Zhongyuan Qin

Orcid: 0000-0002-7887-7203

According to our database1, Zhongyuan Qin authored at least 17 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
LN-PCA: Differential Privacy Protection of Medical Data Based on Principal Component Analysis Adding Laplace Noise.
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023

MODGF: Multi-Objective Optimization Approach for Directed Greybox Fuzzing.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Efficient fuzzing testcases generation based on SAGAN.
Proceedings of the 2023 International Conference on Communication Network and Machine Learning, 2023

2022
Smart Grid Data Aggregation Scheme Based on Local Differential Privacy.
Proceedings of the IEEE International Conference on Trust, 2022

VecSeeds: Generate fuzzing testcases from latent vectors based on VAE-GAN.
Proceedings of the IEEE International Conference on Trust, 2022

VulMiningBGS: Detection of overflow vulnerabilities based on graph similarity.
Proceedings of the 18th International Conference on Computational Intelligence and Security, 2022

2021
Security Analysis of Embedded SIM Remote Provisioning Protocol Using SPIN.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

ERGA: An Effective Region Gradient Algorithm for Adversarial Example Generation.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

Formal Analysis and Verification of Embedded SIM Session Key Agreement Protocol.
Proceedings of the EITCE 2021: 5th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, October 22, 2021

2015
An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2014
An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter.
Sensors, 2014

A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Novel Key Pre-distribution Scheme in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Novel Identity-Based Security Scheme for Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2011
Multimedia storage security in cloud computing: An overview.
Proceedings of the IEEE 13th International Workshop on Multimedia Signal Processing (MMSP 2011), 2011

2004
Semantic repository modeling in image database.
Proceedings of the 2004 IEEE International Conference on Multimedia and Expo, 2004

2003
A 3D Modeling Scheme for Cerebral Vasculature from MRA Datasets.
Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 2003


  Loading...