


default search action
Minghao Zhao 0001
Person information
- unicode name: 赵明昊
- affiliation: Tsinghua University, School of Software, Beijing, China
- affiliation (former): Shandong University, College of Computer Science and Technology, Jinan, China
Other persons with the same name
- Minghao Zhao 0002
— NetEase, Fuxi AI Laboratory, Hangzhou, China (and 1 more)
- Minghao Zhao 0003
— Jilin University, College of Computer Science and Technology, Changchun, China
- Minghao Zhao 0004 — Tsinghua University, Department of Thermal Engineering, Beijing, China
- Minghao Zhao 0005 — University of Jinan, China
- Minghao Zhao 0006 — Chinese Academy of Medical Sciences, Plastic Surgery Hospital, Beijing, China (and 1 more)
- Minghao Zhao 0007 — Jilin University, College of Earth Sciences, Changchun, China
- Minghao Zhao 0008 — Beihang University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [i3]Yunan Wei, Shengnan Zhao, Chuan Zhao, Zhe Liu, Zhenxiang Chen, Minghao Zhao:
FedCAPrivacy: Privacy-Preserving Heterogeneous Federated Learning with Anonymous Adaptive Clustering. CoRR abs/2503.23292 (2025) - 2023
- [j28]Yilei Wang, Zhaojie Wang
, Guoyu Yang, Shan Ai, Xiaoyu Xiang, Chang Chen
, Minghao Zhao
:
On-chain is not enough: Ensuring pre-data on the chain credibility for blockchain-based source-tracing systems. Digit. Commun. Networks 9(5): 1053-1060 (2023) - [j27]Yiting Zhang, Minghao Zhao, Tao Li, Yilei Wang, Tiancai Liang:
Achieving optimal rewards in cryptocurrency stubborn mining with state transition analysis. Inf. Sci. 625: 299-313 (2023) - [j26]Hua Yang
, Minghao Zhao, Lei Yuan, Yang Yu, Zhenhua Li
, Ming Gu:
Memory-efficient Transformer-based network model for Traveling Salesman Problem. Neural Networks 161: 589-597 (2023) - [j25]Yilei Wang, Qingzhe Lv, Huang Zhang, Minghao Zhao, Yuhong Sun, Lingkai Ran, Tao Li:
Beyond model splitting: Preventing label inference attacks in vertical federated learning with dispersed training. World Wide Web (WWW) 26(5): 2691-2707 (2023) - 2022
- [j24]Jianan Guo
, Zhaojie Wang, Hai Liang, Minghao Zhao, Hui An, Yilei Wang:
Improving transaction succeed ratio in payment channel networks via enhanced node connectivity and balanced channel capacity. Int. J. Intell. Syst. 37(11): 9013-9036 (2022) - [j23]Zhaobo Lu
, Hai Liang, Minghao Zhao, Qingzhe Lv, Tiancai Liang, Yilei Wang:
Label-only membership inference attacks on machine unlearning without dependence of posteriors. Int. J. Intell. Syst. 37(11): 9424-9441 (2022) - [j22]Yilei Wang, Zhaojie Wang, Minghao Zhao, Xueyang Han, Huiyu Zhou, Xiaoying Wang, Arthur Sandor Voundi Koe:
BSM-ether: Bribery selfish mining in blockchain-based healthcare systems. Inf. Sci. 601: 1-17 (2022) - [j21]Minghao Zhao
, Zhenhua Li
, Wei Liu
, Jian Chen, Xingyao Li:
UFC2: User-Friendly Collaborative Cloud. IEEE Trans. Parallel Distributed Syst. 33(9): 2163-2182 (2022) - [c18]Zhaobo Lu
, Yilei Wang
, Qingzhe Lv
, Minghao Zhao
, Tiancai Liang
:
FP2-MIA: A Membership Inference Attack Free of Posterior Probability in Machine Unlearning. ProvSec 2022: 167-175 - [c17]Zhaojie Wang
, Willy Susilo
, Jianan Guo
, Yilei Wang
, Minghao Zhao
:
Reinforcement-Mining: Protecting Reward in Selfish Mining. ProvSec 2022: 199-209 - 2021
- [j20]Yilei Wang, Minghao Zhao, Yuemei Hu, Yijie Gao, Xinchun Cui:
Secure computation protocols under asymmetric scenarios in enterprise information system. Enterp. Inf. Syst. 15(4): 492-512 (2021) - [j19]Tao Li
, Yuling Chen
, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu
, Yixian Yang:
Corrigendum to "Rational Protocols and Attacks in Blockchain System". Secur. Commun. Networks 2021: 9856969:1-9856969:2 (2021) - [c16]Minghao Zhao, Jian Chen, Zhenhua Li:
Enabling Conflict-free Collaborations with Cloud Storage Services. ICPADS 2021: 615-621 - 2020
- [j18]Hao Wang
, Hong Qin
, Minghao Zhao
, Xiaochao Wei
, Hua Shen
, Willy Susilo
:
Blockchain-based fair payment smart contract for public cloud storage auditing. Inf. Sci. 519: 348-362 (2020) - [j17]Chengyu Hu
, Yuqin Xu, Pengtao Liu, Jia Yu
, Shanqing Guo, Minghao Zhao
:
Enabling cloud storage auditing with key-exposure resilience under continual key-leakage. Inf. Sci. 520: 15-30 (2020) - [j16]Chuan Zhao
, Shengnan Zhao
, Bo Zhang
, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Oblivious DFA evaluation on joint input and its applications. Inf. Sci. 528: 168-180 (2020) - [j15]Xiaochao Wei, Lin Xu, Minghao Zhao
, Hao Wang
:
Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer. Inf. Sci. 529: 132-140 (2020) - [j14]Tao Li, Yuling Chen, Yanli Wang, Yilei Wang, Minghao Zhao, Haojia Zhu, Youliang Tian, Xiaomei Yu, Yixian Yang:
Rational Protocols and Attacks in Blockchain System. Secur. Commun. Networks 2020: 8839047:1-8839047:11 (2020) - [j13]Yu-an Zhang
, Xiaofeng Qin
, Qinglian Ma, Minghao Zhao, Satoru Hiwa
, Tomoyuki Hiroyasu, Hiroshi Furutani:
Markov chain analysis of evolutionary algorithms on OneMax function - From coupon collector's problem to (1 + 1) EA. Theor. Comput. Sci. 820: 26-44 (2020) - [j12]Xiangfu Song
, Changyu Dong
, Dandan Yuan, Qiuliang Xu
, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IEEE Trans. Dependable Secur. Comput. 17(5): 912-927 (2020) - [c15]Jian Chen, Minghao Zhao, Zhenhua Li, Ennan Zhai, Feng Qian, Hongyi Chen, Yunhao Liu, Tianyin Xu:
Lock-Free Collaboration Support for Cloud Storage Services with Operation Inference and Transformation. FAST 2020: 13-27
2010 – 2019
- 2019
- [j11]Jing Han, Yanping Li
, Jianqing Liu, Minghao Zhao:
An Efficient Lucas Sequence-Based Batch Auditing Scheme for the Internet of Medical Things. IEEE Access 7: 10077-10092 (2019) - [j10]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Keyword guessing on multi-user searchable encryption. Int. J. High Perform. Comput. Netw. 14(1): 60-68 (2019) - [j9]Chuan Zhao
, Shengnan Zhao
, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan
:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j8]Yilei Wang
, Andrea Bracciali, Tao Li, Fengyin Li, Xinchun Cui, Minghao Zhao:
Randomness invalidates criminal smart contracts. Inf. Sci. 477: 291-301 (2019) - [j7]Minghao Zhao, Chengyu Hu, Xiangfu Song, Chuan Zhao:
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial. J. Netw. Comput. Appl. 131: 55-65 (2019) - [c14]Chuan Zhao, Shengnan Zhao, Bo Zhang
, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. CSS (2) 2019: 275-284 - [c13]Yu-an Zhang, Xiaofeng Qin
, Minghao Zhao, Meiyun Du, Rende Song:
Body-Weight Estimation of Plateau Yak with Simple Dimensional Measurement. CSS (2) 2019: 562-571 - [c12]Xi Chen, Minghao Zhao, Xinlei Yang, Zhenhua Li, Yao Liu, Zhenyu Li, Yunhao Liu:
The Cask Effect of Multi-source Content Delivery: Measurement and Mitigation. ICDCS 2019: 261-270 - 2018
- [j6]Minghao Zhao, Han Jiang, Zhen Li, Qiuliang Xu, Hao Wang, Shaojing Li:
An efficient symmetric searchable encryption scheme for dynamic dataset in cloud computing paradigms. Int. J. High Perform. Comput. Netw. 12(2): 179-190 (2018) - [j5]Dandan Yuan, Xiangfu Song, Qiuliang Xu
, Minghao Zhao, Xiaochao Wei, Hao Wang
, Han Jiang:
An ORAM-based privacy preserving data sharing scheme for cloud storage. J. Inf. Secur. Appl. 39: 1-9 (2018) - [j4]Xiaochao Wei
, Minghao Zhao, Qiuliang Xu:
Efficient and secure outsourced approximate pattern matching protocol. Soft Comput. 22(4): 1175-1187 (2018) - [c11]Minghao Zhao, Zhenhua Li, Ennan Zhai, Gareth Tyson, Chen Qian, Zhenyu Li, Leiyu Zhao:
H2Cloud: Maintaining the Whole Filesystem in an Object Storage Cloud. ICPP 2018: 68:1-68:10 - [c10]Xi Chen, Zhenhua Li, Zhenyu Li, Tianyin Xu, Ennan Zhai, Yao Liu, Minghao Zhao, Yunhao Liu:
Minimizing the Cask Effect of Multi-Source Content Delivery. IWQoS 2018: 1-2 - [c9]Jie Cai, Han Jiang, Qiuliang Xu, Guangshi Lv, Minghao Zhao, Hao Wang:
Towards Security Authentication for IoT Devices with Lattice-Based ZK. NSS 2018: 141-150 - [i2]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. IACR Cryptol. ePrint Arch. 2018: 497 (2018) - 2017
- [j3]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Multi-user searchable encryption with a designated server. Ann. des Télécommunications 72(9-10): 617-629 (2017) - [j2]Zhe Liu
, Kim-Kwang Raymond Choo
, Minghao Zhao:
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions. Comput. Secur. 69: 97-113 (2017) - [j1]Hao Wang
, Debiao He, Jian Shen
, Zhihua Zheng, Chuan Zhao, Minghao Zhao:
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21(24): 7325-7335 (2017) - [c8]Zengpeng Li
, Chunguang Ma, Ding Wang
, Minghao Zhao, Qian Zhao, Lu Zhou:
Toward Proxy Re-encryption From Learning with Errors in the Exponent. TrustCom/BigDataSE/ICESS 2017: 683-690 - [i1]Xiangfu Song, Changyu Dong, Dandan Yuan, Qiuliang Xu, Minghao Zhao:
Forward Private Searchable Symmetric Encryption with Optimized I/O Efficiency. CoRR abs/1710.00183 (2017) - 2016
- [c7]Zhen Li, Minghao Zhao, Han Jiang, Qiuliang Xu:
Data Sharing with Fine-Grained Access Control for Multi-tenancy Cloud Storage System. CloudComp 2016: 123-132 - [c6]Xueyang Han, Qiuliang Xu, Fengbo Lin, Minghao Zhao:
Improved Power Analysis Attack Based on the Preprocessed Power Traces. GPC 2016: 278-289 - [c5]Minghao Zhao, Zhen Li, Yilei Wang, Qiuliang Xu:
Longest Common Sub-sequence Computation and Retrieve for Encrypted Character Strings. NBiS 2016: 496-499 - [c4]Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. Trustcom/BigDataSE/ISPA 2016: 418-425 - [c3]Xiaoyan Yang, Han Jiang, Qiuliang Xu, Mengbo Hou, Xiaochao Wei, Minghao Zhao, Kim-Kwang Raymond Choo
:
A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol. Trustcom/BigDataSE/ISPA 2016: 670-677 - 2015
- [c2]Shufeng Li, Minghao Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei:
Efficient ORAM Based on Binary Tree without Data Overflow and Evictions. ISICA 2015: 596-607 - [c1]Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application. TrustCom/BigDataSE/ISPA (1) 2015: 384-391
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-22 21:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint