Lu Zhou
Orcid: 0000-0001-6240-6688Affiliations:
- Nanjing University of Aeronautics and Astronautics, Nanjing, China
- University of Aizu, Division of Computer Science, Japan (former)
According to our database1,
Lu Zhou
authored at least 75 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks.
IEEE Trans. Ind. Informatics, May, 2024
Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024
Proceedings of the Information Security - 27th International Conference, 2024
Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024
2023
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023
IEEE Trans. Serv. Comput., 2023
VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations.
IEEE Trans. Inf. Forensics Secur., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch., 2023
Future Gener. Comput. Syst., 2023
Proceedings of the Natural Language Processing and Chinese Computing, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
Let the Data Choose: Flexible and Diverse Anchor Graph Fusion for Scalable Multi-View Clustering.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
ACM Trans. Sens. Networks, November, 2022
Multi-Connection Based Scalable Video Streaming in UDNs: A Multi-Agent Multi-Armed Bandit Approach.
IEEE Trans. Wirel. Commun., 2022
IEEE Trans. Intell. Transp. Syst., 2022
Int. J. Intell. Syst., 2022
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022
Proceedings of the Natural Language Processing and Chinese Computing, 2022
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Provable and Practical Security, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021
2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks.
IEEE Trans. Emerg. Top. Comput., 2020
J. Inf. Secur. Appl., 2020
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020
Sci. China Inf. Sci., 2020
Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
2019
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things.
ACM Trans. Embed. Comput. Syst., 2019
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst., 2019
A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Comput. Secur., 2019
IEEE Access, 2019
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019
2018
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018
Quantum technique for access control in cloud computing II: Encryption and key distribution.
J. Netw. Comput. Appl., 2018
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
IEEE Commun. Mag., 2018
2017
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017
2016
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015