![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
Xiaoyan Zhu 0005
Person information
- affiliation: Xidian University, State Key Laboratory of Integrated Services Networks, Xi'an, China
- affiliation: Xidian University, School of Telecommunications Engineering, Xi'an, China
Other persons with the same name
- Xiaoyan Zhu — disambiguation page
- Xiaoyan Zhu 0001 — Tsinghua University, Institute for Artificial Intelligence, State Key Lab of Intelligent Technology and Systems, Beijing, China (and 1 more)
- Xiaoyan Zhu 0002
— University of Chinese Academy of Sciences, School of Economics and Management, Beijing, China
- Xiaoyan Zhu 0003
— Xi'an Jiaotong University, Department of Computer Science and Technology, China
- Xiaoyan Zhu 0004
— Jiangsu Electric Power Information Technology Co. Ltd., Nanjing, China
Refine list
![note](https://dblp.org/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Linjie Zhang
, Xiaoyan Zhu
, Jianfeng Ma
:
IoT Route Planning Based on Spatiotemporal Interactive Attention Neural Network. IEEE Internet Things J. 11(5): 7697-7709 (2024) - [j23]Haihan Nan
, Ruidong Li
, Xiaoyan Zhu
, Jianfeng Ma
, Kaiping Xue
:
Spatio-Temporal Identity Multi-Graph Convolutional Network for Traffic Prediction in the Metaverse. IEEE J. Sel. Areas Commun. 42(3): 669-679 (2024) - [j22]Haihan Nan, Ruidong Li
, Xiaoyan Zhu
, Jianfeng Ma
, Dusit Niyato
:
An Efficient Data-Driven Traffic Prediction Framework for Network Digital Twin. IEEE Netw. 38(1): 22-29 (2024) - 2023
- [j21]Haihan Nan
, Xiaoyan Zhu
, Jianfeng Ma
:
MSTL-GLTP: A Global-Local Decomposition and Prediction Framework for Wireless Traffic. IEEE Internet Things J. 10(6, March 15): 5024-5034 (2023) - [c65]Yong Zeng, Zhe Wang, Xiaoya Guo, Kaichao Shi, Zhihong Liu, Xiaoyan Zhu, Jianfeng Ma:
Social Networks Based Robust Federated Learning for Encrypted Traffic Classification. ICC 2023: 4937-4942 - [c64]Chi Zhang, Xijuan Si, Xiaoyan Zhu, Yuqing Zhang:
A Survey on the Security of the Metaverse. MetaCom 2023: 428-432 - [i3]Jun Niu, Xiaoyan Zhu, Moxuan Zeng, Ge Zhang, Qingyang Zhao, Chunhui Huang, Yangming Zhang, Suyu An, Yangzhong Wang, Xinghui Yue, Zhipeng He, Weihao Guo, Kuo Shen, Peng Liu, Yulong Shen, Xiaohong Jiang, Jianfeng Ma, Yuqing Zhang:
SoK: Comparing Different Membership Inference Attacks with a Comprehensive Benchmark. CoRR abs/2307.06123 (2023) - 2021
- [j20]Tong Dong, Yong Zeng, Zhihong Liu, Jian-Feng Ma, Xiaoyan Zhu:
A Differential Privacy Topology Scheme for Average Path Length Query. J. Inf. Sci. Eng. 37(4): 885-899 (2021) - [c63]Jin Wei, Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma:
Attention-aware Multi-encoder for Session-based Recommendation. GLOBECOM 2021: 1-6 - [c62]Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma:
Joint Connection and Content Embedding for Link Prediction in Social Networks. GLOBECOM 2021: 1-6 - 2020
- [c61]Huichuan Liu, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization. CNCERT 2020: 175-190 - [c60]Danni Yuan, Kaoru Ota
, Mianxiong Dong, Xiaoyan Zhu, Tao Wu, Linjie Zhang
, Jianfeng Ma:
Intrusion Detection for Smart Home Security Based on Data Augmentation with Edge Computing. ICC 2020: 1-6 - [c59]Linjie Zhang, Xiaoyan Zhu, Jianfeng Ma, Zhuo Ma, Danni Yuan:
Medical Privacy-preserving Service Recommendation. ICC 2020: 1-6
2010 – 2019
- 2019
- [j19]Shunrong Jiang
, Xiaoyan Zhu, Linke Guo
, Jianqing Liu:
Publicly Verifiable Boolean Query Over Outsourced Encrypted Data. IEEE Trans. Cloud Comput. 7(3): 799-813 (2019) - [c58]Danni Yuan, Xiaoyan Zhu, Mingkui Wei, Jianfeng Ma:
Collaborative Deep Learning for Medical Image Analysis with Differential Privacy. GLOBECOM 2019: 1-6 - [c57]Dongliang Xu, Bailing Wang, Xiaojiang Du, Xiaoyan Zhu, Zhitao Guan, Xiaoyan Yu
, Jingyu Liu:
Verification Code Recognition Based on Active and Deep Learning. ICNC 2019: 453-456 - [c56]Jun Niu, Xiaoyan Zhu, Lei Shi, Jianfeng Ma:
Time-Aware Dummy-Based Privacy Protection for Continuous LBSs. NaNA 2019: 15-20 - [c55]Muyu Zhao, Xiaoyan Zhu, Jun Niu, Jianfeng Ma:
A Semantic-Based Dummy Generation Strategy for Location Privacy. NaNA 2019: 21-26 - [c54]Longfei Wang, Yong Zeng, Yixin Li, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Research on Resolution Limit of Community Detection in Location-Based Social Networks. NaNA 2019: 90-95 - [c53]Lingjie Zhou, Yong Zeng, Yang Liu
, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Edge Weight Differential Privacy Based Spectral Query Algorithm. NaNA 2019: 259-267 - [c52]Mengli Liu, Yong Zeng, Yi-Kai Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Collective Influence Based Privacy Preservation for Social Networks. NaNA 2019: 282-289 - [c51]Tong Dong, Yong Zeng, Mengli Liu, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
A Topology Based Differential Privacy Scheme for Average Path Length Query. NaNA 2019: 350-355 - [c50]Huichuan Liu, Yong Zeng, Zhihong Liu, Jianfeng Ma, Xiaoyan Zhu:
Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method. NaNA 2019: 356-361 - [c49]Shulin Cao, Wei Liu, Yuxing Chen, Xiaoyan Zhu:
Deep Learning Based Customer Churn Analysis. WCSP 2019: 1-6 - [c48]Yaoru Mao, Xiaoyan Zhu, Wenbin Zheng, Danni Yuan, Jianfeng Ma:
A Novel User Membership Leakage Attack in Collaborative Deep Learning. WCSP 2019: 1-6 - [c47]Danni Yuan, Xiaoyan Zhu, Yaoru Mao, Binwen Zheng, Tao Wu:
Privacy-Preserving Pedestrian Detection for Smart City with Edge Computing. WCSP 2019: 1-6 - [c46]Linjie Zhang, Xiaoyan Zhu, Xuexue Han, Jianfeng Ma:
Differentially Privacy-preserving Social IoT. WCSP 2019: 1-6 - [i2]Dongliang Xu, Bailing Wang, Xiaojiang Du, Xiaoyan Zhu, Zhitao Guan, Xiaoyan Yu, Jingyu Liu:
Verification Code Recognition Based on Active and Deep Learning. CoRR abs/1902.04401 (2019) - 2018
- [c45]Xiaoyan Zhu, Linjie Zhang, Yizhe Huang, Baoming Bai, Jianfeng Ma:
TSFR: Time-aware Semantic-based Friend Recommendation in LBSNs. APSIPA 2018: 266-271 - [c44]Haibo Tian, Xiaofeng Chen, Yong Ding, Xiaoyan Zhu, Fangguo Zhang
:
AFCoin: A Framework for Digital Fiat Currency of Central Banks Based on Account Model. Inscrypt 2018: 70-85 - 2017
- [j18]Xiaoyan Zhu
, Ripei Hao, Haotian Chi, Xiaojiang Du:
FineRoute: Personalized and Time-Aware Route Recommendation Based on Check-Ins. IEEE Trans. Veh. Technol. 66(11): 10461-10469 (2017) - 2016
- [j17]Wujun Zhang, Shunrong Jiang, Xiaoyan Zhu, Yumin Wang:
Cooperative downloading with privacy preservation and access control for value-added services in VANETs. Int. J. Grid Util. Comput. 7(1): 50-60 (2016) - [j16]Shunrong Jiang
, Xiaoyan Zhu, Liangmin Wang
:
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8): 2193-2204 (2016) - [c43]Xiaoyan Zhu, Ripei Hao, Haotian Chi, Xiaojiang Du:
Personalized Location Recommendations with Local Feature Awareness. GLOBECOM 2016: 1-6 - [c42]Xiaoyan Zhu, Ripei Hao:
Context-aware location recommendations with tensor factorization. ICCC 2016: 1-6 - 2015
- [j15]Ben Niu, Xiaoyan Zhu, Qinghua Li, Jie Chen, Hui Li:
A novel attack to spatial cloaking schemes in location-based services. Future Gener. Comput. Syst. 49: 125-132 (2015) - [j14]Shunrong Jiang, Xiaoyan Zhu, Liangmin Wang:
EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks. Sensors 15(9): 22419-22438 (2015) - [c41]Shunrong Jiang, Xiaoyan Zhu, Linke Guo, Jianqing Liu:
Publicly Verifiable Boolean Query over Outsourced Encrypted Data. GLOBECOM 2015: 1-6 - [c40]Xiaoyan Zhu, Ripei Hao, Shunrong Jiang, Haotian Chi, Hongning Li:
Verification of Boolean Queries over Outsourced Encrypted Data Based on Counting Bloom Filter. GLOBECOM 2015: 1-6 - [c39]Shunrong Jiang, Xiaoyan Zhu, Linke Guo, Jie Liu, Ripei Hao, Bo Yang:
Efficient private matching based on blind signature for proximity-based mobile social networks. ICC 2015: 3246-3251 - [c38]Shunrong Jiang, Xiaoyan Zhu, Ripei Hao, Haotian Chi, Hui Li, Liangmin Wang
:
Lightweight and privacy-preserving agent data transmission for mobile Healthcare. ICC 2015: 7322-7327 - [c37]Manfei Gao, Xiaoyan Zhu, Yang Su:
Protecting router cache privacy in named data networking. ICCC 2015: 1-5 - [c36]Xiaosan Lei, Xiaoyan Zhu, Haotian Chi, Shunrong Jiang:
Cloud-assisted privacy-preserving genetic paternity test. ICCC 2015: 1-6 - [c35]Xiaosan Lei, Xiaoyan Zhu, Haotian Chi, Shunrong Jiang:
Privacy-preserving use of genomic data on mobile devices. ICCC 2015: 1-6 - [c34]Xiaoyan Zhu, Zengbao Chen, Wenye Wang
:
G2G: Privacy-preserving group matching for proximity-based mobile social networks. ICCC 2015: 1-6 - [c33]Xiaoyan Zhu, Yang Su, Manfei Gao, Yizhe Huang:
Privacy-preserving friendship establishment based on blind signature and bloom filter in mobile social networks. ICCC 2015: 1-6 - [c32]Ben Niu, Xiaoyan Zhu, Weihao Li, Hui Li, Yingjuan Wang, Zongqing Lu:
A personalized two-tier cloaking scheme for privacy-aware location-based services. ICNC 2015: 94-98 - [c31]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Enhancing privacy through caching in location-based services. INFOCOM 2015: 1017-1025 - 2014
- [j13]Xiaoyan Zhu, Shunrong Jiang, Liangmin Wang
, Hui Li:
Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 63(2): 907-919 (2014) - [j12]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
Privacy and Authentication Protocol for Mobile RFID Systems. Wirel. Pers. Commun. 77(3): 1713-1731 (2014) - [c30]Xiaoyan Zhu, Zengbao Chen, Haotian Chi, Jie Liu, Shunrong Jiang:
Two-party and multi-party private matching for proximity-based mobile social networks. ICC 2014: 926-931 - [c29]Xiaoyan Zhu, Haotian Chi, Shunrong Jiang, Xiaosan Lei, Hui Li:
Using dynamic pseudo-IDs to protect privacy in location-based services. ICC 2014: 2307-2312 - [c28]Xiaoyan Zhu, Jie Liu, Shunrong Jiang, Zengbao Chen, Hui Li:
Efficient Weight-based Private Matching for proximity-based mobile social networks. ICC 2014: 4114-4119 - [c27]Ben Niu, Qinghua Li, Xiaoyan Zhu, Hui Li:
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services. ICCCN 2014: 1-8 - [c26]Ben Niu, Qinghua Li, Xiaoyan Zhu, Guohong Cao, Hui Li:
Achieving k-anonymity in privacy-aware location-based services. INFOCOM 2014: 754-762 - [c25]Ben Niu, Xiaoyan Zhu, Weihao Li, Hui Li:
EPcloak: An Efficient and Privacy-Preserving Spatial Cloaking Scheme for LBSs. MASS 2014: 398-406 - [c24]Ben Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li, Hui Li:
Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social Networks. SecureComm (2) 2014: 33-40 - [i1]Ben Niu, Tanran Zhang, Xiaoyan Zhu, Hui Li, Zongqing Lu:
Priority-Aware Private Matching Schemes for Proximity-Based Mobile Social Networks. CoRR abs/1401.8064 (2014) - 2013
- [c23]Linke Guo, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
:
Privacy-preserving attribute-based friend search in geosocial networks with untrusted servers. GLOBECOM 2013: 629-634 - [c22]Xiaoyan Zhu, Haotian Chi, Ben Niu, Weidong Zhang, Zan Li, Hui Li:
MobiCache: When k-anonymity meets cache. GLOBECOM 2013: 820-825 - [c21]Ben Niu, Xiaoyan Zhu, Xiaosan Lei, Weidong Zhang, Hui Li:
EPS: Encounter-Based Privacy-Preserving Scheme for Location-Based Services. GLOBECOM 2013: 2139-2144 - [c20]Ben Niu, Xiaoyan Zhu, Jie Liu, Zan Li, Hui Li:
Weight-aware private matching scheme for Proximity-based Mobile Social Networks. GLOBECOM 2013: 3170-3175 - [c19]Wujun Zhang, Shunrong Jiang, Xiaoyan Zhu, Yumin Wang:
Privacy-Preserving Cooperative Downloading for Value-Added Services in VANETs. INCoS 2013: 358-362 - [c18]Ben Niu, Xiaoyan Zhu, Tanran Zhang, Haotian Chi, Hui Li:
P-Match: Priority-Aware Friend Discovery for Proximity-Based Mobile Social Networks. MASS 2013: 351-355 - [c17]Ben Niu, Xiaoyan Zhu, Hui Li:
An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems. WCNC 2013: 1864-1869 - [c16]Shunrong Jiang, Xiaoyan Zhu, Liangmin Wang:
A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks. WCNC 2013: 2375-2380 - [c15]Ben Niu, Xiaoyan Zhu, Haotian Chi, Hui Li:
3PLUS: Privacy-preserving pseudo-location updating system in location-based services. WCNC 2013: 4564-4569 - 2012
- [j11]Miao Pan, Xiaoyan Zhu, Yuguang Fang
:
Using homomorphic encryption to secure the combinatorial spectrum auction without the trustworthy auctioneer. Wirel. Networks 18(2): 113-128 (2012) - [c14]Hao Yue, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
:
CPTT: A high-throughput coding-aware routing metric for multi-hop wireless networks. GLOBECOM 2012: 5687-5692 - [c13]Xiaoyan Zhu, Momeng Liu, Min Xie:
Privacy-Preserving Affinity Propagation Clustering over Vertically Partitioned Data. INCoS 2012: 311-317 - 2011
- [j10]Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
:
RescueMe: Location-Based Secure and Dependable VANETs for Disaster Rescue. IEEE J. Sel. Areas Commun. 29(3): 659-669 (2011) - [c12]Ben Niu, Hui Li, Xiaoyan Zhu, Chao Lv:
Security Analysis of Some Recent Authentication Protocols for RFID. CIS 2011: 665-669 - [c11]Linke Guo, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
:
A Multi-Hop Privacy-Preserving Reputation Scheme in Online Social Networks. GLOBECOM 2011: 1-5 - [c10]Liangmin Wang
, Tao Jiang, Xiaoyan Zhu:
Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network. GLOBECOM 2011: 1-5 - [c9]Jinyuan Sun, Xiaoyan Zhu, Chi Zhang, Yuguang Fang
:
HCPP: Cryptography Based Secure EHR System for Patient Privacy and Emergency Healthcare. ICDCS 2011: 373-382 - [c8]Chi Zhang, Xiaoyan Zhu, Yang Song, Yuguang Fang
:
C4: A new paradigm for providing incentives in multi-hop wireless networks. INFOCOM 2011: 918-926 - [c7]Huang Lin, Xiaoyan Zhu, Yuguang Fang
, Chi Zhang, Zhenfu Cao:
Efficient trust based information sharing schemes over distributed collaborative networks. MILCOM 2011: 1399-1403 - 2010
- [j9]Chi Zhang, Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang
:
Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24(4): 13-18 (2010) - [j8]Yun Zhou, Xiaoyan Zhu, Yuguang Fang
:
MABS: Multicast Authentication Based on Batch Signature. IEEE Trans. Mob. Comput. 9(7): 982-993 (2010) - [j7]Yang Song, Xiaoyan Zhu, Yuguang Fang
, Hailin Zhang:
Threshold optimization for rate adaptation algorithms in IEEE 802.11 WLANs. IEEE Trans. Wirel. Commun. 9(1): 318-327 (2010) - [j6]Jinyuan Sun, Yuguang Fang
, Xiaoyan Zhu:
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel. Commun. 17(1): 66-73 (2010) - [j5]Xiaoyan Zhu, Yuguang Fang
, Yumin Wang:
How to secure multi-domain wireless mesh networks. Wirel. Networks 16(5): 1215-1222 (2010) - [c6]Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang
:
Preserving Privacy in Emergency Response Based on Wireless Body Sensor Networks. GLOBECOM 2010: 1-6 - [c5]Jinyuan Sun, Xiaoyan Zhu, Yuguang Fang
:
A Privacy-Preserving Scheme for Online Social Networks with Efficient Revocation. INFOCOM 2010: 2516-2524 - [c4]Chi Zhang, Xiaoyan Zhu, Yang Song, Yuguang Fang
:
A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks. INFOCOM 2010: 2838-2846
2000 – 2009
- 2009
- [j4]Chi Zhang, Xiaoyan Zhu, Yuguang Fang
:
On the improvement of scaling laws for large-scale MANETs with network coding. IEEE J. Sel. Areas Commun. 27(5): 662-672 (2009) - [j3]Xiaoyan Zhu, Pan Li
, Yuguang Fang
, Yumin Wang:
Throughput and Delay in Cooperative Wireless Networks With Partial Infrastructure. IEEE Trans. Veh. Technol. 58(8): 4620-4627 (2009) - [j2]Yuguang Fang
, Xiaoyan Zhu, Yanchao Zhang:
Securing resource-constrained wireless ad hoc networks. IEEE Wirel. Commun. 16(2): 24-30 (2009) - [j1]Xiaoyan Zhu, Hao Yue, Yuguang Fang
, Yumin Wang:
A batched network coding scheme for wireless networks. Wirel. Networks 15(8): 1152-1164 (2009) - [c3]Xiaoyan Zhu, Hao Yue, Yumin Wang:
C and M: A New Network Coding Scheme for Wireless Networks. IAS 2009: 432-436 - [c2]Yang Song, Xiaoyan Zhu, Yuguang Fang
, Hailin Zhang:
Rethinking Thresholds-Based Rate Adaptation Algorithms: A Reverse Engineering Perspective. GLOBECOM 2009: 1-5 - [c1]Chi Zhang, Yuguang Fang
, Xiaoyan Zhu:
Throughput-Delay Tradeoffs in Large-Scale MANETs with Network Coding. INFOCOM 2009: 199-207
Coauthor Index
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-15 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint