default search action
Jindan Zhang
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Jiasen Liu, Xu An Wang, Guofeng Li, Dan Yu, Jindan Zhang:
Improved secure PCA and LDA algorithms for intelligent computing in IoT-to-cloud setting. Comput. Intell. 40(1) (2024) - 2023
- [j27]Yun Xie, Peng Li, Nadia Nedjah, Brij B. Gupta, David Taniar, Jindan Zhang:
Privacy protection framework for face recognition in edge-based Internet of Things. Clust. Comput. 26(5): 3017-3035 (2023) - [j26]Yuanyou Cui, Yunxuan Su, Zheng Tu, Jindan Zhang:
Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage. Int. J. Grid Util. Comput. 14(5): 469-479 (2023) - [j25]Shuanggen Liu, Haozhe Qin, David Taniar, Wandi Liu, Yuanjun Li, Jindan Zhang:
A certificate-based proxy re-encryption plus scheme for secure medical data sharing. Internet Things 23: 100836 (2023) - [c15]Xu An Wang, Xindi Ma, Zhiwei Zhang, Jindan Zhang:
On the Security of a Cloud Auditing Storage Protocol. INCoS 2023: 234-243 - [c14]Mingyu Zhou, Xu An Wang, Xiong Zhang, Xiaoxuan Xu, Jindan Zhang, PengLin Li:
An Improved Data Integrity Verification Scheme for Cloud Storage. INCoS 2023: 393-401 - 2022
- [j24]Jianghao Yin, Na Deng, Jindan Zhang:
Wireless Sensor Network coverage optimization based on Yin-Yang pigeon-inspired optimization algorithm for Internet of Things. Internet Things 19: 100546 (2022) - [j23]Kaiyang Zhao, Xu An Wang, Bo Yang, Youliang Tian, Jindan Zhang:
A privacy preserving homomorphic computing toolkit for predictive computation. Inf. Process. Manag. 59(2): 102880 (2022) - [j22]He Xu, Mingtao Guo, Nadia Nedjah, Jindan Zhang, Peng Li:
Vehicle and Pedestrian Detection Algorithm Based on Lightweight YOLOv3-Promote and Semi-Precision Acceleration. IEEE Trans. Intell. Transp. Syst. 23(10): 19760-19771 (2022) - 2021
- [j21]Yun Xie, Peng Li, Jindan Zhang, Marek R. Ogiela:
Differential privacy distributed learning under chaotic quantum particle swarm optimization. Computing 103(3): 449-472 (2021) - [j20]Weijun Chen, Urszula Ogiela, Jindan Zhang:
Customer-oriented sales modeling strategy in a big data environment. Concurr. Comput. Pract. Exp. 33(19) (2021) - [j19]Jindan Zhang, Chuan Lin, Urszula Ogiela, Nadia Nedjah, Arun Kumar Sangaiah, Xuan Wang:
Improved publicly verifiable auditing protocol for cloud storage. Concurr. Comput. Pract. Exp. 33(23) (2021) - [j18]Shuai Xiao, Han Wang, Jindan Zhang:
New digital signature algorithm based on ECC and its application in bitcoin and IoT. Int. J. High Perform. Syst. Archit. 10(1): 20-31 (2021) - [j17]Jindan Zhang, Rongxing Lu, Baocang Wang, Xu An Wang:
Comments on "Privacy-Preserving Public Auditing Protocol for Regenerating-Code-Based Cloud Storage". IEEE Trans. Inf. Forensics Secur. 16: 1288-1289 (2021) - [c13]Xu An Wang, Yunxuan Su, Jindan Zhang:
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes. NaNA 2021: 278-281 - 2020
- [j16]Jindan Zhang, Baocang Wang, Marek R. Ogiela, Xu An Wang, Arun Kumar Sangaiah:
New public auditing protocol based on homomorphic tags for secure cloud storage. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j15]Jindan Zhang, Baocang Wang, Xu An Wang, Han Wang, Shuai Xiao:
New group user based privacy preserving cloud auditing protocol. Future Gener. Comput. Syst. 106: 585-594 (2020) - [j14]Jindan Zhang, Zhihu Li, Baocang Wang, Xu An Wang, Urszula Ogiela:
Enhanced Certificateless Auditing Protocols for Cloud Data Management and Transformative Computation. Inf. Process. Manag. 57(6): 102287 (2020)
2010 – 2019
- 2019
- [j13]Xu An Wang, Yudong Liu, Arun Kumar Sangaiah, Jindan Zhang:
Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting. Computing 101(7): 773-790 (2019) - [j12]Jindan Zhang, Baocang Wang:
An improved public auditing protocol for cloud storage integrity checking. Int. J. Web Grid Serv. 15(3): 282-303 (2019) - [j11]Jindan Zhang, Baocang Wang, Fatos Xhafa, Xu An Wang, Cong Li:
Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J. Ambient Intell. Humaniz. Comput. 10(2): 429-438 (2019) - [j10]Jindan Zhang, Baocang Wang, Debiao He, Xu An Wang:
Improved secure fuzzy auditing protocol for cloud data storage. Soft Comput. 23(10): 3411-3422 (2019) - 2018
- [j9]Xu An Wang, Yudong Liu, Jindan Zhang, Xiaoyuan Yang, Minqing Zhang:
Improved group-oriented proofs of cloud storage in IoT setting. Concurr. Comput. Pract. Exp. 30(21) (2018) - [j8]Jindan Zhang, Baocang Wang:
An Improved Secure Cloud Storage Auditing Protocol Based on Distributed String Equality Checking. Fundam. Informaticae 157(1-2): 185-199 (2018) - [c12]Wenwu Chen, Su Yang, Xu An Wang, Wei Zhang, Jindan Zhang:
Network Malicious Behavior Detection Using Bidirectional LSTM. CISIS 2018: 627-635 - [c11]Yun Wang, Xu An Wang, Jindan Zhang, Chenghai Yu:
Combining Vector Space Features and Convolution Neural Network for Text Sentiment Analysis. CISIS 2018: 780-790 - [c10]Yanyu Duan, Xu An Wang, Fang Li, Jindan Zhang:
Coupling Relationship Construction of Key Elements in Emergency Intelligence with Big Data. CISIS 2018: 1069-1076 - [c9]Xu An Wang, Jindan Zhang, Guangming Wu, Chenghai Yu:
Improved Functional Encryption Schemes by Using Novel Techniques. INCoS 2018: 437-444 - 2017
- [c8]Jindan Zhang, Baocang Wang, Xu An Wang:
Improved Online/Offline Attribute Based Encryption and More. EIDWT 2017: 603-610 - [c7]Xu An Wang, Xiaoshuang Luo, Jindan Zhang, Xiaoyuan Yang:
On the Security of a Cloud Data Storage Auditing Protocol IPAD. EIDWT 2017: 611-617 - 2016
- [c6]Jindan Zhang, Baocang Wang:
On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing. 3PGCIC 2016: 405-413 - 2015
- [c5]Jindan Zhang, Xu An Wang, Jianfeng Ma:
Data Owner Based Attribute Based Encryption. INCoS 2015: 144-148 - 2013
- [j7]Jindan Zhang, Xu An Wang, Yi Ding, Xiaoyuan Yang:
On the security of two multi-use CCA-secure proxy re-encryption schemes. Int. J. Intell. Inf. Database Syst. 7(5): 422-440 (2013) - [j6]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG. J. Comput. 8(5): 1230-1239 (2013) - [j5]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Identity Based Proxy Re-encryption From BB1 IBE. J. Comput. 8(6): 1618-1626 (2013) - [j4]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Hybrid Proxy Re-encryption Between IBE And CBE. J. Comput. 8(7): 1873-1881 (2013) - [j3]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
Analysis and Improvements of Several (H)IBS/IBSC/PRBE Schemes. J. Comput. 8(9): 2304-2312 (2013) - [j2]Jindan Zhang, Xu An Wang, Xiaoyuan Yang:
DDos Attack against Proxy in PRE and PRS. J. Softw. 8(3): 617-626 (2013) - [c4]Jindan Zhang, Xu An Wang:
Yet Another Way to Construct Digital Signature in the Standard Model. INCoS 2013: 430-433 - [c3]Jindan Zhang, Xu An Wang:
New Construction of PVPKE Scheme Based on Signed Quadratic Residues. INCoS 2013: 434-437 - 2012
- [c2]Jindan Zhang, Xu An Wang:
On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme. INCoS 2012: 571-576 - [c1]Jindan Zhang, Xu An Wang:
Security Analysis of a Multi-use Identity Based CCA-Secure Proxy Re-encryption Scheme. INCoS 2012: 581-586 - 2010
- [j1]Xu An Wang, Xiaoyuan Yang, Jindan Zhang:
Provable Secure Generalized Signcryption. J. Comput. 5(5): 807-814 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint