DSH: Deniable Secret Handshake Framework.
Proceedings of the Information Security Practice and Experience, 2018

Efficient Traceable Oblivious Transfer and Its Applications.
Proceedings of the Information Security Practice and Experience, 2018

Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Smart Grid Power Trading Based on Consortium Blockchain in Internet of Things.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

SybMatch: Sybil Detection for Privacy-Preserving Task Matching in Crowdsourcing.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Towards privacy protection and malicious behavior traceability in smart health.
Personal and Ubiquitous Computing, 2017

Transport capacity of cooperative cognitive radio ad hoc networks.
Physical Communication, 2017

Efficient and Privacy-Aware Power Injection over AMI and Smart Grid Slice in Future 5G Networks.
Mobile Information Systems, 2017

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing.
Inf. Sci., 2017

Expressive ciphertext-policy attribute-based encryption with direct user revocation.
IJES, 2017

Characterizing Linear Structures of Boolean Functions from Arithmetic Walsh Transform.
IEICE Transactions, 2017

PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice.
Proceedings of the International Conference on Networking and Network Applications, 2017

A Random Forest Regression Method With Selected-Text Feature For Depression Assessment.
Proceedings of the 7th Annual Workshop on Audio/Visual Emotion Challenge, Mountain View, CA, USA, October 23, 2017

Efficient privacy-preserving decentralized ABE supporting expressive access structures.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Attribute-Based Encryption with Multi-keyword Search.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Anonymous Attribute-Based Encryption with Large Universe and Threshold Access Structures.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

An Efficient and Secure Deduplication Scheme Based on Rabin Fingerprinting in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Online/offline unbounded multi-authority attribute-based encryption for data sharing in mobile cloud computing.
Security and Communication Networks, 2016

Anonymous attribute-based proxy re-encryption for access control in cloud computing.
Security and Communication Networks, 2016

Efficient attribute-based data sharing in mobile clouds.
Pervasive and Mobile Computing, 2016

MRT precoding in downlink multi-user MIMO systems.
EURASIP J. Wireless Comm. and Networking, 2016

Efficient and Expressive Anonymous Attribute-Based Encryption for Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Privacy-aware attribute-based PHR sharing with user accountability in cloud computing.
The Journal of Supercomputing, 2015

2014
Bayesian image segmentation fusion.
Knowl.-Based Syst., 2014

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing.
TIIS, 2014

Efficient and robust identity-based handoff authentication for EAP-based wireless networks.
Concurrency and Computation: Practice and Experience, 2014

Generic construction for secure and efficient handoff authentication schemes in EAP-based wireless networks.
Computer Networks, 2014

Computationally Efficient Ciphertext-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Provable Security - 8th International Conference, 2014

2013
Tensor-Based Channel Estimation for Cooperative Diversity Scheme in the Presence of Timing and Frequency Offsets.
JNW, 2013

Global Existence and Convergence Rates for the Strong Solutions in H2 to the 3D Chemotaxis Model.
J. Applied Mathematics, 2013

Efficient online/offline signcryption without key exposure.
IJGUC, 2013

Key-Evolving Hierarchical ID-Based Signcryption.
Comput. J., 2013

FDR-ABE: Attribute-Based Encryption with Flexible and Direct Revocation.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Key Policy Attribute-Based Proxy Re-encryption with Matrix Access Structure.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Provably Secure and Subliminal-Free Variant of Schnorr Signature.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Tensor-based blind asynchronous cooperative diversity receiver.
Proceedings of the 15th IEEE International Conference on Communication Technology, 2013

Anonymous attribute-based encryption supporting efficient decryption test.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Efficient and Robust Identity-Based Handoff Authentication in Wireless Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

OR-Tree: An Optimized Spatial Tree Index for Flash-Memory Storage Systems.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

An Improved Self-organization Antibody Network for Pattern Recognition and Its Performance Study.
Proceedings of the Pattern Recognition - Chinese Conference, 2012

2011
Efficient Interference Cancellation Detector in Sparse Rician Frequency Selective Fading Channels.
IEICE Transactions, 2011

2009
Comments on "Successive Interference Cancellation Schemes for Time-Reversal Space-Time Block Codes".
IEEE Trans. Vehicular Technology, 2009

2007
Expert system for power dispatching order ticket.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Application of the Agamogenetic Algorithm to Solve the Traveling Salesman Problem.
Proceedings of the Bio-Inspired Computational Intelligence and Applications, 2007

2006
Multi-asperity based friction modelling and haptic rendering in virtual environments.
PhD thesis, 2006

2004
Computer simulation of mammographic imaging for applications in CAD.
Proceedings of the CARS 2004. Computer Assisted Radiology and Surgery. Proceedings of the 18th International Congress and Exhibition, 2004


  Loading...