Chuan Zhao
Orcid: 0000-0001-9106-6010
According to our database1,
Chuan Zhao
authored at least 101 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multimodal Virtual Semantic Communication for Tiny-Machine-Learning-Based UAV Task Execution.
IEEE Internet Things J., October, 2024
Trajectory Planning, Phase Shift Design, and IoT Devices Association in Flying-RIS-Assisted Mobile Edge Computing.
IEEE Internet Things J., January, 2024
CD-BTMSE: A Concept Drift detection model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble learning.
Knowl. Based Syst., 2024
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism.
Comput. Secur., 2024
2023
Dataset, September, 2023
Hand Posture and Force Estimation Using Surface Electromyography and an Artificial Neural Network.
Hum. Factors, May, 2023
An Anchor-Free and Angle-Free Detector for Oriented Object Detection Using Bounding Box Projection.
IEEE Trans. Geosci. Remote. Sens., 2023
Proceedings of the ICT Systems Security and Privacy Protection, 2023
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Application of case-based PBL teaching method in the teaching of Network and Service Engineering.
Proceedings of the 6th International Conference on Big Data and Education, 2023
Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Proceedings of the 2nd International Conference on Networks, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023
The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Design of Zero-Power Control Strategy With Resisting Tilt of Hybrid Magnetic Levitation System.
IEEE Trans. Ind. Electron., 2022
Generating Daily Soil Moisture at 16 m Spatial Resolution Using a Spatiotemporal Fusion Model and Modified Perpendicular Drought Index.
Sensors, 2022
Dynamic interactive control of inventory in a dual-channel supply chain under stochastic demand: Modelling and empirical studies.
J. Oper. Res. Soc., 2022
Privacy-enhancing machine learning framework with private aggregation of teacher ensembles.
Int. J. Intell. Syst., 2022
Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption.
Int. J. Intell. Syst., 2022
Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction.
Connect. Sci., 2022
Deep learning for full-feature X-ray microcomputed tomography segmentation of proton electron membrane fuel cells.
Comput. Chem. Eng., 2022
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2022
Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map Computing.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine.
Proceedings of the IEEE INFOCOM 2022, 2022
2021
Multiscenario Analyses Between Front and Back End Investment in Software Reliability: An Evolutionary Game Perspective.
IEEE Trans. Reliab., 2021
Performance Analysis for Green Food in Dual-Channel Supply Chain Considering Fairness Concern.
Int. J. Perform. Eng., 2021
Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Modeling and Simulation of Social E-commerce User Behavior based on Social E-commerce Simulator.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2021
Active Disturbance Rejection Control Algorithm of Permanent Magnetic Suspension System **Research supported by ABC Foundation.
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2021
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021
Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2021
2020
Hierarchical Attention and Bilinear Fusion for Remote Sensing Image Scene Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020
An Efficient and Lightweight Convolutional Neural Network for Remote Sensing Image Scene Classification.
Sensors, 2020
ALS Point Cloud Classification With Small Training Data Set Based on Transfer Learning.
IEEE Geosci. Remote. Sens. Lett., 2020
PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing.
Int. J. Intell. Syst., 2020
Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness Concern.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020
Proceedings of the ICRAI 2020: 6th International Conference on Robotics and Artificial Intelligence, 2020
Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020
2019
Effects of Acetone Vapor on the Exciton Band Photoluminescence Emission from Single- and Few-Layer WS<sub>2</sub> on Template-Stripped Gold.
Sensors, 2019
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication.
Comput. Secur., 2019
Research on multi-objective decision-making under cloud platform based on quality function deployment and uncertain linguistic variables.
Adv. Eng. Informatics, 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the Pattern Recognition and Artificial Intelligence, 2019
Haralick Feature Guided Network for the Improvement of Generalization in Landcover Classification.
Proceedings of the Pattern Recognition and Artificial Intelligence, 2019
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Secur. Commun. Networks, 2018
Sparse classification based on dictionary learning for planet bearing fault identification.
Expert Syst. Appl., 2018
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018
Proceedings of the 2018 International Conference on Security, 2018
Proceedings of the 2018 International Conference on Security, 2018
Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm.
Proceedings of the Intelligent Systems Design and Applications, 2018
Hierarchical Building Extraction from High-resolution Remote Sensing Imagery Based on Multi-feature and Multi-scale Method.
Proceedings of the 3rd International Conference on Multimedia and Image Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017
SRTM DEM-Aided Mapping Satellite-1 Image Geopositioning Without Ground Control Points.
IEEE Geosci. Remote. Sens. Lett., 2017
Proceedings of the Knowledge Management in Organizations - 12th International Conference, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Proceedings of the Intelligent Computing Theories and Application, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016
Proceedings of the Pattern Recognition - 7th Chinese Conference, 2016
2015
Secur. Commun. Networks, 2015
Mob. Inf. Syst., 2015
Int. J. Inf. Secur. Priv., 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
2014
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2014
2013
A fast depth-map wedgelet partitioning scheme for intra prediction in 3D video coding.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013
2012
Proceedings of the 19th IEEE International Conference on Image Processing, 2012
2010
An Effective Entity Resolution Method.
Proceedings of The 2010 International Conference on Data Mining, 2010
Proceedings of the British Machine Vision Conference, 2010
2009
A Graph-based Similarity Metric and Validity Indices for Clustering Non-numeric and Unstructured Data.
Proceedings of The 2009 International Conference on Data Mining, 2009
2008
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008
2007
Proceedings of the 3rd workshop on Testing aspect-oriented programs, 2007
Proceedings of the 3rd workshop on Testing aspect-oriented programs, 2007