Shijie Zhou
Orcid: 0000-0001-8314-754XAffiliations:
- University of Electronic Science and Technology of China, UESTC, School of Information and Software Engineering, Chengdu, Sichuan, China (PhD 2004)
According to our database1,
Shijie Zhou
authored at least 86 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing.
Future Gener. Comput. Syst., 2025
2024
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis.
Concurr. Comput. Pract. Exp., November, 2024
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System.
IEEE Internet Things J., September, 2024
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS.
IEEE Trans. Intell. Transp. Syst., July, 2024
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl., 2024
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT.
Internet Things, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
2023
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023
Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE).
J. Inf. Secur. Appl., May, 2023
Symmetry, March, 2023
Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023
Proceedings of the 7th International Conference on Algorithms, Computing and Systems, 2023
2022
Remote. Sens., 2022
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022
SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment.
IEEE Internet Things J., 2022
Adversarial attack and defense technologies in natural language processing: A survey.
Neurocomputing, 2022
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022
Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021
Learning Syllables Using Conv-LSTM Model for Swahili Word Representation and Part-of-speech Tagging.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions.
J. Inf. Secur. Appl., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Sector Error-Oriented Durability-Aware Fast Repair in Erasure-Coded Cloud Storage Systems.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021
A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service.
Proceedings of the IEEE Intl Conf on Dependable, 2021
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020
Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification.
Mob. Inf. Syst., 2020
Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms.
Comput. Networks, 2020
IEEE Access, 2020
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020
Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
2019
IEEE Internet Things J., 2019
IEEE Access, 2019
An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection.
IEEE Access, 2019
IEEE Access, 2019
IEEE Access, 2019
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019
Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics.
Proceedings of the 8th International Conference on Networks, Communication and Computing, 2019
2018
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018
IEEE Access, 2018
2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017
2016
Int. J. Embed. Syst., 2016
An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation.
Proceedings of the Conceptual Modeling - 35th International Conference, 2016
2015
The B<sup>+</sup>-tree-based method for nearest neighbour queries in traffic simulation systems.
Int. J. High Perform. Comput. Netw., 2015
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
2014
Int. J. Ad Hoc Ubiquitous Comput., 2014
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
J. Parallel Distributed Comput., 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013
2012
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
2010
Proceedings of the 18th International Workshop on Quality of Service, 2010
2009
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007
2006
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2004
Proceedings of the Grid and Cooperative Computing, 2004
2003
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003