Fucai Zhou

Orcid: 0000-0001-6054-3523

According to our database1, Fucai Zhou authored at least 87 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR.
Comput. Stand. Interfaces, 2025

2024
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE.
J. Syst. Archit., 2024

Privacy-preserving geo-tagged image search in edge-cloud computing for IoT.
J. Inf. Secur. Appl., 2024

Privacy-preserving and verifiable data aggregation for Internet of Vehicles.
Comput. Commun., 2024

Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems.
Comput. Commun., 2024

Privacy-Preserving Image Retrieval with Multi-Modal Query.
Comput. J., 2024

Multi-user privacy-preserving image search in distributed cloud computing.
Comput. Electr. Eng., 2024

Efficient private information retrievals for IoT data based on bucket tree.
Comput. Electr. Eng., 2024

Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024

2023
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT.
Comput. Networks, December, 2023

Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system.
J. Syst. Archit., October, 2023

Research on diversity and accuracy of the recommendation system based on multi-objective optimization.
Neural Comput. Appl., March, 2023

Flexible revocation and verifiability for outsourced Private Set Intersection computation.
J. Inf. Secur. Appl., March, 2023

Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

E2VQ: Enabling Expressive, Efficient, and Verifiable Queries over Blockchain Databases.
Proceedings of the IEEE International Conference on Data Mining, 2023

SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggregate Query.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
MiniYOLO: A lightweight object detection algorithm that realizes the trade-off between model size and detection accuracy.
Int. J. Intell. Syst., December, 2022

Privacy-Preserving Publicly Verifiable Databases.
IEEE Trans. Dependable Secur. Comput., 2022

Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets.
IEEE Trans. Cloud Comput., 2022

RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing.
Sensors, 2022

Efficient Aggregate Queries on Location Data with Confidentiality.
Sensors, 2022

Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT.
J. Inf. Secur. Appl., 2022

Privacy-preserving image retrieval in a distributed environment.
Int. J. Intell. Syst., 2022

An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search.
IEEE Access, 2022

VSES-MB: Verifiable Searchable Encryption Scheme in Metaverse by Blockchain.
Proceedings of the IEEE Smartworld, 2022

Secure Distributed Outsourcing of Large-scale Linear Systems.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Privacy-Enhancing k-Nearest Neighbors Search over Mobile Social Networks.
Sensors, 2021

A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks.
Secur. Commun. Networks, 2021

Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem.
Mob. Networks Appl., 2021

Distributed secret sharing scheme based on the high-dimensional rotation paraboloid.
J. Inf. Secur. Appl., 2021

Efficient verifiable databases with additional insertion and deletion operations in cloud computing.
Future Gener. Comput. Syst., 2021

Social Event Recommendation Based on Social Relationship and Attention Mechanism.
Proceedings of the ICMAI 2021: 6th International Conference on Mathematics and Artificial Intelligence, Chengdu, China, March 19, 2021

2020
Privacy-Preserving Graph Operations for Mobile Authentication.
Wirel. Commun. Mob. Comput., 2020

SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing.
IEEE Trans. Comput. Soc. Syst., 2020

Chameleon accumulator and its applications.
J. Inf. Secur. Appl., 2020

Outsourced privacy-preserving decision tree classification service over encrypted data.
J. Inf. Secur. Appl., 2020

Generating universal adversarial perturbation with ResNet.
Inf. Sci., 2020

Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system.
Future Gener. Comput. Syst., 2020

Graph encryption for all-path queries.
Concurr. Comput. Pract. Exp., 2020

A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications.
Comput. J., 2020

Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications.
IEEE Access, 2020

Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data.
IEEE Access, 2020

An Efficient Two-Server Ranked Dynamic Searchable Encryption Scheme.
IEEE Access, 2020

PPFQ: Privacy-Preserving Friends Query over Online Social Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Privacy-Preserving Graph Operations for Social Network Analysis.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Evolutionary-Based Image Encryption with DNA Coding and Chaotic Systems.
Proceedings of the Web Information Systems and Applications, 2020

2019
Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas.
J. Netw. Comput. Appl., 2019

Secure data stream outsourcing with publicly verifiable integrity in cloud storage.
J. Inf. Secur. Appl., 2019

Privacy-Preserving Subgraph Matching Protocol for Two Parties.
Int. J. Found. Comput. Sci., 2019

Publicly verifiable function secret sharing.
Int. J. Comput. Sci. Eng., 2019

Lightweight Privacy-Preserving Equality Query in Edge Computing.
IEEE Access, 2019

PAFR: Privacy-Aware Friends Retrieval over Online Social Networks.
Proceedings of the Science of Cyber Security - Second International Conference, 2019

2018
Faster fog-aided private set intersectionwith integrity preserving.
Frontiers Inf. Technol. Electron. Eng., 2018

Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Netw. Comput. Appl., 2018

Integrity-verifiable conjunctive keyword searchable encryption in cloud storage.
Int. J. Inf. Sec., 2018

An Effective Multi-classification Method for NHL Pathological Images.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Verifiable Outsourced Computation with Full Delegation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services.
J. Inf. Sci. Eng., 2017

Enhanced security model and efficient construction for direct anonymous attestation.
Int. J. Internet Protoc. Technol., 2017

Identity-Based Batch Provable Data Possession with Detailed Analyses.
Int. J. Found. Comput. Sci., 2017

Dynamic Chameleon Authentication Tree for Verifiable Data Streaming in 5G Networks.
IEEE Access, 2017

Secure Collaborative Publicly Verifiable Computation.
IEEE Access, 2017

Identity-Based Public Multi-Replica Provable Data Possession.
IEEE Access, 2017

Private Subgraph Matching Protocol.
Proceedings of the Provable Security, 2017

Semi-Supervised Learning Based Fake Review Detection.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Private Graph Intersection Protocol.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2016

基于用户鼠标行为的身份认证方法 (Identity Authentication Method Based on User's Mouse Behavior).
计算机科学, 2016

Dynamic proofs of retrievability with square-root oblivious RAM.
J. Ambient Intell. Humaniz. Comput., 2016

Anomaly detection model of user behavior based on principal component analysis.
J. Ambient Intell. Humaniz. Comput., 2016

The electronic cash system based on non-interactive zero-knowledge proofs.
Int. J. Comput. Math., 2016

Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2016

Identity-Based Batch Provable Data Possession.
Proceedings of the Provable Security, 2016

Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing.
Proceedings of the Provable Security, 2016

2015
Efficient Anonymous Broadcast Encryption with Adaptive Security.
KSII Trans. Internet Inf. Syst., 2015

Group Pattern Mining on Moving Objects' Uncertain Trajectories.
Int. J. Comput. Commun. Control, 2015

2014
An Improved Authenticated Skip List for Relational Query Authentication.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
The Electronic Cash Protocol Based on Dynamic Group Signature.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation.
Proceedings of the Frontiers in Internet Technologies, 2013

2012
An Efficient Property-Based Attestation Scheme with Flexible Revocation Mechanisms.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

2008
Research on anonymous signatures and group signatures.
Comput. Commun., 2008

Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

Hierarchical Data Processing Model and Complete Tree Key Management Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Multicast Key Management Scheme Based on TOFT.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

2006
Researches on Properties of Generalized Normalization Coefficient in NML Distribution.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006


  Loading...