Zechao Liu

Orcid: 0000-0002-9350-5168

According to our database1, Zechao Liu authored at least 38 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT.
Frontiers Comput. Sci., June, 2024

Reinforcement learning with time intervals for temporal knowledge graph reasoning.
Inf. Syst., February, 2024

Learning to walk with logical embedding for knowledge reasoning.
Inf. Sci., 2024

A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm.
Comput. Commun., 2024

Imprecise Deep Networks for Uncertain Image Classification.
Proceedings of the Belief Functions: Theory and Applications, 2024

2023
Deep Hyperspherical Clustering for Skin Lesion Medical Image Segmentation.
IEEE J. Biomed. Health Informatics, August, 2023

Mining and reasoning of data uncertainty-induced imprecision in deep image classification.
Inf. Fusion, August, 2023

PTKE: Translation-based temporal knowledge graph embedding in polar coordinate system.
Neurocomputing, April, 2023

Attribution rollout: a new way to interpret visual transformer.
J. Ambient Intell. Humaniz. Comput., 2023

Intelligent agents path planning in wireless sensor networks based on Vor-PSO algorithm.
Int. J. Bio Inspired Comput., 2023

Gradient-free adversarial attack algorithm based on differential evolution.
Int. J. Bio Inspired Comput., 2023

2022
Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing.
J. Inf. Secur. Appl., 2022

Intrusion Detection Method Based on Improved Sparrow Algorithm and Optimized SVM.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Feature Selection of Intrusion Detection Method Based on Improved GWO.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Multi-Authority Criteria-Based Encryption Scheme for IoT.
Secur. Commun. Networks, 2021

Nowhere to Hide: A Novel Private Protocol Identification Algorithm.
Secur. Commun. Networks, 2021

ATFE: A Two-dimensional Feature Encoding-based Sentence-level Attention Model for Distant Supervised Relation Extraction.
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

Practical Multi-Authority Ciphertext Policy Attribute-Based Encryption from R-LWE.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Model guided DLP 3D printing for solid and hollow structure.
Proceedings of the 14th International Conference on Human System Interaction, 2021

2020
Multi-objective Informative Frequency Band Selection Based on Negentropy-induced Grey Wolf Optimizer for Fault Diagnosis of Rolling Element Bearings.
Sensors, 2020

Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020

A new incomplete pattern belief classification method with multiple estimations based on KNN.
Appl. Soft Comput., 2020

2019
Graph-based supervised discrete image hashing.
J. Vis. Commun. Image Represent., 2019

Multi-directional 3D Printing with Strength Retention.
Proceedings of the SIGGRAPH Asia 2019 Posters, 2019

Processing private queries based on distributed storage in location-based services.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Practical attribute-based encryption: Outsourcing decryption, attribute revocation and policy updating.
J. Netw. Comput. Appl., 2018

A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Global-optimization-based model decomposition for support-free multi-DOF 3D printing.
Proceedings of the SIGGRAPH Asia 2018 Posters, Tokyo, Japan, December 04-07, 2018, 2018

Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Offline/online attribute-based encryption with verifiable outsourced decryption.
Concurr. Comput. Pract. Exp., 2017

A Traceable Outsourcing CP-ABE Scheme with Attribute Revocation.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

White-box traceable dynamic attribute based encryption.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Lattice-based proxy signature scheme with reject sampling method.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

Attribute-based queries over outsourced encrypted database.
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017

2016
Dynamic Attribute-Based Access Control in Cloud Storage Systems.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Revocable Outsourcing Attribute-Based Encryption Scheme.
Proceedings of the Cloud Computing, Security, Privacy in New Computing Environments, 2016

2015
Outsourcing Two-Party Privacy Preserving K-Means Clustering Protocol in Wireless Sensor Networks.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015


  Loading...