Zhiguang Qin

According to our database1, Zhiguang Qin authored at least 130 papers between 2003 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Imaging and fusing time series for wearable sensor-based human activity recognition.
Information Fusion, 2020

2019
A Lightweight Fine-Grained Search Scheme over Encrypted Data in Cloud-Assisted Wireless Body Area Networks.
Wireless Communications and Mobile Computing, 2019

Permission-Based Separation of Duty in Dynamic Role-Based Access Control Model.
Symmetry, 2019

Proxy Re-Encryption in Access Control Framework of Information-Centric Networks.
IEEE Access, 2019

MSCryptoNet: Multi-Scheme Privacy-Preserving Deep Learning in Cloud Computing.
IEEE Access, 2019

Sec-D2D: A Secure and Lightweight D2D Communication System With Multiple Sensors.
IEEE Access, 2019

Progressive Image Enhancement under Aesthetic Guidance.
Proceedings of the 2019 on International Conference on Multimedia Retrieval, 2019

2018
Alternating Relaxed Twin Bounded Support Vector Clustering.
Wireless Personal Communications, 2018

Leveraging Image Visual Features in Content-Based Recommender System.
Scientific Programming, 2018

Channel Precoding Based Message Authentication in Wireless Networks: Challenges and Solutions.
IEEE Network, 2018

A Service Recommendation Algorithm Based on Modeling of Dynamic and Diverse Demands.
Int. J. Web Service Res., 2018

An LDPC Code Based Physical Layer Message Authentication Scheme With Prefect Security.
IEEE Journal on Selected Areas in Communications, 2018

Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud".
Inf. Process. Lett., 2018

Multi-modal brain tumor image segmentation based on SDAE.
Int. J. Imaging Systems and Technology, 2018

Achieving Collaborative Cloud Data Storage by Key-Escrow-Free Multi-Authority CP-ABE Scheme with Dual-Revocation.
I. J. Network Security, 2018

Cubic Medium Field Equation Public Key Cryptosystem.
I. J. Network Security, 2018

Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle.
I. J. Network Security, 2018

Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing.
IEEE Access, 2018

Ciphertext-Policy Attribute-Based Signcryption With Verifiable Outsourced Designcryption for Sharing Personal Health Records.
IEEE Access, 2018

Brain Tumor Segmentation Using Concurrent Fully Convolutional Networks and Conditional Random Fields.
Proceedings of the 3rd International Conference on Multimedia and Image Processing, 2018

2017
Frequent Symptom Sets Identification from Uncertain Medical Data in Differentially Private Way.
Scientific Programming, 2017

Captioning Videos Using Large-Scale Image Corpus.
J. Comput. Sci. Technol., 2017

S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol.
IEEE Internet of Things Journal, 2017

Attribute-based Encryption with Non-Monotonic Access Structures Supporting Fine-Grained Attribute Revocation in M-healthcare.
I. J. Network Security, 2017

An Efficient and Provably Secure Certificateless Key Insulated Encryption with Applications to Mobile Internet.
I. J. Network Security, 2017

Integrating the Functional Encryption and Proxy Re-cryptography to Secure DRM Scheme.
I. J. Network Security, 2017

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing.
Computer Standards & Interfaces, 2017

Brain MR Image Classification for Alzheimer's Disease Diagnosis Based on Multifeature Fusion.
Comp. Math. Methods in Medicine, 2017

LACS: A Lightweight Label-Based Access Control Scheme in IoT-Based 5G Caching Context.
IEEE Access, 2017

PCP: A Privacy-Preserving Content-Based Publish-Subscribe Scheme With Differential Privacy in Fog Computing.
IEEE Access, 2017

Wheel: Accelerating CNNs with Distributed GPUs via Hybrid Parallelism and Alternate Strategy.
Proceedings of the 2017 ACM on Multimedia Conference, 2017

Multi-message Authentication over Noisy Channel with Polar Codes.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

MESA: An Efficient Matching Scheme in Content-Based Publish/Subscribe System with Simplified Bayesian Approach.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Non-interactive deniable ring signature without random oracles.
Security and Communication Networks, 2016

Secure mobile agent-based English auction protocol using identity-based signature scheme.
IJSN, 2016

An ElGamal Encryption with Fuzzy Keyword Search on Cloud Environment.
I. J. Network Security, 2016

Anonymous Pairing-Free and Certificateless Key Exchange Protocol for DRM System.
I. J. Network Security, 2016

FRP: a fast resource placement algorithm in distributed cloud computing platform.
Concurrency and Computation: Practice and Experience, 2016

Understanding Factors That Affect Web Traffic via Twitter.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Hierarchical Random Walk Inference in Knowledge Graphs.
Proceedings of the 39th International ACM SIGIR conference on Research and Development in Information Retrieval, 2016

A deep learning-based segmentation method for brain tumor in MR images.
Proceedings of the 6th IEEE International Conference on Computational Advances in Bio and Medical Sciences, 2016

Measuring Trust in Online Social Networks.
Proceedings of the Artificial Intelligence Research and Development, 2016

Ciphertext-Policy Attribute-Based Access Control with Effective User Revocation for Cloud Data Sharing System.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

ActiveRec: A Novel Context-Sensitive Ranking Method for Active Movie Recommendation.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

Certificateless Key-Insulated Encryption: Cryptographic Primitive for Achieving Key-Escrow Free and Key-Exposure Resilience.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wireless Personal Communications, 2015

Characterization of Complex Networks for Epidemics Modeling.
Wireless Personal Communications, 2015

Revocable and Scalable Certificateless Remote Authentication Protocol With Anonymity for Wireless Body Area Networks.
IEEE Trans. Information Forensics and Security, 2015

Modeling and analysis of passive worm propagation in the P2P file-sharing network.
Simulation Modelling Practice and Theory, 2015

A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
TIIS, 2015

Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
I. J. Network Security, 2015

Cryptanalysis of Attribute-based Ring Signcryption Scheme.
I. J. Network Security, 2015

On the Security of a Provably Secure Certificate Based Ring Signature Without Pairing.
I. J. Network Security, 2015

Distance-bounding trust protocol in anonymous radio-frequency identification systems.
Concurrency and Computation: Practice and Experience, 2015

Measuring User Influence Based on Multiple Metrics on YouTube.
Proceedings of the Seventh International Symposium on Parallel Architectures, 2015

Message Authentication Code over a wiretap channel.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Network coding based cooperative device-to-device communications in the uplink of cellular network.
Proceedings of the 9th International Conference on Signal Processing and Communication Systems, 2015

Fast Community Discovery and Its Evolution Tracking in Time-Evolving Social Networks.
Proceedings of the IEEE International Conference on Data Mining Workshop, 2015

An ISP-Friendly Hierarchical Overlay for P2P Live Streaming.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Strongly Secure and Cost-Effective Certificateless Proxy Re-encryption Scheme for Data Sharing in Cloud Computing.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Wireless Device Authentication Using Acoustic Hardware Fingerprints.
Proceedings of the Big Data Computing and Communications - First International Conference, 2015

Classification of Alzheimer's disease based on the combination of morphometric feature and texture feature.
Proceedings of the 2015 IEEE International Conference on Bioinformatics and Biomedicine, 2015

2014
Fully Secure Identity Based Key-Insulated Signcryption in the Standard Model.
Wireless Personal Communications, 2014

On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol.
Wireless Personal Communications, 2014

Certificate-free ad hoc anonymous authentication.
Inf. Sci., 2014

A Provably Secure Certificate Based Ring Signature Without Pairing.
I. J. Network Security, 2014

Simultaneous community discovery and user interests extraction in social network based on probabilistic model.
IJIIDS, 2014

Analysis and improvement of a provable secure fuzzy identity-based signature scheme.
SCIENCE CHINA Information Sciences, 2014

Incorporating Language Patterns and Domain Knowledge into Feature-Opinion Extraction.
Proceedings of the Text, Speech and Dialogue - 17th International Conference, 2014

A probabilistic approach towards modeling email network with realistic features.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

An Architecture and a Platform for Recording and Replaying the Healthcare Information.
Proceedings of the Health Information Science - Third International Conference, 2014

An Improved Text Categorization Algorithm Based on VSM.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Cold-Start Mastered: LebiD1.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
Secure and Efficient LCMQ Entity Authentication Protocol.
IEEE Trans. Information Theory, 2013

SmokeGrenade: An Efficient Key Generation Protocol With Artificial Interference.
IEEE Trans. Information Forensics and Security, 2013

Community Detecting and Feature Analysis in Real Directed Weighted Social Networks.
JNW, 2013

Certificateless threshold signature secure in the standard model.
Inf. Sci., 2013

SmokeGrenade: A Key Generation Protocol with Artificial Interference in Wireless Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

A Trajectory Preserving Method Based on Semantic Anonymity Proxy.
Proceedings of the IEEE 11th International Conference on Dependable, 2013

2012
Towards high performance security policy evaluation.
The Journal of Supercomputing, 2012

An efficient conditionally anonymous ring signature in the random oracle model.
Theor. Comput. Sci., 2012

Further improvement of an identity-based signcryption scheme in the standard model.
Computers & Electrical Engineering, 2012

Accelerating pairwise statistical significance estimation for local alignment by harvesting GPU's power.
BMC Bioinformatics, 2012

Efficient and Random Oracle-Free Conditionally Anonymous Ring Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

An Optimistic Protocol for Distributed Fair Exchange.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Survey on Cloud Data Integrity Proof Techniques.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

Formal Verification of Communicating HSTM Designs.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
A co-commitment based secure data collection scheme for tiered wireless sensor networks.
Journal of Systems Architecture - Embedded Systems Design, 2011

A Certificateless Proxy Ring Signature Scheme with Provable Security.
I. J. Network Security, 2011

Efficient three-party authenticated key agreement protocol in certificateless cryptography.
Int. J. Comput. Math., 2011

Analysis of an Identity-Based Signcryption Scheme in the Standard Model.
IEICE Transactions, 2011

Cryptanalysis of an Identity Based Signcryption without Random Oracles.
Fundam. Inform., 2011

A Survey of Routing Protocols and Simulations in Delay-Tolerant Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

A New Conditionally Anonymous Ring Signature.
Proceedings of the Computing and Combinatorics - 17th Annual International Conference, 2011

2010
A Resource Allocation Algorithm in Cognitive Radio Networks Based on Cooperative Game Theory Approach.
JDCTA, 2010

A Provably Secure Proxy Signature Scheme in Certificateless Cryptography.
Informatica, Lith. Acad. Sci., 2010

Identity-based Threshold Signature Secure in the Standard Model.
I. J. Network Security, 2010

More efficient DDH pseudorandom generators.
Des. Codes Cryptogr., 2010

Efficient Modeling of Spam Images.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Efficient and Spontaneous Privacy-Preserving Protocol for Secure Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2010

Topology Preserving SOM with Transductive Confidence Machine.
Proceedings of the Discovery Science - 13th International Conference, 2010

A New Technique of Anti-tampering Technology Based on AVS Video.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

A Method to Prevent CW Sharing in DTV CAS.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Improved Distributed Framework for Worm Detection & Throttling in Mobile Peer-to-Peer Networks.
JDCTA, 2009

An Anonymous Sealed-bid Electronic Auction Based on Ring Signature.
I. J. Network Security, 2009

Golden Fish: An Intelligent Stream Cipher Fuse Memory Modules.
IACR Cryptology ePrint Archive, 2009

Secure and Efficient HB-CM Entity Authentication Protocol.
IACR Cryptology ePrint Archive, 2009

A Comment to the Intelligent Functions of Different Weight Ciphers.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

SDC: Secure Data Collection for Time Based Queries in Tiered Wireless Sensor Networks.
Proceedings of the 15th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications, 2009

DCSMS: A Mobicast-Based Dynamic Clustering Secure Mobile Multicast Scheme for Large-Scale Sensornets.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Formal Analysis for Security of Otway-Rees Protocol with BAN Logic.
Proceedings of the First International Workshop on Database Technology and Applications, 2009

Enhancing the Scale-Free Network's Attack Tolerance.
Proceedings of the Complex Sciences, 2009

2008
An Improved Certificateless Signature Scheme Secure in the Standard Model.
Fundam. Inform., 2008

HRS: A Hybrid Replication Strategy for Exhaustive P2P Search.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

DHT-assisted probabilistic exhaustive search in unstructured P2P networks.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Breaking Instance II of New TTM Cryptosystems.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Designated Verifier Proxy Signature Scheme.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Propagation Model of Active Worms in P2P Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Simulatability and Security of Certificateless Threshold Signatures without Random Oracles.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

Link Farm Spam Detection Based on its Properties.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
Efficient Multi-source Location in Unstructured P2P Systems.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

2006
IAC: Interest-Aware Caching for Unstructured P2P.
Proceedings of the 2006 International Conference on Semantics, 2006

Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Interconnected Peer-to-Peer Network: A Community Based Scheme.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2005
A Note on Secure Key Issuing in ID-based Cryptography.
IACR Cryptology ePrint Archive, 2005

2004
Policy-Tree Based Proactive Defense Model for Network Security.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Colored Petri Net Based Attack Modeling.
Proceedings of the Rough Sets, 2003

Distributing the Keys into P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

ECC Based Intrusion Tolerance for Web Security.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...