Practical Secure Computation Outsourcing: A Survey Z Shan, K Ren, M Blanton, C Wang ACM Computing Surveys (CSUR) 51 (2), 31, 2018 | 148 | 2018 |
You can access but you cannot leak: Defending against illegal content redistribution in encrypted cloud media center LY Zhang, Y Zheng, J Weng, C Wang, Z Shan, K Ren IEEE Transactions on Dependable and Secure Computing 17 (6), 1218-1231, 2018 | 40 | 2018 |
Frequency domain filtered residual network for deepfake detection B Wang, X Wu, Y Tang, Y Ma, Z Shan, F Wei Mathematics 11 (4), 816, 2023 | 16 | 2023 |
A unified framework of source camera identification based on features B Wang, K Zhong, Z Shan, MN Zhu, X Sui Forensic science international 307, 110109, 2020 | 9 | 2020 |
SecSAKE: Towards secure and efficient outsourcing of clinical MRI reconstruction Z Shan, Z Qin, L Ying, K Ren Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018 | 5 | 2018 |
Privacy-Preserving Outsourcing of Magnetic Resonance Imaging Reconstruction Z Shan faculty of the Graduate School of the University at Buffalo, The State …, 2019 | | 2019 |
Privacy-Preserving Outsourcing of Parallel Magnetic Resonance Image Reconstruction Z Shan, K Ren, Z Qin 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 204-205, 2017 | | 2017 |