default search action
Zhuolin Mei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Zhuolin Mei, Jing Zeng, Caicai Zhang, Shimao Yao, Shunli Zhang, Haibin Wang, Hongbo Li, Jiaoli Shi:
Efficient and Verifiable Range Query Scheme for Encrypted Geographical Information in Untrusted Cloud Environments. ISPRS Int. J. Geo Inf. 13(8): 281 (2024) - [j13]Zhuolin Mei, Jing Yu, Caicai Zhang, Bin Wu, Shimao Yao, Jiaoli Shi, Zongda Wu:
Secure multi-dimensional data retrieval with access control and range query in the cloud. Inf. Syst. 122: 102343 (2024) - [j12]Zhuolin Mei, Huilai Zou, Jinzhou Huang, Caicai Zhang, Bin Wu, Jiaoli Shi, Zhengxiang Cheng:
A Secure and Fast Range Query Scheme for Encrypted Multi-Dimensional Data. Int. J. Web Serv. Res. 21(1): 1-17 (2024) - 2023
- [j11]Zhuolin Mei, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang, Zongda Wu:
Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques. Int. J. Web Serv. Res. 20(1): 1-18 (2023) - [j10]Shimao Yao, Ralph Voltaire J. Dayot, In-Ho Ra, Liya Xu, Zhuolin Mei, Jiaoli Shi:
An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 18: 3833-3848 (2023) - [c6]Ruwang Wen, Zhengxiang Cheng, Weixuan Mao, Zhuolin Mei, Jiaoli Shi, Xiao Cheng:
HMGR: A Hybrid Model for Geolocation Recommendation. BigData 2023: 48-62 - [c5]Chao Luo, Jiaoli Shi, Minchen Xie, Chao Hu, Lihua Wang, Zhuolin Mei, Shimao Yao, Hui Li:
A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter. Inscrypt (1) 2023: 433-451 - [c4]Zhengxiang Cheng, Weixuan Mao, Ruwang Wen, Zhuolin Mei, Bin Wu, Jiaoli Shi, Xiao Cheng:
Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data. EDGE 2023: 69-81 - [c3]Weixuan Mao, Ruwang Wen, Zhengxiang Cheng, Zhuolin Mei, Haibin Wang, Bin Wu, Jiaoli Shi:
A Location Recommendation Model Based on User Behavior and Sequence Influence. ICIOT 2023: 18-30 - [c2]Jiaoli Shi, Chao Hu, Shimao Yao, Zhuolin Mei, Bin Wu, Hui Li:
A Lightening Fine-grained Access Control Scheme Supporting Full Policy Hiding in Cloud Storage. ICPADS 2023: 2875-2878 - 2022
- [j9]Caicai Zhang, Mei Mei, Zhuolin Mei, Junkang Zhang, Anyuan Deng, Chenglang Lu:
PLDANet: Reasonable Combination of PCA and LDA Convolutional Networks. Int. J. Comput. Commun. Control 17(2) (2022) - 2021
- [j8]Bin Wu, Xianyi Chen, Zongda Wu, Zhiqiang Zhao, Zhuolin Mei, Caicai Zhang:
Privacy-Guarding Optimal Route Finding with Support for Semantic Search on Encrypted Graph in Cloud Computing Scenario. Wirel. Commun. Mob. Comput. 2021: 6617959:1-6617959:12 (2021) - 2020
- [j7]Bin Wu, Xianyi Chen, Caicai Zhang, Zhuolin Mei, Zhiqiang Zhao, Zongda Wu, Tao Yan:
Privacy-Protection Path Finding Supporting the Ranked Order on Encrypted Graph in Big Data Environment. IEEE Access 8: 214596-214604 (2020) - [j6]Zhiqiang Zhao, Liwen Xiong, Zhuolin Mei, Bin Wu, Zongmin Cui, Tianjiang Wang, Zhijian Zhao:
Robust object tracking based on ridge regression and multi-scale local sparse coding. Multim. Tools Appl. 79(1-2): 785-804 (2020)
2010 – 2019
- 2019
- [j5]Bin Wu, Zhiqiang Zhao, Zongmin Cui, Zhuolin Mei, Zongda Wu:
Secure and Efficient Adjacency Search Supporting Synonym Query on Encrypted Graph in the Cloud. IEEE Access 7: 133716-133724 (2019) - [j4]Yang Huang, Zhiqiang Zhao, Bin Wu, Zhuolin Mei, Zongmin Cui, Guangyong Gao:
Visual object tracking with discriminative correlation filtering and hybrid color feature. Multim. Tools Appl. 78(24): 34725-34744 (2019) - 2018
- [j3]Zhuolin Mei, Hong Zhu, Zongmin Cui, Zongda Wu, Gang Peng, Bin Wu, Caicai Zhang:
Executing multi-dimensional range query efficiently and flexibly over outsourced ciphertexts in the cloud. Inf. Sci. 432: 79-96 (2018) - 2017
- [j2]Zhuolin Mei, Bin Wu, Shengli Tian, Yonghui Ruan, Zongmin Cui:
Fuzzy Keyword Search Method over Ciphertexts supporting Access Control. KSII Trans. Internet Inf. Syst. 11(11): 5671-5693 (2017) - [c1]Hong Zhu, Zhuolin Mei, Bing Wu, Hongbo Li, Zongmin Cui:
Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing. ACISP (1) 2017: 248-265 - 2016
- [j1]Hong Zhu, Zhuolin Mei, Meiyi Xie:
Identity-based key management for cloud computing. Secur. Commun. Networks 9(13): 2143-2156 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint