Conghua Zhou

Orcid: 0000-0001-6727-6405

According to our database1, Conghua Zhou authored at least 28 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Temporal dual-target cross-domain recommendation framework for next basket recommendation.
Discov. Comput., December, 2024

Federated Learning Approach for Secured Medical Recommendation in Internet of Medical Things Using Homomorphic Encryption.
IEEE J. Biomed. Health Informatics, June, 2024

2023
Blockchain-Enabled Technique for Privacy- Preserved Medical Recommender System.
IEEE Access, 2023

2022
Personalized Relationships-Based Knowledge Graph for Recommender Systems with Dual-View Items.
Symmetry, November, 2022

A heterogeneous couplings and persuasive user/item information model for Next Basket recommendation.
Eng. Appl. Artif. Intell., 2022

A Systematic Review of Deep Knowledge Graph-Based Recommender Systems, with Focus on Explainable Embeddings.
Data, 2022

Deep Reinforcement Learning for Video Summarization with Semantic Reward.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2021
A Novel Hierarchical Deep Matrix Completion Method.
IEEE Access, 2021

2019
An improved learning algorithm for random neural networks based on particle swarm optimization and input-to-output sensitivity.
Cogn. Syst. Res., 2019

2018
一种基于始末距离的时间序列符号聚合近似表示方法 (Symbolic Aggregate Approximation Method of Time Series Based on Beginning and End Distance).
计算机科学, 2018

2017
一种多种攻击并发下的WSN生存性评估模型 (Survivability Evaluation Model for Wireless Sensor Network under Multiple Attacks).
计算机科学, 2017

2016
车载网中可抵制合谋攻击的批量认证方案 (Batch Verification Scheme Defensing Collusive Attack in VANET).
计算机科学, 2016

Testing access control policy through Change Rule and Swap Rule Algorithm (CRSR).
J. Inf. Secur. Appl., 2016

2015
Formal Analysis of MAC in IEEE 802.11p with Probabilistic Model Checking.
Proceedings of the 2015 International Symposium on Theoretical Aspects of Software Engineering, 2015

2013
A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2012
Abstraction In Model Checking Real-Time Temporal Logic of Knowledge.
J. Comput., 2012

Symbolic algorithmic verification of intransitive generalized noninterference.
Sci. China Inf. Sci., 2012

2011
SAT-based Algorithmic Verification of Noninterference.
J. Comput., 2011

Abstraction for model checking multi-agent systems.
Frontiers Comput. Sci. China, 2011

2010
Information Flow Graph: An Approach to Identifying Covert Storage Channels.
Proceedings of the Trusted Systems - Second International Conference, 2010

Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge.
Proceedings of the Artificial Intelligence and Computational Intelligence, 2010

2009
State Space Reduction for Verifying Noninterference.
Proceedings of the Third IEEE International Conference on Secure Software Integration and Reliability Improvement, 2009

2007
Bounded Model Checking of CTL.
J. Comput. Sci. Technol., 2007

QBF-Based Symbolic Model Checking for Knowledge and Time.
Proceedings of the Theory and Applications of Models of Computation, 2007

SAT-based Bounded Model Checking for SE-LTL.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A compositional symbolic verification framework for concurrent software.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

2006
Improved SAT Based Bounded Model Checking.
Proceedings of the Theory and Applications of Models of Computation, 2006

2005
Automatic abstraction refinement for Petri nets verification.
Proceedings of the Tenth IEEE International High-Level Design Validation and Test Workshop 2005, Napa Valley, CA, USA, November 30, 2005


  Loading...