Yichen Zhang
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j54]Yang Lu
, Jiguo Li, Yichen Zhang:
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search. IEEE Access 7: 40878-40892 (2019) - [j53]Yichen Zhang, Jiguo Li
, Hao Yan:
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure. IEEE Access 7: 47982-47990 (2019) - [j52]Shengzhou Hu, Jiguo Li
, Yichen Zhang:
A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation. IEEE Access 7: 84866-84875 (2019) - [j51]Zhiguo Lu, Menglei Lin
, Shixiong Wang, Yichen Zhang, Yongji Yu:
Research on a New-Style Under-Actuated Omnidirectional Mobile Robot Based on Special Coupling Drive System. IEEE Access 7: 152138-152148 (2019) - [j50]Ziyang Chen
, Yichen Zhang
, Xiangyu Wang
, Song Yu, Hong Guo:
Improving Parameter Estimation of Entropic Uncertainty Relation in Continuous-Variable Quantum Key Distribution. Entropy 21(7): 652 (2019) - [j49]Qiang Dou, Shengwu Qin
, Yichen Zhang, Zhongjun Ma
, Junjun Chen, Shuangshuang Qiao, Xiuyu Hu, Fei Liu:
A Method for Improving Controlling Factors Based on Information Fusion for Debris Flow Susceptibility Mapping: A Case Study in Jilin Province, China. Entropy 21(7): 695 (2019) - [j48]Luyu Huang
, Yichen Zhang
, Ziyang Chen, Song Yu:
Unidimensional Continuous-Variable Quantum Key Distribution with Untrusted Detection under Realistic Conditions. Entropy 21(11): 1100 (2019) - [j47]Lina Han, Jiquan Zhang, Yichen Zhang, Qing Ma, Alu Si, Qiuling Lang:
Hazard Assessment of Earthquake Disaster Chains Based on a Bayesian Network Model and ArcGIS. ISPRS Int. J. Geo-Information 8(5): 210 (2019) - [j46]Jiguo Li
, Qihong Yu, Yichen Zhang, Jian Shen:
Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470: 175-188 (2019) - [j45]Jiguo Li, Qihong Yu, Yichen Zhang:
Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 484: 113-134 (2019) - [j44]Liqing Chen, Jiguo Li, Yichen Zhang:
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. TIIS 13(3): 1523-1545 (2019) - [j43]Xiangyu Wang, Yichen Zhang, Song Yu, Hong Guo:
High efficiency postprocessing for continuous-variable quantum key distribution: using all raw keys for parameter estimation and key extraction. Quantum Information Processing 18(9): 264 (2019) - [j42]Weihong Fu, Yichen Zhang:
Wideband Blind Source Separation Algorithm Based on Beamforming. Wireless Personal Communications 108(1): 221-234 (2019) - [c18]Yichen Zhang, Fatima Zohra Taousser, Mohammed M. Olama, Seddik M. Djouadi, Yaosuo Xue, Ben Ollis, Kevin Tomsovic:
Secondary Voltage Control Via Demand-Side Energy Storage with Temporal Logic Specifications. ISGT 2019: 1-5 - [c17]Ziyong Zheng, Yichen Zhang, Song Yu, Hong Guo:
Experimental Implementation of Bias-free Quantum Random Number Generator based on Vacuum Fluctuation. PHOTOPTICS 2019: 276-282 - [i13]Yichen Zhang, Shanshan Jia, Yajing Zheng, Zhaofei Yu, Yonghong Tian, Tiejun Huang, Jian K. Liu:
Reconstruction of Natural Visual Scenes from Neural Spikes with Deep Neural Networks. CoRR abs/1904.13007 (2019) - [i12]Jiao Xie, Shaohui Lin, Yichen Zhang, Linkai Luo:
Training convolutional neural networks with cheap convolutions and online distillation. CoRR abs/1909.13063 (2019) - 2018
- [j41]Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and Improvement for Certificateless Aggregate Signature. Fundam. Inform. 157(1-2): 111-123 (2018) - [j40]Jiguo Li, Qihong Yu, Yichen Zhang:
Identity-based broadcast encryption with continuous leakage resilience. Inf. Sci. 429: 177-193 (2018) - [j39]Jiguo Li
, Liqing Chen, Yang Lu
, Yichen Zhang:
Anonymous certificate-based broadcast encryption with constant decryption cost. Inf. Sci. 454-455: 110-127 (2018) - [j38]Shengzhou Hu, Jiguo Li, Yichen Zhang:
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption. TIIS 12(10): 5100-5119 (2018) - [j37]Jiguo Li
, Shengzhou Hu, Yichen Zhang:
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key. Security and Communication Networks 2018: 8738960:1-8738960:10 (2018) - [j36]Jiguo Li
, Wei Yao, Jinguang Han
, Yichen Zhang, Jian Shen
:
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage. IEEE Systems Journal 12(2): 1767-1777 (2018) - [j35]Yuyan Guo, Jiguo Li, Yang Lu, Yichen Zhang, Futai Zhang:
Provably secure certificate-based encryption with leakage resilience. Theor. Comput. Sci. 711: 1-10 (2018) - [c16]Yichen Zhang, Alexander Melin, Mohammed M. Olama, Seddik M. Djouadi, Jin Dong
, Kevin Tomsovic:
Battery energy storage scheduling for optimal load variance minimization. ISGT 2018: 1-5 - [c15]Yao Ding, Yichen Zhang, Yanyun Qu, Cuihua Li:
Deformable Feature Pyramid Network for Ship Recognition. PCM (3) 2018: 57-66 - [i11]Yichen Zhang, Kevin Tomsovic, Seddik M. Djouadi, Héctor Pulgar-Painemal:
Hybrid Controller for Wind Turbine Generators to Ensure Adequate Frequency Response in Power Networks. CoRR abs/1802.03429 (2018) - [i10]Yichen Zhang, Alexander Melin, Mohammed M. Olama, Seddik M. Djouadi, Jin Dong, Kevin Tomsovic:
Battery Energy Storage Scheduling for Optimal Load Variance Minimization. CoRR abs/1802.03442 (2018) - [i9]Yichen Zhang, M. Ehsan Raoufat, Kevin Tomsovic, Seddik M. Djouadi:
Set Theory-Based Safety Supervisory Control for Wind Turbines to Ensure Adequate Frequency Response. CoRR abs/1803.03694 (2018) - [i8]Yichen Zhang, Alexander M. Melin, Seddik M. Djouadi, Mohammed M. Olama, Kevin Tomsovic:
Provision for Guaranteed Inertial Response in Diesel-Wind Systems via Model Reference Control. CoRR abs/1804.04535 (2018) - [i7]Yichen Zhang, Mohammed M. Olama, Alexander Melin, Yaosuo Xue, Seddik M. Djouadi, Kevin Tomsovic:
Synthesizing Distributed Energy Resources in Microgrids with Temporal Logic Specifications. CoRR abs/1804.08209 (2018) - [i6]Qi Yan, Yajing Zheng, Shanshan Jia, Yichen Zhang, Zhaofei Yu, Feng Chen, Yonghong Tian, Tiejun Huang, Jian K. Liu:
Revealing Fine Structures of the Retinal Receptive Field by Deep Learning Networks. CoRR abs/1811.02290 (2018) - [i5]Xi Chen, Weidong Liu, Yichen Zhang:
First-order Newton-type Estimator for Distributed Estimation and Inference. CoRR abs/1811.11368 (2018) - 2017
- [j34]Yichen Zhang
, Kevin Tomsovic, Seddik M. Djouadi, Héctor Pulgar-Painemal:
Hybrid Controller for Wind Turbine Generators to Ensure Adequate Frequency Response in Power Networks. IEEE J. Emerg. Sel. Topics Circuits Syst. 7(3): 359-370 (2017) - [j33]Jiguo Li, Yuerong Shi, Yichen Zhang:
Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int. J. Communication Systems 30(1) (2017) - [j32]Xiangyu Wang, Yichen Zhang, Zhengyu Li, Bingjie Xu, Song Yu, Hong Guo:
Efficient rate-adaptive reconciliation for CV-QKD protocol. Quantum Information & Computation 17(13&14): 1123-1134 (2017) - [j31]Yijia Zhao, Yichen Zhang
, Zhengyu Li, Song Yu, Hong Guo:
Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction. Quantum Information Processing 16(8): 184 (2017) - [j30]Jiguo Li
, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Security and Communication Networks 2017: 3596205:1-3596205:11 (2017) - [j29]Pengyun Chen
, Yichen Zhang, Zhenhong Jia, Jie Yang, Nikola Kasabov
:
Remote Sensing Image Change Detection Based on NSCT-HMT Model and Its Application. Sensors 17(6): 1295 (2017) - [j28]Hao Yan, Jiguo Li
, Jinguang Han
, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. IEEE Trans. Information Forensics and Security 12(1): 78-88 (2017) - [j27]Jiguo Li, Xiaonan Lin, Yichen Zhang, Jinguang Han
:
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage. IEEE Trans. Services Computing 10(5): 715-725 (2017) - [j26]Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian, Jinguang Han
:
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Trans. Services Computing 10(5): 785-796 (2017) - [c14]Yichen Zhang, Alexander Melin, Seddik M. Djouadi, Mohammed M. Olama:
Performance guaranteed inertia emulation for diesel-wind system feed microgrid via model reference control. ISGT 2017: 1-5 - [i4]Yichen Zhang, Alexander Melin, Seddik M. Djouadi, Mohammed M. Olama:
Performance Guaranteed Inertia Emulation for Diesel-Wind System Feed Microgrid via Model Reference Control. CoRR abs/1710.05700 (2017) - 2016
- [j25]Jiguo Li, Na Qian, Yichen Zhang, Xinyi Huang:
An Efficient Certificate-Based Designated Verifier Signature Scheme. Computing and Informatics 35(5): 1210-1230 (2016) - [j24]Jiguo Li, Haiting Du, Yichen Zhang:
Certificate-Based Key-Insulated Signature in the Standard Model. Comput. J. 59(7): 1028-1039 (2016) - [j23]Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu:
A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. Comput. J. 59(7): 1066-1075 (2016) - [j22]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang, Futai Zhang:
Continuous leakage-resilient certificate-based encryption. Inf. Sci. 355-356: 1-14 (2016) - [j21]Jiguo Li, Haiping Wang, Yichen Zhang, Jian Sheng:
Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. TIIS 10(7): 3339-3352 (2016) - [j20]Jiguo Li, Xuexia Zhao, Yichen Zhang, Wei Yao:
Provably Secure Certificate-based Conditional Proxy Re-encryption. J. Inf. Sci. Eng. 32(4): 813-830 (2016) - [j19]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang
:
Certificate-based encryption resilient to key leakage. Journal of Systems and Software 116: 101-112 (2016) - [j18]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang:
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Security and Communication Networks 9(10): 1016-1024 (2016) - [j17]Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen:
Hierarchical attribute-based encryption with continuous auxiliary inputs leakage. Security and Communication Networks 9(18): 4852-4862 (2016) - [c13]Ang Lu, Yichen Zhang, Lu Yu:
General Synthesized View Distortion Estimation for Depth Map Compression of FTV. DCC 2016: 496-505 - [i3]Bin Wang, Yichen Zhang, Kai Sun, Kevin Tomsovic:
Emulated Inertia and Damping of Converter-Interfaced Power Source. CoRR abs/1611.02698 (2016) - [i2]Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. IACR Cryptology ePrint Archive 2016: 692 (2016) - 2015
- [j16]Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou:
A Forward-Secure Certificate-Based Signature Scheme. Comput. J. 58(4): 853-866 (2015) - [j15]Yichen Zhang
, Zhengyu Li, Christian Weedbrook, Kevin Marshall, Stefano Pirandola
, Song Yu, Hong Guo:
Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution. Entropy 17(7): 4547-4562 (2015) - [j14]Huiling Qian, Jiguo Li, Yichen Zhang, Jinguang Han
:
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Sec. 14(6): 487-497 (2015) - [j13]Yichen Zhang, Song Yu, Hong Guo:
Application of practical noiseless linear amplifier in no-switching continuous-variable quantum cryptography. Quantum Information Processing 14(11): 4339-4349 (2015) - [j12]Jiguo Li, Jingjing Zhao, Yichen Zhang:
Certificateless online/offline signcryption scheme. Security and Communication Networks 8(11): 1979-1990 (2015) - [j11]Qihong Yu, Jiguo Li, Yichen Zhang:
Leakage-resilient certificate-based encryption. Security and Communication Networks 8(18): 3346-3355 (2015) - [c12]Yichen Zhang, Ngai-Man Cheung, Lu Yu:
On the Efficiency of View Synthesis Prediction for 3D Video Coding. DCC 2015: 283-292 - [c11]Yichen Zhang, Ngai-Man Cheung, Lu Yu:
The efficiency of view synthesis prediction for 3D video coding: A spectral domain analysis. ICASSP 2015: 1453-1457 - [i1]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. IACR Cryptology ePrint Archive 2015: 314 (2015) - 2014
- [j10]Tong Hao, Zheng Zeng, Bin Wang, Yichen Zhang, Yichen Liu, Xuyun Geng, Jinsheng Sun:
The protein-protein interaction network of eyestalk, Y-organ and hepatopancreas in Chinese mitten crab Eriocheir sinensis. BMC Systems Biology 8: 39 (2014) - [j9]Jiguo Li, Haiting Du, Yichen Zhang, Tao Li, Yuexin Zhang:
Provably secure certificate-based key-insulated signature scheme. Concurrency and Computation: Practice and Experience 26(8): 1546-1560 (2014) - [j8]Yichen Zhang, Yin Zhao, Lu Yu:
Block-Based In-Loop View Synthesis for 3-D Video Coding. IEEE Signal Process. Lett. 21(4): 441-444 (2014) - [c10]Yichen Zhang:
The Ergativization of the Verb "死"[si](Die) in Chinese Language History. CLSW 2014: 124-133 - [c9]Huibin Zhuang, Yichen Zhang, Xiangling Li, Shaoshuai Shen, Zhenqian Liu:
On chi: Its Gestalt and Collocations. CLSW 2014: 143-152 - [c8]Jiguo Li, Xuexia Zhao, Yichen Zhang:
Certificate-Based Conditional Proxy Re-Encryption. NSS 2014: 299-310 - 2013
- [j7]Jiguo Li, Zhiwei Wang, Yichen Zhang:
Provably secure certificate-based signature scheme without pairings. Inf. Sci. 233: 313-320 (2013) - [j6]Ji Yao, Jiguo Li, Yichen Zhang:
Certificate-Based Encryption Scheme without Pairing. TIIS 7(6): 1480-1491 (2013) - [j5]Jiguo Li, Yanqiong Li, Yichen Zhang:
Provably Secure Forward Secure Certificateless Proxy Signature Scheme. TIIS 7(8): 1972-1988 (2013) - [c7]Huiling Qian, Jiguo Li, Yichen Zhang:
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. ICICS 2013: 363-372 - [c6]Yin Zhao, Yichen Zhang, Lu Yu:
Subjective study of binocular rivalry in stereoscopic images with transmission and compression artifacts. ICIP 2013: 132-135 - [c5]Yin Zhao, Yichen Zhang, Peng Lu, Lu Yu:
Synthesized disparity vectors for 3D video coding. ICIP 2013: 1734-1737 - [c4]Jiguo Li, Yanqiong Li, Yichen Zhang:
Forward Secure Certificateless Proxy Signature Scheme. NSS 2013: 350-364 - 2012
- [j4]Jiguo Li, Xinyi Huang, Meixue Hong, Yichen Zhang:
Certificate-based signcryption with enhanced security features. Computers & Mathematics with Applications 64(6): 1587-1601 (2012) - [j3]Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. Journal of Systems and Software 85(2): 314-322 (2012) - [c3]Jiguo Li, Yichen Zhang, Huiyun Teng:
A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. CSS 2012: 362-376 - [c2]Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, Yuexin Zhang:
Certificate-Based Key-Insulated Signature. ICDKE 2012: 206-220
2000 – 2009
- 2009
- [j2]Jiguo Li, Lizhong Xu, Yichen Zhang:
Provably Secure Certificate-based Proxy Signature Schemes. JCP 4(6): 444-452 (2009) - 2006
- [c1]Jiguo Li, Yichen Zhang, Zhijian Wang:
Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ICICIC (1) 2006: 480-483 - 2003
- [j1]Jiguo Li, Zhenfu Cao, Yichen Zhang:
Nonrepudiable Proxy Multi-Signature Scheme. J. Comput. Sci. Technol. 18(3): 399-402 (2003)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-11-29 21:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint