 
															Senior Lecturer
Department of Hospitality and Business Management
Contact details
Email: rockyzhang@thei.edu.hk
Phone: +852 3890 8209
					 TEACHING AREAS 
							
			
			
		
						
				TEACHING AREAS
- Data Cleaning and Analytics 
- Introduction to IT Audit 
- Embedded Systems 
- Digital Circuits 
- Computer and Network Security 
					 ACADEMIC QUALIFICATIONS 
							
			
			
		
						
				ACADEMIC QUALIFICATIONS
| 2014-2019 | Ph.D. in Computer Science The University of Hong Kong (HKU) | 
| 2011-2014 | MPhil of Cryptography Xidian University | 
| 2007-2011 | Bachelor of Communication Engineering Henan Polytechnic University (HPU) | 
					 EMPLOYMENT 
							
			
			
		
						
				EMPLOYMENT
| 2025-Present | Senior Lecturer Department of Hospitality and Business Management Technological and Higher Education Institute of Hong Kong (THEi) | 
| 2024-2025 | Lecturer I Institute of Cyberspace Technology HKCT Institute of Higher Education (CTIHE) | 
| 2019-2023 | Senior Lead Engineer, Lead Engineer, Senior Engineer Artificial Intelligence and Trust Technologies (AITT) Technology Division Hong Kong Applied Science and Technology Research Institute (ASTRI) | 
					 AWARDS 
							
			
			
		
						
				AWARDS
| 2023 | Bronze Medal, in the 48th International Exhibition of Inventions of Geneva Hong Kong Applied Science and Technology Research Institute (ASTRI) | 
| 2021 | Annual Inventor Awards Hong Kong Applied Science and Technology Research Institute (ASTRI) | 
| 2017 | Best Paper Award of I-SPAN 2017 International Conference | 
					 PROFESSIONAL SOCIETIES 
							
			
			
		
						
				PROFESSIONAL SOCIETIES
| 2025 | Member, Chinese Association for Cryptologic Research (CACR) | 
					 RESEARCH INTERESTS 
							
			
			
		
						
				RESEARCH INTERESTS
- Privacy Preserving Computation
- Blockchain Security
- Digital Copyright Protection
- Post-Quantum Cryptography
- Artificial Intelligence
					 SELECTED PUBLICATIONS/CONFERENCE PRESENTATIONS 
							
			
			
		
						
				SELECTED PUBLICATIONS/CONFERENCE PRESENTATIONS
Journal Article
- Wang, J., Hui, L. C., Yiu, S. M., Zhou, G., & Zhang, R. (2017). F‐DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber‐Physical Systems. Security and Communication Networks, 2017(1), 9602357.
- 牛飛斐, 張若箐, 楊亞濤, & 李子臣. (2014). 基于 Hash 函數的計算機日志完整性檢測模型設計. 計算機工程與設計, 35(3), 830-834.
Conference Papers
- Liu, Z., Jiang, Z. L., Wang, X., Yiu, S. M., Zhang, R., & Wu, Y. (2018, August). A temporal and spatial constrained attribute-based access control scheme for cloud storage. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 614-623). IEEE.
- Wen, J., Hui, L. C., Yiu, S. M., & Zhang, R. (2018, June). DCN: detector-corrector network against evasion attacks on deep neural networks. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) (pp. 215-221). IEEE.
- Zhang, R., Hui, L., Yiu, S., Yu, X., Liu, Z., & Jiang, Z. L. (2017, August). A traceable outsourcing cp-abe scheme with attribute revocation. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 363-370). IEEE.
- Zhang, R., Chow, C., & Hui, L. C. (2017, June). Crypt-ehrserver: Protecting confidentiality with attribute-based encryption and encrypted query processing. In 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC) (pp. 234-241). IEEE
- Jiang, Z. L., Zhang, R., Liu, Z., Yiu, S. M., Hui, L. C., Wang, X., & Fang, J. (2016, November). A revocable outsourcing attribute-based encryption scheme. In International Conference on Cloud Computing (pp. 145-161). Cham: Springer International Publishing.
- Yu, X., Cao, N., Zeng, G., Zhang, R., & Yiu, S. M. (2016, August). LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation). In International Workshop on Information Security Applications (pp. 233-244). Cham: Springer International Publishing.
- Li, Z., Zhang, R., Yang, Y., & Li, Z. (2014, October). A provable secure mutual RFID authentication protocol based on error-correct code. In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 73-78). IEEE.
- Chen, Z., Zhang, R., Yang, Y., & Li, Z. (2013, October). A Homomorphic ElGamal Variant Based on BGN’s Method. In 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 1-5). IEEE.
- Zhang, R., Chen, Z., Li, Z., Yang, Y., & Li, Z. (2013, August). An efficient scheme for log integrity check in security monitoring system. In IET International Conference on Smart and Sustainable City 2013 (ICSSC 2013) (pp. 198-202). IET.
Patents
- Shangru, W. U., Zhang, H., Zhang, X., & Zhang, R. (2022). Apparatus and Method of Lightweight Communication Protocols Between Multiple Blockchains. In: US-11368288-B2. Date of Patent: 21/06/2022.
- 吳尚儒, 張海華, 張星霞, 張若箐. “多区块链间轻量通讯协定装置及方法”. In: CN114868359A (Aug. 2022). Granting date 05/08/2022.
Industry Report
- Alternative Credit Scoring of Micro-, Small, and Medium-sized Enterprises. Hong Kong Monetary Authority (HKMA) and ASTRI. 02/11/2020.
