default search action
Mingwu Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j137]Haina Song, Hua Shen, Nan Zhao, Zhangqing He, Minghu Wu, Wei Xiong, Mingwu Zhang:
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing. Comput. Secur. 136: 103517 (2024) - [j136]Gang Shen, Chengliangyi Xia, Yumei Li, Hua Shen, Weizhi Meng, Mingwu Zhang:
Traceable and Privacy-Preserving Authentication Scheme for Energy Trading in V2G Networks. IEEE Internet Things J. 11(4): 6664-6676 (2024) - [j135]Peiheng Zhang, Min Tang, Willy Susilo, Mingwu Zhang:
Efficient Noninteractive Polynomial Commitment Scheme in the Discrete Logarithm Setting. IEEE Internet Things J. 11(5): 8078-8089 (2024) - [j134]Zirui Qiao, Kui Ma, Yanwei Zhou, Qiliang Yang, Zhe Xia, Bo Yang, Mingwu Zhang:
An Anonymous and Efficient Certificate-Based Identity Authentication Protocol for VANET. IEEE Internet Things J. 11(7): 11232-11245 (2024) - [j133]Yu Han, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang:
An Efficient and Secure Lightweight Certificateless Hybrid Signcryption Scheme. IEEE Internet Things J. 11(7): 12252-12265 (2024) - [j132]Yasi Zhu, Yanwei Zhou, Jing Wang, Bo Yang, Mingwu Zhang:
A Lightweight Cross-Domain Direct Identity Authentication Protocol for VANETs. IEEE Internet Things J. 11(23): 37741-37757 (2024) - [j131]Hua Shen, Zhiwei Wang, Jixin Zhang, Mingwu Zhang:
L-Net: A lightweight convolutional neural network for devices with low computing power. Inf. Sci. 660: 120131 (2024) - [j130]Haina Song, Hua Shen, Nan Zhao, Zhangqing He, Wei Xiong, Minghu Wu, Mingwu Zhang:
Adaptive personalized privacy-preserving data collection scheme with local differential privacy. J. King Saud Univ. Comput. Inf. Sci. 36(5): 102042 (2024) - [j129]Yanwei Zhou, Lei Cao, Zirui Qiao, Ran Xu, Yu Han, Junsheng Xing, Bo Yang, Zhe Xia, Mingwu Zhang:
A Novel Cloud-Assisted Authentication Key Agreement Protocol for VANET. IEEE Trans. Veh. Technol. 73(9): 13526-13541 (2024) - [c59]Yiwen Zhai, Jia Yang, Mingwu Zhang:
Efficient Vulnerability Detection for Smart Contracts Using Gated Graph Neural Network. ACISP (3) 2024: 44-63 - [c58]Mingwu Zhang, Yulu Zhong, Yifei Wang, Yuntao Wang:
Controlled Multi-client Functional Encryption for Flexible Access Control. ISPEC 2024: 329-346 - [c57]Mingwu Zhang, Qi Zou, Bo Yang:
A Secure Incentive Mechanism in Blockchain-Based Mobile Crowdsensing. ISPEC 2024: 347-364 - [c56]Yudi Zhang, Yumei Li, Mingwu Zhang, Willy Susilo:
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. ISPEC 2024: 383-402 - 2023
- [j128]Hua Shen, Jian Zhou, Ge Wu, Mingwu Zhang:
Multi-Keywords Searchable Attribute-Based Encryption With Verification and Attribute Revocation Over Cloud Data. IEEE Access 11: 139715-139727 (2023) - [j127]Junhang Pan, Xiangchen Li, Mingwu Zhang, Yewei Lu, Yelei Zhu, Kunyang Wu, Yiwen Wu, Weixin Wang, Bin Chen, Zhengwei Liu, Xiaomeng Wang, Junshun Gao:
TransFlow: a Snakemake workflow for transmission analysis ofMycobacterium tuberculosiswhole-genome sequencing data. Bioinform. 39(1) (2023) - [j126]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Ying Wang, Bo Yang, Yi Mu, Mingwu Zhang:
Identity-Based Encryption With Continuous Leakage-Resilient CCA Security From Static Complexity Assumption. Comput. J. 66(4): 924-940 (2023) - [j125]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang:
A Novel Construction Of Certificateless Aggregate Signature Scheme For Healthcare Wireless Medical Sensor Networks. Comput. J. 66(11): 2810-2824 (2023) - [j124]Yanwei Zhou, Lei Cao, Bo Yang, Zhe Xia, Chunxiang Gu, Mingwu Zhang:
A direct construction of continuous leakage-resilient (H)IBE scheme with CCA security from dual system encryption. Comput. Stand. Interfaces 83: 103668 (2023) - [j123]Mingwu Zhang, Shuo Huang, Gang Shen, Yuntao Wang:
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption. Comput. Stand. Interfaces 84: 103678 (2023) - [j122]Shijin Chen, Willy Susilo, Yudi Zhang, Bo Yang, Mingwu Zhang:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j121]Mingwu Zhang, Zhen-An Li, Peiheng Zhang:
A secure and privacy-preserving word vector training scheme based on functional encryption with inner-product predicates. Comput. Stand. Interfaces 86: 103734 (2023) - [j120]Yanwei Zhou, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. Des. Codes Cryptogr. 91(11): 3757-3801 (2023) - [j119]Zhaolong Wang, Yanwei Zhou, Zirui Qiao, Bo Yang, Chunxiang Gu, Yuan Xu, Mingwu Zhang:
An Anonymous and Revocable Authentication Protocol for Vehicle-to-Vehicle Communications. IEEE Internet Things J. 10(6, March 15): 5114-5127 (2023) - [j118]Yanwei Zhou, Lei Cao, Zirui Qiao, Zhe Xia, Bo Yang, Mingwu Zhang, Wenzheng Zhang:
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs. IEEE Internet Things J. 10(11): 10052-10065 (2023) - [j117]Yanwei Zhou, Zhaolong Wang, Zirui Qiao, Bo Yang, Mingwu Zhang:
An Efficient and Provably Secure Identity Authentication Scheme for VANET. IEEE Internet Things J. 10(19): 17170-17183 (2023) - [j116]Yanwei Zhou, Ran Xu, Zirui Qiao, Bo Yang, Zhe Xia, Mingwu Zhang:
An Anonymous and Efficient Multimessage and Multireceiver Certificateless Signcryption Scheme for VANET. IEEE Internet Things J. 10(24): 22823-22835 (2023) - [j115]Hua Shen, Jiqiang Li, Ge Wu, Mingwu Zhang:
Data release for machine learning via correlated differential privacy. Inf. Process. Manag. 60(3): 103349 (2023) - [j114]Mingwu Zhang, Mingxuan Yang, Gang Shen, Zhe Xia, Yuntao Wang:
A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things. Inf. Sci. 623: 293-310 (2023) - [j113]Gang Shen, Zhiqiang Fu, Yumin Gui, Willy Susilo, Mingwu Zhang:
Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system. Inf. Sci. 647: 119261 (2023) - [j112]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Mingwu Zhang:
A redesigned secure and efficient data transaction protocol for mobile payment system. J. Syst. Archit. 143: 102964 (2023) - [j111]Fagen Li, Emmanuel Ahene, Mingwu Zhang, Fuchun Guo:
Guest editorial: Special issue on frontiers in cyber security. J. Syst. Archit. 145: 103027 (2023) - [j110]Hua Shen, Yu Wang, Mingwu Zhang:
A Privacy-Preserving Trajectory Publishing Method Based on Multi-Dimensional Sub-Trajectory Similarities. Sensors 23(24): 9652 (2023) - [j109]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Tao Wang:
An Efficient Certificate-Based Aggregate Signature Scheme With Provable Security for Industrial Internet of Things. IEEE Syst. J. 17(1): 72-82 (2023) - [j108]Yuan Xu, Yanwei Zhou, Bo Yang, Zirui Qiao, Zhaolong Wang, Zhe Xia, Mingwu Zhang:
An Efficient Identity Authentication Scheme With Provable Security and Anonymity for Mobile Edge Computing. IEEE Syst. J. 17(1): 1012-1023 (2023) - [j107]Boyao Zhu, Yumei Li, Guoxiong Hu, Mingwu Zhang:
A Privacy-Preserving Data Aggregation Scheme Based on Chinese Remainder Theorem in Mobile Crowdsensing System. IEEE Syst. J. 17(3): 4257-4266 (2023) - [j106]Kui Ma, Yanwei Zhou, Ying Wang, Chunsheng Dong, Zhe Xia, Bo Yang, Mingwu Zhang:
An Efficient Certificateless Signature Scheme With Provably Security and Its Applications. IEEE Syst. J. 17(4): 5636-5647 (2023) - [j105]Mingwu Zhang, Yu Chen, Willy Susilo:
Decision Tree Evaluation on Sensitive Datasets for Secure e-Healthcare Systems. IEEE Trans. Dependable Secur. Comput. 20(5): 3988-4001 (2023) - [j104]Hua Shen, Ge Wu, Zhe Xia, Willy Susilo, Mingwu Zhang:
A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform. IEEE Trans. Inf. Forensics Secur. 18: 2637-2652 (2023) - [j103]Mingwu Zhang, Shijin Chen, Jian Shen, Willy Susilo:
PrivacyEAFL: Privacy-Enhanced Aggregation for Federated Learning in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 18: 5804-5816 (2023) - [j102]Guoqiang Deng, Min Tang, Yuxing Xi, Mingwu Zhang:
Privacy-Preserving Online Medical Prediagnosis Training Model Based on Soft-Margin SVM. IEEE Trans. Serv. Comput. 16(3): 2072-2084 (2023) - [j101]Hua Shen, Ge Wu, Willy Susilo, Mingwu Zhang:
Data-Matching-Based Privacy-Preserving Statistics and Its Applications in Digital Publishing Industry. IEEE Trans. Serv. Comput. 16(6): 4554-4566 (2023) - [j100]Biwen Chen, Tao Xiang, Xiaoguo Li, Mingwu Zhang, Debiao He:
Efficient Attribute-Based Signature With Collusion Resistance for Internet of Vehicles. IEEE Trans. Veh. Technol. 72(6): 7844-7856 (2023) - [j99]Yuanyuan Zhang, Lingzhe Meng, Mingwu Zhang, Weizhi Meng:
A secure and lightweight batch authentication scheme for Internet of Drones environment. Veh. Commun. 44: 100680 (2023) - [c55]Mingwu Zhang, Chao He, Gang Shen:
Identity-Based Key Verifiable Inner Product Functional Encryption Scheme. BlockTEA 2023: 3-22 - [c54]Yuzhu Wang, Xingbo Wang, Mingwu Zhang:
Homomorphic Witness Encryption from Indistinguishable Obfuscation. ProvSec 2023: 231-250 - [e2]Mingwu Zhang, Man Ho Au, Yudi Zhang:
Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings. Lecture Notes in Computer Science 14217, Springer 2023, ISBN 978-3-031-45512-4 [contents] - 2022
- [j98]Wenzheng Zhang, Zirui Qiao, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Continuous Leakage-Amplified Public-Key Encryption With CCA Security. Comput. J. 65(7): 1760-1775 (2022) - [j97]Hanchao Ku, Willy Susilo, Yudi Zhang, Wenfen Liu, Mingwu Zhang:
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption. Comput. Stand. Interfaces 80: 103583 (2022) - [j96]Mingwu Zhang, Mingxuan Yang, Gang Shen:
SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain. J. Syst. Archit. 129: 102619 (2022) - [j95]Run-Hua Shi, Bai Liu, Mingwu Zhang:
Measurement-device-independent quantum secure multiparty summation. Quantum Inf. Process. 21(4): 122 (2022) - [j94]Mingwu Zhang, Wenxiang Song, Jixing Zhang:
A Secure Clinical Diagnosis With Privacy-Preserving Multiclass Support Vector Machine in Clouds. IEEE Syst. J. 16(1): 67-78 (2022) - [j93]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Mingwu Zhang:
Improved Secure Transaction Scheme With Certificateless Cryptographic Primitives for IoT-Based Mobile Payments. IEEE Syst. J. 16(2): 1842-1850 (2022) - [j92]Mingwu Zhang, Yimeng Zhang, Gang Shen:
PPDDS: A Privacy-Preserving Disease Diagnosis Scheme Based on the Secure Mahalanobis Distance Evaluation Model. IEEE Syst. J. 16(3): 4552-4562 (2022) - [j91]Zirui Qiao, Yanwei Zhou, Bo Yang, Mingwu Zhang, Tao Wang, Zhe Xia:
Secure and Efficient Certificate-Based Proxy Signature Schemes for Industrial Internet of Things. IEEE Syst. J. 16(3): 4719-4730 (2022) - [j90]Yang Zhou, Hua Shen, Mingwu Zhang:
A Distributed and Privacy-Preserving Random Forest Evaluation Scheme with Fine Grained Access Control. Symmetry 14(2): 415 (2022) - [j89]Mingwu Zhang, Boyao Zhu, Yumei Li, Yuntao Wang:
TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs. Symmetry 14(6): 1123 (2022) - [c53]Yumei Li, Mingwu Zhang, Futai Zhang:
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace. ACISP 2022: 229-243 - [c52]Yuewu Lian, Haitao Zhan, Peiheng Zhang, Mingwu Zhang:
Time-Lock Encryption for Multiple Consecutive Periods and its Application. DSC 2022: 620-626 - [c51]Zhe Xia, Shiyun Liu, Yichen Huang, Hua Shen, Mingwu Zhang:
A Multi-task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks. EISA 2022: 21-36 - [c50]Yi Liu, Guoxiong Hu, Yudi Zhang, Mingwu Zhang:
SVFLS: A Secure and Verifiable Federated Learning Training Scheme. FCS 2022: 134-148 - [c49]Fengxiao Liu, Gang Shen, Mingwu Zhang:
Privacy-Preserving Multi-party Neural Network Learning Over Incomplete Data. HPCC/DSS/SmartCity/DependSys 2022: 1216-1221 - [c48]Yuzhu Wang, Mingwu Zhang:
Witness Encryption from Smooth Projective Hashing System. ISC 2022: 53-72 - [c47]Shijin Chen, Mingwu Zhang, Bo Yang:
Bilateral Privacy-Preserving Task Assignment with Personalized Participant Selection for Mobile Crowdsensing. ISC 2022: 473-490 - [c46]Mingwu Zhang, Zhen-An Li, Peihang Zhang:
A Secure Word Vector Training Scheme Based on Inner-Product Functional Encryption. SocialSec 2022: 65-82 - [c45]Mingwu Zhang, Chenmei Cui, Gang Shen, Yudi Zhang:
A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces. SocialSec 2022: 212-226 - 2021
- [j88]Hua Shen, Mingwu Zhang, Hao Wang, Fuchun Guo, Willy Susilo:
Efficient and Privacy-Preserving Massive Data Processing for Smart Grids. IEEE Access 9: 70616-70627 (2021) - [j87]Zirui Qiao, Qiliang Yang, Yanwei Zhou, Zhe Xia, Mingwu Zhang:
Novel Public-Key Encryption with Continuous Leakage Amplification. Comput. J. 64(8): 1163-1177 (2021) - [j86]Yu Chen, Hanchao Ku, Mingwu Zhang:
PP-OCQ: A distributed privacy-preserving optimal closeness query scheme for social networks. Comput. Stand. Interfaces 74: 103484 (2021) - [j85]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. Des. Codes Cryptogr. 89(7): 1575-1614 (2021) - [j84]Mingwu Zhang, Yu Chen, Jingqiang Lin:
A Privacy-Preserving Optimization of Neighborhood-Based Recommendation for Medical-Aided Diagnosis and Treatment. IEEE Internet Things J. 8(13): 10830-10842 (2021) - [j83]Hua Shen, Mingwu Zhang, Hao Wang, Fuchun Guo, Willy Susilo:
A cloud-aided privacy-preserving multi-dimensional data comparison protocol. Inf. Sci. 545: 739-752 (2021) - [j82]Runhua Shi, Bai Liu, Mingwu Zhang:
Secure two-party integer comparison protocol without any third party. Quantum Inf. Process. 20(12): 402 (2021) - [j81]Mingwu Zhang, Yu Chen, Zhe Xia, Jiangyi Du, Willy Susilo:
PPO-DFK: A Privacy-Preserving Optimization of Distributed Fractional Knapsack With Application in Secure Footballer Configurations. IEEE Syst. J. 15(1): 759-770 (2021) - [j80]Mingwu Zhang, Yu Chen, Jiajun Huang:
SE-PPFM: A Searchable Encryption Scheme Supporting Privacy-Preserving Fuzzy Multikeyword in Cloud Systems. IEEE Syst. J. 15(2): 2980-2988 (2021) - [j79]Yanwei Zhou, Yuan Xu, Zirui Qiao, Bo Yang, Mingwu Zhang:
Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing. Theor. Comput. Sci. 860: 1-22 (2021) - [c44]Zhe Xia, Yifeng Shu, Hua Shen, Mingwu Zhang:
A Federated Learning Assisted Conditional Privacy Preserving Scheme for Vehicle Networks. CSS 2021: 16-35 - [c43]Lingfu Wang, Jing Wang, Mingwu Zhang, Weijia Huang:
A Compact Secret Image Sharing Scheme Based on Flexible Secret Matrix Sharing Scheme. ICA3PP (3) 2021: 411-431 - [c42]Tianqi Zhou, Jian Shen, Sai Ji, Yongjun Ren, Mingwu Zhang:
Key Exposure Resistant Group Key Agreement Protocol. ProvSec 2021: 83-97 - [c41]Yuzhu Wang, Peiheng Zhang, Haitao Zhan, Mingwu Zhang:
Privacy-Enhanced Mean-Variance Scheme Against Malicious Signature Attacks in Smart Grids. UbiSec 2021: 145-158 - 2020
- [j78]Meijuan Huang, Bo Yang, Mingwu Zhang, Lina Zhang, Hong-xia Hou:
Updatable Lossy Trapdoor Functions Under Consecutive Leakage. Comput. J. 63(4): 648-656 (2020) - [j77]Yudi Zhang, Debiao He, Mingwu Zhang, Kim-Kwang Raymond Choo:
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm. Frontiers Comput. Sci. 14(3): 143803 (2020) - [j76]Hua Shen, Mingwu Zhang, Hao Wang, Fuchun Guo, Willy Susilo:
A Lightweight Privacy-Preserving Fair Meeting Location Determination Scheme. IEEE Internet Things J. 7(4): 3083-3093 (2020) - [j75]Mingwu Zhang, Yu Chen, Willy Susilo:
PPO-CPQ: A Privacy-Preserving Optimization of Clinical Pathway Query for E-Healthcare Systems. IEEE Internet Things J. 7(10): 10660-10672 (2020) - [j74]Hua Shen, Yajing Liu, Zhe Xia, Mingwu Zhang:
An efficient aggregation scheme resisting on malicious data mining attacks for smart grid. Inf. Sci. 526: 289-300 (2020) - [j73]Yixin Su, Gang Shen, Mingwu Zhang:
A Novel Privacy-Preserving Authentication Scheme for V2G Networks. IEEE Syst. J. 14(2): 1963-1971 (2020) - [j72]Yudi Zhang, Debiao He, Yumei Li, Mingwu Zhang, Kim-Kwang Raymond Choo:
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks. IEEE Syst. J. 14(4): 5320-5328 (2020) - [j71]Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Identity-based encryption with leakage-amplified chosen-ciphertext attacks security. Theor. Comput. Sci. 809: 277-295 (2020) - [j70]Mingwu Zhang, Bingruolan Zhou:
PP-VCA: A Privacy-Preserving and Verifiable Combinatorial Auction Mechanism. Wirel. Commun. Mob. Comput. 2020: 8888284:1-8888284:11 (2020) - [c40]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:
Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. ACISP 2020: 631-641
2010 – 2019
- 2019
- [j69]Ou Ruan, Zihao Wang, Jing Mi, Mingwu Zhang:
New Approach to Set Representation and Practical Private Set-Intersection Protocols. IEEE Access 7: 64897-64906 (2019) - [j68]Run-Hua Shi, Mingwu Zhang:
A Feasible Quantum Protocol for Private Set Intersection Cardinality. IEEE Access 7: 72105-72112 (2019) - [j67]Ou Ruan, Zihao Wang, Qingping Wang, Mingwu Zhang:
Continuous After-the-Fact Leakage-Resilient Group Password-Authenticated Key Exchange. Int. J. Netw. Secur. 21(5): 861-871 (2019) - [j66]Mingwu Zhang, Yudi Zhang, Yan Jiang, Jian Shen:
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds. IEEE Syst. J. 13(2): 1478-1486 (2019) - [c39]Mingwu Zhang, Bo Peng, Yu Chen:
An Efficient Image Encryption Scheme for Industrial Internet-of-Things Devices. IoT S&P@CCS 2019: 38-43 - [c38]Na Deng, Xu Chen, Caiquan Xiong, Chunzhi Wang, Mingwu Zhang, Zhiwei Ye, Desheng Li, Xuehong Yang:
A Method of Collecting Four Character Medicine Effect Phrases in TCM Patents Based on Semi-supervised Learning. CISIS 2019: 462-473 - [c37]Zhe Xia, Lein Harn, Bo Yang, Mingwu Zhang, Yi Mu, Willy Susilo, Weizhi Meng:
Provably Secure Group Authentication in the Asynchronous Communication Model. ICICS 2019: 324-340 - [c36]Hua Shen, Daijie Sun, Lan Zhao, Mingwu Zhang:
A Fair (t, n)-Threshold Secret Sharing Scheme with Efficient Cheater Identifying. IFIPTM 2019: 122-132 - [c35]Mingwu Zhang, Xiao Chen, Gang Shen, Yong Ding:
A Fair and Efficient Secret Sharing Scheme Based on Cloud Assisting. ML4CS 2019: 348-360 - [c34]Ou Ruan, Yang Yang, Mingwu Zhang:
An Efficient Leakage-Resilient Authenticated Group Key Exchange Protocol. NSS 2019: 665-674 - [c33]Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Hua Shen, Yi Mu:
Provably Secure Proactive Secret Sharing Without the Adjacent Assumption. ProvSec 2019: 247-264 - [c32]Liuying Sun, Anthony T. S. Ho, Zhe Xia, Jiageng Chen, Mingwu Zhang:
Development of an Early Warning System for Network Intrusion Detection Using Benford's Law Features. SocialSec 2019: 57-73 - [d1]Mingwu Zhang:
PPO-DFK. IEEE DataPort, 2019 - 2018
- [j65]Mingwu Zhang, Wentao Leng, Yong Ding, Chunming Tang:
Tolerating Sensitive-Leakage With Larger Plaintext-Space and Higher Leakage-Rate in Privacy-Aware Internet-of-Things. IEEE Access 6: 33859-33870 (2018) - [j64]Mingwu Zhang, Jiajun Huang, Hua Shen, Zhe Xia, Yong Ding:
Consecutive Leakage-Resilient and Updatable Lossy Trapdoor Functions and Application in Sensitive Big-Data Environments. IEEE Access 6: 43936-43945 (2018) - [j63]Gang Shen, Yixin Su, Mingwu Zhang:
Secure and Membership-Based Data Sharing Scheme in V2G Networks. IEEE Access 6: 58450-58460 (2018) - [j62]Lixue Sun, Chunxiang Xu, Mingwu Zhang, Kefei Chen, Hongwei Li:
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci. China Inf. Sci. 61(3): 038106:1-038106:3 (2018) - [j61]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. Comput. J. 61(4): 526-538 (2018) - [j60]Mingwu Zhang:
ADR-lrABE: New Mechanism of Direct-revocable Attribute-Based Encryption with Continual-leakage Tolerances. Fundam. Informaticae 157(1-2): 1-27 (2018) - [j59]Yonghui Chen, Cheng Zhang, Wei Li, Tingsong Chen, Mingwu Zhang:
A publicly verifiable network coding scheme with null-space HMAC. Int. J. Intell. Inf. Database Syst. 11(2/3): 117-131 (2018) - [j58]Sujuan Li, Yi Mu, Mingwu Zhang:
Certificate-based Smooth Projective Hashing and Its Applications. Int. J. Netw. Secur. 20(2): 266-277 (2018) - [j57]Gang Shen, Yixin Su, Danhong Zhang, Huajun Zhang, Binyu Xiong, Mingwu Zhang:
Secure and Fine-grained Electricity Consumption Aggregation Scheme for Smart Grid. KSII Trans. Internet Inf. Syst. 12(4): 1553-1571 (2018) - [j56]Mingwu Zhang, Yao Yao, Yan Jiang, Bingbing Li, Chunming Tang:
Accountable mobile E-commerce scheme in intelligent cloud system transactions. J. Ambient Intell. Humaniz. Comput. 9(6): 1889-1899 (2018) - [j55]Na Deng, Chunzhi Wang, Mingwu Zhang, Zhiwei Ye, Liang Xiao, Jingbai Tian, Desheng Li, Xu Chen:
A Semi-Automatic Annotation Method of Effect Clue Words for Chinese Patents Based on Co-Training. Int. J. Data Warehous. Min. 14(4): 1-19 (2018) - [j54]Ou Ruan, Yuanyuan Zhang, Mingwu Zhang, Jing Zhou, Lein Harn:
After-the-Fact Leakage-Resilient Identity-Based Authenticated Key Exchange. IEEE Syst. J. 12(2): 2017-2026 (2018) - [j53]Xingxin Li, Youwen Zhu, Jian Wang, Zhe Liu, Yining Liu, Mingwu Zhang:
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification. IEEE Trans. Dependable Secur. Comput. 15(5): 906-912 (2018) - [c31]Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. ACISP 2018: 83-100 - [c30]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. ACISP 2018: 417-430 - [c29]Mingwu Zhang, Yan Jiang, Hua Shen, Bingbing Li, Willy Susilo:
Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation. Inscrypt 2018: 240-259 - [c28]Zhe Xia, Bo Yang, Mingwu Zhang, Yi Mu:
An Efficient and Provably Secure Private Polynomial Evaluation Scheme. ISPEC 2018: 595-609 - [e1]Leonard Barolli, Mingwu Zhang, Xu An Wang:
Advances in Internetworking, Data & Web Technologies, The 5th International Conference on Emerging Internetworking, Data & Web Technologies, EIDWT-2017, Wuhan, China, June 10-11, 2017. Lecture Notes on Data Engineering and Communications Technologies 6, Springer 2018, ISBN 978-3-319-59462-0 [contents] - 2017
- [j52]Mingwu Zhang, Yan Jiang, Yi Mu, Willy Susilo:
Obfuscating Re-encryption Algorithm With Flexible and Controllable Multi-Hop on Untrusted Outsourcing Server. IEEE Access 5: 26419-26434 (2017) - [j51]Ou Ruan, Jing Chen, Mingwu Zhang:
Provably Leakage-Resilient Password-Based Authenticated Key Exchange in the Standard Model. IEEE Access 5: 26832-26841 (2017) - [j50]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Mingwu Zhang, Xiaoshuang Luo:
Cost-effective secure E-health cloud system using identity based cryptographic techniques. Future Gener. Comput. Syst. 67: 242-254 (2017) - [j49]Xu An Wang, Jianfeng Ma, Fatos Xhafa, Baodong Qin, Mingwu Zhang:
New efficient chosen ciphertext secure Elgamal encryption schemes for secure Cloud storage service. Int. J. Web Grid Serv. 13(3): 246-269 (2017) - [j48]Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:
Continuous Leakage Resilient Lossy Trapdoor Functions. Inf. 8(2): 38 (2017) - [j47]Ling Zhao, Mingwu Zhang, Hua Shen, Yudi Zhang, Jian Shen:
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server. KSII Trans. Internet Inf. Syst. 11(2): 826-845 (2017) - [j46]Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn:
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. J. Inf. Sci. Eng. 33(4): 993-1006 (2017) - [j45]Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu:
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments. IEEE Syst. J. 11(2): 1018-1026 (2017) - [j44]Hua Shen, Mingwu Zhang, Jian Shen:
Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. IEEE Trans. Inf. Forensics Secur. 12(6): 1369-1381 (2017) - [c27]Yudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang:
An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding. EIDWT 2017: 524-531 - [c26]Ou Ruan, Mingwu Zhang, Jing Chen:
Leakage-Resilient Password-Based Authenticated Key Exchange. ICA3PP 2017: 285-296 - [c25]Yonghui Chen, Mingwu Zhang, Chao Xu:
Reliable Homomorphic Matrix Disguising Scheme. IMIS 2017: 666-675 - 2016
- [j43]Mingwu Zhang, Yi Mu:
Token-Leakage Tolerant and Vector Obfuscated IPE and Application in Privacy-Preserving Two-Party Point/Polynomial Evaluations. Comput. J. 59(4): 493-507 (2016) - [j42]Bo Yang, Mingwu Zhang, Jun-Qiang Du:
An error-tolerant keyword search scheme based on public-key encryption in secure cloud computing. Concurr. Comput. Pract. Exp. 28(4): 1083-1093 (2016) - [j41]Mingwu Zhang, Yong Xia, Ou Yuan, Kirill Morozov:
Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services. Int. J. Commun. Syst. 29(12): 1863-1872 (2016) - [j40]Ou Ruan, Jing Zhou, Mingwu Zhang:
An efficient resource-fair commit-prove-fair-open protocol. Int. J. Electron. Secur. Digit. Forensics 8(1): 17-34 (2016) - [j39]Lein Harn, Ching-Fang Hsu, Mingwu Zhang, Tingting He, Maoyuan Zhang:
Realizing secret sharing with general access structure. Inf. Sci. 367-368: 209-220 (2016) - [j38]Mingwu Zhang, Bo Yang:
Continual key leakage tolerant encryption from extensible set delegation. Secur. Commun. Networks 9(12): 1638-1649 (2016) - [j37]Mingwu Zhang, Yi Mu, Jian Shen, Xinyi Huang:
Strongly average-case secure obfuscation: achieving input privacy and circuit obscurity. Secur. Commun. Networks 9(12): 1737-1747 (2016) - [c24]Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. ACISP (2) 2016: 3-20 - [c23]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. ASIACRYPT (1) 2016: 844-876 - [c22]Sujuan Li, Yi Mu, Mingwu Zhang, Futai Zhang:
Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage. ProvSec 2016: 309-319 - [i3]Rongmao Chen, Yi Mu, Guomin Yang, Willy Susilo, Fuchun Guo, Mingwu Zhang:
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions. IACR Cryptol. ePrint Arch. 2016: 873 (2016) - 2015
- [j36]Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. Comput. J. 58(4): 735-749 (2015) - [j35]Sha Ma, Mingwu Zhang, Qiong Huang, Bo Yang:
Public Key Encryption with Delegated Equality Test in a Multi-User Setting. Comput. J. 58(4): 986-1002 (2015) - [j34]Debiao He, Mingwu Zhang, Baowen Xu:
Insecurity of an Efficient Identity-Based Proxy Signature in the Standard Model. Comput. J. 58(10): 2507-2508 (2015) - [j33]Chunhua Pan, Shunpeng Li, Qihui Zhu, Chunzhi Wang, Mingwu Zhang:
Notes on Proxy Signcryption and Multi-proxy Signature Schemes. Int. J. Netw. Secur. 17(1): 29-33 (2015) - [j32]Hua Shen, Yanxiang He, Mingwu Zhang:
基于Petri网的Web服务组合验证方法 (Verification Methods Based on Petri Networks for Web Services Composition). 计算机科学 42(4): 111-115 (2015) - [j31]Hua Shen, Yanxiang He, Mingwu Zhang:
基于服务组合模型结构特征的性能瓶颈定位方案 (Performance Bottlenecks Location Scheme Based on Structural Features of Service Composition Model). 计算机科学 42(9): 107-117 (2015) - [j30]Chi Cheng, Tao Jiang, Yining Liu, Mingwu Zhang:
Security analysis of a homomorphic signature scheme for network coding. Secur. Commun. Networks 8(18): 4053-4060 (2015) - [j29]Sha Ma, Qiong Huang, Mingwu Zhang, Bo Yang:
Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization. IEEE Trans. Inf. Forensics Secur. 10(3): 458-470 (2015) - [c21]Mingwu Zhang, Biwen Chen, Hua Shen:
Program Obfuscator for Privacy-Carrying Unidirectional One-hop Re-encryption. ICA3PP (Workshops and Symposiums) 2015: 133-142 - 2014
- [j28]Mingwu Zhang, Yi Mu:
Key continual-leakage resilient broadcast cryptosystem from dual system in broadcast networks. Frontiers Comput. Sci. 8(3): 456-468 (2014) - [j27]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous encryption with partial-order subset delegation and its application in privacy email systems. IET Inf. Secur. 8(4): 240-249 (2014) - [j26]Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi:
Fully secure constructions of spatial encryption with vector privacy. Int. J. Commun. Syst. 27(12): 4307-4327 (2014) - [j25]Min Zhou, Mingwu Zhang, Chunzhi Wang, Bo Yang:
CCLAS: A Practical and Compact Certificateless Aggregate Signature with Share Extraction. Int. J. Netw. Secur. 16(2): 157-164 (2014) - [j24]Zhenhua Chen, Shundong Li, Chunzhi Wang, Mingwu Zhang:
Comments on FHH Anonymous Multireceiver Encryption. Int. J. Netw. Secur. 16(5): 397-400 (2014) - [j23]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Anonymous spatial encryption under affine space delegation functionality with full security. Inf. Sci. 277: 715-730 (2014) - [j22]Sha Ma, Bo Yang, Mingwu Zhang:
PPGJ: A privacy-preserving general join for outsourced encrypted database. Secur. Commun. Networks 7(8): 1232-1244 (2014) - [j21]Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui, Mingwu Zhang:
An efficient fair UC-secure protocol for two-party computation. Secur. Commun. Networks 7(8): 1253-1263 (2014) - [j20]Mingwu Zhang, Bo Yang, Chunzhi Wang, Tsuyoshi Takagi:
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance. Secur. Commun. Networks 7(11): 1974-1987 (2014) - [j19]Mingwu Zhang, Chunzhi Wang, Kirill Morozov:
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces. J. Supercomput. 70(3): 1405-1432 (2014) - [c20]Mingwu Zhang:
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation. ACISP 2014: 192-208 - [c19]Mingwu Zhang:
ACP-lrFEM: Functional Encryption Mechanism with Automatic Control Policy in the Presence of Key Leakage. ISPEC 2014: 481-495 - 2013
- [j18]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate. Comput. J. 56(4): 464-477 (2013) - [j17]Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi:
Public Key Replacement and Universal Forgery of a SCLS Scheme. Int. J. Netw. Secur. 15(2): 133-138 (2013) - [j16]Fagen Li, Mingwu Zhang, Tsuyoshi Takagi:
Identity-based partially blind signature in the standard model for electronic cash. Math. Comput. Model. 58(1-2): 196-203 (2013) - [j15]Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:
Efficient and adaptively secure broadcast encryption systems. Secur. Commun. Networks 6(8): 1044-1052 (2013) - [j14]Mingwu Zhang, Tsuyoshi Takagi:
Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation. IEEE Syst. J. 7(3): 410-419 (2013) - [c18]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-Resilient Attribute-Based Encryption with Fast Decryption: Models, Analysis and Constructions. ISPEC 2013: 75-90 - [i2]Mingwu Zhang, Wei Shi, Chunzhi Wang, Zhenhua Chen, Yi Mu:
Leakage-resilient Attribute-based Encryptions with Fast Decryption: Model, Analysis and Construction. IACR Cryptol. ePrint Arch. 2013: 247 (2013) - 2012
- [j13]Fagen Li, Mingwu Zhang, Tsuyoshi Takagi:
Efficient signcryption in the standard model. Concurr. Comput. Pract. Exp. 24(17): 1977-1989 (2012) - [j12]Yuyue Xu, Jiulin Sun, Jinqu Zhang, Yong Xu, Mingwu Zhang, Xiuying Liao:
Combining AHP with GIS in synthetic evaluation of environmental suitability for living in China's 35 major cities. Int. J. Geogr. Inf. Sci. 26(9): 1603-1623 (2012) - [j11]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li:
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 259-262 (2012) - [j10]Mingwu Zhang, Fagen Li, Tsuyoshi Takagi:
Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks. IEICE Trans. Inf. Syst. 95-D(2): 686-689 (2012) - [j9]Chandrashekhar Meshram, Suchitra A. Meshram, Mingwu Zhang:
An ID-based cryptographic mechanisms based on GDLP and IFP. Inf. Process. Lett. 112(19): 753-758 (2012) - [j8]Youwen Zhu, Liusheng Huang, Tsuyoshi Takagi, Mingwu Zhang:
Privacy-Preserving OLAP for Accurate Answer. J. Circuits Syst. Comput. 21(1) (2012) - [j7]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption. Secur. Commun. Networks 5(12): 1430-1440 (2012) - [c17]Jintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou:
A Robust Fuzzy Extractor without ECCs. Inscrypt 2012: 60-68 - [c16]Bo Yang, Mingwu Zhang:
LR-UESDE: A Continual-Leakage Resilient Encryption with Unbounded Extensible Set Delegation. ProvSec 2012: 125-142 - 2011
- [j6]Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi:
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor. Int. J. Netw. Secur. 12(1): 50-57 (2011) - [j5]Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi:
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings. Int. J. Netw. Secur. 12(3): 130-136 (2011) - [j4]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 181(18): 4041-4050 (2011) - [c15]Mingwu Zhang, Tsuyoshi Takagi:
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems. ACISP 2011: 241-258 - [c14]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang:
Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks. PAISI 2011: 71-84 - [c13]Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi:
Efficient Identity-Based Signcryption in the Standard Model. ProvSec 2011: 120-137 - [c12]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous Encryption with Partial-Order Subset Delegation Functionality. ProvSec 2011: 154-169 - 2010
- [j3]Yajun Jiang, Bo Yang, Mingwu Zhang:
A Classified Credential Selection Scheme with Disclosure-minimizing Privacy. J. Digit. Content Technol. its Appl. 4(9): 201-211 (2010) - [c11]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang:
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. PAISI 2010: 77-87 - [c10]Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi:
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. PAISI 2010: 98-104
2000 – 2009
- 2009
- [j2]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Ordered Semiring-based Trust Establish Model with Risk Evaluating. Int. J. Netw. Secur. 8(2): 101-106 (2009) - [c9]Mingwu Zhang, Yusheng Zhong, Bo Yang, Wenzheng Zhang:
Analysis and Improvement of an ID-Based Anonymous Signcryption Model. ICIC (1) 2009: 433-442 - [i1]Mingwu Zhang, Yusheng Zhong, Pengcheng Li, Bo Yang:
Analysis and Enhance of Anonymous Signcryption Scheme. IACR Cryptol. ePrint Arch. 2009: 194 (2009) - 2008
- [b1]Mingwu Zhang:
Supporting fine-grained database lineage tracking. Purdue University, USA, 2008 - [j1]Mingwu Zhang, Qi Ouyang, Alan Stephenson, Michael D. Kane, David E. Salt, Sunil Prabhakar, John Burgner, Charles R. Buck, Xiang Zhang:
Interactive analysis of systems biology molecular expression data. BMC Syst. Biol. 2: 23 (2008) - [c8]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. ATC 2008: 516-526 - [c7]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. ISI Workshops 2008: 126-137 - 2007
- [c6]Yong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang:
Efficient Identity-Based Signcryption Scheme for Multiple Receivers. ATC 2007: 13-21 - [c5]Mingwu Zhang, Daisuke Kihara, Sunil Prabhakar:
Tracing Lineage in Multi-version Scientific Databases. BIBE 2007: 440-447 - [c4]Mingwu Zhang, Wei Jiang, Chris Clifton, Sunil Prabhakar:
Identifying Rare Classes with Sparse Training Data. DEXA 2007: 751-760 - [c3]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments. ICNC (5) 2007: 814-818 - [c2]Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang:
Using Trust Metric to Detect Malicious Behaviors in WSNs. SNPD (3) 2007: 104-108 - [c1]Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Prabhakar:
Tracing Lineage Beyond Relational Operators. VLDB 2007: 1116-1127
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint