Dehua Zhou
Orcid: 0000-0003-4256-4528
According to our database1,
Dehua Zhou
authored at least 25 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Frontiers Comput. Sci., February, 2025
Advancing explainability of adversarial trained Convolutional Neural Networks for robust engineering applications.
Eng. Appl. Artif. Intell., 2025
2024
VSAFL: Verifiable and Secure Aggregation With (Poly) Logarithmic Overhead in Federated Learning.
IEEE Internet Things J., December, 2024
Cryptogr., September, 2024
J. Syst. Archit., January, 2024
2023
Multi-authority anonymous authentication with public accountability for incentive-based applications.
Comput. Networks, July, 2023
How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Future Internet, June, 2023
EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy.
Sensors, 2023
2022
Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022
Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing.
IEEE Trans. Serv. Comput., 2022
Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance.
Inf. Sci., 2022
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Proceedings of the 33rd International Symposium on Algorithms and Computation, 2022
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
HEND-FL: Accurate Federated Learning Using Homomorphic Encryption and a New Distributed Protocol.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022
2020
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
2019
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018
2017
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
Int. J. Wavelets Multiresolution Inf. Process., 2016
2014
Unforgeability of an improved certificateless signature scheme in the standard model.
IET Inf. Secur., 2014
Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014
2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005