default search action
Qikun Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Yanling Shao, Yuzhi Zhang, Wenyong Dong, Qikun Zhang, Pingping Shan, Junying Guo, Hairui Xu:
Enhancing adversarial attacks with resize-invariant and logical ensemble. Neural Networks 173: 106194 (2024) - [j39]Junling Yuan, Xuhong Li, Qikun Zhang, Jing Zhang, Suping Li:
A routing modulation and spectrum assignment algorithm for semi-filterless elastic optical networks. Opt. Switch. Netw. 51: 100764 (2024) - [j38]Xuhong Li, Junling Yuan, Zhimin Xu, Qikun Zhang, Ruijie Zhu:
A precise partition strategy for proactive fragmentation avoidance in SDM-EONs with crosstalk awareness. Photonic Netw. Commun. 47(2): 79-96 (2024) - 2023
- [j37]Wenjun Song, Mengqi Liu, Thar Baker, Qikun Zhang, Yu-an Tan:
A group key exchange and secure data sharing based on privacy protection for federated learning in edge-cloud collaborative computing environment. Int. J. Netw. Manag. 33(5) (2023) - [j36]Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Shan Ai, Jun Zheng:
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration. J. Ambient Intell. Humaniz. Comput. 14(10): 13661-13672 (2023) - [j35]Jun Chen, Xiangyang Luo, Liyan Zhu, Qikun Zhang, Yong Gan:
Handwritten CAPTCHA recognizer: a text CAPTCHA breaking method based on style transfer network. Multim. Tools Appl. 82(9): 13025-13043 (2023) - [i1]Rongzhen Zhao, Zhenzhi Wu, Qikun Zhang:
Learnable Heterogeneous Convolution: Learning both topology and strength. CoRR abs/2301.05440 (2023) - 2022
- [j34]Qikun Zhang, Kunyuan Zhao, Xiaohui Kuang, Yongjiao Li, Yuanpan Zheng, Junling Yuan, Ruifang Wang:
Multidomain security authentication for the Internet of things. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j33]Qikun Zhang, Yongjiao Li, Zheng Chuanyang, Liang Zhu, Junling Yuan, Sikang Hu:
A permission-combination scalable access control model for Internet of things. Trans. Emerg. Telecommun. Technol. 33(4) (2022) - [j32]Qikun Zhang, Liang Zhu, Yongjiao Li, Zhaorui Ma, Junling Yuan, Jun Zheng, Shan Ai:
A group key agreement protocol for intelligent internet of things system. Int. J. Intell. Syst. 37(1): 699-722 (2022) - [j31]Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Yuanzhang Li, Shangbo Wu:
A fine-grained and traceable multidomain secure data-sharing model for intelligent terminals in edge-cloud collaboration scenarios. Int. J. Intell. Syst. 37(3): 2543-2566 (2022) - [j30]Qikun Zhang, Liang Zhu, Ruifang Wang, Jianyong Li, Junling Yuan, Tiancai Liang, Jun Zheng:
Group key agreement protocol among terminals of the intelligent information system for mobile edge computing. Int. J. Intell. Syst. 37(12): 10442-10461 (2022) - [j29]Qikun Zhang, Liang Zhu, Kunyuan Zhao, Yimeng Wu, Baohua Jin, Jianyong Li, Yinghui Meng, Sikang Hu:
Dynamic permission access control model based on privacy protection. Telecommun. Syst. 81(2): 191-205 (2022) - 2021
- [j28]Yong Gan, Bingli Wang, Yuan Zhuang, Yuan Gao, Zhigang Li, Qikun Zhang:
An asymmetric group key agreement protocol based on attribute threshold for Internet of Things. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j27]Qikun Zhang, Yongjiao Li, Ruifang Wang, Lu Liu, Yu-an Tan, Jingjing Hu:
Data security sharing model based on privacy protection for blockchain-enabled industrial Internet of Things. Int. J. Intell. Syst. 36(1): 94-111 (2021) - [j26]Hongzhe Liu, Qikun Zhang, Cheng Xu, Zhao Ye:
A novel FastICA algorithm based on improved secant method for Intelligent drive. J. Intell. Fuzzy Syst. 40(1): 165-178 (2021) - [j25]Rongzhen Zhao, Zhenzhi Wu, Qikun Zhang:
Learnable Heterogeneous Convolution: Learning both topology and strength. Neural Networks 141: 270-280 (2021) - [j24]Junsong Zhang, Qikun Zhang, Zhigang Li, Xianling Lu, Yong Gan:
A Lightweight and Secure Anonymous User Authentication Protocol for Wireless Body Area Networks. Secur. Commun. Networks 2021: 4939589:1-4939589:11 (2021) - [j23]Junsong Zhang, Qikun Zhang, Xianling Lu, Yong Gan:
A Novel Privacy-Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment. Wirel. Commun. Mob. Comput. 2021: 6692568:1-6692568:13 (2021) - [c14]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of a Lattice-Based Group Signature with Verifier-Local Revocation Achieving Full Security. ACNS Workshops 2021: 332-345 - [c13]Kunyuan Zhao, Qikun Zhang, Yimeng Wu, Liang Zhu, Hongfei Zhu, Ruifang Wang:
A Security Data Sharing Model for Cloud Network. DMBD (2) 2021: 303-315 - 2020
- [j22]Shuru Liu, Qiang Guo, Junling Yuan, Qikun Zhang:
A Resource-Periodic-Arrangement Strategy for RMSA Problem in Elastic Optical Networks. IEEE Access 8: 159745-159755 (2020) - [j21]Qikun Zhang, Yongjiao Li, Ruifang Wang, Jianyong Li, Yong Gan, Yanhua Zhang, Xiao Yu:
Blockchain-based asymmetric group key agreement protocol for internet of vehicles. Comput. Electr. Eng. 86: 106713 (2020) - [j20]Ran Zhang, Min Liu, Yifeng Yin, Qikun Zhang, Zengyu Cai:
Prediction Algorithm for Network Security Situation based on BP Neural Network Optimized by SA-SOA. Int. J. Perform. Eng. 16(8): 1171-1182 (2020) - [c12]Yanhua Zhang, Ximeng Liu, Yifeng Yin, Qikun Zhang, Huiwen Jia:
On New Zero-Knowledge Proofs for Fully Anonymous Lattice-Based Group Signature Scheme with Verifier-Local Revocation. ACNS Workshops 2020: 381-399 - [c11]Ran Zhang, Min Liu, Qikun Zhang, Zengyu Cai:
A Network Security Situation Prediction Algorithm Based on BP Neural Network Optimized by SOA. ICAIS (2) 2020: 417-427 - [c10]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Cryptanalysis of Two Fully Anonymous Attribute-Based Group Signature Schemes with Verifier-Local Revocation from Lattices. WISA 2020: 334-346
2010 – 2019
- 2019
- [j19]Qikun Zhang, Yongjiao Li, Yong Gan, Zheng Chuanyang, Xiangyang Luo, Jun Zheng:
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication. IEEE Access 7: 87085-87096 (2019) - [j18]Xuhong Li, Junling Yuan, Qikun Zhang, Zhongbao Ren, Lihua Yang:
Farsighted Spectrum Resource Assignment Method for Advance Reservation Requests in Elastic Optical Networks. IEEE Access 7: 167836-167846 (2019) - [j17]Xiaohui Kuang, Hongyi Liu, Ye Wang, Qikun Zhang, Quanxin Zhang, Jun Zheng:
A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks. IEEE Access 7: 172938-172947 (2019) - [j16]Yong Gan, Bingli Wang, Yuan Zhuang, Zengyu Cai, Qikun Zhang:
An authenticated hierarchical asymmetric group key agreement protocol based on identity. Int. J. Embed. Syst. 11(6): 815-824 (2019) - [j15]Qikun Zhang, Xianmin Wang, Junling Yuan, Lu Liu, Ruifang Wang, Hong Huang, Yuanzhang Li:
A hierarchical group key agreement protocol using orientable attributes for cloud computing. Inf. Sci. 480: 55-69 (2019) - [j14]Junling Yuan, Yunyang Fu, Ruijie Zhu, Xuhong Li, Qikun Zhang, Jing Zhang, Aretor Samuel:
A constrained-lower-indexed-block spectrum assignment policy in elastic optical networks. Opt. Switch. Netw. 33: 25-33 (2019) - [j13]Junling Yuan, Di Zhang, Qikun Zhang, Xuhong Li, Zhongbao Ren:
A routing and spectrum assignment algorithm in elastic optical network based on minimizing contiguity reduction. Photonic Netw. Commun. 38(1): 51-61 (2019) - [j12]Qikun Zhang, Yongjiao Li, Zhigang Li, Junling Yuan, Yong Gan, Xiangyang Luo:
Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things. Sensors 19(23): 5237 (2019) - [j11]Xuhong Li, Junling Yuan, Qikun Zhang, Jing Zhang:
A positive-negative delayer for slotted OBS networks to enhance two-way signaling scheme. Telecommun. Syst. 71(1): 111-120 (2019) - [c9]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Lattice-Based Group Signatures with Verifier-Local Revocation: Achieving Shorter Key-Sizes and Explicit Traceability with Ease. CANS 2019: 120-140 - [c8]Yanhua Zhang, Ximeng Liu, Yupu Hu, Qikun Zhang, Huiwen Jia:
Attribute-Based Signatures for Inner-Product Predicate from Lattices. CSS (1) 2019: 173-185 - [c7]Yanhua Zhang, Yifeng Yin, Ximeng Liu, Qikun Zhang, Huiwen Jia:
Zero-Knowledge Proofs for Improved Lattice-Based Group Signature Scheme with Verifier-Local Revocation. FCS 2019: 107-127 - [c6]Yanhua Zhang, Yupu Hu, Qikun Zhang, Huiwen Jia:
On New Zero-Knowledge Proofs for Lattice-Based Group Signatures with Verifier-Local Revocation. ISC 2019: 190-208 - [c5]Qikun Zhang, Yongjiao Li, Jianyong Li, Yong Gan, Yanhua Zhang, Jingjing Hu:
Blockchain-Based Asymmetric Group Key Agreement Protocol for Mobile Ad Hoc Network. SocialSec 2019: 47-56 - 2018
- [j10]Qikun Zhang, Yong Gan, Quan-Xin Zhang, Ruifang Wang, Yu-an Tan:
A Dynamic and Cross-Domain Authentication Asymmetric Group Key Agreement in Telemedicine Application. IEEE Access 6: 24064-24074 (2018) - [j9]Jiamin Zheng, Yu-an Tan, Qikun Zhang, Xiaosong Zhang, Liehuang Zhu, Quan-Xin Zhang:
Cross-cluster asymmetric group key agreement for wireless sensor networks. Sci. China Inf. Sci. 61(4): 048103:1-048103:3 (2018) - [j8]Zhigang Li, Mingchuan Zhang, Junlong Zhu, Ruijuan Zheng, Qikun Zhang, Qingtao Wu:
Stochastic Block-Coordinate Gradient Projection Algorithms for Submodular Maximization. Complex. 2018: 2609471:1-2609471:11 (2018) - [j7]Qikun Zhang, Yong Gan, Lu Liu, Xianmin Wang, Xiangyang Luo, Yuanzhang Li:
An authenticated asymmetric group key agreement based on attribute encryption. J. Netw. Comput. Appl. 123: 1-10 (2018) - [j6]Yanzhang Wu, Hongzhe Liu, Jiazheng Yuan, Qikun Zhang:
Is visual saliency useful for content-based image retrieval? Multim. Tools Appl. 77(11): 13983-14006 (2018) - [j5]Junling Yuan, Xuhong Li, Jing Zhang, Qikun Zhang, Yunyang Fu:
A partial-success-rate-based resource reservation scheme for slotted OBS networks. Photonic Netw. Commun. 35(2): 177-186 (2018) - [j4]Qikun Zhang, Junling Yuan, Ge Guo, Yong Gan, Jianwei Zhang:
An Authentication Key Establish Protocol for WSNs Based on Combined Key. Wirel. Pers. Commun. 99(1): 95-110 (2018) - [c4]Zucheng Huang, Lu Liu, Yuanzhang Li, Yu Zhang, Qikun Zhang:
Maintaining Root via Custom Android Kernel Across Over-The-Air Upgrade. ICA3PP (1) 2018: 299-309 - 2016
- [j3]Junsong Zhang, Lei He, Qikun Zhang, Yong Gan:
Pseudonym-based Privacy Protection Scheme for Participatory Sensing with Incentives. KSII Trans. Internet Inf. Syst. 10(11): 5654-5673 (2016) - 2012
- [j2]Li Zhang, Yu-an Tan, Qikun Zhang:
Identification of NAND flash ECC algorithms in mobile devices. Digit. Investig. 9(1): 34-48 (2012) - 2011
- [j1]Qikun Zhang, Jun Zheng, Yu-an Tan, Ruifang Wang, Yuanzhang Li:
Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups. J. Comput. 6(4): 650-656 (2011) - [c3]Jun Zheng, Yu-an Tan, Qikun Zhang, Xin Sun, Yichun Chen:
An Improved Cross-Domain Role-Based Authorization Management Model. ICAIC (4) 2011: 526-537 - [c2]Jun Zheng, Yu-an Tan, Qikun Zhang, Chunxiao Gao, Siyuan Wang:
A RBAC Model Based on Multi-granularities of Time Constraints. ICAIC (4) 2011: 538-549
2000 – 2009
- 2008
- [c1]Qiuyu Zhang, Fengman Miao, Zhanting Yuan, Qikun Zhang, Zhi Fan:
Construction of a Dynamic Trust Ontology Model. CIS (1) 2008: 394-398
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-13 00:41 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint