Æȷοì
Tao Zhang (张涛)
Tao Zhang (张涛)
xidian.edu.cnÀÇ À̸ÞÀÏ È®ÀεÊ
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Fedproc: Prototypical contrastive federated learning on non-iid data
X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang
Future Generation Computer Systems 143, 93-104, 2023
832023
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
752017
TRAC: traceable and revocable access control scheme for mHealth in 5G-enabled IIoT
Q Li, B Xia, H Huang, Y Zhang, T Zhang
IEEE Transactions on Industrial Informatics 18 (5), 3437-3448, 2021
642021
Personal health records integrity verification using attribute based proxy signature in cloud computing
X Liu, J Ma, J Xiong, T Zhang, Q Li
Internet and Distributed Computing Systems: 6th International Conference ¡¦, 2013
512013
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J Guo, J Ma, X Li, J Zhang, T Zhang
Journal of Information Science & Engineering 33 (4), 2017
332017
A hierarchical access control scheme for perceptual layer of IoT
J Ma, Y Guo, J Ma, J Xiong, T Zhang
Computer Research and Development 50, 1267-1275, 2013
262013
Traceable ciphertext-policy attribute-based encryption with verifiable outsourced decryption in ehealth cloud
Q Li, H Zhu, Z Ying, T Zhang
Wireless Communications and Mobile Computing 2018, 2018
232018
Threshold attribute‐based encryption with attribute hierarchy for lattices in the standard model
X Liu, J Ma, J Xiong, Q Li, T Zhang, H Zhu
IET Information Security 8 (4), 217-223, 2014
232014
HTAC: Fine-grained policy-hiding and traceable access control in mHealth
Q Li, Y Zhang, T Zhang, H Huang, Y He, J Xiong
IEEE Access 8, 123430-123439, 2020
212020
Ciphertext policy weighted attribute based encryption scheme
X Liu, J Ma, J Xiong, Q Li, T Zhang
Journal of Xi¡¯an Jiaotong University 47 (8), 44-48, 2013
202013
Microthingschain: Edge computing and decentralized iot architecture based on blockchain for cross-domain data shareing
J Zheng, X Dong, T Zhang, J Chen, W Tong, X Yang
2018 International Conference on Networking and Network Applications (NaNA ¡¦, 2018
192018
Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing
X Dong, T Zhang, D Lu, G Li, Y Shen, J Ma
IEEE Transactions on Vehicular Technology 68 (9), 8881-8892, 2019
182019
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
182014
Privacy-preserving asynchronous grouped federated learning for IoT
T Zhang, A Song, X Dong, Y Shen, J Ma
IEEE Internet of Things Journal 9 (7), 5511-5523, 2021
172021
A situational awareness trust evolution model for mobile devices in D2D communication
J Guo, J Ma, X Li, T Zhang, Z Liu
IEEE Access 6, 4375-4386, 2017
172017
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21, 185-200, 2018
152018
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
152013
PRAM: privacy preserving access management scheme in cloud services
J Xiong, Z Yao, J Ma, X Liu, Q Li, T Zhang
Proceedings of the 2013 international workshop on Security in cloud ¡¦, 2013
152013
Trust-based service composition and selection in service oriented architecture
JJ Guo, JF Ma, XX Guo, XH Li, JW Zhang, T Zhang
Peer-to-Peer Networking and Applications 11, 862-880, 2018
132018
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
122013
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20