Minghao Zhao
Minghao Zhao
East China Normal University
Verified email at - Homepage
Cited by
Cited by
Secure multi-party computation: theory, practice and applications
C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
Forward private searchable symmetric encryption with optimized I/O efficiency
X Song, C Dong, D Yuan, Q Xu, M Zhao
IEEE Transactions on Dependable and Secure Computing 17 (5), 912-927, 2018
Blockchain-based fair payment smart contract for public cloud storage auditing
H Wang, H Qin, M Zhao, X Wei, H Shen, W Susilo
Information Sciences 519, 348-362, 2020
Rational protocols and attacks in blockchain system
T Li, Y Chen, Y Wang, Y Wang, M Zhao, H Zhu, Y Tian, X Yu, Y Yang
Security and Communication Networks 2020 (1), 8839047, 2020
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
H Wang, D He, J Shen, Z Zheng, C Zhao, M Zhao
Soft Computing 21, 7325-7335, 2017
Randomness invalidates criminal smart contracts
Y Wang, A Bracciali, T Li, F Li, X Cui, M Zhao
Information Sciences 477, 291-301, 2019
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions
Z Liu, KKR Choo, M Zhao
Computers & Security 69, 97-113, 2017
Secure computation protocols under asymmetric scenarios in enterprise information system
Y Wang, M Zhao, Y Hu, Y Gao, X Cui
Enterprise Information Systems 15 (4), 492-512, 2021
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems
Y Wang, Z Wang, M Zhao, X Han, H Zhou, X Wang, ASV Koe
Information Sciences 601, 1-17, 2022
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage
C Hu, Y Xu, P Liu, J Yu, S Guo, M Zhao
Information Sciences 520, 15-30, 2020
Efficient and secure outsourced approximate pattern matching protocol
X Wei, M Zhao, Q Xu
Soft Computing 22, 1175-1187, 2018
Multi-user searchable encryption with a designated server
Z Li, M Zhao, H Jiang, Q Xu
Annals of Telecommunications 72, 617-629, 2017
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems
Y Wang, Z Wang, G Yang, S Ai, X Xiang, C Chen, M Zhao
Digital Communications and Networks 9 (5), 1053-1060, 2023
Memory-efficient transformer-based network model for traveling salesman problem
H Yang, M Zhao, L Yuan, Y Yu, Z Li, M Gu
Neural Networks 161, 589-597, 2023
An ORAM-based privacy preserving data sharing scheme for cloud storage
D Yuan, X Song, Q Xu, M Zhao, X Wei, H Wang, H Jiang
Journal of information security and applications 39, 1-9, 2018
Label‐only membership inference attacks on machine unlearning without dependence of posteriors
Z Lu, H Liang, M Zhao, Q Lv, T Liang, Y Wang
International Journal of Intelligent Systems 37 (11), 9424-9441, 2022
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
M Zhao, C Hu, X Song, C Zhao
Journal of Network and Computer Applications 131, 55-65, 2019
Cut-and-choose bilateral oblivious transfer and its application
C Zhao, H Jiang, X Wei, Q Xu, M Zhao
2015 IEEE Trustcom/BigDataSE/ISPA 1, 384-391, 2015
Keyword guessing on multi-user searchable encryption
Z Li, M Zhao, H Jiang, Q Xu
International Journal of High Performance Computing and Networking 14 (1), 60-68, 2019
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer
X Wei, L Xu, M Zhao, H Wang
Information Sciences 529, 132-140, 2020
The system can't perform the operation now. Try again later.
Articles 1–20