default search action
Yuan Zhang 0006
Person information
- affiliation: University of Electronic Science and Technology of China, Center for Cyber Security, Chengdu, China
Other persons with the same name
- Yuan Zhang (aka: Yu-an Zhang, Yuan-Zhang) — disambiguation page
- Yuan Zhang 0001 — Massachusetts Institute of Technology, Cambridge, MA, USA
- Yuan Zhang 0002 — Southeast University, National Mobile Communications Research Laboratory, Nanjing, China
- Yuan Zhang 0003 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Yuan Zhang 0004 — Nanjing University, State Key Laboratory for Novel Software Technology, China (and 1 more)
- Yuan Zhang 0005 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Yuan Zhang 0007 — Southwest University, College of Electronic and Information Engineering, Chongqing, China (and 1 more)
- Yuan Zhang 0008 — Arizona State University, Tempe, AZ, USA
- Yuan Zhang 0009 — Fudan University, China
- Yuan Zhang 0010 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China (and 1 more)
- Yuan Zhang 0011 — University of New South Wales, School of Electrical Engineering and Telecommunications, Sydney, NSW, Australia
- Yuan Zhang 0012 — University of Texas at Dallas, Naveen Jindal School of Management, Richardson, TX, USA
- Yuan Zhang 0013 — Communication University of China, Beijing, China (and 1 more)
- Yuan Zhang 0014 — Chinese Academy and Sciences, Graduate School, China (and 1 more)
- Yuan Zhang 0015 — Westlake University, School of Engineering, Hangzhou, China (and 2 more)
- Yuan Zhang 0016 — Beijing Institute of Technology, School of Automation, China (and 1 more)
- Yuan Zhang 0017 — China University of Geosciences, Beijing, China
- Yuan Zhang 0018 — South China University of Technology, School of Mechanical and Automotive Engineering, Guangzhou, China
- Yuan Zhang 0019 — Southeast University, Key Laboratory of New Generation Artificial Intelligence Technology and Its Interdisciplinary Applications, Nanjing, China
- Yuan Zhang 0020 — Peking University, Center on Frontiers of Computing Studies, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j48]Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang:
EpiOracle: Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics. Proc. Priv. Enhancing Technol. 2025(1): 361-378 (2025) - 2024
- [j47]Jie Zhao, Hejiao Huang, Daojing He, Xiaojun Zhang, Yuan Zhang, Kim-Kwang Raymond Choo:
IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage. IEEE Internet Things J. 11(16): 27214-27231 (2024) - [j46]Weijia Li, Yuan Zhang, Xinyu He, Yaqing Song:
Secure and efficient covert communication for blockchain-integrated SAGINs. Secur. Saf. 3: 2024006 (2024) - [j45]Shiyu Li, Yuan Zhang, Yaqing Song, Nan Cheng, Kan Yang, Hongwei Li:
Blockchain-Based Portable Authenticated Data Transmission for Mobile Edge Computing: A Universally Composable Secure Solution. IEEE Trans. Computers 73(4): 1114-1125 (2024) - [j44]Yaqing Song, Chunxiang Xu, Yuan Zhang, Shiyu Li:
Hardening Password-Based Credential Databases. IEEE Trans. Inf. Forensics Secur. 19: 469-484 (2024) - [j43]Ge Gao, Yuan Zhang, Yaqing Song, Shiyu Li:
PrivSSO: Practical Single-Sign-On Authentication Against Subscription/Access Pattern Leakage. IEEE Trans. Inf. Forensics Secur. 19: 5075-5089 (2024) - [j42]Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Dahai Tao, Hongwei Li, Kan Yang:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. IEEE Trans. Inf. Forensics Secur. 19: 6425-6440 (2024) - [j41]Rui Zhang, Hongwei Li, Luoding Tian, Meng Hao, Yuan Zhang:
Vertical Federated Learning Across Heterogeneous Regions for Industry 4.0. IEEE Trans. Ind. Informatics 20(8): 10145-10155 (2024) - [j40]Haiyang Zhang, Xiaojun Zhang, Yuan Zhang, Xin Wang, Qing Liu:
Blockchain-Based Proxy-Oriented Data Integrity Checking Mechanism in Cloud-Assisted Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 25(11): 17366-17381 (2024) - [c18]Xinyu He, Yuan Zhang, Yaqing Song, Nan Cheng, Kan Yang:
STAGE: Secure and Efficient Data Delivery for Exchange-Assisted Data Marketplaces. ICC 2024: 1-6 - [c17]Yali Wang, Yuan Zhang, Yaqing Song, Nan Cheng, Kan Yang:
PPoD: Practical Proofs of Dealership for Authorized Data Trading. ICC 2024: 1340-1345 - [c16]Meng Hao, Hanxiao Chen, Hongwei Li, Chenkai Weng, Yuan Zhang, Haomiao Yang, Tianwei Zhang:
Scalable Zero-knowledge Proofs for Non-linear Functions in Machine Learning. USENIX Security Symposium 2024 - [c15]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Instruction Backdoor Attacks Against Customized LLMs. USENIX Security Symposium 2024 - [i4]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization. CoRR abs/2402.09179 (2024) - 2023
- [j39]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Anjia Yang, Xinsheng Wen, Kefei Chen:
Backdoor-Resistant Public Data Integrity Verification Scheme Based on Smart Contracts. IEEE Internet Things J. 10(16): 14269-14284 (2023) - [j38]Yaqing Song, Yuan Zhang, Chunxiang Xu, Shiyu Li, Anjia Yang, Nan Cheng:
Edge-Cloud-Assisted Certificate Revocation Checking: An Efficient Solution Against Irresponsible Service Providers. IEEE Internet Things J. 10(17): 15563-15580 (2023) - [j37]Md. Jakir Hossain, Chunxiang Xu, Yuan Zhang, Xiaojun Zhang, Wanpeng Li:
LAMA: A secure lattice-based authentication scheme for cloud storage against misbehaved private key generator. J. Ambient Intell. Humaniz. Comput. 14(7): 8613-8629 (2023) - [j36]Shiyu Li, Yuan Zhang, Chunxiang Xu, Nan Cheng, Zhi Liu, Yicong Du, Xuemin Shen:
HealthFort: A Cloud-Based eHealth System With Conditional Forward Transparency and Secure Provenance via Blockchain. IEEE Trans. Mob. Comput. 22(11): 6508-6525 (2023) - [j35]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Kefei Chen:
Blockchain-Based Transparent Integrity Auditing and Encrypted Deduplication for Cloud Storage. IEEE Trans. Serv. Comput. 16(1): 134-146 (2023) - [c14]Xinyu He, Yuan Zhang, Shiyu Li, Yaqing Song, Hongwei Li:
Privacy-Driven Fine-Grained Data Trading. PIMRC 2023: 1-6 - [i3]Shiyu Li, Yuan Zhang, Yaqing Song, Hongbo Liu, Nan Cheng, Hongwei Li, Dahai Tao, Kan Yang:
Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data Delivery. IACR Cryptol. ePrint Arch. 2023: 1775 (2023) - [i2]Shiyu Li, Yuan Zhang, Yaqing Song, Fan Wu, Feng Lyu, Kan Yang, Qiang Tang:
Privacy-Preserving Cross-Facility Early Warning for Unknown Epidemics. IACR Cryptol. ePrint Arch. 2023: 1779 (2023) - [i1]Yuan Zhang, Yaqing Song, Shiyu Li, Weijia Li, Zeqi Lai, Qiang Tang:
There Is Always a Way Out! Destruction-Resistant Key Management: Formal Definition and Practical Instantiation. IACR Cryptol. ePrint Arch. 2023: 1785 (2023) - 2022
- [j34]Shanshan Li, Chunxiang Xu, Yuan Zhang, Yicong Du, Xinsheng Wen, Kefei Chen, Jianfeng Ma:
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems. IEEE Syst. J. 16(2): 3096-3107 (2022) - [j33]Xiaojun Zhang, Wei Tang, Dawu Gu, Yuan Zhang, Jingting Xue, Xin Wang:
Lightweight Multidimensional Encrypted Data Aggregation Scheme With Fault Tolerance for Fog-Assisted Smart Grids. IEEE Syst. J. 16(4): 6647-6657 (2022) - [j32]Yuan Zhang, Chunxiang Xu, Nan Cheng, Xuemin Shen:
Secure Password-Protected Encryption Key for Deduplicated Cloud Storage Systems. IEEE Trans. Dependable Secur. Comput. 19(4): 2789-2806 (2022) - [j31]Xiaojun Zhang, Chao Huang, Yuan Zhang, Sheng Cao:
Enabling Verifiable Privacy-Preserving Multi-Type Data Aggregation in Smart Grids. IEEE Trans. Dependable Secur. Comput. 19(6): 4225-4239 (2022) - [j30]Shanshan Li, Chunxiang Xu, Yuan Zhang, Jianying Zhou:
A Secure Two-Factor Authentication Scheme From Password-Protected Hardware Tokens. IEEE Trans. Inf. Forensics Secur. 17: 3525-3538 (2022) - [j29]Xiaojun Zhang, Jie Zhao, Chunxiang Xu, Huaxiong Wang, Yuan Zhang:
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage. IEEE Trans. Serv. Comput. 15(1): 334-345 (2022) - [c13]Rui Zhang, Hongwei Li, Meng Hao, Hanxiao Chen, Yuan Zhang:
Secure Feature Selection for Vertical Federated Learning in eHealth Systems. ICC 2022: 1257-1262 - [c12]Shiyu Li, Yuan Zhang, Nan Cheng, Yaqing Song:
Badge: Blockchain-Assisted Secure Authenticated Data Transmission in Mobile Edge Computing. ICC 2022: 4757-4762 - 2021
- [j28]Sheng Cao, Sixuan Dang, Yuan Zhang, Wei Wang, Nan Cheng:
A blockchain-based access control and intrusion detection framework for satellite communication systems. Comput. Commun. 172: 216-225 (2021) - [j27]Xiaojun Zhang, Chao Huang, Chunxiang Xu, Yuan Zhang, Jingwei Zhang, Huaxiong Wang:
Key-Leakage Resilient Encrypted Data Aggregation With Lightweight Verification in Fog-Assisted Smart Grids. IEEE Internet Things J. 8(10): 8234-8245 (2021) - [j26]Changsong Jiang, Chunxiang Xu, Yuan Zhang:
PFLM: Privacy-preserving federated learning with membership proof. Inf. Sci. 576: 288-311 (2021) - [j25]Yaqing Song, Chunxiang Xu, Yuan Zhang, Fagen Li:
Comments on an identity-based signature scheme for VANETs. J. Syst. Archit. 112: 101851 (2021) - [j24]Yuan Zhang, Chunxiang Xu, Xiaodong Lin, Xuemin Shen:
Blockchain-Based Public Integrity Verification for Cloud Storage against Procrastinating Auditors. IEEE Trans. Cloud Comput. 9(3): 923-937 (2021) - [j23]Yuan Zhang, Chunxiang Xu, Jianbing Ni, Hongwei Li, Xuemin Sherman Shen:
Blockchain-Assisted Public-Key Encryption with Keyword Search Against Keyword Guessing Attacks for Cloud Storage. IEEE Trans. Cloud Comput. 9(4): 1335-1348 (2021) - [j22]Xiaojun Zhang, Jie Zhao, Chunxiang Xu, Hongwei Li, Huaxiong Wang, Yuan Zhang:
CIPPPA: Conditional Identity Privacy-Preserving Public Auditing for Cloud-Based WBANs Against Malicious Auditors. IEEE Trans. Cloud Comput. 9(4): 1362-1375 (2021) - [j21]Xiaojun Zhang, Chunxiang Xu, Huaxiong Wang, Yuan Zhang, Shixiong Wang:
FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things. IEEE Trans. Dependable Secur. Comput. 18(3): 1019-1032 (2021) - [j20]Shiyu Li, Yuan Zhang, Chunxiang Xu, Kefei Chen:
Cryptoanalysis of an Authenticated Data Structure Scheme With Public Privacy-Preserving Auditing. IEEE Trans. Inf. Forensics Secur. 16: 2564-2565 (2021) - [j19]Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Nan Cheng, Xuemin Shen:
PROTECT: Efficient Password-Based Threshold Single-Sign-On Authentication for Mobile Users against Perpetual Leakage. IEEE Trans. Mob. Comput. 20(6): 2297-2312 (2021) - [c11]Yaqing Song, Chunxiang Xu, Yuan Zhang, Nan Cheng:
Privacy-Preserving Friend Matching for Mobile Social Networks. GLOBECOM 2021: 1-6 - [c10]Yicong Du, Chunxiang Xu, Yuan Zhang:
A Blockchain-based Online Transaction System for Physical Products Trading with Fairness, Privacy Preservation, and Auditability. iSCI 2021: 15-22 - [c9]Shiyu Li, Yuan Zhang, Chunxiang Xu, Nan Cheng, Zhi Liu, Xuemin Sherman Shen:
BESURE: Blockchain-Based Cloud-Assisted eHealth System with Secure Data Provenance. IWQoS 2021: 1-6 - 2020
- [b1]Yuan Zhang, Chunxiang Xu, Xuemin Sherman Shen:
Data Security in Cloud Storage. Wireless Networks, Springer 2020, ISBN 978-981-15-4373-9, pp. 1-171 - [j18]Xiaojun Zhang, Chao Huang, Yuan Zhang, Jingwei Zhang, Jie Gong:
LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs. IEEE Access 8: 54402-54414 (2020) - [j17]Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen:
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation. Int. J. Inf. Sec. 19(6): 711-720 (2020) - [j16]Huige Wang, Kefei Chen, Yuan Zhang, Yunlei Zhao:
Functional encryption with application to machine learning: simple conversions from generic functions to quadratic functions. Peer-to-Peer Netw. Appl. 13(6): 2334-2341 (2020) - [j15]Yuan Zhang, Chunxiang Xu, Nan Cheng, Hongwei Li, Haomiao Yang, Xuemin Shen:
Chronos$^{{\mathbf +}}$+: An Accurate Blockchain-Based Time-Stamping Scheme for Cloud Storage. IEEE Trans. Serv. Comput. 13(2): 216-229 (2020) - [c8]Shanshan Li, Chunxiang Xu, Yuan Zhang, Anjia Yang, Xinsheng Wen, Kefei Chen:
Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious Auditors. Inscrypt 2020: 202-220 - [c7]Guowen Xu, Hongwei Li, Yuan Zhang, Xiaodong Lin, Robert H. Deng, Xuemin Shen:
A Deep Learning Framework Supporting Model Ownership Protection and Traitor Tracing. ICPADS 2020: 438-446 - [c6]Shanshan Li, Chunxiang Xu, Yuan Zhang, Xinsheng Wen:
Multi-user Dynamic Symmetric Searchable Encryption for Attribute-Value Type Database in Cloud Storage. SPDE 2020: 355-368
2010 – 2019
- 2019
- [j14]Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen:
An efficient \(\mathcal{iO}\) -based data integrity verification scheme for cloud storage. Sci. China Inf. Sci. 62(5): 59101:1-59101:3 (2019) - [j13]Huige Wang, Yuan Zhang, Kefei Chen, Guangye Sui, Yunlei Zhao, Xinyi Huang:
Functional broadcast encryption with applications to data sharing for cloud storage. Inf. Sci. 502: 109-124 (2019) - [j12]Shanshan Li, Chunxiang Xu, Yuan Zhang:
CSED: Client-Side encrypted deduplication scheme based on proofs of ownership for cloud storage. J. Inf. Secur. Appl. 46: 250-258 (2019) - [c5]Yuan Zhang, Chunxiang Xu, Nan Cheng, Xuemin Shen:
Secure Encrypted Data Deduplication for Cloud Storage against Compromised Key Servers. GLOBECOM 2019: 1-6 - [c4]Yuan Zhang, Chunxiang Xu, Hongwei Li, Haomiao Yang, Xuemin Sherman Shen:
Chronos: Secure and Accurate Time-Stamping Scheme for Digital Files via Blockchain. ICC 2019: 1-6 - 2018
- [j11]Tingting Fu, Peng Liu, Yue Ding, Yuan Zhang:
Secure and Efficient Large Content Broadcasting in Mobile Social Networks. IEEE Access 6: 42108-42118 (2018) - [j10]Lixue Sun, Chunxiang Xu, Yuan Zhang:
A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting. J. Inf. Secur. Appl. 40: 145-155 (2018) - [j9]Jingting Xue, Chunxiang Xu, Yuan Zhang:
Private Blockchain-Based Secure Access Control for Smart Home Systems. KSII Trans. Internet Inf. Syst. 12(12): 6057-6078 (2018) - [j8]Yuan Zhang, Chunxiang Xu, Hongwei Li, Kan Yang, Jianying Zhou, Xiaodong Lin:
HealthDep: An Efficient and Secure Deduplication Scheme for Cloud-Assisted eHealth Systems. IEEE Trans. Ind. Informatics 14(9): 4101-4112 (2018) - [c3]Jingting Xue, Chunxiang Xu, Yuan Zhang, Lanhua Bai:
DStore: A Distributed Cloud Storage System Based on Smart Contracts and Blockchain. ICA3PP (3) 2018: 385-401 - [c2]Yuan Zhang, Xiaodong Lin, Chunxiang Xu:
Blockchain-Based Secure Data Provenance for Cloud Storage. ICICS 2018: 3-19 - 2017
- [j7]Xiaojun Zhang, Chunxiang Xu, Yuan Zhang:
Fuzzy identity-based signature scheme from lattice and its application in biometric authentication. KSII Trans. Internet Inf. Syst. 11(5): 2762-2777 (2017) - [j6]Yuan Zhang, Chunxiang Xu, Xiaohui Liang, Hongwei Li, Yi Mu, Xiaojun Zhang:
Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation. IEEE Trans. Inf. Forensics Secur. 12(3): 676-688 (2017) - [j5]Xiaojun Zhang, Chunxiang Xu, Yuan Zhang, Chunhua Jin:
Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks. Wirel. Pers. Commun. 96(2): 1819-1833 (2017) - 2016
- [j4]Yuan Zhang, Chunxiang Xu, Hongwei Li, Xiaohui Liang:
Cryptographic Public Verification of Data Integrity for Cloud Storage Systems. IEEE Cloud Comput. 3(5): 44-52 (2016) - 2015
- [j3]Yuan Zhang, Chunxiang Xu, Jining Zhao, Xiaojun Zhang, Junwei Wen:
Cryptanalysis of an integrity checking scheme for cloud data sharing. J. Inf. Secur. Appl. 23: 68-73 (2015) - [j2]Yuan Zhang, Chunxiang Xu, Shui Yu, Hongwei Li, Xiaojun Zhang:
SCLPV: Secure Certificateless Public Verification for Cloud-Based Cyber-Physical-Social Systems Against Malicious Auditors. IEEE Trans. Comput. Soc. Syst. 2(4): 159-170 (2015) - 2014
- [j1]Chunxiang Xu, Yuan Zhang, Yong Yu, Xiaojun Zhang, Junwei Wen:
An Efficient Provable Secure Public Auditing Scheme for Cloud Storage. KSII Trans. Internet Inf. Syst. 8(11): 4226-4241 (2014) - 2011
- [c1]Xinghua Li, Lingjuan Deng, Yuan Zhang, Dan Yang, Jianfeng Ma:
Analysis of the Authentication Protocols Based on Game Theory. CIS 2011: 788-792
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-14 22:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint