至今已发表科研论文110余篇,其中50余篇被SCI检索,50篇左右被EI检索,部分文章列举如下。
- Leyou Zhang,Yadi Ye, Yi Mu, Multi-authority Access Control with Anonymous Authentication for Personal Health Record, IEEE Internet of Things Journal, 8(1), 2021, pp. 156-167. (SCI , EI)
- Leyou Zhang, Jun Wang, Yi Mu, Privacy-preserving Flexible Access Control to Encrypted Data in Internet of Things,IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3071553. (SCI , EI)
- Leyou Zhang, Wenting You, Yi Mu, Secure Outsourced Attribute-based Sharing Framework for Lightweight Devices in Smart Health Systems, IEEE transactions on Services Computing, 2021, DOI: 10.1109/TSC.2021.3073740. (SCI , EI)
- Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang,Xinyi Huang, Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors, IEEE Internet of Things Journal, 2021, DOI: 10.1109/JIOT.2021.3082150. (SCI , EI)
- Gongcheng Hu Leyou Zhang, Yi Mu, An Expressive “test-decrypt-verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud. IEEE systems Journal, 15(1), 2020, pp. 365-376 (SCI , EI)
- Leyou Zhang, Yi Lei Cui, Yi Mu, Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE systems Journal, 14(1), 2020, pp. 387-397, doi: 10.1109/JSYST.2019.2911391. (SCI , EI)
- Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu, Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing, IEEE Systems Journal, doi: 10.1109/JSYST.2021.3072793. 2021. (SCI , EI)
- Gongcheng Hu, Leyou Zhang, Yi Mu, Xiaoxu Gao. An Expressive“test-decrypt-verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud [J]. IEEE Systems Journal. DOI: 10.1109/JSYST.2020.2996216),(SCI)
- Leyou Zhang, Jian Su, Yi Mu. Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage 104344 - 104356 DOI: 10.1109/ACCESS.2020.3000049 : IEEE Access ( Volume: 8 ), (SCI , EI)
- Leyou Zhang, Jun Wang, Yi Mu. Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks. IEEE Access, ( Volume: 8 ),DOI: 10.1109/ACCESS.2020.3004247,(SCI , EI)
- Leyou Zhang, Gongcheng Hu, Yi Mu. Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System [J]. IEEE Access, 2019, 3(7): 33202-33213. (SCI)
- Gongcheng Hu, Leyou Zhang. Analysis of Ciphertext Policy Hidden AttributeBased Encryption and Its Improved Method [C]. 2019 International Conference on Frontiers in Cyber Security (FCS-2019). Springer, 193-208. (EI: 20195307948045)
- Leyou Zhang, Juan Ren, Yi Mu and Baocang Wang. Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid[J]. IEEE Access, 2020, 8: 23294-23307. (SCI, EI)
- Juan Ren, Leyou Zhang. Hierarchical Identity-Based Signature over Verifiable Random Function[C]. In: Shen B., Wang B., Han J., Yu Y. (eds) Frontiers in Cyber Security. FCS 2019. Communications in Computer and Information Science,Springer, Singapore, 2019, 1105: 177-189. (EI:20195307948044)
- Juan Ren, Leyou Zhang and Baocang Wang. Decentralized Multi-Authority Attribute-Based Searchable Encryption Scheme[J]. International Journal of Network Security. (EI)
- Leyou Zhang, Juan Ren, Yi Mu and Baocang Wang. Decentralized Multi-Authority Attribute-Based Access Control Scheme with Fully Hidden Policy[J]. International Journal of Network Security. (EI)
- Leyou Zhang, Xiaoxu Gao, Fuchun Guo, Gongcheng Hu. Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing[J], IEEE Access. DOI: 10.1109/ACCESS.2020.2995480), (SCI , EI)
- Xiaoxu Gao, Leyou Zhang, Gongcheng Hu. Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation[C], Springer FCS 2019, CCIS 1105, 2019. pp. 21–35(EI: 20195307948052)
- Xiaoxu Gao, Leyou Zhang. Efficient Anonymous Ciphertext-Policy Attributebased Encryption for General Structures Supporting Leakage-Resilience[J], International Journal of Network Security. (SCI)
- Li Kang, Leyou Zhang. A Privacy-Preserving Data Sharing System with Decentralized Attribute-Based Encryption Scheme [J]. International Journal of Network Security. (EI)
- Li Kang, Leyou Zhang. Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-Authority in Cloud [C]. Springer FCS 2019, CCIS 1105, 2019, pp.3-18 (EI: 20195307948041)
- Pengfei Liang, Leyou Zhang, Li Kang, Juan Ren. Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage [J]. Journal of Information Security and Applications, 2019, pp.258-266 (SCI: WOS: 000480387600027; EI: 20192206994210)
- Leyou Zhang, Pengfei Liang, Yi Mu: Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018), (SCI , EI)
- Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu: Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. IJHPCN 11(1): 45-54 (2018),(SCI , EI)
- Leyou Zhang, Hongjian Yin: Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. I. J. Network Security 20(1): 168-176 (2018), (SCI)
- Hongjian Yin, Leyou Zhang, Yi Mu: A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation. ICCCS (3) 2018: 435-446 (SCI)
- Leyou Zhang, Yilei Cui, Yi Mu: Improving Privacy-Preserving CP-ABE with Hidden Access Policy. ICCCS (3) 2018: 596-605. (SCI , EI)
- Yujie Shang, Leyou Zhang, Xiaoxu Gao. Continual Auxiliary Leakage-Resilient Attribute-Based Broadcast Encryption with Constant Size Ciphertexts[J], The Journal of China Universities of Posts and Telecommunications. (EI)
- Leyou Zhang, Jingxia Zhang, Yi Mu: Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J.60(4): 541-554 (2017) ,(SCI)
- Qing Wu, Leyou Zhang, Jingxia Zhang: Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud. IEICE Transactions 100-A(5): 1257-1261 (2017) (SCI)
- Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu: Revocable hierarchical identity-based encryption over lattice for pay-TV systems. IJES 9(4): 379-398 (2017), (SCI , EI)
- Jing Wei, Leyou Zhang: Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud. IJHPCN 10(6): 524-533 (2017),(SCI , EI)
- Jingxia Zhang, Leyou Zhang: Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. J. Inf. Sci. Eng. 33(3): 789-805 (2017), (SCI , EI)
- Leyou Zhang, Qing Wu: Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. NSS 2017: 46-58, (SCI , EI)
- Hongjian Yin, Leyou Zhang: Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption. SpaCCS 2017: 344-352, (SCI , EI)
- Leyou Zhang, Yi Mu, Qing Wu: Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. Comput. J. 59(4): 452-461, (SCI , EI)
- Leyou Zhang, Qing Wu, Yi Mu, Jingxia Zhang: Privacy-Preserving and Secure Sharing of PHR in the Cloud. J. Medical Systems 40(12): 267:1-267:13, (SCI , EI)
- Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu: Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 3PGCIC 2015: 449-453, (SCI , EI)
- Leyou Zhang, Zhuanning Wang, Qing Wu: Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model. ICA3PP (Workshops and Symposiums) 2015: 201-210, (SCI , EI)
- Leyou Zhang, Yupu Hu. New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. KSII Transactions on internet and information systems,7,(5),1343-1356, 2013. (SCI)
- Leyou Zhang, Yupu Hu and Qing Wu. Adaptively Secure Identity-based Broadcast Encryption with constant size private keys and ciphertexts from the Subgroups。 Mathematical and computer Modelling, 2012, 55,pp. 12–18,2012. (SCI,EI
- Leyou Zhang, Qing Wu and Yupu Hu. Hierarchical Identity-based Encryption with Constant size private keys。ETRI Journal,2012, 34(1),142-145。(SCI,EI)
- Leyou Zhang, Yupu Hu and Qing Wu. Fully Secure Identity-based Broadcast Encryption in the Subgroups, China Communications, Vol. 8, No. 2, 152-158, 2011(SCI).
- Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Transactions on internet and information systems, Vol.5 No.2, pp. 247-476, 2011 (SCI).
- Leyou Zhang, Yupu Hu and Qing Wu. Unbounded Hierarchical Identity-based Encryption in the Standard Model。Information Journal, Vol. 15, NO. 1, pp.105-112, 2012. (SCI)
- Leyou Zhang, Yupu Hu and Qing Wu. Identity-based threshold broadcast encryption in the standard model. KSII Transactions on internet and information systems, Vol. 4, No. 3, pp.400-410, 2010 .(SCI)
- Leyou Zhang, Yupu Hu and Qing Wu. New Construction of Short Hierarchical ID-Based Signature in the Standard Model, Fundamenta Informaticae, 90(1-2),191-201, 2009. (SCI,EI).
- Leyou Zhang, Yupu Hu and Qing Wu. Efficient Dynamic Data Encryption Algorithm for Mobile Ad Hoc Network, Przeglad Elektrotechniczny, 12(9b):42-47,2012. (SCI)
- Qing Wu, Sanyang Liu and Leyou Zhang. Support vector regression based on adjustable entropy function approach. Journal of Information Science and Engineering, 2010, 26: 2331-2339. (SCI ,EI)
- Qing Wu, Sanyang Liu and Leyou Zhang. Particle swarm optimization for semi-supervised support vector machine. Journal of Information Science and Engineering, 2010, 26: 1695-1706. (SCI , EI)
- Qing Wu, Sanyang Liu and Leyou Zhang. Adjustable entropy function method for support vector machines. Journal of Systems Engineering and Electronics, 2008, 19(5): 1029-1034. (SCI ,EI )
- Qing Wu, Sanyang Liu and Leyou Zhang. Hypersphere support vector machines based on multiplicative updates. ICNC 2006, Part I, LNCS 4221, pp. 1-4, 2006. Springer-Verlag Berlin Heidelberg 2006. (SCI,EI)
- Leyou Zhang, Yupu Hu and Qing Wu. Secure Identity-based Ad Hoc Protocols for Mobile Networks.ICIC Express Letters, Vol. 5, No. 2, 2011, pp. 293-298.(EI).
- Leyou Zhang, Qing Wu and Yupu Hu, Direct Chosen-Ciphertext Technique for Identity-based Broadcast Encryption, Journal of comptution information system, Accepted, In press, 2011.(EI)
- Leyou Zhang, Yupu Hu and Qing Wu, Adaptively secure hierarchical identity-based signature in the standard model. The Journal of China Universities of Posts and Telecommunications, Vol. 17, No. 6, 2010,pp.95-100.(EI).
- Leyou Zhang, Qing Wu and Yupu Hu. Adaptively Secure Identity-based Encryption in the Anonymous Communications. ICIC Express Letters, Vol. 5. No. 9(A), 3209-3216. (EI)
- Leyou Zhang,Yupu Hu and Qing Wu. Adaptively Secure Identity-based Threshold Broadcast Encryption without Random Oracles. AMR Journal, Vols. 143-144 (2011) pp 347-352.(EI)
- Leyou Zhang, Yupu Hu and Qing Wu. Short signature in the Standard Model. ICIC Express Letters,Vol. 5, No. 4(B), 1313-1320,2011.(EI)
- Leyou Zhang, Yupu Hu and Qing Wu. Fuzzy Biometric Identity-based Signature in the Standard Model, AMM Journal, Vols. 44-47, 2011, pp. 3350-3354.(EI)
- Leyou Zhang, Yupu Hu and Qing Wu. New Constructions of Short Signatures in the Standard Model。Journal of Software. Accepted,2011.(EI)
- Leyou Zhang, Hu yupu, Tian xu’an, Yang yang. New construction of identity-based threshold decryption. Wuhan University journal of natural science. Vol. 15, No.3, June 2010, pp. 222-226.
- Leyou Zhang, Yupu Hu, Qing Wu, Xu’an Tian. Secure short Hierarchical identity-based signature in the standard model. IEEE international conference on network security, wireless communications and trusted computing, Vol. 1, pp. 366-369, IEEE computer society, 2010. (EI, ISTP)
- Leyou Zhang, Yupu Hu, Xu’an Tian, Yang Yang. Novel identity-based blind signature for electronic voting system. IEEE international workshop on education technology and computer science. Vol. 2, 122-125, IEEE computer society, 2010. (EI, ISTP).
- Leyou Zhang, Yupu Hu, Xu’an Tian, New Identity-based Threshold Broadcast Encryption for Ad Hoc Networks. IEEE international conference on wireless communications, networking, mobile computing.2010 , Page(s): 1-4. (EI, ISTP)
- Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing.ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
- Leyou Zhang, Yupu Hu and Ningbo Mu. Identity-Based Broadcast Encryption with Shorter Transmissions.Journal of Shanghai Jiaotong University(Science), 2008, 13(6): 641-645.(EI)
- Leyou Zhang and Yupu Hu. A New Construction of Short Hierarchical Identity-based Signature in the Standard Model. International Journal of Computer Science and Network Security, Vol. 9, No.4, 2009, 180-186.
- Leyou Zhang, Yupu Hu and Qing Wu. Short Signature from the Bilinear Pairing. ICICA 2010, Lecture Notes in Computer Science 6377, pp. 111-118, 2010.(EI, ISTP)
- 张乐友,胡予濮,吴青,标准模型下一种新的基于身份的分级加密方案,电子与信息学报, 2009,31(4),937-941.(EI)
- 张乐友,胡予濮,标准模型下基于身份的可证安全签名方案,武大学学报信息安全版,2008,33(10),1076-1079 .(EI)
- 张乐友,胡予濮,刘振华,标准模型下基于身份的可证安全门限签名方案,西安电子科技大学学报,2008,35 (1):81-86 .(EI)