Zhiyan Xu

Orcid: 0000-0002-8443-8282

According to our database1, Zhiyan Xu authored at least 17 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Sanitizable signature scheme with privacy protection for electronic medical data sharing.
Cyber Secur. Appl., December, 2023

Certificateless Public Auditing Scheme With Data Privacy and Dynamics in Group User Model of Cloud-Assisted Medical WSNs.
IEEE J. Biomed. Health Informatics, May, 2023

2022
Learning Two-Stream CNN for Multi-Modal Age-Related Macular Degeneration Categorization.
IEEE J. Biomed. Health Informatics, 2022

2021
Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021

2020
Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios.
Wirel. Commun. Mob. Comput., 2020

Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Secur. Commun. Networks, 2020

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020

2019
Two-Stream CNN with Loose Pair Training for Multi-modal AMD Categorization.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

2018
New Certificateless Aggregate Signature Scheme for Healthcare Multimedia Social Network on Cloud Environment.
Secur. Commun. Networks, 2018

Deterministic remote preparation of arbitrary multi-qubit equatorial states via two-qubit entangled states.
Quantum Inf. Process., 2018

Probabilistic teleportation via multi-parameter measurements and partially entangled states.
Quantum Inf. Process., 2018

2017
A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
J. Supercomput., 2017

Security analysis of a publicly verifiable data possession scheme for remote storage.
J. Supercomput., 2017

2016
Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message.
Proceedings of the Provable Security, 2016

2013
Fault Detection Filter Design for Certain Networked Control System.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2013

2006
Fault Detection Filter Design For Networked Control System With Communication Delays.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006


  Loading...