default search action
Wenzheng Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j34]Wei-Tao Song, Wenzheng Zhang, Dianhua Tang, Bin Hu:
A Small-Size FHE Scheme for Better Privacy Protection of IoT. IEEE Internet Things J. 11(7): 12909-12917 (2024) - 2023
- [j33]Wei-Tao Song, Guang Zeng, Wenzheng Zhang, Dianhua Tang:
Research on privacy information retrieval model based on hybrid homomorphic encryption. Cybersecur. 6(1): 31 (2023) - [j32]Yanwei Zhou, Lei Cao, Zirui Qiao, Zhe Xia, Bo Yang, Mingwu Zhang, Wenzheng Zhang:
An Efficient Identity Authentication Scheme With Dynamic Anonymity for VANETs. IEEE Internet Things J. 10(11): 10052-10065 (2023) - [j31]Yanwei Zhou, Ran Xu, Wenzheng Zhang, Zhe Xia, Bo Yang, Chunxiang Gu, Meijuan Huang:
Public-key encryption scheme with optimal continuous leakage resilience. Inf. Process. Lett. 180: 106318 (2023) - [j30]Jingting Xue, Lingjie Shi, Wenzheng Zhang, Wenyi Li, Xiaojun Zhang, Yu Zhou:
Poly-ABE: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems. J. Syst. Archit. 143: 102982 (2023) - [j29]Wenzheng Zhang, Changyue Wu, Weidong Man, Mingyue Liu:
Dual-Channel Semi-Supervised Adversarial Network for Building Segmentation from UAV-Captured Images. Remote. Sens. 15(23): 5608 (2023) - [j28]Jiguo Li, Ruyuan Zhang, Yang Lu, Jinguang Han, Yichen Zhang, Wenzheng Zhang, Xinfeng Dong:
Multiauthority Attribute-Based Encryption for Assuring Data Deletion. IEEE Syst. J. 17(2): 2029-2038 (2023) - [j27]Wenzheng Zhang, Chenyan Xiong, Karl Stratos, Arnold Overwijk:
Improving Multitask Retrieval by Promoting Task Specialization. Trans. Assoc. Comput. Linguistics 11: 1201-1212 (2023) - [j26]Jiani Li, Tao Wang, Bo Yang, Qiliang Yang, Wenzheng Zhang, Keyong Hong:
ABCrowdMed: A Fine-Grained Worker Selection Scheme for Crowdsourcing Healthcare With Privacy-Preserving. IEEE Trans. Serv. Comput. 16(5): 3182-3195 (2023) - 2022
- [j25]Xiaorui Zhang, Wenzheng Zhang, Wei Sun, Aiguo Song:
A new soft tissue deformation model based on Runge-Kutta: Application in lung. Comput. Biol. Medicine 148: 105811 (2022) - [j24]Wenzheng Zhang, Zirui Qiao, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Continuous Leakage-Amplified Public-Key Encryption With CCA Security. Comput. J. 65(7): 1760-1775 (2022) - [j23]Xiaorui Zhang, Wenzheng Zhang, Wei Sun, Hailun Wu, Aiguo Song, Sunil Kumar Jha:
A Real-time Cutting Model Based on Finite Element and Order Reduction. Comput. Syst. Sci. Eng. 43(1): 1-15 (2022) - [j22]Junbin Shi, Qiming Yu, Yong Yu, Lianhai Wang, Wenzheng Zhang:
Privacy protection in social applications: A ciphertext policy attribute-based encryption with keyword search. Int. J. Intell. Syst. 37(12): 12152-12168 (2022) - [j21]Wenzheng Zhang, Shiyun Liu, Zhe Xia:
A distributed privacy-preserving data aggregation scheme for smart grid with fine-grained access control. J. Inf. Secur. Appl. 66: 103118 (2022) - [j20]Liang Wu, Wenzheng Zhang, Wei Zhao:
Privacy Preserving Data Aggregation for Smart Grid with User Anonymity and Designated Recipients. Symmetry 14(5): 847 (2022) - 2021
- [j19]Wenzheng Zhang, Baodong Qin, Xinfeng Dong, Aikui Tian:
Public-key encryption with bidirectional keyword search and its application to encrypted emails. Comput. Stand. Interfaces 78: 103542 (2021) - [j18]Zhentao Zhao, Xuegang Yuan, Datian Niu, Wenzheng Zhang, Hongwu Zhang:
Phenomena of Bifurcation and Chaos in the Dynamically Loaded Hyperelastic Spherical Membrane Based on a Noninteger Power-Law Constitutive Model. Int. J. Bifurc. Chaos 31(5): 2130015:1-2130015:26 (2021) - [j17]Xinchun Wei, Xing Li, Wei Liu, Lianpeng Zhang, Dayu Cheng, Hanyu Ji, Wenzheng Zhang, Kai Yuan:
Building Outline Extraction Directly Using the U2-Net Semantic Segmentation Model from High-Resolution Aerial Images and a Comparison Study. Remote. Sens. 13(16): 3187 (2021) - [j16]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Wenzheng Zhang:
On the Modified Transparency Order of n , m -Functions. Secur. Commun. Networks 2021: 6640099:1-6640099:14 (2021) - 2020
- [j15]Wenxue Hong, Cunfang Zheng, Baohong Mi, Cunguo Yu, Wenzheng Zhang, Jingbin Wang:
The physical pattern evaluation and identification method of infrared thermal image of human health state in Traditional Chinese Medicine. Int. J. Comput. Appl. Technol. 64(1): 18-32 (2020) - 2019
- [j14]Qiong Zhang, Wenzheng Zhang:
Accurate detection of selective forwarding attack in wireless sensor networks. Int. J. Distributed Sens. Networks 15(1) (2019) - 2016
- [j13]Fengrong Zhang, Claude Carlet, Yupu Hu, Wenzheng Zhang:
New secondary constructions of Bent functions. Appl. Algebra Eng. Commun. Comput. 27(5): 413-434 (2016) - [j12]Yanwei Zhou, Bo Yang, Wenzheng Zhang:
Provably secure and efficient leakage-resilient certificateless signcryption scheme without bilinear pairing. Discret. Appl. Math. 204: 185-202 (2016) - [j11]Yanwei Zhou, Bo Yang, Wenzheng Zhang, Yi Mu:
CCA2 secure public-key encryption scheme tolerating continual leakage attacks. Secur. Commun. Networks 9(17): 4505-4519 (2016) - 2014
- [j10]Yupu Hu, Hao Lei, Fenghe Wang, Wenzheng Zhang:
Gaussian sampling of lattices for cryptographic applications. Sci. China Inf. Sci. 57(7): 1-8 (2014) - [j9]Peiyi Shen, Liang Zhang, Juan Song, Hu Xu, Lianjie Qin, Wei Wei, Wenzheng Zhang, Bin Leng, Mengqi Zeng:
A Near-Infrared Face Detection and Recognition System Using ASM and PCA+LDA. J. Networks 9(10): 2728-2733 (2014) - 2013
- [j8]Wanpeng Li, Chunxiang Xu, Wenzheng Zhang, Shixiong Zhu, Xiujie Zhang:
New forward-secure signature schemes with untrusted update. Frontiers Comput. Sci. 7(4): 536-543 (2013) - [j7]Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang, Wanpeng Li:
Threshold public key encryption scheme resilient against continual leakage without random oracles. Frontiers Comput. Sci. 7(6): 955-968 (2013) - [j6]Jining Zhao, Chunxiang Xu, Fagen Li, Wenzheng Zhang:
Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2709-2716 (2013) - [j5]Yupu Hu, Fengrong Zhang, Wenzheng Zhang:
Hard fault analysis of Trivium. Inf. Sci. 229: 142-158 (2013) - 2012
- [j4]Yu Zhou, Wenzheng Zhang, Shixiong Zhu, Guozhen Xiao:
The global avalanche characteristics of two Boolean functions and algebraic immunity. Int. J. Comput. Math. 89(16): 2165-2179 (2012) - [j3]Wenzheng Zhang, Xuegang Yuan, Hongwu W. Zhang:
Nonlinear Periodic Oscillation of a Cylindrical Microvoid Centered at an Isotropic Incompressible Ogden Cylinder. J. Appl. Math. 2012: 872161:1-872161:9 (2012) - 2011
- [j2]Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi:
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor. Int. J. Netw. Secur. 12(1): 50-57 (2011) - 2009
- [j1]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Ordered Semiring-based Trust Establish Model with Risk Evaluating. Int. J. Netw. Secur. 8(2): 101-106 (2009)
Conference and Workshop Papers
- 2023
- [c22]Wenhui Ye, Jinhua Wang, Ting Chen, Wenzheng Zhang, Yu Zhou, Yanyan Liu:
An improved chaotic-map based two-factor authentication and key agreement protocol for WSNs. ADMIT 2023: 171-180 - [c21]Wenzheng Zhang, Sam Wiseman, Karl Stratos:
Seq2seq is All You Need for Coreference Resolution. EMNLP 2023: 11493-11504 - 2022
- [c20]Chunhai Zhang, Jie Liu, Kai Dang, Wenzheng Zhang:
Multi-Scale Distillation from Multiple Graph Neural Networks. AAAI 2022: 4337-4344 - [c19]Wenzheng Zhang, Wenyue Hua, Karl Stratos:
EntQA: Entity Linking as Question Answering. ICLR 2022 - 2021
- [c18]Hao Tan, Dong Xu Miao, Bin Shen, Wenzheng Zhang:
Fast MILP Modelings for Sboxes. CSSE 2021: 174-177 - [c17]Wenzheng Zhang, Jie Liu, Liting Liu:
Generalizing Message Passing Neural Networks to Heterophily Using Position Information. ICANN (3) 2021: 230-242 - [c16]Liting Liu, Wenzheng Zhang, Jie Liu, Wenxuan Shi, Yalou Huang:
Learning Multi-Graph Neural Network for Data-Driven Job Skill Prediction. IJCNN 2021: 1-8 - [c15]Liting Liu, Wenzheng Zhang, Jie Liu, Wenxuan Shi, Yalou Huang:
Interpretable Charge Prediction for Legal Cases based on Interdependent Legal Information. IJCNN 2021: 1-8 - [c14]Wenzheng Zhang, Karl Stratos:
Understanding Hard Negatives in Noise Contrastive Estimation. NAACL-HLT 2021: 1090-1101 - [c13]Bingquan Wang, Jie Liu, Shaowei Chen, Xiao Ling, Shanpeng Wang, Wenzheng Zhang, Liyi Chen, Jiaxin Zhang:
A Residual Dynamic Graph Convolutional Network for Multi-label Text Classification. NLPCC (1) 2021: 664-675 - 2020
- [c12]Liting Liu, Jie Liu, Wenzheng Zhang, Ziming Chi, Wenxuan Shi, Yalou Huang:
Hiring Now: A Skill-Aware Multi-Attention Model for Job Posting Generation. ACL 2020: 3096-3104 - [c11]Shaowei Chen, Jie Liu, Yu Wang, Wenzheng Zhang, Ziming Chi:
Synchronous Double-channel Recurrent Network for Aspect-Opinion Pair Extraction. ACL 2020: 6515-6524 - 2015
- [c10]Jia Chen, Wenzheng Zhang:
A Needs Analysis Survey for Open EAP Courses for Chinese Graduates on Overseas Exchange Programs. Intelligent Environments (Workshops) 2015: 161-171 - 2013
- [c9]Xiujie Zhang, Chunxiang Xu, Wenzheng Zhang:
Efficient Chosen Ciphertext Secure Threshold Public-Key Encryption with Forward Security. EIDWT 2013: 407-413 - 2012
- [c8]Jingjing Wang, Xiangxue Li, Kefei Chen, Wenzheng Zhang:
Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator. AFRICACRYPT 2012: 53-66 - [c7]Yu Zhou, Xinfeng Dong, Wenzheng Zhang, Bing Zeng:
New bounds on the sum-of-squares indicator. CHINACOM 2012: 173-178 - 2010
- [c6]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang:
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. PAISI 2010: 77-87 - 2009
- [c5]Mingwu Zhang, Yusheng Zhong, Bo Yang, Wenzheng Zhang:
Analysis and Improvement of an ID-Based Anonymous Signcryption Model. ICIC (1) 2009: 433-442 - 2008
- [c4]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. ATC 2008: 516-526 - [c3]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. ISI Workshops 2008: 126-137 - 2007
- [c2]Mingwu Zhang, Bo Yang, Shenglin Zhu, Wenzheng Zhang:
Trust-based Distributed Authentication Middleware in Ubiquitous Mobile Environments. ICNC (5) 2007: 814-818 - [c1]Mingwu Zhang, Bo Yang, Yu Qi, Wenzheng Zhang:
Using Trust Metric to Detect Malicious Behaviors in WSNs. SNPD (3) 2007: 104-108
Informal and Other Publications
- 2023
- [i5]Wenzheng Zhang, Chenyan Xiong, Karl Stratos, Arnold Overwijk:
Improving Multitask Retrieval by Promoting Task Specialization. CoRR abs/2307.00342 (2023) - [i4]Wenzheng Zhang, Sam Wiseman, Karl Stratos:
Seq2seq is All You Need for Coreference Resolution. CoRR abs/2310.13774 (2023) - 2021
- [i3]Wenzheng Zhang, Karl Stratos:
Understanding Hard Negatives in Noise Contrastive Estimation. CoRR abs/2104.06245 (2021) - [i2]Wenzheng Zhang, Wenyue Hua, Karl Stratos:
EntQA: Entity Linking as Question Answering. CoRR abs/2110.02369 (2021) - 2012
- [i1]Fengrong Zhang, Claude Carlet, Yupu Hu, Wenzheng Zhang:
Secondary Constructions of Bent Functions and Highly Nonlinear Resilient Functions. CoRR abs/1211.4191 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint