default search action
Junwei Zhang 0001
Person information
- affiliation (PhD 2010): Xidian University, School of Cyber Engineering and Shaanxi Key Laboratory of Network and System Security, Xian, China
Other persons with the same name
- Junwei Zhang — disambiguation page
- Junwei Zhang 0002 — Qualcomm CDMA Technologies, San Diego, CA, USA (and 1 more)
- Junwei Zhang 0003 — Chinese Academy of Science, Institute of Computing Technology, Beijing, China
- Junwei Zhang 0004 — Chongqing University, School of Big Data and Software Engineering, China
- Junwei Zhang 0005 — Shanxi Medical University, School of Management, Taiyuan, China (and 1 more)
- Junwei Zhang 0006 — Carnegie Mellon University, School of Computer Science, Pittsburgh, PA, USA (and 1 more)
- Junwei Zhang 0007 — Hong Kong Polytechnic University, Department of Land Surveying and Geo-Informatics, Hong Kong
- Junwei Zhang 0008 — Hebei University, College of Electronic Information Engineering, Baoding, China (and 1 more)
- Junwei Zhang 0009 — Hangzhou Institute of Medicine, Chinese Academy of Sciences, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Jinhai Zhang, Junwei Zhang, Zhuo Ma, Yang Liu, Xindi Ma, Jianfeng Ma:
Efficient and self-recoverable privacy-preserving k-NN classification system with robustness to network delay. J. Syst. Archit. 150: 103111 (2024) - 2022
- [j32]Zhuzhu Wang, Junwei Zhang, Yang Liu, Maobin Lu, Zuobin Ying, Jianfeng Ma:
A certificateless authentication scheme with fuzzy batch verification for federated UAV network. Int. J. Intell. Syst. 37(9): 6048-6079 (2022) - [j31]Ning Lu, Junwei Zhang, Ximeng Liu, Wenbo Shi, Jianfeng Ma:
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks. IEEE Trans. Inf. Forensics Secur. 17: 938-953 (2022) - [c5]Xinjing Liu, Zhuo Ma, Yang Liu, Zhan Qin, Junwei Zhang, Zhuzhu Wang:
SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection. ESORICS (1) 2022: 610-630 - 2021
- [j30]Quanlong Zhu, Chao Yang, Yu Zheng, Jianfeng Ma, Hui Li, Junwei Zhang, Jiajie Shao:
Smart home: Keeping privacy based on Air-Padding. IET Inf. Secur. 15(2): 156-168 (2021) - [j29]Junwei Zhang, Fan Yang, Zhuo Ma, Zhuzhu Wang, Ximeng Liu, Jianfeng Ma:
A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 22(4): 2299-2313 (2021) - 2020
- [j28]Zhicheng Yan, Chao Yang, Wei You, Jingjing Guo, Junwei Zhang, Yu Zheng, Jianfeng Ma:
Achieving secure and convenient WLAN sharing in personal. IET Inf. Secur. 14(6): 733-744 (2020) - [j27]Jingjing Guo, Xinghua Li, Zhiquan Liu, Jianfeng Ma, Chao Yang, Junwei Zhang, Dapeng Wu:
TROVE: A Context-Awareness Trust Model for VANETs Using Reinforcement Learning. IEEE Internet Things J. 7(7): 6647-6662 (2020) - [j26]Junwei Zhang, Zhuzhu Wang, Lei Shang, Di Lu, Jianfeng Ma:
BTNC: A blockchain based trusted network connection protocol in IoT. J. Parallel Distributed Comput. 143: 1-16 (2020) - [j25]Ning Lu, Can Chen, Wenbo Shi, Junwei Zhang, Jianfeng Ma:
Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images. Remote. Sens. 12(23): 3907 (2020) - [j24]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Xinghua Li, Qi Jiang, Junwei Zhang:
Attribute-Based Keyword Search over Hierarchical Data in Cloud Computing. IEEE Trans. Serv. Comput. 13(6): 985-998 (2020) - [j23]Zhuo Ma, Junwei Zhang, Yongzhen Guo, Yang Liu, Ximeng Liu, Wei He:
An Efficient Decentralized Key Management Mechanism for VANET With Blockchain. IEEE Trans. Veh. Technol. 69(6): 5836-5849 (2020) - [c4]Yang Song, Zhuzhu Wang, Junwei Zhang, Zhuo Ma, Jianfeng Ma:
A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS. SPDE 2020: 249-262
2010 – 2019
- 2019
- [j22]Junwei Zhang, Yue Zong, Chao Yang, Yinbin Miao, Jingjing Guo:
LBOA: Location-Based Secure Outsourced Aggregation in IoT. IEEE Access 7: 43869-43883 (2019) - [j21]Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang:
Universally composable secure geographic area verification without pre-shared secret. Sci. China Inf. Sci. 62(3): 32113:1-32113:15 (2019) - [j20]Junwei Zhang, Wenxuan Cui, Jianfeng Ma, Chao Yang:
Blockchain-based secure and fair crowdsourcing scheme. Int. J. Distributed Sens. Networks 15(7) (2019) - [j19]Chao Yang, Junwei Zhang, Jingjing Guo, Yu Zheng, Li Yang, Jianfeng Ma:
Fingerprint Protected Password Authentication Protocol. Secur. Commun. Networks 2019: 1694702:1-1694702:12 (2019) - 2018
- [j18]Yaxian Ji, Junwei Zhang, Jianfeng Ma, Chao Yang, Xin Yao:
BMPLS: Blockchain-Based Multi-level Privacy-Preserving Location Sharing Scheme for Telecare Medical Information Systems. J. Medical Syst. 42(8): 147:1-147:13 (2018) - [j17]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Zhiquan Liu, Junwei Zhang, Fushan Wei:
DOAS: Efficient data owner authorized search over encrypted cloud data. Peer-to-Peer Netw. Appl. 11(3): 349-360 (2018) - [j16]Jingjing Guo, Jianfeng Ma, Xinxin Guo, Xinghua Li, Junwei Zhang, Tao Zhang:
Trust-based service composition and selection in service oriented architecture. Peer-to-Peer Netw. Appl. 11(5): 862-880 (2018) - [j15]Qi Gao, Junwei Zhang, Jianfeng Ma, Chao Yang, Jingjing Guo, Yinbin Miao:
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices. Wirel. Commun. Mob. Comput. 2018: 9436120:1-9436120:14 (2018) - [j14]Zhen Lv, Changgen Peng, Yanguo Peng, Junwei Zhang:
A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 9437936:1-9437936:13 (2018) - [c3]Yuke Liu, Junwei Zhang, Qi Gao:
A Blockchain-Based Secure Cloud Files Sharing Scheme with Fine-Grained Access Control. NaNA 2018: 277-283 - 2017
- [j13]Yanguo Peng, Hui Li, Jiangtao Cui, Junwei Zhang, Jianfeng Ma, Changgen Peng:
hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts. Sci. China Inf. Sci. 60(6): 62101 (2017) - [j12]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu:
VKSE-MO: verifiable keyword search over encrypted data in multi-owner settings. Sci. China Inf. Sci. 60(12): 122105:1-122105:15 (2017) - [j11]Li Yang, Yaping Tian, Jin Li, Jianfeng Ma, Junwei Zhang:
Identifying opinion leaders in social networks with topic limitation. Clust. Comput. 20(3): 2403-2413 (2017) - [j10]Jingjing Guo, Jianfeng Ma, Xinghua Li, Junwei Zhang, Tao Zhang:
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy. J. Inf. Sci. Eng. 33(4): 1007-1023 (2017) - [j9]Yinbin Miao, Jianfeng Ma, Ximeng Liu, Qi Jiang, Junwei Zhang, Limin Shen, Zhiquan Liu:
VCKSM: Verifiable conjunctive keyword search over mobile e-health cloud in shared multi-owner settings. Pervasive Mob. Comput. 40: 205-219 (2017) - [j8]Chao Yang, Min Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren:
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive Mob. Comput. 41: 243-258 (2017) - 2016
- [j7]Zuobin Ying, Hui Li, Jianfeng Ma, Junwei Zhang, Jiangtao Cui:
Adaptively secure ciphertext-policy attribute-based encryption with dynamic policy updating. Sci. China Inf. Sci. 59(4): 042701:1-042701:16 (2016) - [j6]Junwei Zhang, Fangqiong Du, Jianfeng Ma, Chao Yang:
Position based key exchange: defnitions and implementations. J. Commun. Inf. Networks 1(4): 33-43 (2016) - 2015
- [j5]Junwei Zhang, Jianfeng Ma, Chao Yang, Li Yang:
Universally composable secure positioning in the bounded retrieval model. Sci. China Inf. Sci. 58(11): 1-15 (2015) - [j4]Junwei Zhang, Jianfeng Ma, Chao Yang:
Protocol Derivation System for the Needham-Schroeder family. Secur. Commun. Networks 8(16): 2687-2703 (2015) - 2011
- [c2]Junwei Zhang, Chao Yang, Jianfeng Ma:
Protocol Derivation System for the Needham-Schroeder family. CHINACOM 2011: 836-840 - 2010
- [j3]Junwei Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable secure TNC model and EAP-TNC protocol in IF-T. Sci. China Inf. Sci. 53(3): 465-482 (2010) - [j2]Junwei Zhang, Jianfeng Ma, Sang-Jae Moon:
Universally composable one-time signature and broadcast authentication. Sci. China Inf. Sci. 53(3): 567-580 (2010) - [j1]Lanjun Dang, Weidong Kou, Hui Li, Junwei Zhang, Xuefei Cao, Bin Zhao, Kai Fan:
Efficient ID-based registration protocol featured with user anonymity in mobile IP networks. IEEE Trans. Wirel. Commun. 9(2): 594-604 (2010) - [c1]Li Yang, Jianfeng Ma, Junwei Zhang:
Security Flaws and Improvements to a Direct Anonymous Attestation Scheme for Mobile Computing Platforms. CIS 2010: 334-338
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint