default search action
Zhengping Jin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i8]Mingyu Yu, Haonan Miao, Zhengping Jin, Sujuan Qin:
DDIM-Driven Coverless Steganography Scheme with Real Key. CoRR abs/2411.06486 (2024) - 2023
- [j49]Pengxi Yang, Hua Zhang, Fei Gao, Yanxin Xu, Zhengping Jin:
Multi-player evolutionary game of federated learning incentive mechanism based on system dynamics. Neurocomputing 557: 126739 (2023) - [j48]Hua Zhang, Kaixuan Li, Teng Huang, Xin Zhang, Wenmin Li, Zhengping Jin, Fei Gao, Minghui Gao:
Publishing locally private high-dimensional synthetic data efficiently. Inf. Sci. 633: 343-356 (2023) - 2022
- [j47]Yunping Gong, Fei Gao, Wenmin Li, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
A rORAM scheme with logarithmic bandwidth and logarithmic locality. Int. J. Intell. Syst. 37(10): 8068-8091 (2022) - [j46]Yongsheng Li, Tengfei Tu, Hua Zhang, JiShuai Li, Zhengping Jin, Qiaoyan Wen:
Sound Can Help Us See More Clearly. Sensors 22(2): 599 (2022) - [j45]Hao Lin, Fei Gao, Hua Zhang, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. IEEE Syst. J. 16(1): 1460-1470 (2022) - [j44]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Dynamic Proof of Data Possession and Replication With Tree Sharing and Batch Verification in the Cloud. IEEE Trans. Serv. Comput. 15(4): 1813-1824 (2022) - 2020
- [j43]Hua Zhang, Xueqi Jin, Ying Li, Zhengwei Jiang, Ye Liang, Zhengping Jin, Qiaoyan Wen:
A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System. IEEE Access 8: 1031-1047 (2020) - [j42]Wei Guo, Su-Juan Qin, Jun Lu, Fei Gao, Zhengping Jin, Qiaoyan Wen, Daniele Sgandurra:
Improved Proofs Of Retrievability And Replication For Data Availability In Cloud Storage. Comput. J. 63(8): 1216-1230 (2020) - [j41]Zhidan Li, Wenmin Li, Fei Gao, Ping Yu, Hua Zhang, Zhengping Jin, Qiaoyan Wen:
New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services. Comput. J. 63(12): 1886-1903 (2020) - [j40]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively secure broadcast encryption with authenticated content distributors. Multim. Tools Appl. 79(11-12): 7889-7910 (2020) - [j39]Shuo Zhang, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Multi-User Public Key Encryption with Multi-Keyword Search out of Bilinear Pairings. Sensors 20(23): 6962 (2020) - [j38]Yuanbo Cui, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin:
KNN search-based trajectory cloaking against the Cell-ID tracking in cellular network. Soft Comput. 24(2): 965-980 (2020) - [j37]Wei Guo, Su-Juan Qin, Fei Gao, Hua Zhang, Wenmin Li, Zhengping Jin, Qiaoyan Wen:
Comments on "Provable Multicopy Dynamic Data Possession in Cloud Computing Systems". IEEE Trans. Inf. Forensics Secur. 15: 2584-2586 (2020) - [j36]Shuo Zhang, Wenmin Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Flexible KP-ABE Suit for Mobile User Realizing Decryption Outsourcing and Attribute Revocation. Wirel. Pers. Commun. 114(4): 2783-2800 (2020)
2010 – 2019
- 2019
- [j35]Zhidan Li, Wenmin Li, Zhengping Jin, Hua Zhang, Qiaoyan Wen:
An Efficient ABE Scheme With Verifiable Outsourced Encryption and Decryption. IEEE Access 7: 29023-29037 (2019) - [j34]Wei Guo, Hua Zhang, Su-Juan Qin, Fei Gao, Zhengping Jin, Wenmin Li, Qiaoyan Wen:
Outsourced dynamic provable data possession with batch update for secure cloud storage. Future Gener. Comput. Syst. 95: 309-322 (2019) - [j33]Huawei Wang, Ye Li, Yingnan Jiao, Zhengping Jin:
An efficient outsourced attribute-based encryption scheme in the device-to-device mobile network. Int. J. Distributed Sens. Networks 15(7) (2019) - [j32]Dianli Guo, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Wenmin Li:
Authenticated public key broadcast encryption with short ciphertexts. Multim. Tools Appl. 78(16): 23399-23414 (2019) - [j31]Xiuhua Lu, Qiaoyan Wen, Wei Yin, Kaitai Liang, Zhengping Jin, Emmanouil Panaousis, Jiageng Chen:
Quantum-Resistant Identity-Based Signature with Message Recovery and Proxy Delegation. Symmetry 11(2): 272 (2019) - [j30]Ping Yu, Qiaoyan Wen, Wei Ni, Wenmin Li, Caijun Sun, Hua Zhang, Zhengping Jin:
Decentralized, Revocable and Verifiable Attribute-Based Encryption in Hybrid Cloud System. Wirel. Pers. Commun. 106(2): 719-738 (2019) - 2018
- [j29]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Anti-Quantum Transaction Authentication Approach in Blockchain. IEEE Access 6: 5393-5401 (2018) - [j28]Xiuhua Lu, Wei Yin, Qiaoyan Wen, Zhengping Jin, Wenmin Li:
A Lattice-Based Unordered Aggregate Signature Scheme Based on the Intersection Method. IEEE Access 6: 33986-33994 (2018) - [j27]Yang Chen, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Generic Construction of Outsourced Attribute-Based Encryption Without Key Escrow. IEEE Access 6: 58955-58966 (2018) - [c10]Nengqiang He, Tianqi Wang, Pingyang Chen, Hanbing Yan, Zhengping Jin:
An Android Malware Detection Method Based on Deep AutoEncoder. AICCC 2018: 88-93 - [c9]Wei Yin, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A New Insight - Proxy Re-encryption Under LWE with Strong Anti-collusion. ISPEC 2018: 559-577 - [i7]Ziqing Guo, Hua Zhang, Xin Zhang, Zhengping Jin, Qiaoyan Wen:
Secure and Efficiently Searchable IoT Communication Data Management Model: Using Blockchain as a new tool. CoRR abs/1812.08603 (2018) - 2017
- [j26]Zhengping Jin, Hong Zhang, Zhongxian Li:
Security on a Knapsack-Type Encryption Scheme Based Upon Hybrid-Model Assumption. Int. J. Netw. Secur. 19(4): 644-647 (2017) - 2016
- [j25]Zhengping Jin, Qing Wang, Zhongxian Li:
A formal construction of certificateless proxy multi-signature scheme. Int. J. Secur. Networks 11(3): 126-139 (2016) - [j24]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Adaptively Secure Broadcast Encryption With Constant Ciphertexts. IEEE Trans. Broadcast. 62(3): 709-715 (2016) - [j23]Jie Xu, Qiaoyan Wen, Wenmin Li, Zhengping Jin:
Circuit Ciphertext-Policy Attribute-Based Hybrid Encryption with Verifiable Delegation in Cloud Computing. IEEE Trans. Parallel Distributed Syst. 27(1): 119-129 (2016) - [c8]Jingjing Zhang, Zhengping Jin:
Energy-Aware Location Privacy Routing for Wireless Sensor Networks. SpaCCS Workshops 2016: 26-32 - [c7]Xixia Liu, Zhengping Jin:
ChainMR Crawler: A Distributed Vertical Crawler Based on MapReduce. SpaCCS Workshops 2016: 33-39 - 2015
- [j22]Peng Jiang, Qiaoyan Wen, Wenmin Li, Zhengping Jin, Hua Zhang:
An anonymous and efficient remote biometrics user authentication scheme in a multi server environment. Frontiers Comput. Sci. 9(1): 142-156 (2015) - [j21]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
Cryptanalysis and improvement of a certificateless aggregate signature scheme. Inf. Sci. 295: 337-346 (2015) - [j20]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems. J. Medical Syst. 39(3): 20 (2015) - [j19]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
A Novel Authentication Scheme Using Self-certified Public Keys for Telecare Medical Information Systems. J. Medical Syst. 39(6): 62:1-62:8 (2015) - [j18]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption. Secur. Commun. Networks 8(17): 3167-3179 (2015) - [j17]Dianli Guo, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Analysis and Improvement of 'Chaotic Map Based Mobile Dynamic ID Authenticated Key Agreement Scheme'. Wirel. Pers. Commun. 83(1): 35-48 (2015) - 2014
- [j16]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Frontiers Comput. Sci. 8(1): 163-173 (2014) - [j15]Xiuhua Lu, Qiaoyan Wen, Zhengping Jin, Licheng Wang, Chunli Yang:
A lattice-based signcryption scheme without random oracles. Frontiers Comput. Sci. 8(4): 667-675 (2014) - [j14]Xin Xu, Ping Zhu, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Lian He:
A Secure and Efficient Authentication and Key Agreement Scheme Based on ECC for Telecare Medicine Information Systems. J. Medical Syst. 38(1): 9994 (2014) - [j13]Xuelei Li, Qiaoyan Wen, Wenmin Li, Hua Zhang, Zhengping Jin:
Secure Privacy-Preserving Biometric Authentication Scheme for Telecare Medicine Information Systems. J. Medical Syst. 38(11): 139 (2014) - 2013
- [j12]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers Comput. Sci. 7(4): 544-557 (2013) - [j11]Xuelei Li, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks. Int. J. Netw. Manag. 23(5): 311-324 (2013) - [j10]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices. Inf. Technol. Control. 42(2): 191-204 (2013) - [j9]Rui Guo, Qiaoyan Wen, Huixian Shi, Zhengping Jin, Hua Zhang:
An Efficient and Provably-Secure Certificateless Public Key Encryption Scheme for Telecare Medicine Information Systems. J. Medical Syst. 37(5): 9965 (2013) - [c6]Rohan Garg, Komal Sodha, Zhengping Jin, Gene Cooperman:
Checkpoint-restart for a network of virtual machines. CLUSTER 2013: 1-8 - [c5]Lin Cheng, Zhengping Jin, Qiaoyan Wen, Hua Zhang:
A novel privacy preserving keyword searching for cloud storage. PST 2013: 77-81 - [i6]Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin, Wenmin Li:
Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols. CoRR abs/1301.5091 (2013) - [i5]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang, Liming Zhou:
On the security of a certificateless aggregate signature scheme. IACR Cryptol. ePrint Arch. 2013: 93 (2013) - [i4]Lin Cheng, Qiaoyan Wen, Zhengping Jin, Hua Zhang:
On the security of a certi cateless signature scheme in the standard model. IACR Cryptol. ePrint Arch. 2013: 153 (2013) - 2012
- [j8]Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin, Yanjiong Wang:
An Anonymous Password-Authenticated and Key Exchange Protocol for Roaming Services in Wireless Networks. Ad Hoc Sens. Wirel. Networks 16(1-3): 29-44 (2012) - [j7]Wenmin Li, Qiaoyan Wen, Qi Su, Zhengping Jin:
An efficient and secure mobile payment protocol for restricted connectivity scenarios in vehicular ad hoc network. Comput. Commun. 35(2): 188-195 (2012) - [j6]Lu Zhao, Qiao-Yan Wen, Jie Zhang, Zhengping Jin:
On the 2-Adic Complexity of Periodic Binary Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 367-371 (2012) - [j5]Min Zhang, Jie Zhang, Zhengping Jin, Hua Zhang, Qiao-Yan Wen:
A Light-Weight Rainbow Signature Scheme for WSN. J. Networks 7(8): 1272-1279 (2012) - [c4]Maozhen Ding, Fei Gao, Zhengping Jin, Hua Zhang:
An efficient Public Key Encryption with Conjunctive Keyword Search scheme based on pairings. IC-NIDC 2012: 526-530 - 2011
- [j4]Zhengping Jin, Qiaoyan Wen:
Certificateless multi-proxy signature. Comput. Commun. 34(3): 344-352 (2011) - [i3]Min Zhang, Jie Zhang, Qiao-Yan Wen, Zhengping Jin, Hua Zhang:
Analysis and improvement of a strongly secure certificateless key exchange protocol without pairing. CoRR abs/1112.0649 (2011) - 2010
- [j3]Zhengping Jin, Qiaoyan Wen, Hongzhen Du:
An improved semantically-secure identity-based signcryption scheme in the standard model. Comput. Electr. Eng. 36(3): 545-552 (2010) - [i2]Zhengping Jin, Qiaoyan Wen, Hua Zhang:
A supplement to Liu et al.'s certificateless signcryption scheme in the standard model. IACR Cryptol. ePrint Arch. 2010: 252 (2010)
2000 – 2009
- 2008
- [i1]Zhengping Jin, Huijuan Zuo, Hongzhen Du, Qiaoyan Wen:
An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs. IACR Cryptol. ePrint Arch. 2008: 195 (2008)
1990 – 1999
- 1990
- [c3]Peter Mowforth, J. Paul Siebert, Zhengping Jin, Colin W. Urquhart:
A head called Richard. BMVC 1990: 1-6 - [c2]Jonathan Shapiro, Zhengping Jin:
An Interactive Colour Line Recognition System for Seismic Section Digitisation. MVA 1990: 223-226
1980 – 1989
- 1989
- [c1]Peter Mowforth, Zhengping Jin:
Model Based Tissue Differentiation in MR Brain Images. Alvey Vision Conference 1989: 1-6 - 1988
- [b1]Zhengping Jin:
On the multi-scale iconic representations for low-level computer vision. University of Strathclyde, UK, 1988 - 1987
- [j2]Peter Mowforth, J. Jelinek, Zhengping Jin:
An appropriate representation for early vision. Pattern Recognit. Lett. 5(2): 175-182 (1987) - 1986
- [j1]Peter Mowforth, Zhengping Jin:
Implementation for noise suppression in images. Image Vis. Comput. 4(1): 29-37 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:21 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint