後退

高級講師

酒店餐飲及工商管理學系


聯絡方法

電郵: rockyzhang@thei.edu.hk

電話: +852 3890 8209

TEACHING AREAS
  1. Data Cleaning and Analytics

  2. Introduction to IT Audit

  3. Embedded Systems

  4. Digital Circuits

  5. Computer and Network Security

2014-2019

Ph.D. in Computer Science

The University of Hong Kong (HKU)

2011-2014

MPhil of Cryptography

Xidian University

2007-2011

Bachelor of Communication Engineering

Henan Polytechnic University (HPU)

2025-Present高級講師
酒店餐飲及工商管理學系
香港高等教育科技學院 (THEi高科院)
2024-2025Lecturer I
Institute of Cyberspace Technology
HKCT Institute of Higher Education (CTIHE)
2019-2023Senior Lead Engineer, Lead Engineer, Senior Engineer
Artificial Intelligence and Trust Technologies (AITT) Technology Division
Hong Kong Applied Science and Technology Research Institute (ASTRI)
2023Bronze Medal, in the 48th International Exhibition of Inventions of Geneva
Hong Kong Applied Science and Technology Research Institute (ASTRI)
2021Annual Inventor Awards
Hong Kong Applied Science and Technology Research Institute (ASTRI)
2017Best Paper Award of I-SPAN 2017 International Conference
2025Member, Chinese Association for Cryptologic Research (CACR)
  1. Privacy Preserving Computation
  2. Blockchain Security
  3. Digital Copyright Protection
  4. Post-Quantum Cryptography
  5. Artificial Intelligence

Journal Article

  1. Wang, J., Hui, L. C., Yiu, S. M., Zhou, G., & Zhang, R. (2017). F‐DDIA: A Framework for Detecting Data Injection Attacks in Nonlinear Cyber‐Physical Systems. Security and Communication Networks2017(1), 9602357.
  2. 牛飛斐, 張若箐, 楊亞濤, & 李子臣. (2014). 基于 Hash 函數的計算機日志完整性檢測模型設計. 計算機工程與設計35(3), 830-834.

Conference Papers

  1. Liu, Z., Jiang, Z. L., Wang, X., Yiu, S. M., Zhang, R., & Wu, Y. (2018, August). A temporal and spatial constrained attribute-based access control scheme for cloud storage. In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (pp. 614-623). IEEE.
  2. Wen, J., Hui, L. C., Yiu, S. M., & Zhang, R. (2018, June). DCN: detector-corrector network against evasion attacks on deep neural networks. In 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W) (pp. 215-221). IEEE.
  3. Zhang, R., Hui, L., Yiu, S., Yu, X., Liu, Z., & Jiang, Z. L. (2017, August). A traceable outsourcing cp-abe scheme with attribute revocation. In 2017 IEEE Trustcom/BigDataSE/ICESS (pp. 363-370). IEEE.
  4. Zhang, R., Chow, C., & Hui, L. C. (2017, June). Crypt-ehrserver: Protecting confidentiality with attribute-based encryption and encrypted query processing. In 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks & 2017 11th International Conference on Frontier of Computer Science and Technology & 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC) (pp. 234-241). IEEE
  5. Jiang, Z. L., Zhang, R., Liu, Z., Yiu, S. M., Hui, L. C., Wang, X., & Fang, J. (2016, November). A revocable outsourcing attribute-based encryption scheme. In International Conference on Cloud Computing (pp. 145-161). Cham: Springer International Publishing.
  6. Yu, X., Cao, N., Zeng, G., Zhang, R., & Yiu, S. M. (2016, August). LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation). In International Workshop on Information Security Applications (pp. 233-244). Cham: Springer International Publishing.
  7. Li, Z., Zhang, R., Yang, Y., & Li, Z. (2014, October). A provable secure mutual RFID authentication protocol based on error-correct code. In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 73-78). IEEE.
  8. Chen, Z., Zhang, R., Yang, Y., & Li, Z. (2013, October). A Homomorphic ElGamal Variant Based on BGN’s Method. In 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (pp. 1-5). IEEE.
  9. Zhang, R., Chen, Z., Li, Z., Yang, Y., & Li, Z. (2013, August). An efficient scheme for log integrity check in security monitoring system. In IET International Conference on Smart and Sustainable City 2013 (ICSSC 2013) (pp. 198-202). IET.

Patents

  1. Shangru, W. U., Zhang, H., Zhang, X., & Zhang, R. (2022). Apparatus and Method of Lightweight Communication Protocols Between Multiple Blockchains. In: US-11368288-B2. Date of Patent: 21/06/2022.
  2. 吳尚儒, 張海華, 張星霞, 張若箐. “多区块链间轻量通讯协定装置及方法”. In: CN114868359A (Aug. 2022). Granting date 05/08/2022.

Industry Report

  1. Alternative Credit Scoring of Micro-, Small, and Medium-sized Enterprises.

    Hong Kong Monetary Authority (HKMA) and ASTRI. 02/11/2020.