Follow
Kai ZHANG
Kai ZHANG
Shanghai University of Electric Power (SUEP)
Verified email at shiep.edu.cn - Homepage
Title
Cited by
Cited by
Year
Energy Theft Detection with Energy Privacy Preservation in the Smart Grid
D Yao, M Wen, X Liang, Z Fu, K Zhang, B Yang
IEEE Internet of Things Journal 6 (5), 7659 - 7669, 2019
1942019
FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid
M Wen, R Xie, K Lu, L Wang, K Zhang
IEEE Internet of Things Journal 9 (8), 6069 - 6080, 2022
792022
Forward Secure Public Key Encryption with Keyword Search for Outsourced Cloud Storage
M Zeng, J Chen, H Qiang, K Zhang
IEEE Transactions on Cloud Computing 10 (1), 426-438, 2022
532022
Efficient Public Key Encryption with Equality Test in the Standard Model
K Zhang, J Chen, HT Lee, H Qian, H Wang
Theoretical Computer Science 755, 65-80, 2019
492019
Multi-client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-enforced Authorization
K Zhang, M Wen, R Lu, K Chen
IEEE Transactions on Dependable and Secure Computing 18 (6), 2875 - 2887, 2021
322021
A Conditional Privacy-Preserving Certificateless Aggregate Signature Scheme in the Standard Model for VANETs
H Wang, L Wang, K Zhang, J Li, Y Luo
IEEE Access 10, 15605-15618, 2022
262022
Practical and Efficient Attribute-based Encryption with Constant-size Ciphertexts in Outsourced Verifiable Computation
K Zhang, J Gong, S Tang, J Chen, X Li, H Qian, Z Cao
Proceedings of the 11th ACM on Asia Conference on Computer and …, 2016
212016
A Searchable Asymmetric Encryption Scheme with Support for Boolean Queries for Cloud Applications
M Zeng, K Zhang, H Qian, X Chen, J Chen
The Computer Journal 62 (4), 563-578, 2019
202019
Security analysis and modification of ID-based encryption with equality test from ACISP 2017
HT Lee, H Wang, K Zhang
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
172018
Batch verifiable computation with public verifiability for outsourcing polynomials and matrix computations
Y Sun, Y Yu, X Li, K Zhang, H Qian, Y Zhou
Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016
172016
Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices
J Chen, L Wang, M Wen, K Zhang, K Chen
IEEE Internet of Things Journal 9 (11), 8967-8979, 2021
162021
MEDAPs: Secure Multi‐entities Delegated Authentication Protocols for Mobile Cloud Computing
L Zhang, L Wei, D Huang, K Zhang, M Dong, K Ota
Security and Communication Networks 9 (16), 3777-3789, 2016
162016
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage
K Zhang, Z Jiang, J Ning, X Huang
IEEE Transactions on Information Forensics and Security 17, 1771 - 1784, 2022
152022
Privacy-Preserving Federated Learning via Functional Encryption, Revisited
Y Chang, K Zhang, J Gong, H Qian
IEEE Transactions on Information Forensics and Security 18, 1855-1869, 2023
142023
Multi-Authority Non-Monotonic KP-ABE with Cryptographic Reverse Firewall
B Hong, J Chen, K Zhang, H Qian
IEEE Access 7, 159002 - 159012, 2019
142019
P3GQ: a practical privacy-preserving generic location-based services query scheme
M Zeng, K Zhang, J Chen, H Qian
Pervasive and Mobile Computing 51, 56-72, 2018
142018
Forward Secure Public-Key Authenticated Encryption with Conjunctive Keyword Search
Z Jiang, K Zhang, L Wang, J Ning
The Computer Journal 66 (9), 2265–2278, 2023
132023
Public key encryption with equality test via hash proof system
M Zeng, J Chen, K Zhang, H Qian
Theoretical Computer Science 795, 20-35, 2019
132019
Lattice-based dual receiver encryption and more
D Zhang, K Zhang, B Li, X Lu, H Xue, J Li
Australasian Conference on Information Security and Privacy, 520-538, 2018
102018
New Application of Partitioning Methodology: Identity‐based Dual Receiver Encryption
K Zhang, W Chen, X Li, J Chen, H Qian
Security and Communication Networks 9 (18), 5789-5802, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20