Lu Zhou

Orcid: 0000-0001-6240-6688

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, Nanjing, China
  • University of Aizu, Division of Computer Science, Japan (former)


According to our database1, Lu Zhou authored at least 75 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks.
IEEE Trans. Ind. Informatics, May, 2024

Voltran: Unlocking Trust and Confidentiality in Decentralized Federated Learning Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024

Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2024

Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices.
IEEE Trans. Inf. Forensics Secur., 2024

Phantom: A CUDA-Accelerated Word-Wise Homomorphic Encryption Library.
IEEE Trans. Dependable Secur. Comput., 2024

A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput., 2024

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024

Multi-way High-Throughput Implementation of Kyber.
Proceedings of the Information Security - 27th International Conference, 2024

Proof of Run: A Fair and Sustainable Blockchain Consensus Protocol Based on Game Theory in DApps.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

Parallel Secure Inference for Multiple Models Based on CKKS.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

ACMDS: An Anonymous Collaborative Medical Data Sharing Scheme Based on Blockchain.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., April, 2023

Privacy-Preserving Classification in Multiple Clouds eHealthcare.
IEEE Trans. Serv. Comput., 2023

VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations.
IEEE Trans. Inf. Forensics Secur., 2023

XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

Implementing and Benchmarking Word-Wise Homomorphic Encryption Schemes on GPU.
IACR Cryptol. ePrint Arch., 2023

Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch., 2023

A blockchain-based security and trust mechanism for AI-enabled IIoT systems.
Future Gener. Comput. Syst., 2023

IMTM: Invisible Multi-trigger Multimodal Backdoor Attack.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Detecting Ethereum Phishing Scams with Temporal Motif Features of Subgraph.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

An Enhanced Privacy-Preserving Hierarchical Federated Learning Framework for IoV.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Sparse Federated Training of Object Detection in the Internet of Vehicles.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Layer Feature Division Transferable Adversarial Attack.
Proceedings of the IEEE International Conference on Acoustics, 2023

Vulnerability Analysis of Continuous Prompts for Pre-trained Language Models.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2023, 2023

Auto-Weighted Multi-View Clustering for Large-Scale Data.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Let the Data Choose: Flexible and Diverse Anchor Graph Fusion for Scalable Multi-View Clustering.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Measurement-Based Optimization of Cell Selection in NB-IoT Networks.
ACM Trans. Sens. Networks, November, 2022

Multi-Connection Based Scalable Video Streaming in UDNs: A Multi-Agent Multi-Armed Bandit Approach.
IEEE Trans. Wirel. Commun., 2022

Age Efficient Optimization in UAV-Aided VEC Network: A Game Theory Viewpoint.
IEEE Trans. Intell. Transp. Syst., 2022

Robust privacy-preserving federated learning framework for IoT devices.
Int. J. Intell. Syst., 2022

An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2022

Privacy Preserving Federated Learning Using CKKS Homomorphic Encryption.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Recovering the Weights of Convolutional Neural Network via Chosen Pixel Horizontal Power Analysis.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

Precise Code Clone Detection with Architecture of Abstract Syntax Trees.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

PromptAttack: Prompt-Based Attack for Language Models via Gradient Search.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

A Deep Looking at the Code Changes in OpenHarmony.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst., 2021

A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021

Fully Discover the Balance of Lightning Network Payment Channels.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control.
Proceedings of the Provable and Practical Security, 2021

Systematic Research on Technology and Challenges of Lightning Network.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

ActAnyware - Blockchain-Based Software Licensing Scheme.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

2020
A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks.
IEEE Trans. Emerg. Top. Comput., 2020

Achieving reliable timestamp in the bitcoin platform.
Peer-to-Peer Netw. Appl., 2020

CsiIBS: A post-quantum identity-based signature scheme based on isogenies.
J. Inf. Secur. Appl., 2020

A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci., 2020

Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J., 2020

DO-RA: Data-oriented runtime attestation for IoT devices.
Comput. Secur., 2020

A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes.
Sci. China Inf. Sci., 2020

Ciphertext-Policy Attribute-Based Encryption with Multi-Keyword Search over Medical Cloud Data.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

2019
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things.
ACM Trans. Embed. Comput. Syst., 2019

Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst., 2019

A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors, 2019

Game theoretic security of quantum bit commitment.
Inf. Sci., 2019

Automatic fine-grained access control in SCADA by machine learning.
Future Gener. Comput. Syst., 2019

Lightweight IoT-based authentication scheme in cloud computing circumstance.
Future Gener. Comput. Syst., 2019

Security analysis and new models on the intelligent symmetric key encryption.
Comput. Secur., 2019

A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.
IEEE Access, 2019

A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
Proceedings of the 2019 International Workshop on Secure Internet of Things, 2019

2018
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018

Quantum technique for access control in cloud computing II: Encryption and key distribution.
J. Netw. Comput. Appl., 2018

Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst., 2018

Towards practical white-box lightweight block cipher implementations for IoTs.
Future Gener. Comput. Syst., 2018

Stag hunt and trust emergence in social networks.
Future Gener. Comput. Syst., 2018

Position based cryptography with location privacy: A step for Fog Computing.
Future Gener. Comput. Syst., 2018

I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics.
IEEE Commun. Mag., 2018

2017
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017

2016
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Parallel Implementations of LEA, Revisited.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

2015
Faster ECC over F<sub>2<sup>521</sup>-1</sub> (feat. NEON).
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015


  Loading...