default search action
Shihui Zheng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Junke Duan, Shihui Zheng, Wei Wang, Licheng Wang, Xiaoya Hu, Lize Gu:
Concise RingCT Protocol Based on Linkable Threshold Ring Signature. IEEE Trans. Dependable Secur. Comput. 21(5): 5014-5028 (2024) - 2023
- [j20]Shihui Zheng, Ruihao Xing, Junlong Lai, Junkai Liu, Haofeng Wang, Changhai Ou:
Breaking Fault Attack Countermeasures With Side-Channel Information. IEEE Trans. Computers 72(5): 1396-1408 (2023) - [j19]Changhai Ou, Debiao He, Kexin Qiao, Shihui Zheng, Siew-Kei Lam, Fan Zhang:
CoTree: A Side-Channel Collision Tool to Push the Limits of Conquerable Space. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(12): 4505-4517 (2023) - [i4]Yukun Cheng, Changhai Ou, Fan Zhang, Shihui Zheng:
DLPFA: Deep Learning based Persistent Fault Analysis against Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 21 (2023) - 2022
- [i3]Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng:
How to Launch a Powerful Side-Channel Collision Attack? IACR Cryptol. ePrint Arch. 2022: 174 (2022) - [i2]Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam:
Snowball: Another View on Side-Channel Key Recovery Tools. IACR Cryptol. ePrint Arch. 2022: 728 (2022) - 2021
- [j18]Qing Guo, Zhenhan Ke, Siyuan Wang, Shihui Zheng:
Persistent Fault Analysis Against SM4 Implementations in Libraries Crypto++ and GMSSL. IEEE Access 9: 63636-63645 (2021) - [j17]Shihui Zheng, Xudong Liu, Shoujin Zang, Yihao Deng, Dongqi Huang, Changhai Ou:
A Persistent Fault-Based Collision Analysis Against the Advanced Encryption Standard. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 40(6): 1117-1129 (2021) - [c18]Junkai Liu, Shihui Zheng, Lize Gu:
Effective Deep Learning-based Side-Channel Analyses Against ASCAD. TrustCom 2021: 514-523 - [i1]Changhai Ou, Debiao He, Zhu Wang, Kexin Qiao, Shihui Zheng, Siew-Kei Lam:
CoTree: Push the Limits of Conquerable Space in Collision-Optimized Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2021: 1582 (2021) - 2020
- [j16]Junke Duan, Lize Gu, Shihui Zheng:
ARCT: An Efficient Aggregating Ring Confidential Transaction Protocol in Blockchain. IEEE Access 8: 198118-198130 (2020) - [j15]Yunhong Zhou, Shihui Zheng, Licheng Wang:
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud. Cryptogr. 4(4): 28 (2020) - [j14]Xiaoya Hu, Hong Zhao, Shihui Zheng, Licheng Wang:
CBOL: Cross-Bank Over-Loan Prevention, Revisited. Entropy 22(6): 619 (2020) - [j13]Hong Zhao, Xue Bai, Shihui Zheng, Licheng Wang:
RZcoin: Ethereum-Based Decentralized Payment with Optional Privacy Service. Entropy 22(7): 712 (2020) - [j12]Yuan Zhang, Yuan Liu, Yurong Guo, Shihui Zheng, Licheng Wang:
Adaptively Secure Efficient (H)IBE over Ideal Lattice with Short Parameters. Entropy 22(11): 1247 (2020)
2010 – 2019
- 2019
- [j11]Qingyue Meng, Shihui Zheng, Yongmei Cai:
Deep Learning SDN Intrusion Detection Scheme Based on TW-Pooling. J. Adv. Comput. Intell. Intell. Informatics 23(3): 396-401 (2019) - 2018
- [c17]Qian Cui, Shihui Zheng, Bin Sun, Yongmei Cai:
SDN Dynamic Access Control Scheme Based on Prediction. ADHIP 2018: 57-67 - [c16]Xiaochen Qiu, Shihui Zheng, Lize Gu, Yongmei Cai:
A Fine-Grained Detection Mechanism for SDN Rule Collision. ADHIP 2018: 549-559 - [c15]Yanlei Wang, Shihui Zheng, Lize Gu, Yongmei Cai:
Source Encryption Scheme in SDN Southbound. ADHIP 2018: 560-569 - [c14]Liang Zhao, Shihui Zheng:
Research on the Realization of Excitation Signal SPWM of Radar Synchronous Motor Based on DSP. CSPS (3) 2018: 733-739 - 2015
- [j10]Da Xiao, Lvyin Yang, Chuanyi Liu, Bin Sun, Shihui Zheng:
Efficient Data Possession Auditing for Real-World Cloud Storage Environments. IEICE Trans. Inf. Syst. 98-D(4): 796-806 (2015) - [c13]Chunli Yang, Peigang Qiu, Shihui Zheng, Licheng Wang:
An Efficient Lattice-Based Proxy Signature Scheme without Trapdoor. IIH-MSP 2015: 189-194 - 2014
- [j9]Liwei Chang, Shihui Zheng, You Gao, Lize Gu, Yi-Xian Yang:
A novel construction of optimal multi-sender authentication code from singular pseudo-symplectic geometry over finite fields. Appl. Algebra Eng. Commun. Comput. 25(6): 407-429 (2014) - [j8]Lize Gu, Shihui Zheng:
Conjugacy Systems Based on Nonabelian Factorization Problems and Their Applications in Cryptography. J. Appl. Math. 2014: 630607:1-630607:10 (2014) - [j7]Chunli Yang, Shihui Zheng, Licheng Wang, Xiuhua Lu, Yixian Yang:
Hierarchical identity-based broadcast encryption scheme from LWE. J. Commun. Networks 16(3): 258-263 (2014) - [j6]Shihui Zheng, Yuan Tian, Lei Jin, Yu Yang:
A Portable Random Key Predistribution Scheme for Distributed Sensor Network. J. Sensors 2014: 394147:1-394147:14 (2014) - 2013
- [j5]Yanbin Sun, Yan Sun, Mingxing Luo, Lize Gu, Shihui Zheng, Yixian Yang:
Comment on Lee et al.'s group signature and e-auction scheme. Inf. Syst. Frontiers 15(1): 133-139 (2013) - 2012
- [j4]Zhiwei Wang, Licheng Wang, Shihui Zheng, Yixian Yang, Zhengming Hu:
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues. Int. J. Netw. Secur. 14(1): 33-38 (2012) - 2010
- [j3]Shihui Zheng, Licheng Wang, Yixian Yang:
A new impossible differential attack on SAFER ciphers. Comput. Electr. Eng. 36(1): 180-189 (2010)
2000 – 2009
- 2008
- [c12]Yihua Yu, Shihui Zheng, Yixian Yang:
ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG. CSICC 2008: 821-824 - [c11]Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang:
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. ICCSA (2) 2008: 1-13 - 2007
- [c10]Licheng Wang, Zhenfu Cao, Shihui Zheng, Xiaofang Huang, Yixian Yang:
Transitive Signatures from Braid Groups. INDOCRYPT 2007: 183-196 - 2005
- [j2]Hongjun Lu, Jeffrey Xu Yu, Guoren Wang, Shihui Zheng, Haifeng Jiang, Ge Yu, Aoying Zhou:
What makes the differences: benchmarking XML database implementations. ACM Trans. Internet Techn. 5(1): 154-194 (2005) - 2003
- [j1]Shihui Zheng, Aoying Zhou, Long Zhang, Hongjun Lu:
DVQ: Towards Visual Query Processing of XML Database Systems. World Wide Web 6(2): 233-253 (2003) - [c9]Shihui Zheng, Ji-Rong Wen, Hongjun Lu:
Cost-Driven Storage Schema Selection for XML. DASFAA 2003: 337-344 - [c8]Hongjun Lu, Jeffrey Xu Yu, Guoren Wang, Shihui Zheng, Haifeng Jiang, Ge Yu, Aoying Zhou:
What Makes the Differences: Benchmarking XML Database Implementations. ICDE 2003: 720-722 - [c7]Aoying Zhou, Qing Wang, Zhimao Guo, Xueqing Gong, Shihui Zheng, Hongwei Wu, Jianchang Xiao, Kun Yue, Wenfei Fan:
TREX: DTD-Conforming XML to XML Transformations. SIGMOD Conference 2003: 670 - 2002
- [c6]Long Zhang, Shihui Zheng, Aoying Zhou, Hongjun Lu:
DVQ: a DTD-driven Visual Query Interface for XML Database Systems. VDB 2002: 385-399 - [c5]Michael Benedikt, Chee Yong Chan, Wenfei Fan, Rajeev Rastogi, Shihui Zheng, Aoying Zhou:
DTD-Directed Publishing with Attribute Translation Grammars. VLDB 2002: 838-849 - [c4]Shihui Zheng, Aoying Zhou, Jeffrey Xu Yu, Long Zhang, Han Tao:
Structural Map: A New Index for Efficient XML Path Expression Processing. WAIM 2002: 25-36 - 2001
- [c3]Aoying Zhou, Hongjun Lu, Shihui Zheng, Yuqi Liang, Long Zhang, Wenyun Ji, Zengping Tian:
VXMLR: A Visual XML-Relational Database System. VLDB 2001: 719-720 - [c2]Yuqi Liang, Aoying Zhou, Shihui Zheng, Long Zhang, Wenyun Ji:
Enhancing XML Data Processing in Relational System with Indices. WAIM 2001: 168-178 - 2000
- [c1]Shihui Zheng:
Inferring DTD to Facilitate User-Oriented XML Document Query. Web-Age Information Management 2000: 61-66
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-24 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint