default search action
Yichen Zhang 0003
Person information
- affiliation: Fujian Normal University, Fuzhou, China
- affiliation (PhD 2015): Hohai University, Nanjing, China
Other persons with the same name
- Yichen Zhang — disambiguation page
- Yichen Zhang 0001 — Argonne National Laboratory, Lemont, IL, USA (and 1 more)
- Yichen Zhang 0002 — National University of Singapore (and 1 more)
- Yichen Zhang 0004 — University of Science and Technology, Beijing, China
- Yichen Zhang 0005 — University of Texas at Arlington, Arlington, TX, USA
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Shaobo Chen, Jiguo Li, Yichen Zhang, Jinguang Han:
Efficient Revocable Attribute-Based Encryption With Verifiable Data Integrity. IEEE Internet Things J. 11(6): 10441-10451 (2024) - 2023
- [j63]Jiguo Li, Ruyuan Zhang, Yang Lu, Jinguang Han, Yichen Zhang, Wenzheng Zhang, Xinfeng Dong:
Multiauthority Attribute-Based Encryption for Assuring Data Deletion. IEEE Syst. J. 17(2): 2029-2038 (2023) - [j62]Peng Yi, Jiguo Li, Yichen Zhang, Yu Chen:
Efficient Hierarchical Signature Scheme With Batch Verification Function Suitable for ADS-B System. IEEE Trans. Aerosp. Electron. Syst. 59(2): 1292-1299 (2023) - [j61]Zhaozhe Kang, Jiguo Li, Jian Shen, Jinguang Han, Yuting Zuo, Yichen Zhang:
TFS-ABS: Traceable and Forward-Secure Attribute-Based Signature Scheme With Constant-Size. IEEE Trans. Knowl. Data Eng. 35(9): 9514-9530 (2023) - 2022
- [j60]Jiguo Li, Yu Chen, Jinguang Han, Chengdong Liu, Yichen Zhang, Huaqun Wang:
Decentralized Attribute-Based Server-Aid Signature in the Internet of Things. IEEE Internet Things J. 9(6): 4573-4583 (2022) - [j59]Ruyuan Zhang, Jiguo Li, Yang Lu, Jinguang Han, Yichen Zhang:
Key escrow-free attribute based encryption with user revocation. Inf. Sci. 600: 59-72 (2022) - [j58]Ningyu Chen, Jiguo Li, Yichen Zhang, Yuyan Guo:
Efficient CP-ABE Scheme With Shared Decryption in Cloud Storage. IEEE Trans. Computers 71(1): 175-184 (2022) - [j57]Jiguo Li, Hao Yan, Yichen Zhang:
Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage. IEEE Trans. Cloud Comput. 10(1): 356-365 (2022) - [j56]Jiguo Li, Yichen Zhang, Jianting Ning, Xinyi Huang, Geong Sen Poh, Debang Wang:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Trans. Cloud Comput. 10(2): 762-773 (2022) - [j55]Yu Chen, Jiguo Li, Chengdong Liu, Jinguang Han, Yichen Zhang, Peng Yi:
Efficient Attribute Based Server-Aided Verification Signature. IEEE Trans. Serv. Comput. 15(6): 3224-3232 (2022) - [i13]Hantao Cui, Yichen Zhang:
Andes_gym: A Versatile Environment for Deep Reinforcement Learning in Power Systems. CoRR abs/2203.01292 (2022) - 2021
- [j54]Jiguo Li, Min Wang, Yang Lu, Yichen Zhang, Huaqun Wang:
ABKS-SKGA: Attribute-based keyword search secure against keyword guessing attack. Comput. Stand. Interfaces 74: 103471 (2021) - [j53]Peng Yi, Jiguo Li, Chengdong Liu, Jinguang Han, Huaqun Wang, Yichen Zhang, Yu Chen:
An efficient identity-based signature scheme with provable security. Inf. Sci. 576: 790-799 (2021) - [j52]Jiguo Li, Hao Yan, Yichen Zhang:
Identity-Based Privacy Preserving Remote Data Integrity Checking for Cloud Storage. IEEE Syst. J. 15(1): 577-585 (2021) - [j51]Jiguo Li, Ningyu Chen, Yichen Zhang:
Extended File Hierarchy Access Control Scheme with Attribute-Based Encryption in Cloud Computing. IEEE Trans. Emerg. Top. Comput. 9(2): 983-993 (2021) - [j50]Jiguo Li, Hao Yan, Yichen Zhang:
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage. IEEE Trans. Serv. Comput. 14(1): 71-81 (2021) - [j49]Yang Lu, Jiguo Li, Yichen Zhang:
Secure Channel Free Certificate-Based Searchable Encryption Withstanding Outside and Inside Keyword Guessing Attacks. IEEE Trans. Serv. Comput. 14(6): 2041-2054 (2021) - [i12]Yichen Zhang, Hantao Cui, Jianzhe Liu, Feng Qiu, Tianqi Hong, Rui Yao, Fangxing Li:
Encoding Frequency Constraints in Preventive Unit Commitment Using Deep Learning with Region-of-Interest Active Sampling. CoRR abs/2102.09583 (2021) - 2020
- [j48]Yang Lu, Jiguo Li, Yichen Zhang:
Privacy-Preserving and Pairing-Free Multirecipient Certificateless Encryption With Keyword Search for Cloud-Assisted IIoT. IEEE Internet Things J. 7(4): 2553-2562 (2020) - [j47]Liqing Chen, Jiguo Li, Yang Lu, Yichen Zhang:
Adaptively secure certificate-based broadcast encryption and its application to cloud storage service. Inf. Sci. 538: 273-289 (2020) - [j46]Hao Yan, Jiguo Li, Yichen Zhang:
Remote Data Checking With a Designated Verifier in Cloud Storage. IEEE Syst. J. 14(2): 1788-1797 (2020) - [j45]Jiguo Li, Shengzhou Hu, Yichen Zhang, Jinguang Han:
A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation. Soft Comput. 24(3): 1869-1882 (2020) - [j44]Liqing Chen, Jiguo Li, Yichen Zhang:
Adaptively secure efficient broadcast encryption with constant-size secret key and ciphertext. Soft Comput. 24(6): 4589-4606 (2020) - [j43]Liqing Chen, Jiguo Li, Yichen Zhang:
Anonymous Certificate-Based Broadcast Encryption With Personalized Messages. IEEE Trans. Broadcast. 66(4): 867-881 (2020) - [j42]Jiguo Li, Yao Wang, Yichen Zhang, Jinguang Han:
Full Verifiability for Outsourced Decryption in Attribute Based Encryption. IEEE Trans. Serv. Comput. 13(3): 478-487 (2020) - [j41]Jiguo Li, Yichen Zhang:
Cryptanalysis and Improvement of Batch Verification Certificateless Signature Scheme for VANETs. Wirel. Pers. Commun. 111(2): 1255-1269 (2020) - [i11]Yichen Zhang, Yan Li, Kevin Tomsovic, Seddik M. Djouadi, Meng Yue:
Review on Set-Theoretic Methods for Safety Verification and Control of Power System. CoRR abs/2001.00080 (2020) - [i10]Yichen Zhang, Chen Chen, Guodong Liu, Tianqi Hong, Feng Qiu:
Approximating Trajectory Constraints with Machine Learning - Microgrid Islanding with Frequency Constraints. CoRR abs/2001.05775 (2020) - [i9]Yichen Zhang, Chen Chen, Tianqi Hong, Bai Cui, Bo Chen, Feng Qiu:
Robust Synthesis of Wind Turbine Generators to Support Microgrid Frequency Considering Linearization-Induced Uncertainty. CoRR abs/2003.02905 (2020) - [i8]Hantao Cui, Yichen Zhang, Federico Milano, Fangxing Li:
On the Modeling and Simulation of Anti-Windup Proportional-Integral Controller. CoRR abs/2005.05430 (2020) - [i7]Yang Liu, Yichen Zhang, Kai Sun, Xiaopeng Zhao:
Adaptive Switching Control of Wind Turbine Generators for Necessary Frequency Response. CoRR abs/2005.14562 (2020) - [i6]Yichen Zhang, Jianzhe Liu, Feng Qiu, Tianqi Hong, Rui Yao:
Deep Active Learning for Solvability Prediction in Power Systems. CoRR abs/2007.13250 (2020) - [i5]Yichen Zhang, Feng Qiu, Tianqi Hong, Zhaoyu Wang, Fangxing Li:
Hybrid Imitation Learning for Real-Time Service Restoration in Resilient Distribution Systems. CoRR abs/2011.14458 (2020)
2010 – 2019
- 2019
- [j40]Yang Lu, Jiguo Li, Yichen Zhang:
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search. IEEE Access 7: 40878-40892 (2019) - [j39]Yichen Zhang, Jiguo Li, Hao Yan:
Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure. IEEE Access 7: 47982-47990 (2019) - [j38]Shengzhou Hu, Jiguo Li, Yichen Zhang:
A Dispersed Multi-Value Attribute-Based Encryption With Mediated Obfuscation. IEEE Access 7: 84866-84875 (2019) - [j37]Jiguo Li, Qihong Yu, Yichen Zhang, Jian Shen:
Key-policy attribute-based encryption against continual auxiliary input leakage. Inf. Sci. 470: 175-188 (2019) - [j36]Jiguo Li, Qihong Yu, Yichen Zhang:
Hierarchical attribute based encryption with continuous leakage-resilience. Inf. Sci. 484: 113-134 (2019) - [j35]Liqing Chen, Jiguo Li, Yichen Zhang:
Adaptively Secure Anonymous Identity-based Broadcast Encryption for Data Access Control in Cloud Storage Service. KSII Trans. Internet Inf. Syst. 13(3): 1523-1545 (2019) - 2018
- [j34]Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and Improvement for Certificateless Aggregate Signature. Fundam. Informaticae 157(1-2): 111-123 (2018) - [j33]Jiguo Li, Qihong Yu, Yichen Zhang:
Identity-based broadcast encryption with continuous leakage resilience. Inf. Sci. 429: 177-193 (2018) - [j32]Jiguo Li, Liqing Chen, Yang Lu, Yichen Zhang:
Anonymous certificate-based broadcast encryption with constant decryption cost. Inf. Sci. 454-455: 110-127 (2018) - [j31]Shengzhou Hu, Jiguo Li, Yichen Zhang:
Improving Security and Privacy-Preserving in Multi-Authorities Ciphertext-Policy Attribute-Based Encryption. KSII Trans. Internet Inf. Syst. 12(10): 5100-5119 (2018) - [j30]Jiguo Li, Shengzhou Hu, Yichen Zhang:
Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key. Secur. Commun. Networks 2018: 8738960:1-8738960:10 (2018) - [j29]Jiguo Li, Wei Yao, Jinguang Han, Yichen Zhang, Jian Shen:
User Collusion Avoidance CP-ABE With Efficient Attribute Revocation for Cloud Storage. IEEE Syst. J. 12(2): 1767-1777 (2018) - [j28]Yuyan Guo, Jiguo Li, Yang Lu, Yichen Zhang, Futai Zhang:
Provably secure certificate-based encryption with leakage resilience. Theor. Comput. Sci. 711: 1-10 (2018) - [i4]Yichen Zhang, M. Ehsan Raoufat, Kevin Tomsovic, Seddik M. Djouadi:
Set Theory-Based Safety Supervisory Control for Wind Turbines to Ensure Adequate Frequency Response. CoRR abs/1803.03694 (2018) - 2017
- [j27]Jiguo Li, Yuerong Shi, Yichen Zhang:
Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int. J. Commun. Syst. 30(1) (2017) - [j26]Jiguo Li, Fengjie Sha, Yichen Zhang, Xinyi Huang, Jian Shen:
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length. Secur. Commun. Networks 2017: 3596205:1-3596205:11 (2017) - [j25]Hao Yan, Jiguo Li, Jinguang Han, Yichen Zhang:
A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(1): 78-88 (2017) - [j24]Jiguo Li, Xiaonan Lin, Yichen Zhang, Jinguang Han:
KSF-OABE: Outsourced Attribute-Based Encryption with Keyword Search Function for Cloud Storage. IEEE Trans. Serv. Comput. 10(5): 715-725 (2017) - [j23]Jiguo Li, Wei Yao, Yichen Zhang, Huiling Qian, Jinguang Han:
Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing. IEEE Trans. Serv. Comput. 10(5): 785-796 (2017) - 2016
- [j22]Jiguo Li, Na Qian, Yichen Zhang, Xinyi Huang:
An Efficient Certificate-Based Designated Verifier Signature Scheme. Comput. Informatics 35(5): 1210-1230 (2016) - [j21]Jiguo Li, Haiting Du, Yichen Zhang:
Certificate-Based Key-Insulated Signature in the Standard Model. Comput. J. 59(7): 1028-1039 (2016) - [j20]Jiguo Li, Meilin Teng, Yichen Zhang, Qihong Yu:
A Leakage-Resilient CCA-Secure Identity-Based Encryption Scheme. Comput. J. 59(7): 1066-1075 (2016) - [j19]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang, Futai Zhang:
Continuous leakage-resilient certificate-based encryption. Inf. Sci. 355-356: 1-14 (2016) - [j18]Jiguo Li, Haiping Wang, Yichen Zhang, Jian Sheng:
Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Trans. Internet Inf. Syst. 10(7): 3339-3352 (2016) - [j17]Jiguo Li, Xuexia Zhao, Yichen Zhang, Wei Yao:
Provably Secure Certificate-based Conditional Proxy Re-encryption. J. Inf. Sci. Eng. 32(4): 813-830 (2016) - [j16]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-based encryption resilient to key leakage. J. Syst. Softw. 116: 101-112 (2016) - [j15]Jiguo Li, Yuyan Guo, Qihong Yu, Yang Lu, Yichen Zhang:
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage. Secur. Commun. Networks 9(10): 1016-1024 (2016) - [j14]Yuyan Guo, Jiguo Li, Yichen Zhang, Jian Shen:
Hierarchical attribute-based encryption with continuous auxiliary inputs leakage. Secur. Commun. Networks 9(18): 4852-4862 (2016) - [i3]Bin Wang, Yichen Zhang, Kai Sun, Kevin Tomsovic:
Emulated Inertia and Damping of Converter-Interfaced Power Source. CoRR abs/1611.02698 (2016) - [i2]Jiguo Li, Hong Yuan, Yichen Zhang:
Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. IACR Cryptol. ePrint Arch. 2016: 692 (2016) - 2015
- [j13]Jiguo Li, Huiyun Teng, Xinyi Huang, Yichen Zhang, Jianying Zhou:
A Forward-Secure Certificate-Based Signature Scheme. Comput. J. 58(4): 853-866 (2015) - [j12]Huiling Qian, Jiguo Li, Yichen Zhang, Jinguang Han:
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation. Int. J. Inf. Sec. 14(6): 487-497 (2015) - [j11]Yichen Zhang, Jiguo Li, Na Qian:
无证书强指定验证者签名方案 (Certificateless Strong Designated Verifier Signature Scheme). 计算机科学 42(3): 132-135 (2015) - [j10]Jiguo Li, Jingjing Zhao, Yichen Zhang:
Certificateless online/offline signcryption scheme. Secur. Commun. Networks 8(11): 1979-1990 (2015) - [j9]Qihong Yu, Jiguo Li, Yichen Zhang:
Leakage-resilient certificate-based encryption. Secur. Commun. Networks 8(18): 3346-3355 (2015) - [i1]Qihong Yu, Jiguo Li, Yichen Zhang, Wei Wu, Xinyi Huang, Yang Xiang:
Certificate-Based Encryption Resilient to Key Leakage. IACR Cryptol. ePrint Arch. 2015: 314 (2015) - 2014
- [j8]Jiguo Li, Haiting Du, Yichen Zhang, Tao Li, Yuexin Zhang:
Provably secure certificate-based key-insulated signature scheme. Concurr. Comput. Pract. Exp. 26(8): 1546-1560 (2014) - [c7]Jiguo Li, Xuexia Zhao, Yichen Zhang:
Certificate-Based Conditional Proxy Re-Encryption. NSS 2014: 299-310 - 2013
- [j7]Jiguo Li, Zhiwei Wang, Yichen Zhang:
Provably secure certificate-based signature scheme without pairings. Inf. Sci. 233: 313-320 (2013) - [j6]Ji Yao, Jiguo Li, Yichen Zhang:
Certificate-Based Encryption Scheme without Pairing. KSII Trans. Internet Inf. Syst. 7(6): 1480-1491 (2013) - [j5]Jiguo Li, Yanqiong Li, Yichen Zhang:
Provably Secure Forward Secure Certificateless Proxy Signature Scheme. KSII Trans. Internet Inf. Syst. 7(8): 1972-1988 (2013) - [c6]Huiling Qian, Jiguo Li, Yichen Zhang:
Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Fully Hidden Access Structure. ICICS 2013: 363-372 - [c5]Jiguo Li, Yanqiong Li, Yichen Zhang:
Forward Secure Certificateless Proxy Signature Scheme. NSS 2013: 350-364 - 2012
- [j4]Jiguo Li, Xinyi Huang, Meixue Hong, Yichen Zhang:
Certificate-based signcryption with enhanced security features. Comput. Math. Appl. 64(6): 1587-1601 (2012) - [j3]Jiguo Li, Xinyi Huang, Yichen Zhang, Lizhong Xu:
An efficient short certificate-based signature scheme. J. Syst. Softw. 85(2): 314-322 (2012) - [c4]Jiguo Li, Yichen Zhang, Huiyun Teng:
A Forward-Secure Certificate-Based Signature Scheme in the Standard Model. CSS 2012: 362-376 - [c3]Haiting Du, Jiguo Li, Yichen Zhang, Tao Li, Yuexin Zhang:
Certificate-Based Key-Insulated Signature. ICDKE 2012: 206-220
2000 – 2009
- 2009
- [j2]Jiguo Li, Lizhong Xu, Yichen Zhang:
Provably Secure Certificate-based Proxy Signature Schemes. J. Comput. 4(6): 444-452 (2009) - 2006
- [c2]Jiguo Li, Yichen Zhang, Zhijian Wang:
Improvement of Threshold Signature Scheme Using Self-Certified Public Key. ICICIC (1) 2006: 480-483 - 2004
- [c1]Jiguo Li, Yichen Zhang, Yuelong Zhu:
Security analysis and improvement of some proxy signature schemes. InfoSecu 2004: 27-32 - 2003
- [j1]Jiguo Li, Zhenfu Cao, Yichen Zhang:
Nonrepudiable Proxy Multi-Signature Scheme. J. Comput. Sci. Technol. 18(3): 399-402 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint