近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
(SCI, IF 4.305, JCR-Q1, CCF B) Jun Zhang, Zoe L. Jiang*, Ping Li, Siu Ming Yiu. Privacy-preserving multikey computing framework for encrypted data in the cloud, Information Sciences, vol. 575, 2021.10, 217-230
(SCI, IF 4.305, JCR-Q1, CCF B) Zoe L. Jiang, Ning Guo, Yabin Jin, Jiazhuo Lv, Yulin Wu, Yating Yu, Xuan Wang, S. M. Yiu, and Junbin Fang. Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing, Information Sciences, 518, 168–180, 2020.1
(SCI, IF 2.222, JCR-Q1) Zhengzhong Yi, Junbin Fang, Puxi Lin, Xiaojun Wen, Zoe Lin Jiang*, Xuan Wang. Efficient Quantum Key Distribution Protocol Based on Classical-quantum Polarized Channels, Quantum Information Processing, 18(356), 1-24, 2019.10
(SCI, IF 3.500, JCR-Q1, CCF C) Zechao Liu, Zoe L. Jiang*, Xuan Wang. Practical Attribute-based Encryption: Outsourcing Decryption, Attribute Revocation and Policy Updating, Journal of Network and Computer Applications (JNCA), 108, pp. 112-123, 2018.4
(SCI, IF 6.404, JCR-Q1, CCF A) Yulin Wu, Xuan Wang, Zoe L. Jiang, etc. Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing, IEEE Transactions on Dependable and Secure Computing, 2020
(SCI, IF 2.040, JCR-Q2) Ye Li, Zoe L. Jiang*, Lin Yao, Xuan Wang, S.M. Yiu, Zhengan Huang. Outsourced Privacy-preserving C4.5 Decision Tree Algorithm over Horizontally and Vertically Partitioned Dataset among Multiple Parties. Cluster Computing, 22(S1), pp. 1581-1593, 2019.1
(SCI, IF 2.627, JCR-Q2) Zhen Che, Junbin Fang, Zoe Lin Jiang*, Jin Li, Shancheng Zhao, Yongchun Zhong, Zhe Chen. A Physical-Layer Secure Coding Scheme for Indoor Visible Light Communication Based on Polar Codes, IEEE Photonics Journal, 10(5), 7907313, 2018.9
(SCI, IF 2.487, JCR-Q2) Yulin Wu, Xuan Wang*, Willy Susilo, Guomin Yang, Zoe L. Jiang, Siu-Ming Yiu, Hao Wang. Generic Server-aided Secure Multi-Party Computation in Cloud Computing [J]. Computer Standards & Interfaces, vol. 79, 2022.1, 103552
(SCI, IF 2.487, JCR-Q2) Yulin Wu, Xuan Wang*, Willy Susilo, Guomin Yang, Zoe L. Jiang, Hao Wang, Tong Wu. Efficient Maliciously Secure Two-Party Mixed-Protocol Framework for Data-Driven Computation Tasks [J]. Computer Standards & Interfaces, vol. 80, 2022.3, 103571
(SCI, IF 2.487, JCR-Q2) Yulin Wu, Xuan Wang*, Willy Susilo, Guomin Yang, Zoe L. Jiang, Junyi Li, Xueqiao Liu. Mixed-Protocol Multi-Party Computation Framework Towards Complex Computation Tasks with Malicious Security [J]. Computer Standards & Interfaces, vol. 80, 2022.3, 103570
会议论文
Chengjin Liu, Zoe L. Jiang, etc., Efficient and Privacy-Preserving Logistic Regression Scheme based on Leveled Fully Homomorphic Encryption, IEEE INFOCOM 2022 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2022.6
Zoe L. Jiang, Hui Guo, Yijian Pan, Yang Liu, Xuan Wang, Jun Zhang. Secure Neural Network in Federated Learning with Model Aggregation under Multiple Keys, 2021 8th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud), pp. 47-52, 2021.6.
Jun Zhang, Siu Ming Yiu, Zoe L. Jiang. Outsourced Privacy-Preserving Reduced SVM Among Multiple Institutions, International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2020, pp 126-141, 2020.9.
Zhentian Xiong, Zoe L. Jiang*, Shuqiang Yang, Xuan Wang, Junbin Fang. SSHTDNS: A Secure, Scalable and High-Throughput Domain Name System via Blockchain Technique, 13th International Conference on Network and System Security (NSS2019), LNCS 11928, pp. 272–287, 2019.12
Zeming Lu, Zoe L. Jiang*, Yulin Wu, Xuan Wang, Yantao Zhong. A Lattice-Based Anonymous Distributed E-Cash, 13th International Conference on Provable Security (Provsec 2019), LNCS 11821, pp. 275-287, 2019.9
(CCF C) Heyan Chai, Shuqiang Yang, Zoe L. Jiang, Xuan Wang. A Robust and Reversible Watermarking Technique for Relational Dataset Based on Clustering, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom2019), pp. 411-418, 2019.8
(CCF C) Jiazhuo Lv, Zoe L. Jiang*, Xuan Wang. A Secure Decentralized Trustless E-Voting System Based on Smart Contract, 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom2019), pp. 570-577, 2019.8
(CCF C) Zechao Liu, Zoe L. Jiang*, Xuan Wang, S.M. Yiu, Ruoqing Zhang, Yulin Wu. A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage, the 17th International Conference on Trust, Security and Privacy (TrustCom2018), New York, USA, pp.614-623, 2018.9
(CCF C) Ye Li, Zoe L. Jiang*, Xuan Wang, and S.M. Yiu and Peng Zhang. Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-Parties. 2017 IEEE Trustcom/BigDataSE/ICESS, pp. 1070-1075, 2017.9
Ye Li, Zoe L. Jiang*, Xuan Wang, Siu Ming Yiu and Junbin Fang. Outsourced Privacy Preserving Random Decision Tree Algorithm under Multiple Parties for Sensor-Cloud Integration, 13th International Conference on Information Security Practice and Experience (ISPEC 2017), LNCS 10701, pp. 525-538, 2017.12
著作
钟焰涛,蒋琳,方俊彬等,《同态密码学原理及算法》,机械工业出版社,2022.8,ISBN9787111709190
方滨兴,顾钊铨,崔翔,蒋琳等,《人工智能安全》,电子工业出版社,2020.6,ISBN9787121389917
Junbin Fang, Zoe L. Jiang, Sijin Li, Siu-Ming Yiu, Lucas C.K. Hui, Kam-Pui Chow. Chapter 9 - Timeline analysis for digital evidences on MTK-based Shanzhai Mobile Phone, Advanced Topics in Security, Privacy and Forensic (Mobile Security and Privacy), Syngress/Elsevier Book Series, Singapore, 2016