
Hong Zhong 0001
Person information
- affiliation: Anhui University, School of Computer Science and Technology, Hefei, China
Other persons with the same name
- Hong Zhong — disambiguation page
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2021
- [j84]Hong Zhong, Yiyuan Zhou, Qingyang Zhang, Yan Xu, Jie Cui:
An efficient and outsourcing-supported attribute-based access control scheme for edge-enabled smart healthcare. Future Gener. Comput. Syst. 115: 486-496 (2021) - [j83]Yongliang Cheng, Yan Xu
, Hong Zhong
, Yi Liu:
Leveraging Semisupervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT Communication. IEEE Internet Things J. 8(1): 144-155 (2021) - 2020
- [j82]Hong Zhong, Zhanfei Li, Yan Xu, Zhili Chen, Jie Cui:
Two-stage index-based central keyword-ranked searches over encrypted cloud data. Sci. China Inf. Sci. 63(3) (2020) - [j81]Qiliang Li, Jie Cui
, Hong Zhong, Yichao Du, Yonglong Luo, Lu Liu
:
LBBESA: An efficient software-defined networking load-balancing scheme based on elevator scheduling algorithm. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j80]Jing Zhang, Hong Zhong
, Jie Cui
, Yan Xu, Lu Liu
:
An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks. IEEE Internet Things J. 7(4): 3462-3473 (2020) - [j79]Yan Xu, Song Sun, Jie Cui, Hong Zhong
:
Intrusion-resilient public cloud auditing scheme with authenticator update. Inf. Sci. 512: 616-628 (2020) - [j78]Qingren Wang, Chuankai Feng, Yan Xu
, Hong Zhong, Victor S. Sheng:
A novel privacy-preserving speech recognition framework using bidirectional LSTM. J. Cloud Comput. 9: 36 (2020) - [j77]Hong Zhong, Yingxue Geng, Jie Cui, Yan Xu, Lu Liu:
A weight-based conditional privacy-preserving authentication scheme in software-defined vehicular network. J. Cloud Comput. 9: 54 (2020) - [j76]Hong Zhong, Zhanfei Li, Jie Cui, Yue Sun, Lu Liu:
Efficient dynamic multi-keyword fuzzy search over encrypted cloud data. J. Netw. Comput. Appl. 149 (2020) - [j75]Jie Cui
, Lu Wei
, Hong Zhong
, Jing Zhang, Yan Xu, Lu Liu
:
Edge Computing in VANETs-An Efficient and Privacy-Preserving Cooperative Downloading Scheme. IEEE J. Sel. Areas Commun. 38(6): 1191-1204 (2020) - [j74]Ran Ding, Yan Xu, Jie Cui
, Hong Zhong
:
A Public Auditing Protocol for Cloud Storage System With Intrusion-Resilience. IEEE Syst. J. 14(1): 633-644 (2020) - [j73]Yimin Wang, Hong Zhong, Yan Xu, Jie Cui, Ge Wu
:
Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs. IEEE Syst. J. 14(4): 5373-5383 (2020) - [j72]Jie Cui, Xiaoyu Zhang, Hong Zhong, Jing Zhang, Lu Liu:
Extensible Conditional Privacy Protection Authentication Scheme for Secure Vehicular Networks in a Multi-Cloud Environment. IEEE Trans. Inf. Forensics Secur. 15: 1654-1667 (2020) - [j71]Jing Zhang, Hong Zhong
, Jie Cui
, Miaomiao Tian
, Yan Xu
, Lu Liu:
Edge Computing-Based Privacy-Preserving Authentication Framework and Protocol for 5G-Enabled Vehicular Networks. IEEE Trans. Veh. Technol. 69(7): 7940-7954 (2020) - [j70]Jie Cui
, Yali Wang, Jing Zhang, Yan Xu
, Hong Zhong
:
Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 69(8): 8914-8924 (2020) - [j69]Jie Cui, Wenyu Xu, Yibo Han, Jing Zhang, Hong Zhong:
Secure mutual authentication with privacy preservation in vehicular ad hoc networks. Veh. Commun. 21 (2020) - [c41]Zhili Chen, Baohua Yang, Fuhu Wu, Shuai Ren, Hong Zhong:
TCNN: Two-Way Convolutional Neural Network for Image Steganalysis. SecureComm (1) 2020: 509-514 - [c40]Jie Cui, Jing Zhang, Jiantao He, Hong Zhong, Yao Lu:
DDoS detection and defense mechanism for SDN controllers with K-Means. UCC 2020: 394-401 - [c39]Yan Xu, Meng Wang
, Jie Cui, Jing Zhang, Hong Zhong
:
LPE-RCM: Lightweight Privacy-Preserving Edge-Based Road Condition Monitoring for VANETs. WASA (2) 2020: 78-86 - [i12]Tianjiao Ni, Zhili Chen, Lin Chen, Hong Zhong, Shun Zhang, Yan Xu:
Differentially Private Combinatorial Cloud Auction. CoRR abs/2001.00694 (2020) - [i11]Zhili Chen, Wei Ding, Yan Xu, Miaomiao Tian, Hong Zhong:
Fair Auction and Trade Framework for Cloud VM Allocation based on Blockchain. CoRR abs/2001.00771 (2020) - [i10]Shun Zhang, Benfei Duan, Zhili Chen, Hong Zhong, Qizhi Yu:
A Differentially Private Framework in Spatial Crowdsourcing with Historical Data Learning. CoRR abs/2008.03475 (2020) - [i9]Tianjiao Ni, Minghao Qiao, Zhili Chen, Shun Zhang, Hong Zhong:
Utility-efficient Differentially Private K-means Clustering based on Cluster Merging. CoRR abs/2010.01234 (2020) - [i8]Zhili Chen, Yuting Wang, Tianjiao Ni, Hong Zhong:
DCDChain: A Credible Architecture of Digital Copyright Detection Based on Blockchain. CoRR abs/2010.01235 (2020)
2010 – 2019
- 2019
- [b1]Sheng Zhong, Hong Zhong, Xinyi Huang, Panlong Yang, Jin Shi, Lei Xie, Kun Wang:
Security and Privacy for Next-Generation Wireless Networks. Wireless Networks, Springer 2019, ISBN 978-3-030-01149-9, pp. 1-180 - [j68]Hong Zhong
, Lei Pan, Qingyang Zhang, Jie Cui
:
A New Message Authentication Scheme for Multiple Devices in Intelligent Connected Vehicles Based on Edge Computing. IEEE Access 7: 108211-108222 (2019) - [j67]Miaomiao Tian
, Shibei Ye, Hong Zhong
, Fei Chen
, Chuang Gao, Jie Chen:
Publicly-Verifiable Proofs of Storage Based on the Discrete Logarithm Problem. IEEE Access 7: 129071-129081 (2019) - [j66]Jingwen Pan, Jie Cui
, Lu Wei, Yan Xu, Hong Zhong:
Secure data sharing scheme for VANETs based on edge computing. EURASIP J. Wirel. Commun. Netw. 2019: 169 (2019) - [j65]Jie Cui, Mingjun Wang, Yonglong Luo, Hong Zhong:
DDoS detection and defense mechanism based on cognitive-inspired computing in SDN. Future Gener. Comput. Syst. 97: 275-283 (2019) - [j64]Jie Cui
, Xiaoyu Zhang, Hong Zhong
, Zuobin Ying
, Lu Liu
:
RSMA: Reputation System-Based Lightweight Message Authentication Framework and Protocol for 5G-Enabled Vehicular Networks. IEEE Internet Things J. 6(4): 6417-6428 (2019) - [j63]Ran Ding, Hong Zhong
, Jianfeng Ma, Ximeng Liu
, Jianting Ning
:
Lightweight Privacy-Preserving Identity-Based Verifiable IoT-Based Health Storage System. IEEE Internet Things J. 6(5): 8393-8405 (2019) - [j62]Hong Zhong
, Shunshun Han, Jie Cui
, Jing Zhang, Yan Xu:
Privacy-preserving authentication scheme with full aggregation in VANET. Inf. Sci. 476: 211-221 (2019) - [j61]Jie Cui
, Han Zhou, Yan Xu, Hong Zhong
:
OOABKS: Online/offline attribute-based encryption for keyword search in mobile cloud. Inf. Sci. 489: 63-77 (2019) - [j60]Shun Zhang, Laixiang Liu, Zhili Chen, Hong Zhong:
Probabilistic matrix factorization with personalized differential privacy. Knowl. Based Syst. 183 (2019) - [j59]Qingyang Zhang
, Hui Sun, Xiaopei Wu, Hong Zhong
:
Edge Video Analytics for Public Safety: A Review. Proc. IEEE 107(8): 1675-1696 (2019) - [j58]Hong Zhong, Jianqiao Sheng, Yan Xu, Jie Cui
:
SCPLBS: a smart cooperative platform for load balancing and security on SDN distributed controllers. Peer Peer Netw. Appl. 12(2): 440-451 (2019) - [j57]Zhili Chen
, Tianjiao Ni
, Hong Zhong, Shun Zhang
, Jie Cui
:
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization. IEEE Trans. Inf. Forensics Secur. 14(11): 2805-2818 (2019) - [j56]Jie Cui
, Lu Wei
, Jing Zhang
, Yan Xu, Hong Zhong
:
An Efficient Message-Authentication Scheme Based on Edge Computing for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 20(5): 1621-1632 (2019) - [j55]Jie Cui
, Di Wu, Jing Zhang
, Yan Xu, Hong Zhong
:
An Efficient Authentication Scheme Based on Semi-Trusted Authority in VANETs. IEEE Trans. Veh. Technol. 68(3): 2972-2986 (2019) - [j54]Zhili Chen
, Ruihong Che, Hong Zhong, Miaomiao Tian, Jie Cui:
PATH: privacy-preserving auction for heterogeneous spectrum allocations. Wirel. Networks 25(4): 1763-1776 (2019) - [c38]Hong Zhong
, JianZhong Zou
, Jie Cui
, Yan Xu
:
RTEF-PP: A Robust Trust Evaluation Framework with Privacy Protection for Cloud Services Providers. ICA3PP (1) 2019: 330-344 - [c37]Ke Cheng, Yulong Slien, Yuzhen Zhang, Xinghui Zhu, Liangmin Wang, Hong Zhong:
Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets. ICC 2019: 1-6 - [c36]Lin Wang, Qingyang Zhang, Youhuizi Li, Hong Zhong, Weisong Shi
:
MobileEdge: Enhancing On-Board Vehicle Computing Units Using Mobile Edges for CAVs. ICPADS 2019: 470-479 - [c35]Yongliang Cheng, Yan Xu, Hong Zhong, Yi Liu:
HS-TCN: A Semi-supervised Hierarchical Stacking Temporal Convolutional Network for Anomaly Detection in IoT. IPCCC 2019: 1-7 - [i7]Zhili Chen, Xiaoli Kan, Shun Zhang, Lin Chen, Yan Xu, Hong Zhong:
Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics. CoRR abs/1908.03715 (2019) - [i6]Yin Xu, Zhili Chen, Hong Zhong:
Privacy-preserving Double Auction Mechanism Based on Homomorphic Encryption and Sorting Networks. CoRR abs/1909.07637 (2019) - 2018
- [j53]Hong Zhong
, Bo Huang, Jie Cui
, Yan Xu, Lu Liu
:
Conditional Privacy-Preserving Authentication Using Registration List in Vehicular Ad Hoc Networks. IEEE Access 6: 2241-2250 (2018) - [j52]Hong Zhong, Yaming Fang, Jie Cui:
Reprint of "LBBSRT: An efficient SDN load balancing scheme based on server response time". Future Gener. Comput. Syst. 80: 409-416 (2018) - [j51]Miaomiao Tian, Lingyan Wang, Hong Zhong, Jie Chen:
Attribute-based Data Integrity Checking for Cloud Storage. Fundam. Informaticae 163(4): 395-411 (2018) - [j50]Jie Cui
, Jingyu Wen, Shunshun Han, Hong Zhong
:
Efficient Privacy-Preserving Scheme for Real-Time Location Data in Vehicular Ad-Hoc Network. IEEE Internet Things J. 5(5): 3491-3498 (2018) - [j49]Qingyang Zhang
, Quan Zhang
, Weisong Shi
, Hong Zhong
:
Distributed Collaborative Execution on the Edges and Its Application to AMBER Alerts. IEEE Internet Things J. 5(5): 3580-3593 (2018) - [j48]Jie Cui, Han Zhou, Hong Zhong, Yan Xu:
AKSER: Attribute-based keyword search with efficient revocation in cloud computing. Inf. Sci. 423: 343-352 (2018) - [j47]Jie Cui, Jing Zhang, Hong Zhong, Runhua Shi, Yan Xu:
An efficient certificateless aggregate signature without pairings for vehicular ad hoc networks. Inf. Sci. 451-452: 1-15 (2018) - [j46]Hong Zhong, Lili Shao, Jie Cui
, Yan Xu:
An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks. J. Parallel Distributed Comput. 111: 1-12 (2018) - [j45]Jie Cui, Lili Shao, Hong Zhong, Yan Xu, Lu Liu:
Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer Peer Netw. Appl. 11(5): 1022-1037 (2018) - [j44]Jie Cui
, Wenyu Xu, Hong Zhong
, Jing Zhang, Yan Xu, Lu Liu:
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles. Sensors 18(5): 1453 (2018) - [j43]Hong Zhong, Wenlong Zhu, Yan Xu, Jie Cui:
Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 22(1): 243-251 (2018) - [j42]Jie Cui
, Qinghe Lu
, Hong Zhong
, Miaomiao Tian, Lu Liu
:
A Load-Balancing Mechanism for Distributed SDN Control Plane Using Response Time. IEEE Trans. Netw. Serv. Manag. 15(4): 1197-1206 (2018) - [j41]Quan Zhang
, Qingyang Zhang, Weisong Shi
, Hong Zhong
:
Firework: Data Processing and Sharing for Hybrid Cloud-Edge Analytics. IEEE Trans. Parallel Distributed Syst. 29(9): 2004-2017 (2018) - [j40]Jie Cui, Xuefei Tao
, Jing Zhang, Yan Xu, Hong Zhong:
HCPA-GKA: A hash function-based conditional privacy-preserving authentication and group-key agreement scheme for VANETs. Veh. Commun. 14: 15-25 (2018) - [c34]Yan Xu, Ran Ding, Jie Cui, Hong Zhong:
Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. ACISP 2018: 399-416 - [c33]Jie Cui, Jiantao He, Yan Xu, Hong Zhong:
TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. ACISP 2018: 649-665 - [c32]Qingyang Zhang, Hong Zhong, Jiaoren Wu, Weisong Shi
:
How Edge Computing and Initial Congestion Window Affect Latency of Web-Based Services: Early Experiences with Baidu? SEC 2018: 393-398 - [c31]Jie Cui, Qinghe Lu, Hong Zhong, Miaomiao Tian, Lu Liu:
SMCLBRT: A Novel Load-Balancing Strategy of Multiple SDN Controllers Based on Response Time. HPCC/SmartCity/DSS 2018: 541-546 - [c30]Zhili Chen, Xianyue Bao, Zuobin Ying, Ximeng Liu, Hong Zhong:
Differentially Private Location Protection with Continuous Time Stamps for VANETs. ICA3PP (4) 2018: 204-219 - [c29]Miaomiao Tian, Shibei Ye, Hong Zhong, Lingyan Wang, Fei Chen, Jie Cui:
Identity-Based Proofs of Storage with Enhanced Privacy. ICA3PP (4) 2018: 461-480 - [c28]Hong Zhong, Bo Huang, Jie Cui, Jiang Li, Kewei Sha:
Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET. ICCCN 2018: 1-8 - [c27]Jie Cui, Sheng Zhou, Hong Zhong, Yan Xu, Kewei Sha:
Transaction-Based Flow Rule Conflict Detection and Resolution in SDN. ICCCN 2018: 1-9 - [c26]Qingyang Zhang, Yifan Wang, Xingzhou Zhang, Liangkai Liu, Xiaopei Wu, Weisong Shi
, Hong Zhong:
OpenVDAP: An Open Vehicular Data Analytics Platform for CAVs. ICDCS 2018: 1310-1320 - [c25]Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:
PP-MCSA: Privacy Preserving Multi-channel Double Spectrum Auction. ICICS 2018: 248-267 - [i5]Zhili Chen, Tianjiao Ni, Hong Zhong, Shun Zhang, Jie Cui:
Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization. CoRR abs/1810.07873 (2018) - [i4]Zhili Chen, Xuemei Wei, Hong Zhong, Jie Cui, Yan Xu, Shun Zhang:
Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter. CoRR abs/1810.07880 (2018) - [i3]Zhili Chen, Sheng Chen, Hong Zhong, Lin Chen, Miaomiao Tian:
PP-MCSA: Privacy Preserving Multi-Channel Double Spectrum Auction. CoRR abs/1810.08451 (2018) - [i2]Shun Zhang, Laixiang Liu, Zhili Chen, Hong Zhong:
Probabilistic Matrix Factorization with Personalized Differential Privacy. CoRR abs/1810.08509 (2018) - [i1]Zhili Chen, Yu Wang, Shun Zhang, Hong Zhong, Lin Chen:
Differentially Private User-based Collaborative Filtering Recommendation Based on K-means Clustering. CoRR abs/1812.01782 (2018) - 2017
- [j39]Liangmin Wang, Qing-Qing Xie
, Hong Zhong
:
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data. IEEE Access 5: 3216-3227 (2017) - [j38]Yan Xu, Ming Wang, Hong Zhong
, Jie Cui
, Lu Liu, Virginia N. L. Franqueira
:
Verifiable Public Key Encryption Scheme With Equality Test in 5G Networks. IEEE Access 5: 12702-12713 (2017) - [j37]Jie Cui, Hong Zhong, Weiya Luo, Jing Zhang:
Area-based mobile multicast group key management scheme for secure mobile cooperative sensing. Sci. China Inf. Sci. 60(9): 098104:1-098104:3 (2017) - [j36]Hong Zhong, Weiya Luo, Jie Cui:
Multiple multicast group key management for the Internet of People. Concurr. Comput. Pract. Exp. 29(3) (2017) - [j35]Hong Zhong, Yaming Fang, Jie Cui:
LBBSRT: An efficient SDN load balancing scheme based on server response time. Future Gener. Comput. Syst. 68: 183-190 (2017) - [j34]Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, Yimin Wang:
An Efficient ID-based Online/Offline Signature Scheme without Key Escrow. Int. J. Netw. Secur. 19(1): 127-137 (2017) - [j33]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Inf. Process. 16(1): 8 (2017) - [j32]Zhen-wan Peng, Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 16(12): 316 (2017) - [j31]Song Li, Jie Cui
, Hong Zhong, Yiwen Zhang, Qiang He:
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks. Secur. Commun. Networks 2017: 4364376:1-4364376:16 (2017) - [j30]Song Li, Jie Cui
, Hong Zhong, Lu Liu:
Public Auditing with Privacy Protection in a Multi-User Model of Cloud-Assisted Body Sensor Networks. Sensors 17(5): 1032 (2017) - [j29]Jie Cui
, Jing Zhang
, Hong Zhong, Yan Xu:
SPACF: A Secure Privacy-Preserving Authentication Scheme for VANET With Cuckoo Filter. IEEE Trans. Veh. Technol. 66(11): 10283-10295 (2017) - [c24]Jie Cui, Wenyu Xu, Kewei Sha, Hong Zhong:
An Efficient Identity-Based Privacy-Preserving Authentication Scheme for VANETs. CollaborateCom 2017: 508-518 - [c23]Hong Zhong, Jianqiao Sheng, Jie Cui, Yan Xu:
SCPLBS: A Smart Cooperative Platform for Load Balancing and Security on SDN Distributed Controllers. CYBCONF 2017: 1-6 - [c22]Zhili Chen, Lin Chen, Hong Zhong:
Towards Secure and Verifiable Database-Driven Spectrum Sharing. DSN 2017: 285-296 - [c21]Qingyang Zhang, Quan Zhang, Weisong Shi
, Hong Zhong:
Enhancing AMBER alert using collaborative edges: poster. SEC 2017: 27:1-27:2 - [c20]Jie Cui, Jingyu Wen, Hong Zhong, Jing Zhang:
A Privacy Protection Scheme for Vehicle's Location Based on Virtual Location and Route Confusion. iThings/GreenCom/CPSCom/SmartData 2017: 190-194 - [c19]Zhili Chen, Xuemei Wei, Hong Zhong, Jie Cui, Yan Xu, Shun Zhang:
Secure, efficient and practical double spectrum auction. IWQoS 2017: 1-6 - 2016
- [j28]Yimin Wang, Hong Zhong, Yan Xu, Jie Cui:
ECPB: Efficient Conditional Privacy-Preserving Authentication Scheme Supporting Batch Verification for VANETs. Int. J. Netw. Secur. 18(2): 374-382 (2016) - [j27]Yan Xu, Liusheng Huang, Miaomiao Tian, Hong Zhong:
Insecurity of a Certificate-free Ad Hoc Anonymous Authentication. Int. J. Netw. Secur. 18(5): 993-996 (2016) - [j26]Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui:
Keyword search protocol with privacy preservation using ID-based proxy reencryption. Int. J. Secur. Networks 11(4): 188-195 (2016) - [j25]Runhua Shi, Yi Mu, Hong Zhong, Shun Zhang, Jie Cui:
Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370-371: 147-158 (2016) - [j24]Runhua Shi, Hong Zhong, Shun Zhang:
A Novel Authenticated Group Key Distribution Scheme. KSII Trans. Internet Inf. Syst. 10(2): 935-946 (2016) - [j23]Hong Zhong, Song Li, Ting-Fang Cheng, Chin-Chen Chang:
An Efficient Electronic English Auction System with a Secure On-Shelf Mechanism and Privacy Preserving. J. Electr. Comput. Eng. 2016: 6567146:1-6567146:14 (2016) - [j22]Yan Xu, Hong Zhong, Jie Cui:
An Improved Identity-Based Multi-Proxy Multi-Signature Scheme. J. Inf. Hiding Multim. Signal Process. 7(2): 343-351 (2016) - [j21]Hong Zhong, Haiquan Liu, Chin-Chen Chang, Chia-Chen Lin:
A Novel Fragile Watermark-Based Image Authentication Scheme for AMBTC-Compressed Images. J. Inf. Hiding Multim. Signal Process. 7(2): 362-375 (2016) - [j20]Xuan Tang, Hong Zhong, Runhua Shi, Jie Cui:
基于编码和同态加密的高效SMP方案 (Efficient Solution to SMP Based on Coding and Homomorphic Encryption). 计算机科学 43(1): 181-185 (2016) - [j19]Jiafu Yu, Hong Zhong, Yimin Wang:
基于组合阶双线性群的组签名方案的分析与改进 (Correctness Analysis and Improvement of Group Signature in Composite Order Bilinear Groups). 计算机科学 43(2): 179-182 (2016) - [j18]Conglin Huang, Hong Zhong, Yimin Wang:
基于中国剩余定理的群签名改进方案 (Improved Group Signature Scheme Based on Chinese Remainder Theorem). 计算机科学 43(3): 174-178 (2016) - [j17]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
An efficient quantum scheme for Private Set Intersection. Quantum Inf. Process. 15(1): 363-371 (2016) - [j16]Hong Zhong, Jie Cui, Runhua Shi, Chao Xia:
Many-to-one homomorphic encryption scheme. Secur. Commun. Networks 9(10): 1007-1015 (2016) - [j15]Yimin Wang, Hong Zhong, Yan Xu, Jie Cui, Funchun Guo:
Efficient extensible conditional privacy-preserving authentication scheme supporting batch verification for VANETs. Secur. Commun. Networks 9(18): 5460-5471 (2016) - [j14]Ke Cheng, Liangmin Wang, Hong Zhong:
Secure Nearest Neighbor Query on Crowd-Sensing Data. Sensors 16(10): 1545 (2016) - [c18]Qing-Qing Xie, Liangmin Wang, Hong Zhong:
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data. CBD 2016: 200-206 - [c17]Qingyang Zhang, Zhifeng Yu, Weisong Shi
, Hong Zhong:
Demo Abstract: EVAPS: Edge Video Analysis for Public Safety. SEC 2016: 121-122 - [c16]Dongrui Fan, Hong Zhong, Ali R. Hurson, Weisong Shi
:
Message from the chairs. IGSC 2016: 1 - [c15]Quan Zhang, Xiaohong Zhang, Qingyang Zhang, Weisong Shi
, Hong Zhong:
Firework: Big Data Sharing and Processing in Collaborative Edge Environment. HotWeb 2016: 20-25 - [c14]Zhili Chen, Lin Chen, Liusheng Huang, Hong Zhong:
Towards secure spectrum auction: both bids and bidder locations matter: poster. MobiHoc 2016: 361-362 - [c13]Hong Zhong, Lili Shao, Jie Cui:
A Lightweight and Secure Data Authentication Scheme with Privacy Preservation for Wireless Sensor Networks. NaNA 2016: 210-217 - [c12]Zhili Chen, Lin Chen, Liusheng Huang, Hong Zhong:
On Privacy-Preserving Cloud Auction. SRDS 2016: 279-288 - [c11]Song Li, Hong Zhong, Jie Cui:
Public auditing scheme for cloud-based wireless body area network. UCC 2016: 375-381 - [c10]Jie Cui, Hong Zhong, Xuan Tang, Jing Zhang:
A fined-grained privacy-preserving access control protocol in wireless sensor networks. UCC 2016: 382-387 - 2015
- [j13]Jie Cui, Hong Zhong, Runhua Shi, Jiankai Wang:
Related-key cryptanalysis on 7-round AES-128/192. Int. J. Electron. Secur. Digit. Forensics 7(2): 166-178 (2015) - [j12]