


Остановите войну!
for scientists:


default search action
Kejia Zhang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j46]Yu Zhang, Long Zhang, Kejia Zhang
, Weijian Wang, Kunchi Hou:
A new quantum-inspired solution to blind millionaires' problem. Quantum Inf. Process. 22(1): 80 (2023) - [j45]Qianna Cui
, Haiwei Pan
, Kejia Zhang
, Xiaokun Li
, Haoyu Sun:
Multiscale and Multisubgraph-Based Segmentation Method for Ocean Remote Sensing Images. IEEE Trans. Geosci. Remote. Sens. 61: 1-20 (2023) - 2022
- [j44]Xiang Li, Kejia Zhang
, Long Zhang, Xu Zhao:
A New Quantum Multiparty Simultaneous Identity Authentication Protocol with the Classical Third-Party. Entropy 24(4): 483 (2022) - [j43]Xiaofei Bian, Haiwei Pan
, Kejia Zhang, Chunling Chen, Peng Liu, Kun Shi:
NeDSeM: Neutrosophy Domain-Based Segmentation Method for Malignant Melanoma Images. Entropy 24(6): 783 (2022) - [j42]Na Hua, Juyan Li, Kejia Zhang, Long Zhang
:
A Novel Deterministic Threshold Proxy Re-Encryption Scheme From Lattices. Int. J. Inf. Secur. Priv. 16(1): 1-17 (2022) - [j41]Qianna Cui, Haiwei Pan, Xiaokun Li
, Kejia Zhang, Weipeng Chen:
CMSuG: Competitive mechanism-based superpixel generation method for image segmentation. J. Intell. Fuzzy Syst. 43(4): 4409-4430 (2022) - [j40]Haiwei Pan, Shuning He, Kejia Zhang
, Bo Qu, Chunling Chen, Kun Shi:
AMAM: An Attention-based Multimodal Alignment Model for Medical Visual Question Answering. Knowl. Based Syst. 255: 109763 (2022) - [j39]Xiaofei Bian, Haiwei Pan
, Kejia Zhang, Pengyuan Li, Jinbao Li, Chunling Chen:
Skin lesion image classification method based on extension theory and deep learning. Multim. Tools Appl. 81(12): 16389-16409 (2022) - [j38]Yukun Wang
, Xinhui Li, Yunguang Han, Kejia Zhang:
Practical anonymous entanglement with noisy measurement. Quantum Inf. Process. 21(2): 49 (2022) - [j37]Li Duan
, Yangyang Sun
, Kejia Zhang
, Yong Ding
:
Multiple-Layer Security Threats on the Ethereum Blockchain and Their Countermeasures. Secur. Commun. Networks 2022: 5307697:1-5307697:11 (2022) - [j36]Kuan Ren
, Kejia Zhang, Xizi Qin, Feng Yang, Bai Sun
, Yong Zhao, Yong Zhang:
VETAM-M: A General Model for Voltage-Controlled Memcapacitive-Coupled Memristors. IEEE Trans. Circuits Syst. II Express Briefs 69(3): 1717-1721 (2022) - [c14]Xiuzhen Hao, Haiwei Pan, Kejia Zhang, Chunling Chen, Xiaofei Bian, Shuning He:
MACNet: Multi-Attention and Context Network for Polyp Segmentation. APWeb/WAIM (2) 2022: 369-384 - [c13]Xin Du, Haiwei Pan, Kejia Zhang, Shuning He, Xiaofei Bian, Weipeng Chen:
Automatic Report Generation Method based on Multiscale Feature Extraction and Word Attention Network. APWeb/WAIM (2) 2022: 520-528 - [c12]Na Hua
, Long Zhang
, Kejia Zhang
:
Identity-Based Deterministic Proxy Re-Encryption Scheme on Lattice. CSAE 2022: 24:1-24:7 - [c11]He Wang, Haiwei Pan, Kejia Zhang, Shuning He, Chunling Chen:
M2FNet: Multi-granularity Feature Fusion Network for Medical Visual Question Answering. PRICAI (2) 2022: 141-154 - [c10]Weipeng Chen, Haiwei Pan, Kejia Zhang, Xin Du, Qianna Cui:
VMEKNet: Visual Memory and External Knowledge Based Network for Medical Report Generation. PRICAI (1) 2022: 188-201 - [i5]Zhe Zhang, Shiyao Ma, Zhaohui Yang, Zehui Xiong, Jiawen Kang, Yi Wu, Kejia Zhang, Dusit Niyato:
Robust Semi-supervised Federated Learning for Images Automatic Recognition in Internet of Drones. CoRR abs/2201.01230 (2022) - [i4]Kejia Zhang:
Capturing High-order Structures on Motif-based Graph Nerual Networks. CoRR abs/2205.00867 (2022) - 2021
- [j35]Xu Zhao
, Ke-Jia Zhang
, Bao-Min Zhou
:
A Novel Quantum Sequential Signature Protocol With Y-SNOP States. IEEE Access 9: 63491-63499 (2021) - [j34]Kejia Zhang
, Xu Zhao
, Long Zhang, Guojing Tian, Tingting Song:
A Quantum Dual-Signature Protocol Based on SNOP States without Trusted Participant. Entropy 23(10): 1294 (2021) - [j33]Lijuan Chou, Kejia Zhang, Jicheng Liu, Shengrong Gong, Yongxin Chou:
Life-threatening arrhythmias recognition by pulse-to-pulse intervals analysis. Int. J. Comput. Appl. Technol. 67(2/3): 185-193 (2021) - [j32]Juyan Li
, Zhiqi Qiao
, Kejia Zhang, Chen Cui:
A Lattice-Based Homomorphic Proxy Re-Encryption Scheme with Strong Anti-Collusion for Cloud Computing. Sensors 21(1): 288 (2021) - [j31]Li Duan
, Kejia Zhang
, Bo Cheng, Bingfei Ren
:
Privacy Threats of Acoustic Covert Communication among Smart Mobile Devices. Wirel. Commun. Mob. Comput. 2021: 9179100:1-9179100:16 (2021) - [j30]Kejia Zhang, Xu Zhang, Hongtao Song
, Haiwei Pan, Bangju Wang:
Air Quality Prediction Model Based on Spatiotemporal Data Analysis and Metalearning. Wirel. Commun. Mob. Comput. 2021: 9627776:1-9627776:11 (2021) - [c9]XueLian Mu, Haiwei Pan, Kejia Zhang, Teng Teng, Xiaofei Bian, Chunling Chen:
Channel Context and Dual-Domain Attention Based U-Net for Skin Lesion Attributes Segmentation. ICPCSEE (1) 2021: 528-541 - [i3]Haiwei Pan, Shuning He, Kejia Zhang, Bo Qu, Chunling Chen, Kun Shi:
MuVAM: A Multi-View Attention-based Model for Medical Visual Question Answering. CoRR abs/2107.03216 (2021) - 2020
- [j29]Kai Peng
, Xingda Qian, Bohai Zhao, Kejia Zhang, Yang Liu:
A New Cloudlet Placement Method Based on Affinity Propagation for Cyber-Physical-Social Systems in Wireless Metropolitan Area Networks. IEEE Access 8: 34313-34325 (2020) - [j28]Yanan Hu, Chunsheng Li
, Kejia Zhang, Mei Wang, Yatian Gao:
Research on the Feature Selection Approach Based on IFDS and DPSO With Variable Thresholds in Complex Data Environments. IEEE Access 8: 58645-58659 (2020) - [j27]Kejia Zhang, Yanan Hu, Feng Tian, Chunsheng Li:
A coalition-structure's generation method for solving cooperative computing problems in edge computing environments. Inf. Sci. 536: 372-390 (2020) - [j26]Qingle Wang
, Yuancheng Li, Chaohang Yu, Hui He, Kejia Zhang:
Quantum anonymous ranking and selection with verifiability. Quantum Inf. Process. 19(5): 166 (2020) - [c8]Guang Shen, Riwei Lai, Rui Chen, Yu Zhang, Kejia Zhang, Qilong Han, Hongtao Song:
WISE: Word-Level Interaction-Based Multimodal Fusion for Speech Emotion Recognition. INTERSPEECH 2020: 369-373
2010 – 2019
- 2019
- [j25]Qilong Han, Dan Lu
, Kejia Zhang, Xiaojiang Du, Mohsen Guizani
:
A Prediction Method for Destination Based on the Semantic Transfer Model. IEEE Access 7: 73756-73763 (2019) - [j24]Qilong Han, Dan Lu
, Kejia Zhang, Hongtao Song, Haitao Zhang:
Secure Mining of Association Rules in Distributed Datasets. IEEE Access 7: 155325-155334 (2019) - [j23]Kejia Zhang, Yu Fu, Yanan Hu, Chunsheng Li, Panchi Li:
Scheduling strategy for computational-intensive data flow in generalized cluster environments. Appl. Soft Comput. 82 (2019) - [j22]Yanan Hu, Chunsheng Li, Kejia Zhang, Yu Fu:
Task allocation based on modified contract net protocol under generalized cluster. J. Comput. Methods Sci. Eng. 19(4): 969-988 (2019) - [j21]Jianguo Sun, Wenshan Wang, Kejia Zhang, Liguo Zhang, Yun Lin
, Qilong Han, Qingan Da, Liang Kou:
A multi-focus image fusion algorithm in 5G communications. Multim. Tools Appl. 78(20): 28537-28556 (2019) - [j20]Ke-Jia Zhang, Xue Zhang, Heng-Yue Jia, Long Zhang:
A new n-party quantum secret sharing model based on multiparty entangled states. Quantum Inf. Process. 18(3): 81 (2019) - [j19]Dan Lu
, Qilong Han
, Kejia Zhang
, Haitao Zhang, Bisma Gull:
A Novel Method for Location Privacy Protection in LBS Applications. Secur. Commun. Networks 2019: 1914038:1-1914038:11 (2019) - [j18]Juyan Li
, Chunguang Ma, Kejia Zhang:
A Novel Lattice-Based CP-ABPRE Scheme for Cloud Sharing. Symmetry 11(10): 1262 (2019) - [j17]Kejia Zhang, Qilong Han, Zhipeng Cai
, Guisheng Yin, Junyu Lin:
DOAMI: A distributed on-line algorithm to minimize interference for routing in wireless sensor networks. Theor. Comput. Sci. 774: 1-13 (2019) - [c7]Juyan Li, Chunguang Ma, Kejia Zhang:
A Novel Lattice-Based Ciphertext-Policy Attribute-Based Proxy Re-encryption for Cloud Sharing. SocialSec 2019: 32-46 - 2018
- [j16]Qilong Han, Dan Lu
, Kejia Zhang, Xiaojiang Du, Mohsen Guizani
:
Lclean: A Plausible Approach to Individual Trajectory Data Sanitization. IEEE Access 6: 30110-30116 (2018) - [j15]Qilong Han, Qianqian Chen
, Liguo Zhang, Kejia Zhang:
HRR: a data cleaning approach preserving local differential privacy. Int. J. Distributed Sens. Networks 14(12) (2018) - [j14]Ke-Jia Zhang, Leong-Chuan Kwek, Chun-Guang Ma, Long Zhang, Hong-Wei Sun:
Security analysis with improved design of post-confirmation mechanism for quantum sealed-bid auction with single photons. Quantum Inf. Process. 17(2): 38 (2018) - [j13]Qilong Han, Zuobin Xiong, Kejia Zhang
:
Research on Trajectory Data Releasing Method via Differential Privacy Based on Spatial Partition. Secur. Commun. Networks 2018: 4248092:1-4248092:14 (2018) - [i2]Qilong Han, Dan Lu, Kejia Zhang, Xiaojiang Du, Mohsen Guizani:
Lclean: A Plausible Approach to Individual Trajectory Data Sanitization. CoRR abs/1804.01818 (2018) - [i1]Qilong Han, Qianqian Chen, Kejia Zhang, Xiaojiang Du, Nadra Guizani:
Spatio-temporal Trajectory Dataset Privacy Based on Network Traffic Control. CoRR abs/1804.02052 (2018) - 2017
- [j12]Long Zhang, Hong-Wei Sun, Ke-Jia Zhang, Heng-Yue Jia:
An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3): 70 (2017) - [j11]Kejia Zhang, Qilong Han, Zhipeng Cai
, Guisheng Yin:
RiPPAS: A Ring-Based Privacy-Preserving Aggregation Scheme in Wireless Sensor Networks. Sensors 17(2): 300 (2017) - [c6]Dan Lu, Qilong Han, Hongbin Zhao, Kejia Zhang:
Optimal Task Recommendation for Spatial Crowdsourcing with Privacy Control. ICPCSEE (1) 2017: 412-424 - 2016
- [j10]Kejia Zhang, Qilong Han, Guisheng Yin, Haiwei Pan:
OFDP: a distributed algorithm for finding disjoint paths with minimum total length in wireless sensor networks. J. Comb. Optim. 31(4): 1623-1641 (2016) - 2015
- [j9]Guang-Bao Xu, Ke-Jia Zhang:
A novel quantum group signature scheme without using entangled states. Quantum Inf. Process. 14(7): 2577-2587 (2015) - [c5]Kejia Zhang, Qilong Han, Zhipeng Cai
, Guisheng Yin, Junyu Lin:
Metric and Distributed On-Line Algorithm for Minimizing Routing Interference in Wireless Sensor Networks. COCOA 2015: 279-292 - 2014
- [j8]Kejia Zhang, Guisheng Yin, Qilong Han, Junyu Lin:
DFDP: A Distributed Algorithm for Finding Disjoint Paths in Wireless Sensor Networks with Correctness Guarantee. Int. J. Distributed Sens. Networks 10 (2014) - [c4]Qilong Han, Hongbin Zhao, Zhiqiang Ma, Kejia Zhang, Haiwei Pan:
Protecting Location Privacy Based on Historical Users over Road Networks. WASA 2014: 347-355 - [c3]Kejia Zhang, Hong Gao, Guisheng Yin, Qilong Han:
OFDP: A Distributed Algorithm for Finding Disjoint Paths with Minimum Total Energy Cost in Wireless Sensor Networks. WASA 2014: 694-705 - 2013
- [j7]Kejia Zhang, Hong Gao:
Efficient distributed algorithm for correctly finding disjoint paths in wireless sensor networks. Int. J. Sens. Networks 13(3): 173-184 (2013) - [j6]Wei-Wei Zhang
, Ke-Jia Zhang:
Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5): 1981-1990 (2013) - [j5]Wei-Wei Zhang
, Dan Li, Ke-Jia Zhang, Huijuan Zuo:
A quantum protocol for millionaire problem with Bell states. Quantum Inf. Process. 12(6): 2241-2249 (2013) - [j4]Huijuan Zuo, Ke-Jia Zhang, Ting-Ting Song:
Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7): 2343-2353 (2013) - [j3]Ke-Jia Zhang, Wei-Wei Zhang
, Dan Li:
Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8): 2655-2669 (2013) - [j2]Ke-Jia Zhang, Su-Juan Qin, Ying Sun, Ting-Ting Song, Qi Su:
Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9): 3127-3141 (2013) - 2011
- [j1]Kejia Zhang, Hong Gao, Jianzhong Li:
Finding multiple induced disjoint paths in general graphs. Inf. Process. Lett. 111(20): 1022-1026 (2011)
2000 – 2009
- 2007
- [c2]Kejia Zhang, Shengfei Shi, Hong Gao, Jianzhong Li:
Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree. ADMA 2007: 158-169 - 2005
- [c1]Ke-Jia Zhang, Li-Mei Chen:
日本學生學習華語的聲調偏誤分析: 以二字調為例 (Tonal errors of Japanese students learning Chinese: A study of disyllabic words) [In Chinese]. ROCLING 2005
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-29 01:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint