Bo Zhao
Orcid: 0000-0003-4307-9380Affiliations:
- Wuhan University, School of Cyber Science and Engineering, Wuhan, China
According to our database1,
Bo Zhao
authored at least 33 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest.
Pattern Recognit., March, 2024
TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber-physical systems.
Ad Hoc Networks, 2024
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
Neural Comput. Appl., April, 2023
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 9th IEEE International Conference on Cloud Computing and Intelligent Systems, 2023
2022
IEEE Trans. Cloud Comput., 2022
GreedyFool: Multi-factor imperceptibility and its application to designing a black-box adversarial attack.
Inf. Sci., 2022
CoRR, 2022
Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection.
CoRR, 2022
Appl. Soft Comput., 2022
2021
Intelligent system for interactive online education based on cloud big data analytics.
J. Intell. Fuzzy Syst., 2021
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features.
CoRR, 2021
2020
Secur. Commun. Networks, 2020
IEEE Open J. Comput. Soc., 2020
Mob. Inf. Syst., 2020
GreedyFool: An Imperceptible Black-box Adversarial Example Attack against Neural Networks.
CoRR, 2020
StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
A novel quantum image encryption algorithm based on crossover operation and mutation operation.
Multim. Tools Appl., 2019
Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2019
Entropy, 2019
IEEE Access, 2019
A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019
2018
Mchain: A Blockchain-Based VM Measurements Secure Storage Approach in IaaS Cloud With Enhanced Integrity and Controllability.
IEEE Access, 2018
2017
2016
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
Secur. Commun. Networks, 2016
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2010
2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
2004
Proceedings of the Conceptual Modeling for Advanced Application Domains, 2004