Остановите войну!
for scientists:
default search action
Shun Zhang 0002
Person information
- affiliation: Anhui University, School of Computer Science and Technology, Hefei, China
Other persons with the same name
- Shun Zhang — disambiguation page
- Shun Zhang 0001 — City University of Hong Kong, Department of Mathematics (and 1 more)
- Shun Zhang 0003 — State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an, China
- Shun Zhang 0004 — Shanghai University, Key Laboratory of Specialty Fiber Optics and Optical Access Networks, China (and 1 more)
- Shun Zhang 0005 — Nankai University, College of Software, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Shun Zhang, Pengfei Lan, Benfei Duan, Zhili Chen, Hong Zhong, Neal N. Xiong:
DPIVE: A Regionalized Location Obfuscation Scheme with Personalized Privacy Levels. ACM Trans. Sens. Networks 20(2): 35:1-35:26 (2024) - 2023
- [j18]Fuhu Wu, Jian Sun, Shun Zhang, Neal N. Xiong, Hong Zhong:
Efficient reversible data hiding via two layers of double-peak embedding. Inf. Sci. 644: 119264 (2023) - [j17]Tianjiao Ni, Zhili Chen, Lin Chen, Shun Zhang, Yan Xu, Hong Zhong:
Differentially Private Combinatorial Cloud Auction. IEEE Trans. Cloud Comput. 11(1): 412-425 (2023) - [c3]Fuhu Wu, Lin Wang, Shun Zhang, Jie Cui, Hong Zhong:
Reversible Data Hiding in Encrypted Images Based on Block Classification Coding of Sparse Representation. ProvSec 2023: 27-43 - 2022
- [i11]Fuhu Wu, Jian Sun, Shun Zhang, Zhili Chen, Hong Zhong:
Efficient reversible data hiding via two layers of double-peak embedding. CoRR abs/2206.03838 (2022) - 2021
- [j16]Tianjiao Ni, Zhili Chen, Gang Xu, Shun Zhang, Hong Zhong:
Differentially Private Double Auction with Reliability-Aware in Mobile Crowd Sensing. Ad Hoc Networks 114: 102450 (2021) - [j15]Zhili Chen, Yu Wang, Shun Zhang, Hong Zhong, Lin Chen:
Differentially private user-based collaborative filtering recommendation based on k-means clustering. Expert Syst. Appl. 168: 114366 (2021) - [j14]Tianjiao Ni, Minghao Qiao, Zhili Chen, Shun Zhang, Hong Zhong:
Utility-efficient differentially private K-means clustering based on cluster merging. Neurocomputing 424: 205-214 (2021) - [i10]Shun Zhang, Benfei Duan, Zhili Chen, Hong Zhong:
On the differential privacy of dynamic location obfuscation with personalized error bounds. CoRR abs/2101.12602 (2021) - [i9]Shun Zhang, Benfei Duan, Zhili Chen, Hong Zhong:
Regionalized location obfuscation mechanism with personalized privacy levels. CoRR abs/2102.00654 (2021) - 2020
- [i8]Tianjiao Ni, Zhili Chen, Lin Chen, Hong Zhong, Shun Zhang, Yan Xu:
Differentially Private Combinatorial Cloud Auction. CoRR abs/2001.00694 (2020) - [i7]Shun Zhang, Benfei Duan, Zhili Chen, Hong Zhong, Qizhi Yu:
A Differentially Private Framework in Spatial Crowdsourcing with Historical Data Learning. CoRR abs/2008.03475 (2020) - [i6]Tianjiao Ni, Minghao Qiao, Zhili Chen, Shun Zhang, Hong Zhong:
Utility-efficient Differentially Private K-means Clustering based on Cluster Merging. CoRR abs/2010.01234 (2020)
2010 – 2019
- 2019
- [j13]Shun Zhang, Erich Novak:
Optimal Quadrature Formulas for the Sobolev Space $$H^1$$ H 1. J. Sci. Comput. 78(1): 274-289 (2019) - [j12]Shun Zhang, Laixiang Liu, Zhili Chen, Hong Zhong:
Probabilistic matrix factorization with personalized differential privacy. Knowl. Based Syst. 183 (2019) - [j11]Zhili Chen, Tianjiao Ni, Hong Zhong, Shun Zhang, Jie Cui:
Differentially Private Double Spectrum Auction With Approximate Social Welfare Maximization. IEEE Trans. Inf. Forensics Secur. 14(11): 2805-2818 (2019) - [i5]Zhili Chen, Xiaoli Kan, Shun Zhang, Lin Chen, Yan Xu, Hong Zhong:
Differentially Private Aggregated Mobility Data Publication Using Moving Characteristics. CoRR abs/1908.03715 (2019) - 2018
- [i4]Zhili Chen, Tianjiao Ni, Hong Zhong, Shun Zhang, Jie Cui:
Differentially Private Double Spectrum Auction with Approximate Social Welfare Maximization. CoRR abs/1810.07873 (2018) - [i3]Zhili Chen, Xuemei Wei, Hong Zhong, Jie Cui, Yan Xu, Shun Zhang:
Making Double Spectrum Auction Practical: Both Privacy and Efficiency Matter. CoRR abs/1810.07880 (2018) - [i2]Shun Zhang, Laixiang Liu, Zhili Chen, Hong Zhong:
Probabilistic Matrix Factorization with Personalized Differential Privacy. CoRR abs/1810.08509 (2018) - [i1]Zhili Chen, Yu Wang, Shun Zhang, Hong Zhong, Lin Chen:
Differentially Private User-based Collaborative Filtering Recommendation Based on K-means Clustering. CoRR abs/1812.01782 (2018) - 2017
- [j10]Erich Novak, Mario Ullrich, Henryk Wozniakowski, Shun Zhang:
Complexity of oscillatory integrals on the real line. Adv. Comput. Math. 43(3): 537-553 (2017) - [j9]Dan Liu, Shun Zhang, Hong Zhong, Runhua Shi, Yimin Wang:
An Efficient ID-based Online/Offline Signature Scheme without Key Escrow. Int. J. Netw. Secur. 19(1): 127-137 (2017) - [j8]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
Privacy-preserving point-inclusion protocol for an arbitrary area based on phase-encoded quantum private query. Quantum Inf. Process. 16(1): 8 (2017) - [j7]Zhen-wan Peng, Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 16(12): 316 (2017) - [c2]Zhili Chen, Xuemei Wei, Hong Zhong, Jie Cui, Yan Xu, Shun Zhang:
Secure, efficient and practical double spectrum auction. IWQoS 2017: 1-6 - 2016
- [j6]Feng Shao, Shun Zhang, Hong Zhong, Runhua Shi, Jie Cui:
Keyword search protocol with privacy preservation using ID-based proxy reencryption. Int. J. Secur. Networks 11(4): 188-195 (2016) - [j5]Runhua Shi, Yi Mu, Hong Zhong, Shun Zhang, Jie Cui:
Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370-371: 147-158 (2016) - [j4]Runhua Shi, Hong Zhong, Shun Zhang:
A Novel Authenticated Group Key Distribution Scheme. KSII Trans. Internet Inf. Syst. 10(2): 935-946 (2016) - [j3]Runhua Shi, Yi Mu, Hong Zhong, Jie Cui, Shun Zhang:
An efficient quantum scheme for Private Set Intersection. Quantum Inf. Process. 15(1): 363-371 (2016) - [c1]Runhua Shi, Shun Zhang:
Efficient Authenticated Key Exchange Protocols for Large-Scale Mobile Communication Networks. CloudComp 2016: 204-215 - 2015
- [j2]Runhua Shi, Hong Zhong, Jie Cui, Shun Zhang:
A novel one-to-many and many-to-one asymmetric encryption model and its algorithms. Secur. Commun. Networks 8(18): 3906-3913 (2015) - [j1]Runhua Shi, Hong Zhong, Shun Zhang:
Comments on two schemes of identity-based user authentication and key agreement for mobile client-server networks. J. Supercomput. 71(11): 4015-4018 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-11 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint