Zhiyin Kong

According to our database1, Zhiyin Kong authored at least 6 papers between 2014 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity.
Int. J. Inf. Sec., 2020

2019
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019

Data Rate Trading in Mobile Networks: A Truthful Online Auction Approach.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2016
Key recovery attack for PRESENT using slender-set linear cryptanalysis.
Sci. China Inf. Sci., 2016

2015
On Compact Cauchy Matrices for Substitution-Permutation Networks.
IEEE Trans. Computers, 2015

2014
Know by a handful the whole sack: efficient sampling for top-k influential user identification in large graphs.
World Wide Web, 2014


  Loading...