Follow
wei zhang
wei zhang
Bytedance
Verified email at bytedance.com
Title
Cited by
Cited by
Year
Privacy preserving ranked multi-keyword search for multiple data owners in cloud computing
W Zhang, Y Lin, S Xiao, J Wu, S Zhou
IEEE Transactions on Computers 65 (5), 1566-1577, 2015
2292015
Secure ranked multi-keyword search for multiple data owners in cloud computing
W Zhang, S Xiao, Y Lin, T Zhou, S Zhou
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems …, 2014
1092014
An efficient ranked multi-keyword search for multiple data owners over encrypted cloud data
T Peng, Y Lin, X Yao, W Zhang
iEEE Access 6, 21924-21933, 2018
612018
Catch you if you misbehave: Ranked keyword search results verification in cloud computing
W Zhang, Y Lin, G Qi
IEEE Transactions on Cloud Computing 6 (1), 74-86, 2015
542015
Minority oversampling for imbalanced ordinal regression
T Zhu, Y Lin, Y Liu, W Zhang, J Zhang
Knowledge-Based Systems 166, 140-155, 2019
422019
Inference attack-resistant e-healthcare cloud system with fine-grained access control
W Zhang, Y Lin, J Wu, T Zhou
IEEE Transactions on Services Computing 14 (1), 167-178, 2018
282018
Secure distributed keyword search in multiple clouds
W Zhang, Y Lin, S Xiao, Q Liu, T Zhou
2014 IEEE 22nd international symposium of quality of service (IWQoS), 370-379, 2014
262014
Preserving location and content privacy for secure ranked queries in location based services
P Chen, Y Lin, W Zhang, X Li, S Zhang
2016 IEEE Trustcom/BigDataSE/ISPA, 892-899, 2016
152016
Full reference image quality assessment by considering intra-block structure and inter-block texture
J Yang, W Zhang, X Li, T Zhou, B Ou
IEEE Access 8, 179702-179715, 2020
132020
Secure and Verifiable Keyword Search in Multiple Clouds
J Du, J Zhou, Y Lin, W Zhang, J Wei
IEEE Systems Journal 16 (2), 2660-2671, 2021
62021
Detecting attacks smartly in vehicle cloud computing
W Zhang, S Zhou, A Srinivasan, J Wu, Y Lin
2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced …, 2016
52016
Secure and verifiable top-k query in two-tiered sensor networks
T Zhou, Y Lin, W Zhang, S Xiao, J Li
Security and Privacy in Communication Networks: 9th International ICST …, 2013
52013
Secure and privacy preserving keyword search over the large scale cloud data
W Zhang, J Wu, Y Lin
Handbook of Research on Modern Cryptographic Solutions for Computer and …, 2016
22016
NTIRE 2024 Quality Assessment of AI-Generated Content Challenge
X Liu, X Min, G Zhai, C Li, T Kou, W Sun, H Wu, Y Gao, Y Cao, Z Zhang, ...
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024
12024
A Secondary Index for Improving Reading Performance in the Inline Deduplication System
S Long, Y Lin, X Yao, W Zhang
2016 International Conference on Network and Information Systems for …, 2016
12016
NAORL: Network Feature Aware Offline Reinforcement Learning for Real Time Bandwidth Estimation
W Zhang, X Tao, J Wang
Proceedings of the 15th ACM Multimedia Systems Conference, 326-331, 2024
2024
Align-IQA: Aligning Image Quality Assessment Models with Diverse Human Preferences via Customizable Guidance
WC Junfeng Yang, Jing Fu, Zhen Zhang, Limei Liu, Qin Li, Wei Zhang
Proceedings of the 32st ACM International Conference on Multimedia, 2024
2024
MoE-AGIQA: Mixture-of-Experts Boosted Visual Perception-Driven and Semantic-Aware Quality Assessment for AI-Generated Images
J Yang, J Fu, W Zhang, W Cao, L Liu, H Peng
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern …, 2024
2024
Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing
X Xiao, Y Lin, W Zhang, X Yao, Q Gu
Security and Privacy in Communication Networks: 11th EAI International …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–19