Shijie Zhou

Orcid: 0000-0001-8314-754X

Affiliations:
  • University of Electronic Science and Technology of China, UESTC, School of Information and Software Engineering, Chengdu, Sichuan, China (PhD 2004)


According to our database1, Shijie Zhou authored at least 86 papers between 2003 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Auditing privacy budget of differentially private neural network models.
Neurocomputing, 2025

Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing.
Future Gener. Comput. Syst., 2025

2024
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis.
Concurr. Comput. Pract. Exp., November, 2024

An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System.
IEEE Internet Things J., September, 2024

A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS.
IEEE Trans. Intell. Transp. Syst., July, 2024

A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024

A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application.
J. Inf. Secur. Appl., 2024

Enhanced privacy-preserving distributed deep learning with application to fog-based IoT.
Internet Things, 2024

Towards a Novel Perspective on Adversarial Examples Driven by Frequency.
CoRR, 2024

Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks.
Proceedings of the Computer Vision - ECCV 2024, 2024

2023
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023

Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE).
J. Inf. Secur. Appl., May, 2023

Local Cluster-Aware Attention for Non-Euclidean Structure Data.
Symmetry, March, 2023

Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023

Mobile Payment Protocol with Deniably Authenticated Property.
Sensors, 2023

Preprocessing-based Adversarial Defense for Object Detection via Feature Filtration.
Proceedings of the 7th International Conference on Algorithms, Computing and Systems, 2023

2022
A High-Utility Differentially Private Mechanism for Space Information Networks.
Remote. Sens., 2022

A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022

Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022

SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment.
IEEE Internet Things J., 2022

Adversarial attack and defense technologies in natural language processing: A survey.
Neurocomputing, 2022

An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022

Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021

Learning Syllables Using Conv-LSTM Model for Swahili Word Representation and Part-of-speech Tagging.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions.
J. Inf. Secur. Appl., 2021

GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Sector Error-Oriented Durability-Aware Fast Repair in Erasure-Coded Cloud Storage Systems.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Improving the Number of Queries Supported by Differentially Private Mechanisms.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020

Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification.
Mob. Inf. Syst., 2020

the Connection between Cryptography and Differential Privacy: a Survey.
CoRR, 2020

Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms.
Comput. Networks, 2020

Unknown Attack Detection Based on Zero-Shot Learning.
IEEE Access, 2020

Erasure Coding-Oriented Data Update for Cloud Storage: A Survey.
IEEE Access, 2020

Dynamic Path Planning Based on Improved Ant Colony Algorithm in Traffic Congestion.
IEEE Access, 2020

Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020

Improving Laplace Mechanism of Differential Privacy by Personalized Sampling.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

2019
An Efficient Differential Privacy Logistic Classification Mechanism.
IEEE Internet Things J., 2019

Expansion of Cluster Head Stability Using Fuzzy in Cognitive Radio CR-VANET.
IEEE Access, 2019

Insecurity of an IBEET Scheme and an ABEET Scheme.
IEEE Access, 2019

An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection.
IEEE Access, 2019

Optimizing Query Times for Multiple Users Scenario of Differential Privacy.
IEEE Access, 2019

An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection.
IEEE Access, 2019

Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019

Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics.
Proceedings of the 8th International Conference on Networks, Communication and Computing, 2019

2018
Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Sensors, 2018

Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test.
IEEE Access, 2018

2017
An Anti-collision Algorithm Based on Task Scheduling Model in RFID System.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Gas Sensor Drift Compensation by an Optimal Linear Transformation.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Explore city dynamics from the communication network between base stations.
Int. J. Embed. Syst., 2016

An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation.
Proceedings of the Conceptual Modeling - 35th International Conference, 2016

2015
A Survey on Fast-flux Attacks.
Inf. Secur. J. A Glob. Perspect., 2015

The B<sup>+</sup>-tree-based method for nearest neighbour queries in traffic simulation systems.
Int. J. High Perform. Comput. Netw., 2015

The Design and Implementation of A Cost-effective RFID Indoor Localization System.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
A general approach for the intensive RFID reader deployment.
Int. J. Ad Hoc Ubiquitous Comput., 2014

The adjacent Vehicles Query Algorithm of Microscopic Traffic Simulation.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2013
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distributed Syst., 2013

A bottom-up model for heterogeneous BitTorrent systems.
J. Parallel Distributed Comput., 2013

A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

ARNS: Adaptive RFID Network Scheduling for Device-Free Tracking.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
Formal Verification of Communicating HSTM Designs.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Detecting Malware Variants by Byte Frequency.
J. Networks, 2011

2010
A clone of social networks to decentralized bootstrapping P2P networks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

2009
A Comment to the Intelligent Functions of Different Weight Ciphers.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

An Identity-Based Restricted Deniable Authentication Protocol.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2008
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Deniable Proxy-Anonymous Signatures.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

2006
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Interconnected Peer-to-Peer Network: A Community Based Scheme.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2004
Policy-Tree Based Proactive Defense Model for Network Security.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Colored Petri Net Based Attack Modeling.
Proceedings of the Rough Sets, 2003

Distributing the Keys into P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...