Energy Theft Detection with Energy Privacy Preservation in the Smart Grid D Yao, M Wen, X Liang, Z Fu, K Zhang, B Yang IEEE Internet of Things Journal 6 (5), 7659 - 7669, 2019 | 201 | 2019 |
FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid M Wen, R Xie, K Lu, L Wang, K Zhang IEEE Internet of Things Journal 9 (8), 6069 - 6080, 2022 | 82 | 2022 |
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage M Zeng, J Chen, H Qiang, K Zhang IEEE Transactions on Cloud Computing 10 (1), 426-438, 2022 | 54 | 2022 |
Efficient Public Key Encryption with Equality Test in the Standard Model K Zhang, J Chen, HT Lee, H Qian, H Wang Theoretical Computer Science 755, 65-80, 2019 | 49 | 2019 |
Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization K Zhang, M Wen, R Lu, K Chen IEEE Transactions on Dependable and Secure Computing 18 (6), 2875 - 2887, 2021 | 33 | 2021 |
A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs H Wang, L Wang, K Zhang, J Li, Y Luo IEEE Access 10, 15605-15618, 2022 | 28 | 2022 |
Practical and Efficient Attribute-based Encryption with Constant-size Ciphertexts in Outsourced Verifiable Computation K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016 | 21 | 2016 |
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications M Zeng, K Zhang, H Qian, X Chen, J Chen The Computer Journal 62 (4), 563-578, 2019 | 20 | 2019 |
Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices J Chen, L Wang, M Wen, K Zhang, K Chen IEEE Internet of Things Journal 9 (11), 8967-8979, 2021 | 18 | 2021 |
Security analysis and modification of ID-based encryption with equality test from ACISP 2017 HT Lee, H Wang, K Zhang Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 17 | 2018 |
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations Y Sun, Y Yu, X Li, K Zhang, H Qian, Y Zhou Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 17 | 2016 |
Privacy-Preserving Federated Learning via Functional Encryption, Revisited Y Chang, K Zhang, J Gong, H Qian IEEE Transactions on Information Forensics and Security 18, 1855-1869, 2023 | 16 | 2023 |
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage K Zhang, Z Jiang, J Ning, X Huang IEEE Transactions on Information Forensics and Security 17, 1771 - 1784, 2022 | 16 | 2022 |
MEDAPs: Secure Multi‐entities Delegated Authentication Protocols for Mobile Cloud Computing L Zhang, L Wei, D Huang, K Zhang, M Dong, K Ota Security and Communication Networks 9 (16), 3777-3789, 2016 | 16 | 2016 |
Multi-Authority Non-Monotonic KP-ABE with Cryptographic Reverse Firewall B Hong, J Chen, K Zhang, H Qian IEEE Access 7, 159002 - 159012, 2019 | 15 | 2019 |
Forward Secure Public-Key Authenticated Encryption with Conjunctive Keyword Search Z Jiang, K Zhang, L Wang, J Ning The Computer Journal 66 (9), 2265–2278, 2023 | 14 | 2023 |
P3GQ: a practical privacy-preserving generic location-based services query scheme M Zeng, K Zhang, J Chen, H Qian Pervasive and Mobile Computing 51, 56-72, 2018 | 14 | 2018 |
Public key encryption with equality test via hash proof system M Zeng, J Chen, K Zhang, H Qian Theoretical Computer Science 795, 20-35, 2019 | 13 | 2019 |
Lattice-based dual receiver encryption and more D Zhang, K Zhang, B Li, X Lu, H Xue, J Li Australasian Conference on Information Security and Privacy, 520-538, 2018 | 10 | 2018 |
New Application of Partitioning Methodology: Identity‐based Dual Receiver Encryption K Zhang, W Chen, X Li, J Chen, H Qian Security and Communication Networks 9 (18), 5789-5802, 2016 | 10 | 2016 |