|
Ph.D, Professor
E-mail: kzhang@shiep.edu.cn; zhangkaiecnu@163.com |
Kai Zhang is currently a professor at the College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China. Previously, he received Ph.D degree in East China Normal University (2012.09-2017.12) under the supervision of Prof. Jie Chen and Prof. Haifeng Qian. He was a research assistant in Nanyang Technological University (2017.03-2017.09) under the supervision of Prof. Huaxiong Wang. He visited Shanghai Jiaotong University (2023.09-2024.06) under the supervision of Prof. Haojin Zhu.
His research interests include applied cryptography and information security, he has published over 50 papers in international conferences and referred journals, such as EUROCRYPT, ASIACRYPT, PKC, ACM AsiaCCS and IEEE Transactions on Information Forensics and Security, IEEE Transactions on Dependable and Secure Computing, Theoretical Computer Science.
Searchable Encryption, Functional Encryption and Their Applications
AI Security, Cloud Security, Blockchain and PETs in Smart Grid
2025.10-Now, Professor, Faculty of Artificial Intelligence, Shanghai University of Electric Power
2024.01-2025.10, Professor, College of Computer Science and Technology, Shanghai University of Electric Power
2023.09-2024.06, Visiting Scholar, Computer Science and Technology, Shanghai Jiaotong University
2020.03-2023.12, Associate Professor, College of Computer Science and Technology, Shanghai University of Electric Power
2018.02-2020.03, Assistant Professor, College of Computer Science and Technology, Shanghai University of Electric Power
2017.03-2017.09, Research Assistant, Nanyang Technological University, Singapore
2012.09-2017.12, Ph.D, Computer Science and Technology, East China Normal University
2008.09-2012.06, Bachelor, Computer Science and Technology, Shandong Normal University
When KGC Meets Curator: New Paradigm of Registered ABE and FE
Ziqi Zhu, Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian
31st Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT) (6) 2025: 35–67 [国际三大密码会]
AdvBiTrans: An Efficient Botnet Detection Method based on Adversarial BiLSTM-Transformer in IIoT
Yong Wang, Zhenyang Yan, Kai Zhang*, Mi Wen
The Computer Journal (COMJNL), bxaf140, https://doi.org/10.1093/comjnl/bxaf140 (2025) [CCF-B]
On Adversarial Attack Detection in Intrusion Detection System with Graph Neural Network
Kai Zhang, Qingqing Li, Jianting Ning, Junqing Gong, Haifeng Qian
The Computer Journal (COMJNL), bxaf096, https://doi.org/10.1093/comjnl/bxaf096 (2025) [CCF-B]
Multi-writer/Reader Forward and Backward Private DSSE with Bilateral Selection
Jiawen Wu, Kai Zhang*, Jianting Ning, Hao Chen, Lefeng Zhang, Zuobin Ying
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) (2025) [CCF-A]
AuthGraph: Authorized Search over Encrypted Social Graph Database with Trusted Hardware
Jiawen Wu, Yifan Xu, Kai Zhang*, Pengfei Wu, Yuling Chen, Jianting Ning
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) (2025) [CCF-A]
Flamer: Flexible-Authorized Message Classification Against Message Recovery Attacks in Social IoV
Meng Wu, Kai Zhang*, Liangliang Wang, Jianting Ning
IEEE Transactions on Vehicular Technology (IEEE TVT) (2025) [SCI二区]
Lightweight and Dynamic Privacy-Preserving Federated Learning via Functional Encryption
Boan Yu, Jun Zhao, Kai Zhang*, Junqing Gong, Haifeng Qian
IEEE Transactions on Information Forensics and Security (IEEE TIFS) 20:2496-2508 (2025) [CCF-A]
Pattern Hiding and Authorized Searchable Encryption for Data Sharing in Cloud Storage
Kai Zhang*, Boli Hu, Jianting Ning, Junqing Gong, Haifeng Qian
IEEE Transactions on Knowledge and Data Engineering (IEEE TKDE) 37 (5): 2802-2815 (2025) [CCF-A]
PrivBox: Privacy-Preserving Deep Packet Inspection with Dual Double-masking Obfuscated Rule Generation
Pengfei Wu, Jianting Ning, Xinyi Huang, Rongmao Chen, Kai Zhang, Kaitai Liang
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 22 (5): 4954-4970 (2025) [CCF-A]
Coordinated Scheduling Optimization for Computility Center Microgrid Considering Computing Resources Dynamic Pooling
Jian Zhao, Keran Huang, Yuan Gao, Xiaoyan Bian, Kai Zhang, Dongdong Li, Haoyang Cui
Applied Energy (AE) 393:125971 (2025) [SCI一区]
KA2SE: Key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor Networks
Haijiang Wang, Jianting Ning, Wei Wu, Chao Lin, Kai Zhang
IEEE Transactions on Services Computing(IEEE TSC) 18(1):226-238 (2025) [CCF-A]
Fuzzy Multi-Keyword Search for Multi-Owner Scenario in IoV
Jinguo Li, Yin He, Kai Zhang*, Peichun Yuan, Jie Yu
IEEE Transactions on Vehicular Technology (IEEE TVT) 74(4):5698-5712 (2025) [SCI二区]
Verifiable and Privacy-Enhanced Authorized Keyword Search for Mobile Cloud Storage
Zhentao Long, Kai Zhang*, Jinguo Li, Pengfei Wu, Jianting Ning
IEEE Internet of Things Journal (IEEE IoT-J) 12(6):7348-7359 (2025) [SCI二区]
Practical Searchable Symmetric Encryption for Arbitrary Boolean Query-Join in Cloud Storage
Jiawen Wu, Kai Zhang*, Lifei Wei, Junqing Gong, Jianting Ning
IEEE Transactions on Information Forensics and Security (IEEE TIFS) 19:10086-10098 (2024) [CCF-A]
Malicious-Resistant Non-Interactive Verifiable Aggregation for Federated Learning
Yin Zhu, Junqing Gong, Kai Zhang, Haifeng Qian
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 21(6): 5600-5616 (2024) [CCF-A]
Registered Functional Encryptions from Pairings
Ziqi Zhu, Jiangtao Li, Kai Zhang, Junqing Gong, Haifeng Qian
43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, (EUROCRYPT) (2) 2024:373-402 [CCF-A]
Public-Key Encryption with Keyword Search in Multi-user, Multi-challenge Setting under Adaptive Corruptions
Yunhao Ling, Kai Zhang, Jie Chen, Qiong Huang, Haifeng Qian
IACR International Conference on Public-Key Cryptography (PKC) (4)2024: 105-126, [CCF-B]
Lavida: Large-universe, Verifiable and Dynamic Fine-grained Access Control for E-health Cloud
Jun Zhao, Kai Zhang, Junqing Gong, Haifeng Qian
IEEE Transactions on Information Forensics and Security (IEEE TIFS) 19:2732-2745 (2024) [CCF-A]
Non-interactive Boolean Searchable Asymmetric Encryption with Bilateral Access Control
Xiwen Wang, Kai Zhang*, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning
The Computer Journal (COMPJ) 67(1): 179–194 (2024) [CCF-B]
Updatable Searchable Symmetric Encryption: Definitions and Constructions
Xiwen Wang, Kai Zhang*, Junqing Gong, Shi-Feng Sun, Jianting Ning
Theoretical Computer Science (TCS), 983: 114304 (2024) [CCF-B]
Privacy-Preserving Traceable Encrypted Traffic Inspection in Blockchain-based Industrial IoT
Kai Zhang, Minjun Deng, Bei Gong, Yinbin Miao, Jianting Ning
IEEE Internet of Things Journal (IEEE IoT-J) 11(2):3484-3496 (2024) [SCI二区]
FPCNN: A Fast Privacy-Preserving Outsourced Convolutional Neural Network with Low-Bandwidth
Jinguo Li, Yan Yan, Kai Zhang*, Chunlin Lia, Peichun Yuan
Knowledge-Based Systems (KBS) 283:111181 (2024) [SCI一区]
Registered ABE via Predicate Encodings
Ziqi Zhu, Kai Zhang, Junqing Gong, Haifeng Qian
29th Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT) (5)2023: 66–97 [国际三大密码会]
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes
Minjun Deng, Kai Zhang*, Pengfei Wu, Mi Wen, Jianting Ning
IEEE Transactions on Cloud Computing (IEEE TCC) 11(4):3510-3524 (2023) [CCF-C]
Verifiable Cloud-Based Data Publish-Subscribe Service with Hidden Access Policy
Chunlin Li, Jinguo Li, Kai Zhang, Yan Yan, Jianting Ning
IEEE Transactions on Cloud Computing (IEEE TCC) 11(4):3737-3749 (2023) [CCF-C]
Multi-Client Boolean File Retrieval with Adaptable Authorization Switching for Secure Cloud Search Services
Kai Zhang, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 20(6):4621-4636 (2023) [CCF-A]
Secure Cloud-Assisted Data Pub/Sub Service with Fine-grained Bilateral Access Control
Kai Zhang, Xiwen Wang, Jianting Ning, Junqing Gong, Xinyi Huang
IEEE Transactions on Information Forensics and Security (IEEE TIFS) 18: 5286-5301 (2023) [CCF-A]
Bounded-collusion Decentralized ABE with Sublinear Parameters
Jun Zhao, Minghao Yang, Junqing Gong, Kai Zhang, Haifeng Qian
Theoretical Computer Science (TCS), 960: 113897 (2023) [CCF-B]
Privacy-Preserving Federated Learning via Functional Encryption, Revisited
Yansong Chang, Kai Zhang, Junqing Gong, Haifeng Qian
IEEE Transactions on Information Forensics and Security (IEEE TIFS) 18: 1855-1869 (2023) [CCF-A]
Dual-Server Boolean Data Retrieval for Highly-Scalable Secure File Sharing Services
Kai Zhang, Xiwen Wang, Jianting Ning, Xinyi Huang
IEEE Transactions on Information Forensics and Security (IEEE TIFS) 18: 449-462 (2023) [CCF-A]
Subversion-Resistant and Consistent Attribute-Based Keyword Search for Secure Cloud Storage
Kai Zhang, Zhe Jiang, Jianting Ning, Xinyi Huang
IEEE Transactions on Information Forensics & Security (IEEE TIFS) 17:1771-1784 (2022) [CCF-A]
Forward Secure Public Key Encryption with
Keyword Search for Outsourced Cloud Storage
Ming Zeng, Haifeng Qian, Jie Chen, Kai Zhang
IEEE Transactions on Cloud Computing (IEEE TCC) 10(1):426-438 (2022) [CCF-C]
Multi-client Sub-Linear Boolean Keyword
Searching for Encrypted Cloud Storage with Owner-enforced Authorization
Kai Zhang, Mi Wen, Rongxing Lu, Kefei Chen
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC) 18(6): 2875-2887 (2021) [CCF-A]
Updatable All-But-One Dual Projective
Hashing and Its Applications
Kai Zhang, Zhe Jiang, Junqing Gong, Haifeng Qian
The 23rd International Conference on Information and Communications Security (ICICS) 2021:358-374 [CCF-C]
Public Key Encryption with Equality Test via Hash Proof System
Ming Zeng, Jie Chen, Kai Zhang, Haifeng Qian
Theoretical Computer Science (TCS) 795:20-35 (2019) [CCF-B]
Efficient Public Key
Encryption with Equality Test in The Standard Model
Kai Zhang, Jie Chen, Hyung Tae Lee, Haifeng Qian, Huaxiong Wang
Theoretical Computer Science (TCS) 755:65-80 (2019) [CCF-B]
Lattice-Based Dual
Receiver Encryption and More
Daode Zhang, Kai Zhang*, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li
Australasian Conference on Information Security and Privacy (ACISP) 2018: 520-538 [CCF-C]
Practical and Efficient Attribute-Based Encryption with Constant-Size Ciphertexts in Outsourced Verifiable Computation
Kai Zhang, Junqing Gong, Shaohua Tang, Jie Chen, Xiangxue Li, Haifeng Qian, Zhenfu Cao
ACM on Asia Conference on Computer and Communications Security (AsiaCCS) 2016:269-279 [CCF-C]