default search action
Yudi Zhang 0001
Person information
- affiliation: University of Wollongong, NSW, Australia
- affiliation (former): Wuhan University, Wuhan, Hubei, China
Other persons with the same name
- Yudi Zhang — disambiguation page
- Yudi Zhang 0002 — Jilin Jianzhu University, Changchun, China
- Yudi Zhang 0003 — Nanjing Normal University, Key Laboratory of Virtual Geographic Environment, China
- Yudi Zhang 0004 — University of Bristol, School of Management, UK
- Yudi Zhang 0005 — Shenzhen University, College of Computer Science and Software Engineering, China
- Yudi Zhang 0006 — Shandong University, School of Control Science and Engineering, China
- Yudi Zhang 0007 — Eindhoven University of Technology, The Netherlands
- Yudi Zhang 0008 — Harbin Institute of Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j15]Fengmei Tang, Yumei Li, Yudi Zhang, Willy Susilo, Bingbing Li:
Real-time privacy-preserved auditing for shared outsourced data. Comput. Stand. Interfaces 92: 103927 (2025) - 2024
- [c5]Yudi Zhang, Yumei Li, Mingwu Zhang, Willy Susilo:
OEIBS: A Secure Obfuscation for Encrypted Identity-Based Signatures Scheme in NB-IoT. ISPEC 2024: 383-402 - 2023
- [j14]Shijin Chen, Willy Susilo, Yudi Zhang, Bo Yang, Mingwu Zhang:
Privacy-preserving anomaly counting for time-series data in edge-assisted crowdsensing. Comput. Stand. Interfaces 85: 103707 (2023) - [j13]Yudi Zhang, Fuchun Guo, Willy Susilo, Guomin Yang:
Balancing Privacy and Flexibility of Cloud-Based Personal Health Records Sharing System. IEEE Trans. Cloud Comput. 11(3): 2420-2430 (2023) - [j12]Yudi Zhang, Willy Susilo, Fuchun Guo, Guomin Yang:
PPDF: A Privacy-Preserving Cloud-Based Data Distribution System With Filtering. IEEE Trans. Serv. Comput. 16(6): 3920-3930 (2023) - [e2]Mingwu Zhang, Man Ho Au, Yudi Zhang:
Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings. Lecture Notes in Computer Science 14217, Springer 2023, ISBN 978-3-031-45512-4 [contents] - 2022
- [j11]Hanchao Ku, Willy Susilo, Yudi Zhang, Wenfen Liu, Mingwu Zhang:
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption. Comput. Stand. Interfaces 80: 103583 (2022) - [c4]Yi Liu, Guoxiong Hu, Yudi Zhang, Mingwu Zhang:
SVFLS: A Secure and Verifiable Federated Learning Training Scheme. FCS 2022: 134-148 - [c3]Mingwu Zhang, Chenmei Cui, Gang Shen, Yudi Zhang:
A Privacy-Preserving Federated Learning with Mutual Verification on Vector Spaces. SocialSec 2022: 212-226 - [e1]Willy Susilo, Xiaofeng Chen, Fuchun Guo, Yudi Zhang, Rolly Intan:
Information Security - 25th International Conference, ISC 2022, Bali, Indonesia, December 18-22, 2022, Proceedings. Lecture Notes in Computer Science 13640, Springer 2022, ISBN 978-3-031-22389-1 [contents] - 2021
- [j10]Yudi Zhang, Debiao He, Mohammad S. Obaidat, Pandi Vijayakumar, Kuei-Fang Hsiao:
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System. IEEE J. Sel. Areas Commun. 39(2): 384-395 (2021) - 2020
- [j9]Yudi Zhang, Debiao He, Mingwu Zhang, Kim-Kwang Raymond Choo:
A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm. Frontiers Comput. Sci. 14(3): 143803 (2020) - [j8]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo, Jing Wang:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEICE Trans. Inf. Syst. 103-D(2): 188-195 (2020) - [j7]Yudi Zhang, Debiao He, Yumei Li, Mingwu Zhang, Kim-Kwang Raymond Choo:
Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks. IEEE Syst. J. 14(4): 5320-5328 (2020) - [j6]Debiao He, Yudi Zhang, Ding Wang, Kim-Kwang Raymond Choo:
Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IEEE Trans. Dependable Secur. Comput. 17(5): 1124-1132 (2020) - [c2]Yudi Zhang, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li:
An Efficient Blind Signature Scheme Based on SM2 Signature Algorithm. Inscrypt 2020: 368-384
2010 – 2019
- 2019
- [j5]Mingwu Zhang, Yudi Zhang, Yan Jiang, Jian Shen:
Obfuscating EVES Algorithm and Its Application in Fair Electronic Transactions in Public Clouds. IEEE Syst. J. 13(2): 1478-1486 (2019) - 2018
- [j4]Yudi Zhang, Debiao He, Sherali Zeadally, Ding Wang, Kim-Kwang Raymond Choo:
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks. IEEE Internet Things J. 5(6): 5271-5280 (2018) - [i1]Yudi Zhang, Debiao He, Xinyi Huang, Ding Wang, Kim-Kwang Raymond Choo:
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography. IACR Cryptol. ePrint Arch. 2018: 814 (2018) - 2017
- [j3]Ling Zhao, Mingwu Zhang, Hua Shen, Yudi Zhang, Jian Shen:
Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server. KSII Trans. Internet Inf. Syst. 11(2): 826-845 (2017) - [j2]Mingwu Zhang, Yudi Zhang, Hua Shen, Chunming Tang, Lein Harn:
Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security. J. Inf. Sci. Eng. 33(4): 993-1006 (2017) - [j1]Mingwu Zhang, Yudi Zhang, Yixin Su, Qiong Huang, Yi Mu:
Attribute-Based Hash Proof System Under Learning-With-Errors Assumption in Obfuscator-Free and Leakage-Resilient Environments. IEEE Syst. J. 11(2): 1018-1026 (2017) - [c1]Yudi Zhang, Yan Jiang, Bingbing Li, Mingwu Zhang:
An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding. EIDWT 2017: 524-531
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint