关注
Tao Zhang (张涛)
Tao Zhang (张涛)
在 xidian.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Fedproc: Prototypical contrastive federated learning on non-iid data
X Mu, Y Shen, K Cheng, X Geng, J Fu, T Zhang, Z Zhang
Future Generation Computer Systems 143, 93-104, 2023
1342023
Microthings: A generic iot architecture for flexible data aggregation and scalable service cooperation
Y Shen, T Zhang, Y Wang, H Wang, X Jiang
IEEE Communications Magazine 55 (9), 86-93, 2017
812017
TRAC: Traceable and revocable access control scheme for mHealth in 5G-enabled IIoT
Q Li, B Xia, H Huang, Y Zhang, T Zhang
IEEE Transactions on Industrial Informatics 18 (5), 3437-3448, 2021
722021
Personal health records integrity verification using attribute based proxy signature in cloud computing
X Liu, J Ma, J Xiong, T Zhang, Q Li
Internet and Distributed Computing Systems: 6th International Conference …, 2013
512013
An Attribute-Based Trust Negotiation Protocol for D2D Communication in Smart City Balancing Trust and Privacy.
J Guo, J Ma, X Li, J Zhang, T Zhang
Journal of Information Science & Engineering 33 (4), 2017
362017
Privacy-preserving asynchronous grouped federated learning for IoT
T Zhang, A Song, X Dong, Y Shen, J Ma
IEEE Internet of Things Journal 9 (7), 5511-5523, 2021
272021
A hierarchical access control scheme for perceptual layer of IoT
J Ma, Y Guo, J Ma, J Xiong, T Zhang
Computer Research and Development 50, 1267-1275, 2013
262013
Traceable CiphertextPolicy AttributeBased Encryption with Verifiable Outsourced Decryption in eHealth Cloud
Q Li, H Zhu, Z Ying, T Zhang
Wireless Communications and Mobile Computing 2018 (1), 1701675, 2018
252018
HTAC: Fine-grained policy-hiding and traceable access control in mHealth
Q Li, Y Zhang, T Zhang, H Huang, Y He, J Xiong
IEEE Access 8, 123430-123439, 2020
242020
Threshold attributebased encryption with attribute hierarchy for lattices in the standard model
X Liu, J Ma, J Xiong, Q Li, T Zhang, H Zhu
IET Information Security 8 (4), 217-223, 2014
232014
Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing
X Dong, T Zhang, D Lu, G Li, Y Shen, J Ma
IEEE Transactions on Vehicular Technology 68 (9), 8881-8892, 2019
202019
Ciphertext policy weighted attribute based encryption scheme
X Liu, J Ma, J Xiong, Q Li, T Zhang
Journal of Xi’an Jiaotong University 47 (8), 44-48, 2013
202013
Microthingschain: Edge computing and decentralized iot architecture based on blockchain for cross-domain data shareing
J Zheng, X Dong, T Zhang, J Chen, W Tong, X Yang
2018 International Conference on Networking and Network Applications (NaNA …, 2018
192018
A situational awareness trust evolution model for mobile devices in D2D communication
J Guo, J Ma, X Li, T Zhang, Z Liu
IEEE Access 6, 4375-4386, 2017
172017
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
172014
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
162013
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21, 185-200, 2018
152018
PRAM: privacy preserving access management scheme in cloud services
J Xiong, Z Yao, J Ma, X Liu, Q Li, T Zhang
Proceedings of the 2013 international workshop on Security in cloud …, 2013
152013
Trust-based service composition and selection in service oriented architecture
JJ Guo, JF Ma, XX Guo, XH Li, JW Zhang, T Zhang
Peer-to-Peer Networking and Applications 11, 862-880, 2018
122018
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
122013
系统目前无法执行此操作,请稍后再试。
文章 1–20