Bo Zhao

Orcid: 0000-0003-4307-9380

Affiliations:
  • Wuhan University, School of Cyber Science and Engineering, Wuhan, China


According to our database1, Bo Zhao authored at least 33 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest.
Pattern Recognit., March, 2024

TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber-physical systems.
Ad Hoc Networks, 2024

Style-conditional Prompt Token Learning for Generalizable Face Anti-spoofing.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
Supervised contrastive learning for robust text adversarial training.
Neural Comput. Appl., April, 2023

A Novel Network Topology Sensing Method for Network Security Situation Awareness.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

An Ontology-Centric Approach for Network Security Situation Awareness.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Intelligent Smishing Detection System for Massive Users.
Proceedings of the 9th IEEE International Conference on Cloud Computing and Intelligent Systems, 2023

2022
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX.
IEEE Trans. Cloud Comput., 2022

GreedyFool: Multi-factor imperceptibility and its application to designing a black-box adversarial attack.
Inf. Sci., 2022

Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples.
CoRR, 2022

Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection.
CoRR, 2022

Feature-filter: Detecting adversarial examples by filtering out recessive features.
Appl. Soft Comput., 2022

2021
Intelligent system for interactive online education based on cloud big data analytics.
J. Intell. Fuzzy Syst., 2021

Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features.
CoRR, 2021

2020
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map.
Secur. Commun. Networks, 2020

Etoram: A More Efficient ORAM for Secure Computation.
IEEE Open J. Comput. Soc., 2020

An Area-Context-Based Credibility Detection for Big Data in IoT.
Mob. Inf. Syst., 2020

GreedyFool: An Imperceptible Black-box Adversarial Example Attack against Neural Networks.
CoRR, 2020

StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

2019
Detecting and Mitigating Target Link-Flooding Attacks Using SDN.
IEEE Trans. Dependable Secur. Comput., 2019

A novel quantum image encryption algorithm based on crossover operation and mutation operation.
Multim. Tools Appl., 2019

Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2019

Quantum Image Encryption Scheme Using Arnold Transform and S-box Scrambling.
Entropy, 2019

Cycle ORAM: A Practical Protection for Access Pattern in Untrusted Storage.
IEEE Access, 2019

A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map.
IEEE Access, 2019

A Trust Chain Assessment Method Based on Blockchain for SDN Network Nodes.
Proceedings of the 2019 IEEE International Conference on Smart Internet of Things (SmartIoT), 2019

2018
Mchain: A Blockchain-Based VM Measurements Secure Storage Approach in IaaS Cloud With Enhanced Integrity and Controllability.
IEEE Access, 2018

2017
CHAOS: An SDN-Based Moving Target Defense System.
Secur. Commun. Networks, 2017

2016
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
Secur. Commun. Networks, 2016

2014
POSTER: An E2E Trusted Cloud Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2010
Research on trusted computing and its development.
Sci. China Inf. Sci., 2010

2006
Integration of Distributed Geographical Information Based on Mediation and GML.
Proceedings of the 10th International Conference on CSCW in Design, 2006

2004
Geo Web Services Based on Semantic.
Proceedings of the Conceptual Modeling for Advanced Application Domains, 2004


  Loading...