Fucai Zhou
Orcid: 0000-0001-6054-3523
According to our database1,
Fucai Zhou
authored at least 87 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE.
J. Syst. Archit., 2024
J. Inf. Secur. Appl., 2024
Comput. Commun., 2024
Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems.
Comput. Commun., 2024
Comput. Electr. Eng., 2024
Comput. Electr. Eng., 2024
Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration.
Proceedings of the Data Security and Privacy Protection - Second International Conference, 2024
2023
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT.
Comput. Networks, December, 2023
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system.
J. Syst. Archit., October, 2023
Research on diversity and accuracy of the recommendation system based on multi-objective optimization.
Neural Comput. Appl., March, 2023
Flexible revocation and verifiability for outsourced Private Set Intersection computation.
J. Inf. Secur. Appl., March, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
E2VQ: Enabling Expressive, Efficient, and Verifiable Queries over Blockchain Databases.
Proceedings of the IEEE International Conference on Data Mining, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
MiniYOLO: A lightweight object detection algorithm that realizes the trade-off between model size and detection accuracy.
Int. J. Intell. Syst., December, 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Sensors, 2022
Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT.
J. Inf. Secur. Appl., 2022
Int. J. Intell. Syst., 2022
An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search.
IEEE Access, 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
2021
Sensors, 2021
Secur. Commun. Networks, 2021
Mob. Networks Appl., 2021
J. Inf. Secur. Appl., 2021
Efficient verifiable databases with additional insertion and deletion operations in cloud computing.
Future Gener. Comput. Syst., 2021
Proceedings of the ICMAI 2021: 6th International Conference on Mathematics and Artificial Intelligence, Chengdu, China, March 19, 2021
2020
Wirel. Commun. Mob. Comput., 2020
IEEE Trans. Comput. Soc. Syst., 2020
Outsourced privacy-preserving decision tree classification service over encrypted data.
J. Inf. Secur. Appl., 2020
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system.
Future Gener. Comput. Syst., 2020
Comput. J., 2020
IEEE Access, 2020
IEEE Access, 2020
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Proceedings of the Web Information Systems and Applications, 2020
2019
Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas.
J. Netw. Comput. Appl., 2019
J. Inf. Secur. Appl., 2019
Int. J. Found. Comput. Sci., 2019
Proceedings of the Science of Cyber Security - Second International Conference, 2019
2018
Frontiers Inf. Technol. Electron. Eng., 2018
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Netw. Comput. Appl., 2018
Int. J. Inf. Sec., 2018
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services.
J. Inf. Sci. Eng., 2017
Int. J. Internet Protoc. Technol., 2017
Int. J. Found. Comput. Sci., 2017
IEEE Access, 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2016
计算机科学, 2016
J. Ambient Intell. Humaniz. Comput., 2016
J. Ambient Intell. Humaniz. Comput., 2016
Int. J. Comput. Math., 2016
Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the Provable Security, 2016
Proceedings of the Provable Security, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
Int. J. Comput. Commun. Control, 2015
2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
Proceedings of the Frontiers in Internet Technologies, 2013
2012
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012
2008
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008
2006
Researches on Properties of Generalized Normalization Coefficient in NML Distribution.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006