Zoe L. Jiang

According to our database1, Zoe L. Jiang
  • authored at least 41 papers between 2006 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Polynomial dictionary learning algorithms in sparse representations.
Signal Processing, 2018

Scalable graph based non-negative multi-view embedding for image ranking.
Neurocomputing, 2018

2017
Cost-effective privacy-preserving vehicular urban sensing system.
Personal and Ubiquitous Computing, 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing.
IJDSN, 2017

Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurrency and Computation: Practice and Experience, 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

2016
Key based data analytics across data centers considering bi-level resource provision in cloud computing.
Future Generation Comp. Syst., 2016

Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Dynamic Attribute-Based Access Control in Cloud Storage Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Novel Arc Segmentation Approach for Document Image Processing.
IJPRAI, 2015

Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Vehicular Technology, 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Information Processing, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Information Forensics and Security, 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

2012
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
Journal of Zhejiang University - Science C, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2009
Secure Chained Threshold Proxy Signature without and with Supervision.
JSEA, 2009

Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009

SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Improving Disk Sector Integrity Using K-Dimension Hashing.
Proceedings of the Advances in Digital Forensics IV, 2008

Chained Threshold Proxy Signature without and with Supervision.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

2006
A Key-Recovery System for Long-term Encrypted Documents.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006


  Loading...