Zhuolin Mei

According to our database1, Zhuolin Mei authored at least 16 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional Data.
Int. J. Web Serv. Res., 2024

2023
An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2023

A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data.
Proceedings of the Edge Computing - EDGE 2023, 2023

A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

HMGR: A Hybrid Model for Geolocation Recommendation.
Proceedings of the Big Data - BigData 2023, 2023

2022
PLDANet: Reasonable Combination of PCA and LDA Convolutional Networks.
Int. J. Comput. Commun. Control, March, 2022

2021
Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario.
Wirel. Commun. Mob. Comput., 2021

2020
Robust object tracking based on ridge regression and multi-scale local sparse coding.
Multim. Tools Appl., 2020

Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment.
IEEE Access, 2020

2019
Visual object tracking with discriminative correlation filtering and hybrid color feature.
Multim. Tools Appl., 2019

Secure and Efficient Adjacency Search Supporting Synonym Query on Encrypted Graph in the Cloud.
IEEE Access, 2019

2018
Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud.
Inf. Sci., 2018

2017
Fuzzy Keyword Search Method over Ciphertexts supporting Access Control.
KSII Trans. Internet Inf. Syst., 2017

Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Identity-based key management for cloud computing.
Secur. Commun. Networks, 2016


  Loading...