Zoe Lin Jiang

Orcid: 0000-0002-8944-7444

According to our database1, Zoe Lin Jiang authored at least 114 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Task-Driven ADDIE-Twist Model With a Teach-Study Double-Helix Structure.
IEEE Trans. Educ., February, 2024

Updatable, Aggregatable, Succinct Mercurial Vector Commitment from Lattice.
IACR Cryptol. ePrint Arch., 2024

2023
Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments.
Neural Comput. Appl., August, 2023

Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning.
Comput. J., March, 2023

A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

Imperceptible Physical Attack against Face Recognition Systems via LED Illumination Modulation.
CoRR, 2023

State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.
CoRR, 2023

Cross-Task Physical Adversarial Attack Against Lane Detection System Based on LED Illumination Modulation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Blockchain-Assisted Privacy-Preserving Public Auditing Scheme for Cloud Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
SecMDGM: Federated Learning Security Mechanism Based on Multi-Dimensional Auctions.
Sensors, 2022

Blind reconciliation based on inverse encoding of polar codes with adaptive step sizes for quantum key distribution.
Quantum Inf. Process., 2022

Generic server-aided secure multi-party computation in cloud computing.
Comput. Stand. Interfaces, 2022

Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022

Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security.
Comput. Stand. Interfaces, 2022

Securer and Faster Privacy-Preserving Distributed Machine Learning.
CoRR, 2022

Privacy-Preserving Distributed Machine Learning Made Faster.
CoRR, 2022

MLIA: modulated LED illumination-based adversarial attack on traffic sign recognition system for autonomous vehicle.
Proceedings of the IEEE International Conference on Trust, 2022

Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption.
Proceedings of the IEEE INFOCOM 2022, 2022

Efficient Private Set Intersection Based on Functional Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Efficient Mixed-Protocol Secure Four-Party Computation with Private Robustness.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Self-supervised learning-based weight adaptive hashing for fast cross-modal retrieval.
Signal Image Video Process., 2021

Lattice-based unidirectional infinite-use proxy re-signatures with private re-signature key.
J. Comput. Syst. Sci., 2021

Privacy-preserving multikey computing framework for encrypted data in the cloud.
Inf. Sci., 2021

Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys.
Proceedings of the 8th IEEE International Conference on Cyber Security and Cloud Computing, 2021

2020
DP-FL: a novel differentially private federated learning framework for the unbalanced data.
World Wide Web, 2020

Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020

Explore instance similarity: An instance correlation based hashing method for multi-label cross-model retrieval.
Inf. Process. Manag., 2020

Coarse-to-fine two-stage semantic video carving approach in digital forensics.
Comput. Secur., 2020

Privacy-Preserving Similarity Computation in Cloud-Based Mobile Social Networks.
IEEE Access, 2020

Privacy-Preserving Computing Framework for Encrypted Data Under Multiple Keys.
Proceedings of the Smart Computing and Communication - 5th International Conference, 2020

Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition System.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Efficient quantum key distribution protocol based on classical-quantum polarized channels.
Quantum Inf. Process., 2019

Large scale product search with spatial quantization and deep ranking.
Multim. Tools Appl., 2019

HashEclat: an efficient frequent itemset algorithm.
Int. J. Mach. Learn. Cybern., 2019

Fast Eclat Algorithms Based on Minwise Hashing for Large Scale Transactions.
IEEE Internet Things J., 2019

Multi-task deep convolutional neural network for cancer diagnosis.
Neurocomputing, 2019

Outsourced privacy-preserving C4.5 decision tree algorithm over horizontally and vertically partitioned dataset among multiple parties.
Clust. Comput., 2019

A Secure Decentralized Trustless E-Voting System Based on Smart Contract.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Lattice-Based Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the Provable Security, 2019

SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique.
Proceedings of the Network and System Security - 13th International Conference, 2019

A New Robust and Reversible Watermarking Technique Based on Erasure Code.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

RGB-D tracker under Hierarchical structure.
Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering & Economics, 2019

2018
Securely Outsourcing ID3 Decision Tree in Cloud Computing.
Wirel. Commun. Mob. Comput., 2018

Polynomial dictionary learning algorithms in sparse representations.
Signal Process., 2018

Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
J. Netw. Comput. Appl., 2018

Scalable graph based non-negative multi-view embedding for image ranking.
Neurocomputing, 2018

Outsourcing privacy-preserving ID3 decision tree over horizontally partitioned data for multiple parties.
Int. J. High Perform. Comput. Netw., 2018

Quantum solution for secure information transmission of wearable devices.
Int. J. Distributed Sens. Networks, 2018

A sensitive information protection scheme in wearable devices based on quantum entanglement.
Int. J. Distributed Sens. Networks, 2018

Decision Tree Based Approaches for Detecting Protein Complex in Protein Protein Interaction Network (PPI) via Link and Sequence Analysis.
IEEE Access, 2018

A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

File Fragment Classification Using Grayscale Image Conversion and Deep Learning in Digital Forensics.
Proceedings of the 2018 IEEE Security and Privacy Workshops, 2018

Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

An Improvement of PAA on Trend-Based Approximation for Time Series.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

An Efficient Multi-keyword Searchable Encryption Supporting Multi-user Access Control.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Outsourced Privacy Preserving SVM with Multiple Keys.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Cost-effective privacy-preserving vehicular urban sensing system.
Pers. Ubiquitous Comput., 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

An efficient secure Internet of things data storage auditing protocol with adjustable parameter in cloud computing.
Int. J. Distributed Sens. Networks, 2017

Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurr. Comput. Pract. Exp., 2017

Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks Analytics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Mining inter-transaction association rules from multiple time-series data.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Feature selection for high dimensional imbalanced class data based on F-measure optimization.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

A novel privacy-preserving distributed anomaly detection method.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

EHSBoost: Enhancing ensembles for imbalanced data-sets by evolutionary hybrid-sampling.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

White-box traceable dynamic attribute based encryption.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Cancer classification with multi-task deep learning.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Lattice-based proxy signature scheme with reject sampling method.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Attribute-based queries over outsourced encrypted database.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Outsourced Privacy-Preserving Random Decision Tree Algorithm Under Multiple Parties for Sensor-Cloud Integration.
Proceedings of the Information Security Practice and Experience, 2017

Semantic Video Carving Using Perceptual Hashing and Optical Flow.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Outsourced Privacy-Preserving C4.5 Algorithm over Arbitrarily Partitioned Databases.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Attribute-Based Encryption Scheme Supporting Decryption Outsourcing and Attribute Revocation in Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Privacy-Preserving ID3 Data Mining over Encrypted Data in Outsourced Environments with Multiple Keys.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Secure Dot Product of Outsourced Encrypted Vectors and its Application to SVM.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

Timeline Analysis for Digital Evidence on MTK-Based Shanzhai Mobile Phone.
Proceedings of the Mobile Security and Privacy, 2017

2016
Key based data analytics across data centers considering bi-level resource provision in cloud computing.
Future Gener. Comput. Syst., 2016

Capacity-achieving and Flicker-free FEC coding scheme for Dimmable Visible Light Communication Based on Polar Codes.
CoRR, 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Dynamic Attribute-Based Access Control in Cloud Storage Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Key based Reducer Placement for Data Analytics across Data Centers Considering Bi-level Resource Provision in Cloud Computing.
Proceedings of the International Conference on Internet of Things and Big Data, 2016

A Revocable Outsourcing Attribute-Based Encryption Scheme.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

Generic Construction of Publicly Verifiable Predicate Encryption.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A Novel Arc Segmentation Approach for Document Image Processing.
Int. J. Pattern Recognit. Artif. Intell., 2015

Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Veh. Technol., 2014

Improved key integrity checking for high-speed quantum key distribution using combinatorial group testing with strongly selective family design.
Quantum Inf. Process., 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

2013
Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data.
IEEE Trans. Inf. Forensics Secur., 2013

Photo Forensics on Shanzhai Mobile Phone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2013

2012
Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.
Proceedings of the Advances in Digital Forensics VIII, 2012

2011
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics.
J. Zhejiang Univ. Sci. C, 2011

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

2009
Secure Chained Threshold Proxy Signature without and with Supervision.
J. Softw. Eng. Appl., 2009

Two Efficient Proxy Signature Schemes for Delegation Chains with Nonrepudiation and Untraceability.
Proceedings of the 2009 International Conference on Security & Management, 2009

SPECS: Secure and Privacy Enhancing Communications Schemes for VANETs.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Protecting Digital Legal Professional Privilege (LPP) Data.
Proceedings of the Third International Workshop on Systematic Approaches to Digital Forensic Engineering, 2008

Improving Disk Sector Integrity Using K-Dimension Hashing.
Proceedings of the Advances in Digital Forensics IV, 2008

Chained Threshold Proxy Signature without and with Supervision.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme.
Proceedings of the Future Generation Communication and Networking, 2007

2006
A Key-Recovery System for Long-term Encrypted Documents.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006


  Loading...