Chuan Zhao

Orcid: 0000-0001-9106-6010

According to our database1, Chuan Zhao authored at least 101 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multimodal Virtual Semantic Communication for Tiny-Machine-Learning-Based UAV Task Execution.
IEEE Internet Things J., October, 2024

Trajectory Planning, Phase Shift Design, and IoT Devices Association in Flying-RIS-Assisted Mobile Edge Computing.
IEEE Internet Things J., January, 2024

CD-BTMSE: A Concept Drift detection model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble learning.
Knowl. Based Syst., 2024

Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism.
Comput. Secur., 2024

2023
Current control process for adaptive and dexterous underactuated fingers.
Dataset, September, 2023

Hand Posture and Force Estimation Using Surface Electromyography and an Artificial Neural Network.
Hum. Factors, May, 2023

An Anchor-Free and Angle-Free Detector for Oriented Object Detection Using Bounding Box Projection.
IEEE Trans. Geosci. Remote. Sens., 2023

Practical Single-Round Secure Wildcard Pattern Matching.
Proceedings of the ICT Systems Security and Privacy Protection, 2023

Crossfire Attack Defense Method Based on Virtual Topology.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023

Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
Proceedings of the IEEE International Conference on Communications, 2023

Adversarial Attack with Genetic Algorithm against IoT Malware Detectors.
Proceedings of the IEEE International Conference on Communications, 2023

Application of case-based PBL teaching method in the teaching of Network and Service Engineering.
Proceedings of the 6th International Conference on Big Data and Education, 2023

Improved Canny Edge Detection Algorithm for Noisy Images.
Proceedings of the 4th International Conference on Artificial Intelligence and Computer Engineering, 2023

Anti-DDoS Attacks Strategy of SDN Data Plane with Data Augmentation Based on P4.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Survey of SDN Data Plane Attacks and Defense Strategies.
Proceedings of the 2nd International Conference on Networks, 2023

A General Federated Learning Scheme with Blockchain on Non-IID Data.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

Overcoming Noisy Labels in Federated Learning Through Local Self-Guiding.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

Link load balancing scheme for elephant flow in SDN data center.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Design of Zero-Power Control Strategy With Resisting Tilt of Hybrid Magnetic Levitation System.
IEEE Trans. Ind. Electron., 2022

Generating Daily Soil Moisture at 16 m Spatial Resolution Using a Spatiotemporal Fusion Model and Modified Perpendicular Drought Index.
Sensors, 2022

Dynamic interactive control of inventory in a dual-channel supply chain under stochastic demand: Modelling and empirical studies.
J. Oper. Res. Soc., 2022

Privacy-enhancing machine learning framework with private aggregation of teacher ensembles.
Int. J. Intell. Syst., 2022

Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption.
Int. J. Intell. Syst., 2022

Mining Function Homology of Bot Loaders from Honeypot Logs.
CoRR, 2022

Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction.
Connect. Sci., 2022

Deep learning for full-feature X-ray microcomputed tomography segmentation of proton electron membrane fuel cells.
Comput. Chem. Eng., 2022

Underactuated Three-finger Dexterous Hand in High Altitude and Extreme Environments.
Proceedings of the IEEE International Conference on Real-time Computing and Robotics, 2022

Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map Computing.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Overview of DDoS Attack Research Under SDN.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Multiscenario Analyses Between Front and Back End Investment in Software Reliability: An Evolutionary Game Perspective.
IEEE Trans. Reliab., 2021

Performance Analysis for Green Food in Dual-Channel Supply Chain Considering Fairness Concern.
Int. J. Perform. Eng., 2021

Effective detection of mobile malware behavior based on explainable deep neural network.
Neurocomputing, 2021

AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Modeling and Simulation of Social E-commerce User Behavior based on Social E-commerce Simulator.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Energy-saving Control Method of Permanent Magnetic Suspension System.
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2021

Active Disturbance Rejection Control Algorithm of Permanent Magnetic Suspension System **Research supported by ABC Foundation.
Proceedings of the IEEE International Conference on Intelligence and Safety for Robotics, 2021

IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

An Automatic Approach to Extracting Requirement Dependencies based on Semantic Web.
Proceedings of the 8th International Conference on Dependable Systems and Their Applications, 2021

Efficient Federated Learning Framework Based on Multi-Key Homomorphic Encryption.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2021

2020
Hierarchical Attention and Bilinear Fusion for Remote Sensing Image Scene Classification.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2020

An Efficient and Lightweight Convolutional Neural Network for Remote Sensing Image Scene Classification.
Sensors, 2020

ALS Point Cloud Classification With Small Training Data Set Based on Transfer Learning.
IEEE Geosci. Remote. Sens. Lett., 2020

Oblivious DFA evaluation on joint input and its applications.
Inf. Sci., 2020

PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing.
Int. J. Intell. Syst., 2020

Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness Concern.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Towards Privacy-Preserving Aggregated Prediction from SPDZ.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

An Overview of Crowd Counting on Traditional and CNN-based Approaches.
Proceedings of the ICRAI 2020: 6th International Conference on Robotics and Artificial Intelligence, 2020

Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

Towards Privacy-Preserving Deep Learning: Opportunities and Challenges.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

2019
Effects of Acetone Vapor on the Exciton Band Photoluminescence Emission from Single- and Few-Layer WS<sub>2</sub> on Template-Stripped Gold.
Sensors, 2019

Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial.
J. Netw. Comput. Appl., 2019

Secure Multi-Party Computation: Theory, practice and applications.
Inf. Sci., 2019

Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication.
Comput. Secur., 2019

Research on multi-objective decision-making under cloud platform based on quality function deployment and uncertain linguistic variables.
Adv. Eng. Informatics, 2019

A Signature-Based Assistant Random Oversampling Method for Malware Detection.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Exploring Model Transfer Potential for Airborne LiDAR Point Cloud Classification.
Proceedings of the Pattern Recognition and Artificial Intelligence, 2019

Haralick Feature Guided Network for the Improvement of Generalization in Landcover Classification.
Proceedings of the Pattern Recognition and Artificial Intelligence, 2019

DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018

An Efficient Certificateless Generalized Signcryption Scheme.
Secur. Commun. Networks, 2018

BPMN 2.0过程模型的语义和分析 (Semantics and Analysis of BPMN 2.0 Process Models).
计算机科学, 2018

Sparse classification based on dictionary learning for planet bearing fault identification.
Expert Syst. Appl., 2018

Secure Comparison Under Ideal/Real Simulation Paradigm.
IEEE Access, 2018

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018

Neural Network Rule Extraction for Real Time Traffic Behavior Identification.
Proceedings of the 2018 International Conference on Security, 2018

TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline.
Proceedings of the 2018 International Conference on Security, 2018

Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm.
Proceedings of the Intelligent Systems Design and Applications, 2018

Hierarchical Building Extraction from High-resolution Remote Sensing Imagery Based on Multi-feature and Multi-scale Method.
Proceedings of the 3rd International Conference on Multimedia and Image Processing, 2018

A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing.
Soft Comput., 2017

SRTM DEM-Aided Mapping Satellite-1 Image Geopositioning Without Ground Control Points.
IEEE Geosci. Remote. Sens. Lett., 2017

Education Intelligence Should Be the Breakthrough in Intelligence Science.
Proceedings of the Knowledge Management in Organizations - 12th International Conference, 2017

TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Android Malware Clustering Analysis on Network-Level Behavior.
Proceedings of the Intelligent Computing Theories and Application, 2017

Finding Android Malware Trace from Highly Imbalanced Network Traffic.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Practical Server-Aided k-out-of-n Oblivious Transfer Protocol.
Proceedings of the Green, Pervasive, and Cloud Computing - 11th International Conference, 2016

Hierarchical Image Matching Method Based on Free-Form Linear Features.
Proceedings of the Pattern Recognition - 7th Chinese Conference, 2016

2015
Fair two-party computation with rational parties holding private types.
Secur. Commun. Networks, 2015

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks.
Mob. Inf. Syst., 2015

Several Oblivious Transfer Variants in Cut-and-Choose Scenario.
Int. J. Inf. Secur. Priv., 2015

Cut-and-Choose Bilateral Oblivious Transfer and Its Application.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation.
IACR Cryptol. ePrint Arch., 2014

2013
A fast depth-map wedgelet partitioning scheme for intra prediction in 3D video coding.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

Identity-Based Authenticate Key Exchange Protocol from Lattice.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security.
Proceedings of the Ninth International Conference on Computational Intelligence and Security, 2013

2012
Cognitive visual tracking and camera control.
Comput. Vis. Image Underst., 2012

An adaptive fast intra mode decision in HEVC.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

2010
An Effective Entity Resolution Method.
Proceedings of The 2010 International Conference on Data Mining, 2010

Mean-Shift Visual Tracking with NP-Windows Density Estimates.
Proceedings of the British Machine Vision Conference, 2010

2009
A Graph-based Similarity Metric and Validity Indices for Clustering Non-numeric and Unstructured Data.
Proceedings of The 2009 International Conference on Data Mining, 2009

2008
Target tracking using mean-shift and affine structure.
Proceedings of the 19th International Conference on Pattern Recognition (ICPR 2008), 2008

2007
Testing aspect-oriented programs as object-oriented programs.
Proceedings of the 3rd workshop on Testing aspect-oriented programs, 2007

Testing AspectJ programs using fault-based testing.
Proceedings of the 3rd workshop on Testing aspect-oriented programs, 2007


  Loading...