​
Login / Signup
Weidong Zhong
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 9
Top Topics
Power Analysis
Mobile Apps
Preprocessing
Designated Verifier
Top Venues
Secur. Commun. Networks
Wirel. Commun. Mob. Comput.
ICBASE
3PGCIC
</>
Publications
</>
Yuan Tian
,
Tanping Zhou
,
Xuan Zhou
,
Weidong Zhong
,
Xiaoyuan Yang
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing.
J. King Saud Univ. Comput. Inf. Sci.
36 (6) (2024)
Xuan Zhou
,
Yuan Tian
,
Weidong Zhong
,
Tanping Zhou
,
Xiaoyuan Yang
A structure-preserving linearly homomorphic signature scheme with designated combiner.
PeerJ Comput. Sci.
10 (2024)
Yiwei Zhao
,
Song Jiang
,
Weidong Zhong
,
Lizhong Wang
,
Xiao-Feng Li
NEOP: A Framework for Distributed Mobile Apps on Heterogeneous Devices.
ISADS
(2023)
Zichao Song
,
Tanping Zhou
,
Weidong Zhong
,
Dong Chen
,
Longfei Liu
,
Xiaoyuan Yang
Fault-Tolerant Data Aggregation Scheme Supporting Fine-Grained Linear Operation in Smart Grid.
IEEE Access
11 (2023)
Jinghui Fang
,
Bo Zhang
,
Jian Feng
,
Guozhong Jin
,
Weidong Zhong
Fault Classification and Diagnosis Method for Photovoltaic Power Connected to Distribution Network Equipment Based on arc Flashover Analysis.
ICBASE
(2023)
Peng Ma
,
Zeyu Wang
,
Weidong Zhong
,
Xu An Wang
Preprocessing of Correlation Power Analysis Based on Improved Wavelet Packet.
3PGCIC
(2019)
Wenchao Liu
,
Feng Pan
,
Xu An Wang
,
Guangsheng Tu
,
Weidong Zhong
Construction and Parallel Implementation of Homomorphic Arithmetic Unit Based on NuFHE.
CISIS
(2019)
Shuaiwei Zhang
,
Xiaoyuan Yang
,
Lin Chen
,
Weidong Zhong
A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition.
Secur. Commun. Networks
2019 (2019)
Shuaiwei Zhang
,
Weidong Zhong
A New Type of Countermeasure against DPA in Multi-Sbox of Block Cipher.
Wirel. Commun. Mob. Comput.
2018 (2018)
Wei Zhang
,
Shuguang Liu
,
Weidong Zhong
,
Xiaoyuan Yang
How to build a faster private information retrieval protocol?
J. Ambient Intell. Humaniz. Comput.
6 (5) (2015)
Weidong Zhong
,
Xu An Wang
,
Ziqing Wang
,
Yi Ding
Proxy Re-encryption with Keyword Search from Anonymous Conditional Proxy Re-encryption.
CIS
(2011)
Jia Liu
,
Weidong Zhong
,
Min-Qing Zhang
,
Xiaoyuan Yang
Recognizing human actions using bag-of-features and Intersection Kernel Support Vector Machines.
NCM
(2010)