学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 张乐友的留言板
学术论文

至今已发表科研论文110余篇,其中50余篇被SCI检索,50篇左右被EI检索,部分文章列举如下。

 

  1. Leyou Zhang,Yadi Ye, Yi Mu, Multi-authority Access Control with Anonymous Authentication for Personal Health Record, IEEE Internet of Things Journal, 8(1), 2021, pp. 156-167. (SCI , EI)
  2.  Leyou Zhang, Jun Wang, Yi Mu, Privacy-preserving Flexible Access Control to Encrypted Data in Internet of Things,IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3071553. (SCI , EI)
  3. Leyou Zhang, Wenting You, Yi Mu, Secure Outsourced Attribute-based Sharing Framework for Lightweight Devices in Smart Health Systems, IEEE transactions on Services Computing, 2021, DOI: 10.1109/TSC.2021.3073740. (SCI , EI)
  4. Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang,Xinyi Huang, Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors, IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3082150. (SCI , EI)
  5. Gongcheng Hu Leyou Zhang, Yi Mu, An Expressive “test-decrypt-verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud. IEEE systems Journal, 15(1), 2020, pp. 365-376 (SCI , EI)
  6.  Leyou Zhang, Yi Lei Cui, Yi Mu, Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE systems Journal, 14(1), 2020, pp. 387-397, doi: 10.1109/JSYST.2019.2911391. (SCI , EI)
  7.  Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu, Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE Systems Journal, doi: 10.1109/JSYST.2021.3072793. 2021. (SCI , EI)
  8. Gongcheng Hu, Leyou Zhang, Yi Mu, Xiaoxu Gao. An Expressive“test-decrypt-verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud [J]. IEEE Systems Journal. DOI: 10.1109/JSYST.2020.2996216),(SCI)
  9. Leyou Zhang, Jian Su, Yi Mu. Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage 104344 - 104356 DOI: 10.1109/ACCESS.2020.3000049 : IEEE Access ( Volume: 8 ), (SCI , EI)
  10. Leyou Zhang, Jun Wang, Yi Mu. Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks. IEEE Access, ( Volume: 8 ),DOI: 10.1109/ACCESS.2020.3004247,(SCI , EI)
  11. Leyou Zhang, Gongcheng Hu, Yi Mu. Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System [J]. IEEE Access, 2019, 3(7): 33202-33213. (SCI)
  12. Gongcheng Hu, Leyou Zhang. Analysis of Ciphertext Policy Hidden AttributeBased Encryption and Its Improved Method [C]. 2019 International Conference on Frontiers in Cyber Security (FCS-2019). Springer, 193-208. (EI: 20195307948045)
  13. Leyou Zhang, Juan Ren, Yi Mu and Baocang Wang. Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid[J]. IEEE Access, 2020, 8: 23294-23307. (SCI, EI)
  14. Juan Ren, Leyou Zhang. Hierarchical Identity-Based Signature over Verifiable Random Function[C]. In: Shen B., Wang B., Han J., Yu Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science,Springer, Singapore, 2019, 1105: 177-189. (EI:20195307948044)
  15. Juan Ren, Leyou Zhang and Baocang Wang. Decentralized Multi-Authority Attribute-Based Searchable Encryption Scheme[J]. International Journal of Network Security. (EI)
  16. Leyou Zhang, Juan Ren, Yi Mu and Baocang Wang. Decentralized Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy[J]. International Journal of Network Security. (EI)
  17. Leyou Zhang, Xiaoxu Gao, Fuchun Guo, Gongcheng Hu. Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing[J], IEEE Access. DOI: 10.1109/ACCESS.2020.2995480), (SCI , EI)
  18. Xiaoxu Gao, Leyou Zhang, Gongcheng Hu. Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation[C], Springer FCS 2019, CCIS 1105, 2019. pp. 21–35(EI: 20195307948052)
  19. Xiaoxu Gao, Leyou Zhang. Efficient Anonymous Ciphertext-Policy Attributebased Encryption for General Structures Supporting Leakage-Resilience[J], International Journal of Network Security. (SCI)
  20. Li Kang, Leyou Zhang. A Privacy-Preserving Data Sharing System with Decentralized Attribute-Based Encryption Scheme [J]. International Journal of Network Security. (EI)
  21. Li Kang, Leyou Zhang. Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-Authority in Cloud [C]. Springer FCS 2019, CCIS 1105, 2019, pp.3-18 (EI: 20195307948041)
  22. Pengfei Liang, Leyou Zhang, Li Kang, Juan Ren. Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage [J]. Journal of Information Security and Applications, 2019, pp.258-266 (SCI: WOS: 000480387600027 EI: 20192206994210)
  23. Leyou Zhang, Pengfei Liang, Yi Mu: Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018), (SCI , EI)
  24. Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu: Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. IJHPCN 11(1): 45-54 (2018),(SCI , EI)
  25. Leyou Zhang, Hongjian Yin: Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. I. J. Network Security 20(1): 168-176 (2018), (SCI)
  26. Hongjian Yin, Leyou Zhang, Yi Mu: A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation. ICCCS (3) 2018: 435-446  (SCI)
  27. Leyou Zhang, Yilei Cui, Yi Mu: Improving Privacy-Preserving CP-ABE with Hidden Access Policy. ICCCS (3) 2018: 596-605. (SCI , EI)
  28. Yujie Shang, Leyou Zhang, Xiaoxu Gao. Continual Auxiliary Leakage-Resilient Attribute-Based Broadcast Encryption with Constant Size Ciphertexts[J], The Journal of China Universities of Posts and Telecommunications. (EI)
  29. Leyou Zhang, Jingxia Zhang, Yi Mu: Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J.60(4): 541-554 (2017) ,(SCI)
  30. Qing Wu, Leyou Zhang, Jingxia Zhang: Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud. IEICE Transactions 100-A(5): 1257-1261 (2017) (SCI)
  31. Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu: Revocable hierarchical identity-based encryption over lattice for pay-TV systems. IJES 9(4): 379-398 (2017), (SCI , EI)
  32. Jing Wei, Leyou Zhang: Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud. IJHPCN 10(6): 524-533 (2017),(SCI , EI)
  33. Jingxia Zhang, Leyou Zhang: Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. J. Inf. Sci. Eng. 33(3): 789-805 (2017), (SCI , EI)
  34. Leyou Zhang, Qing Wu: Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. NSS 2017: 46-58, (SCI , EI)
  35. Hongjian Yin, Leyou Zhang: Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption. SpaCCS 2017: 344-352, (SCI , EI)
  36. Leyou Zhang, Yi Mu, Qing Wu: Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. Comput. J. 59(4): 452-461, (SCI , EI)
  37. Leyou Zhang, Qing Wu, Yi Mu, Jingxia Zhang: Privacy-Preserving and Secure Sharing of PHR in the Cloud. J. Medical Systems 40(12): 267:1-267:13, (SCI , EI)
  38. Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu: Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 3PGCIC 2015: 449-453, (SCI , EI)
  39. Leyou Zhang, Zhuanning Wang, Qing Wu: Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model. ICA3PP (Workshops and Symposiums) 2015: 201-210, (SCI , EI)
  40. Leyou Zhang, Yupu Hu. New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. KSII Transactions on internet and information systems,7,(5),1343-1356, 2013. (SCI)
  41. Leyou Zhang, Yupu Hu and Qing Wu. Adaptively Secure Identity-based Broadcast Encryption with constant size private keys and ciphertexts from the Subgroups Mathematical and computer Modelling, 2012, 55pp. 12–182012. (SCI,EI
  42. Leyou Zhang, Qing Wu and Yupu Hu. Hierarchical Identity-based Encryption with Constant size private keysETRI Journal2012, 34(1)142-145(SCI,EI)
  43. Leyou Zhang, Yupu Hu and Qing Wu. Fully Secure Identity-based Broadcast Encryption in the Subgroups, China Communications, Vol. 8, No. 2, 152-158, 2011(SCI).
  44. Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Transactions on internet and information systems, Vol.5 No.2, pp. 247-476, 2011 (SCI).
  45. Leyou Zhang, Yupu Hu and Qing Wu. Unbounded Hierarchical Identity-based Encryption in the Standard ModelInformation Journal, Vol. 15, NO. 1, pp.105-112, 2012. (SCI)
  46. Leyou Zhang, Yupu Hu and Qing Wu. Identity-based threshold broadcast encryption in the standard model. KSII Transactions on internet and information systems, Vol. 4, No. 3, pp.400-410, 2010 .(SCI)
  47. Leyou Zhang, Yupu Hu and Qing Wu. New Construction of Short Hierarchical ID-Based Signature in the Standard Model, Fundamenta  Informaticae, 901-2),191-201, 2009. (SCI,EI).
  48. Leyou Zhang, Yupu Hu and Qing Wu. Efficient Dynamic Data Encryption Algorithm for Mobile Ad Hoc Network, Przeglad Elektrotechniczny, 12(9b):42-47,2012. (SCI)
  49. Qing Wu, Sanyang Liu and Leyou Zhang. Support vector regression based on adjustable entropy function approach. Journal of Information Science and Engineering, 2010, 26: 2331-2339.  (SCI ,EI)
  50. Qing Wu, Sanyang Liu and Leyou Zhang. Particle swarm optimization for semi-supervised support vector machine. Journal of Information Science and Engineering, 2010, 26: 1695-1706.  (SCI , EI)
  51. Qing Wu, Sanyang Liu and Leyou Zhang. Adjustable entropy function method for support vector machines. Journal of Systems Engineering and Electronics, 2008, 19(5): 1029-1034.  (SCI ,EI )
  52. Qing Wu, Sanyang Liu and Leyou Zhang. Hypersphere support vector machines based on multiplicative updates. ICNC 2006, Part I, LNCS 4221, pp. 1-4, 2006. Springer-Verlag Berlin Heidelberg 2006. (SCI,EI)
  53. Leyou Zhang, Yupu Hu and Qing Wu. Secure Identity-based Ad Hoc Protocols for Mobile Networks.ICIC Express Letters, Vol. 5, No. 2, 2011, pp. 293-298.(EI).
  54. Leyou Zhang, Qing Wu and Yupu Hu, Direct Chosen-Ciphertext Technique for Identity-based Broadcast Encryption, Journal of comptution information system, Accepted, In press, 2011.(EI) 
  55. Leyou Zhang, Yupu Hu and Qing Wu, Adaptively secure hierarchical identity-based signature in the standard model. The Journal of China Universities of Posts and Telecommunications, Vol. 17, No. 6, 2010,pp.95-100.(EI).
  56. Leyou Zhang, Qing Wu and Yupu Hu. Adaptively Secure Identity-based Encryption in the Anonymous  Communications. ICIC Express Letters, Vol. 5. No. 9(A), 3209-3216. (EI)
  57. Leyou Zhang,Yupu Hu and Qing Wu. Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles. AMR Journal, Vols. 143-144 (2011) pp 347-352.(EI)
  58. Leyou Zhang, Yupu Hu and Qing Wu. Short signature in the Standard Model. ICIC Express Letters,Vol. 5, No. 4(B), 1313-1320,2011.(EI)
  59. Leyou Zhang, Yupu Hu and Qing Wu. Fuzzy Biometric Identity-based Signature in the Standard Model, AMM Journal, Vols. 44-47, 2011, pp. 3350-3354.(EI)
  60. Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Short Signatures in the Standard ModelJournal of Software. Accepted2011.(EI)
  61. Leyou Zhang, Hu yupu, Tian xu’an, Yang yang. New construction of identity-based threshold decryption. Wuhan University journal of natural science. Vol. 15, No.3, June 2010, pp. 222-226.
  62. Leyou Zhang, Yupu Hu, Qing Wu, Xu’an Tian. Secure short Hierarchical identity-based signature in the standard model. IEEE international conference on network security, wireless communications and trusted computing, Vol. 1, pp. 366-369, IEEE computer society, 2010. (EI, ISTP) 
  63. Leyou Zhang, Yupu Hu, Xu’an Tian, Yang Yang. Novel identity-based blind signature for electronic voting system. IEEE international workshop on education technology and computer science. Vol. 2, 122-125, IEEE computer society, 2010. (EI, ISTP).
  64. Leyou Zhang, Yupu Hu, Xu’an Tian, New Identity-based Threshold Broadcast Encryption for Ad Hoc Networks. IEEE international conference on wireless communications, networking, mobile computing.2010 , Page(s): 1-4. (EI, ISTP)
  65. Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing.ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
  66. Leyou Zhang, Yupu Hu and Ningbo Mu. Identity-Based Broadcast Encryption with Shorter Transmissions.Journal of Shanghai Jiaotong University(Science), 2008, 136: 641-645.(EI)
  67. Leyou Zhang and Yupu Hu. A New Construction of Short Hierarchical Identity-based Signature in the Standard Model. International Journal of Computer Science and Network Security, Vol. 9, No.4, 2009, 180-186.
  68. Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing. ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
  69. 张乐友,胡予濮,吴青,标准模型下一种新的基于身份的分级加密方案,电子与信息学报, 200931(4),937-941.(EI)
  70. 张乐友,胡予濮,标准模型下基于身份的可证安全签名方案,武大学学报信息安全版,200833(10)1076-1079 .(EI)
  71. 张乐友,胡予濮,刘振华,标准模型下基于身份的可证安全门限签名方案,西安电子科技大学学报,200835 (1)81-86 .(EI)