default search action
Yuanyuan Zhang 0009
Person information
- affiliation: Fujian Normal University, College of Mathematics and Informatics, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fuzhou, China
- affiliation (PhD 2022): South China University of Technology, School of Computer Science and Engineering, Pazhou Lab, Guangzhou, China
- affiliation (2017-2018): Singapore Management University, School of Computing and Information Systems, Singapore
Other persons with the same name
- Yuanyuan Zhang (aka: Yuan-Yuan Zhang) — disambiguation page
- Yuanyuan Zhang 0001 — University of Kansas, USA
- Yuanyuan Zhang 0002 — Shanghai Jiao Tong University, Shanghai, China (and 1 more)
- Yuanyuan Zhang 0003 — University College London, UK
- Yuanyuan Zhang 0004 — University of Surrey, UK
- Yuanyuan Zhang 0005 — Zhengzhou University, Zhengzhou, China (and 1 more)
- Yuanyuan Zhang 0006 — Zhongguancun Laboratory, Beijing, China
- Yuanyuan Zhang 0007 (aka: YuanYuan Zhang 0007) — Sichuan University, College of Computer Science and Institute for Industrial Internet Research, Chengdu, China
- Yuanyuan Zhang 0008 (aka: Yuan-Yuan Zhang 0008) — Qingdao University of Technology, School of Information and Control Engineering, Shandong, China (and 1 more)
- Yuanyuan Zhang 0010 — Beijing Baixingkefu Network Technology Company Ltd., BXCL, China (and 1 more)
- Yuanyuan Zhang 0011 — Huazhong University of Science and Technology, School of Aerospace Engineering, Wuhan, Hubei, China
- Yuanyuan Zhang 0012 — Fujitsu Laboratories Ltd. (and 1 more)
- Yuanyuan Zhang 0013 — North China Institute of Computing Technology, Beijing, China (and 1 more)
- Yuanyuan Zhang 0014 — Wuhan University, School of Mathematics and Statistics, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Ruonan Lin, Yikun Huang, Yuanyuan Zhang, Renwan Bi, Jinbo Xiong:
Achieving lightweight, efficient, privacy-preserving user recruitment in mobile crowdsensing. J. Inf. Secur. Appl. 85: 103854 (2024) - [j10]Jinbo Xiong, Renwan Bi, Yuanyuan Zhang, Qi Li, Li Lin, Youliang Tian:
Privacy-Preserving Outsourcing Learning for Connected Autonomous Vehicles: Challenges, Solutions, and Perspectives. IEEE Netw. 38(3): 41-47 (2024) - [c10]Dalong Guo, Changqing Luo, Yuanyuan Zhang, Renwan Bi, Jinbo Xiong:
LSTN: A Lightweight Secure Three-Party Inference Framework for Deep Neural Networks. ICC 2024: 746-751 - [c9]Jiayi Huang, Yuanyuan Zhang, Renwan Bi, Jiayin Lin, Jinbo Xiong:
Knowledge Distillation Enables Federated Learning: A Data-free Federated Aggregation Scheme. IJCNN 2024: 1-7 - 2023
- [j9]Yuanyuan Zhang, Zuobin Ying, Bowen Zhao, Chun Lung Philip Chen:
A privacy preserving data aggregation and query for metro passenger flow via mobile crowdsensing. Concurr. Comput. Pract. Exp. 35(20) (2023) - [j8]Renwan Bi, Dalong Guo, Yuanyuan Zhang, Ruihong Huang, Li Lin, Jinbo Xiong:
Outsourced and Privacy-Preserving Collaborative k-Prototype Clustering for Mixed Data via Additive Secret Sharing. IEEE Internet Things J. 10(18): 15810-15821 (2023) - [c8]Chenxi Lyu, Yinan Yao, Xiaodong Guo, Zihong Huang, Chen Dong, Yuanyuan Zhang, Zhenyi Chen:
AntiMal: an Approach of Malware Detection Employing Swin Transformer. ICCNS 2023: 1-5 - [c7]Qiaowen Wu, Yaojie Ke, Zhanghui Liu, Yuanyuan Zhang, Qiyan Wu:
Marine litter detection based on YOLOv7 algorithm and data encryption protection. ICCNS 2023: 82-87 - [c6]Ruishen Bao, Jiayin Li, Yuzhong Chen, Kaihui Yang, Ziyang Chen, Yuanyuan Zhang:
PracticalHAR: A Practical Method of Human Activity Recognition Based on Embedded Sensors of Mobile Phone. ICCNS 2023: 342-349 - 2022
- [j7]Yuanyuan Zhang, Zuobin Ying, C. L. Philip Chen:
Achieving Privacy-Preserving Multitask Allocation for Mobile Crowdsensing. IEEE Internet Things J. 9(18): 16795-16806 (2022) - [j6]Yuanyuan Zhang, Jinbo Xiong, Ximeng Liu:
Privacy-Preserving Traffic Violation Image Filtering and Searching via Crowdsensing. Mob. Networks Appl. 27(6): 2374-2390 (2022) - [j5]Yuanyuan Zhang, C. L. Philip Chen:
Secure Heterogeneous Data Deduplication via Fog-Assisted Mobile Crowdsensing in 5G-Enabled IIoT. IEEE Trans. Ind. Informatics 18(4): 2849-2857 (2022) - [c5]Xuanwei Lin, Chen Dong, Ximeng Liu, Yuanyuan Zhang:
SPA: An Efficient Adversarial Attack on Spiking Neural Networks using Spike Probabilistic. CCGRID 2022: 366-375 - [c4]Li Lin, Yuanyuan Zhang, Jinbo Xiong, Jiayin Lin:
An incentive mechanism for collaborative intelligence. RACS 2022: 112-118 - 2020
- [j4]Jinbo Xiong, Yuanyuan Zhang, Li Lin, Jian Shen, Xuan Li, Mingwei Lin:
ms-PoSW: A multi-server aided proof of shared ownership scheme for secure deduplication in cloud. Concurr. Comput. Pract. Exp. 32(3) (2020)
2010 – 2019
- 2019
- [j3]Jinbo Xiong, Yuanyuan Zhang, Shaohua Tang, Ximeng Liu, Zhiqiang Yao:
Secure Encrypted Data With Authorized Deduplication in Cloud. IEEE Access 7: 75090-75104 (2019) - 2018
- [j2]Jinbo Xiong, Yuanyuan Zhang, Xuan Li, Mingwei Lin, Zhiqiang Yao, Guangjun Liu:
RSE-PoW: a Role Symmetric Encryption PoW Scheme with Authorized Deduplication for Multimedia Data. Mob. Networks Appl. 23(3): 650-663 (2018) - 2017
- [c3]Yuanyuan Zhang, Jinbo Xiong, Mingwei Lin, Lili Wang, Xuan Li:
Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications. ICCCS (1) 2017: 262-274 - 2016
- [j1]Jinbo Xiong, Suping Li, Xuan Li, Yuanyuan Zhang, Biao Jin:
A secure access and associate deleting scheme for multi-replica in multi-cloud environment. Int. J. High Perform. Syst. Archit. 6(3): 143-152 (2016) - [c2]Yuanyuan Zhang, Jinbo Xiong, Xuan Li, Biao Jin, Suping Li, Xu An Wang:
A Multi-replica Associated Deleting Scheme in Cloud. CISIS 2016: 444-448 - [c1]Jun Ren, Zhiqiang Yao, Jinbo Xiong, Yuanyuan Zhang, Ayong Ye:
A Secure Data Deduplication Scheme Based on Differential Privacy. ICPADS 2016: 1241-1246
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint