Zhuzhu Wang

Orcid: 0000-0001-6534-198X

According to our database1, Zhuzhu Wang authored at least 27 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Adaptive Robust Learning Against Backdoor Attacks in Smart Homes.
IEEE Internet Things J., July, 2024

2023
Outsourced Privacy-Preserving Data Alignment on Vertically Partitioned Database.
IEEE Trans. Big Data, October, 2023

Sonicverse: A Multisensory Simulation Platform for Embodied Household Agents that See and Hear.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

NLP-based Cross-Layer 5G Vulnerabilities Detection via Fuzzing Generated Run-Time Profiling.
Proceedings of the 12th IEEE International Conference on Cloud Networking, 2023

2022
A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box.
IEEE Trans. Ind. Informatics, 2022

Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces.
Int. J. Intell. Syst., 2022

A certificateless authentication scheme with fuzzy batch verification for federated UAV network.
Int. J. Intell. Syst., 2022

Contextualize differential privacy in image database: a lightweight image differential privacy approach based on principle component analysis inverse.
CoRR, 2022

SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Controlling Neural Learning Network with Multiple Scales for Image Splicing Forgery Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021

A Decentralized Location Privacy-Preserving Spatial Crowdsourcing for Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

An approach of covert communication based on the Ethereum whisper protocol in blockchain.
Int. J. Intell. Syst., 2021

2020
A machine learning-based scheme for the security analysis of authentication and key agreement protocols.
Neural Comput. Appl., 2020

BTNC: A blockchain based trusted network connection protocol in IoT.
J. Parallel Distributed Comput., 2020

Privacy-preserving federated <i>k</i>-means for proactive caching in next generation cellular networks.
Inf. Sci., 2020

LiPSG: Lightweight Privacy-Preserving Q-Learning-Based Energy Management for the IoT-Enabled Smart Grid.
IEEE Internet Things J., 2020

Cloud-based Federated Boosting for Mobile Crowdsensing.
CoRR, 2020

Droidetec: Android Malware Detection and Malicious Code Localization through Deep Learning.
CoRR, 2020

A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS.
Proceedings of the Security and Privacy in Digital Economy, 2020

PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

2019
Revocable Federated Learning: A Benchmark of Federated Forest.
CoRR, 2019

Texture-and-Shape Based Active Contour Model for Insulator Segmentation.
IEEE Access, 2019

Running State Prediction and Evaluation of Power Transformers.
Proceedings of the 4th IEEE International Conference on Advanced Robotics and Mechatronics, 2019

2018
Integrating Gaze Tracking and Head-Motion Prediction for Mobile Device Authentication: A Proof of Concept.
Sensors, 2018

2016
Practice and Prospect Analysis of Blended Learning in Primary and Middle Schools in China.
Proceedings of the Blended Learning: Aligning Theory with Practices, 2016

2010
Chinese Schools Modern Distance Education Project in Rural Areas.
Br. J. Educ. Technol., 2010

Capability building in educational technology for teachers in China.
Br. J. Educ. Technol., 2010


  Loading...