default search action
Shijie Zhou 0002
Person information
- affiliation (PhD 2004): University of Electronic Science and Technology of China, UESTC, School of Information and Software Engineering, Chengdu, Sichuan, China
Other persons with the same name
- Shijie Zhou (aka: Zhou Shijie) — disambiguation page
- Shijie Zhou 0001 — Microsoft Corporation, Redmond, USA (and 1 more)
- Shijie Zhou 0003 — University of California Los Angeles, UCLA, Department of Electrical and Computer Engineering, CA, USA
- Shijie Zhou 0004 — York University, Department of Mathematics and Statistics, Toronto, ON, Canada (and 1 more)
- Shijie Zhou 0005 — NARI Digital Service Co., Ltd., NARI Group Corporation, State Grid Electric Power Research Institute, Nanjing, China
- Shijie Zhou 0006 — Beijing New Energy CO. LTD, Commodity Planning Center, China
- Shijie Zhou 0007 — Dalhousie University, Department of Electrical and Computer Engineering, Halifax, Canada
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j46]Nabeil Eltayieb, Rashad Elhabob, Abdeldime M. S. Abdelgader, Yongjian Liao, Fagen Li, Shijie Zhou:
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing. Future Gener. Comput. Syst. 162: 107478 (2025) - [j45]Wen Huang, Zhishuo Zhang, Weixin Zhao, Jian Peng, Wenzheng Xu, Yongjian Liao, Shijie Zhou, Ziming Wang:
Auditing privacy budget of differentially private neural network models. Neurocomputing 614: 128756 (2025) - 2024
- [j44]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Isaac Amankona Obiri, Eric Kuada, Ebenezer Kwaku Danso, Acheampong Edward Mensah:
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis. Concurr. Comput. Pract. Exp. 36(25) (2024) - [j43]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Eric Kuada, Ebenezer Kwaku Danso:
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT. Internet Things 26: 101183 (2024) - [j42]Zhishuo Zhang, Wen Huang, Ying Huang, Yongjian Liao, Zhun Zhang, Shijie Zhou:
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT. IEEE Internet Things J. 11(9): 15616-15632 (2024) - [j41]Zhishuo Zhang, Ying Huang, Wen Huang, Wenbo Pan, Yongjian Liao, Shijie Zhou:
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System. IEEE Internet Things J. 11(18): 30187-30203 (2024) - [j40]Nabeil Eltayieb, Rashad Elhabob, Yongjian Liao, Fagen Li, Shijie Zhou:
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application. J. Inf. Secur. Appl. 83: 103763 (2024) - [j39]Zhishuo Zhang, Ying Huang, Wen Huang, Yongjian Liao, Shijie Zhou:
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS. IEEE Trans. Intell. Transp. Syst. 25(7): 7861-7877 (2024) - [c36]Zhewei Wu, Ruilong Yu, Qihe Liu, Shuying Cheng, Shilin Qiu, Shijie Zhou:
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks. ECCV (46) 2024: 198-214 - [i4]Zhewei Wu, Ruilong Yu, Qihe Liu, Shuying Cheng, Shilin Qiu, Shijie Zhou:
Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks. CoRR abs/2402.17976 (2024) - [i3]Zhun Zhang, Yi Zeng, Qihe Liu, Shijie Zhou:
Towards a Novel Perspective on Adversarial Examples Driven by Frequency. CoRR abs/2404.10202 (2024) - 2023
- [j38]Wen Huang, Ming Zhuo, Tianqing Zhu, Shijie Zhou, Yongjian Liao:
Differential privacy: Review of improving utility through cryptography-based technologies. Concurr. Comput. Pract. Exp. 35(5) (2023) - [j37]Zhishuo Zhang, Wen Huang, Lin Yang, Yongjian Liao, Shijie Zhou:
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC. IEEE Internet Things J. 10(18): 16531-16547 (2023) - [j36]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Yingjie Dong:
Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE). J. Inf. Secur. Appl. 74: 103462 (2023) - [j35]Yunzhuo Liu, Wen Huang, Ming Zhuo, Shijie Zhou, Mengshi Li:
Mobile Payment Protocol with Deniably Authenticated Property. Sensors 23(8): 3927 (2023) - [j34]Ming Zhuo, Yunzhuo Liu, Leyuan Liu, Shijie Zhou:
Local Cluster-Aware Attention for Non-Euclidean Structure Data. Symmetry 15(4): 837 (2023) - [c35]Ling Zhou, Qihe Liu, Shijie Zhou:
Preprocessing-based Adversarial Defense for Object Detection via Feature Filtration. ICACS 2023: 80-87 - 2022
- [j33]Zhishuo Zhang, Wen Huang, Songying Cai, Lin Yang, Yongjian Liao, Shijie Zhou:
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing. Comput. Commun. 196: 9-22 (2022) - [j32]Shilin Qiu, Qihe Liu, Shijie Zhou, Wen Huang:
Adversarial attack and defense technologies in natural language processing: A survey. Neurocomputing 492: 278-307 (2022) - [j31]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms. IEEE Internet Things J. 9(1): 80-91 (2022) - [j30]Ihsan H. Abdulqadder, Shijie Zhou:
SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment. IEEE Internet Things J. 9(18): 18079-18097 (2022) - [j29]Zhishuo Zhang, Wen Huang, Shijie Zhou, Yongjian Liao:
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing. J. Syst. Archit. 129: 102589 (2022) - [j28]Ming Zhuo, Wen Huang, Leyuan Liu, Shijie Zhou, Zhiwen Tian:
A High-Utility Differentially Private Mechanism for Space Information Networks. Remote. Sens. 14(22): 5844 (2022) - [c34]Acheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience. HPCC/DSS/SmartCity/DependSys 2022: 1408-1415 - [c33]Acheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health. HPCC/DSS/SmartCity/DependSys 2022: 1690-1696 - 2021
- [j27]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu, Yuyu Wang, Kwabena Owusu-Agyemang:
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions. J. Inf. Secur. Appl. 61: 102949 (2021) - [j26]Casper Shikali Shivachi, Refuoe Mokhosi, Shijie Zhou, Qihe Liu:
Learning Syllables Using Conv-LSTM Model for Swahili Word Representation and Part-of-speech Tagging. ACM Trans. Asian Low Resour. Lang. Inf. Process. 20(4): 58:1-58:25 (2021) - [j25]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries. IEEE Trans. Inf. Forensics Secur. 16: 3123-3137 (2021) - [c32]Wen Huang, Shijie Zhou, Yongjian Liao:
Improving the Number of Queries Supported by Differentially Private Mechanisms. BigDataSE 2021: 65-71 - [c31]Ganglin Zhang, Yongjian Liao, Shijie Zhou:
A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service. DASC/PiCom/CBDCom/CyberSciTech 2021: 1-9 - [c30]Yifei Xiao, Shijie Zhou, Linpeng Zhong, Zhao Zhang:
Sector Error-Oriented Durability-Aware Fast Repair in Erasure-Coded Cloud Storage Systems. DMBD (2) 2021: 445-459 - [c29]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Ebenezer Kwaku Danso:
An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning. HPCC/DSS/SmartCity/DependSys 2021: 533-542 - [c28]Zhun Zhang, Qihe Liu, Shijie Zhou:
GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM. WASA (3) 2021: 172-182 - 2020
- [j24]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou:
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access 8: 51810-51820 (2020) - [j23]Chunjiang Wu, Shijie Zhou, Licai Xiao:
Dynamic Path Planning Based on Improved Ant Colony Algorithm in Traffic Congestion. IEEE Access 8: 180773-180783 (2020) - [j22]Zhun Zhang, Qihe Liu, Shilin Qiu, Shijie Zhou, Cheng Zhang:
Unknown Attack Detection Based on Zero-Shot Learning. IEEE Access 8: 193981-193991 (2020) - [j21]Yifei Xiao, Shijie Zhou, Linpeng Zhong:
Erasure Coding-Oriented Data Update for Cloud Storage: A Survey. IEEE Access 8: 227982-227998 (2020) - [j20]Ashir Javeed, Sanam Shahla Rizvi, Shijie Zhou, Rabia Riaz, Shafqat Ullah Khan, Se Jin Kwon:
Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification. Mob. Inf. Syst. 2020: 8843115:1-8843115:11 (2020) - [j19]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mob. Networks Appl. 25(1): 223-233 (2020) - [c27]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu:
Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients. HPCC/DSS/SmartCity 2020: 816-823 - [c26]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing. ICDE 2020: 2049-2053 - [c25]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. TrustCom 2020: 623-630 - [i2]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries. CoRR abs/2010.08958 (2020) - [i1]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
the Connection between Cryptography and Differential Privacy: a Survey. CoRR abs/2011.00976 (2020)
2010 – 2019
- 2019
- [j18]Yongjian Liao, Hongjie Chen, Wen Huang, Mohammed Ramadan, Hongtao Pan, Shijie Zhou:
Insecurity of an IBEET Scheme and an ABEET Scheme. IEEE Access 7: 25087-25094 (2019) - [j17]Wen Huang, Yongjian Liao, Shijie Zhou, Hongjie Chen:
An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection. IEEE Access 7: 43453-43461 (2019) - [j16]Yu Fan, Yongjian Liao, Fagen Li, Shijie Zhou, Ganglin Zhang:
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding. IEEE Access 7: 114246-114260 (2019) - [j15]Muhammad Asim Saleem, Shijie Zhou, Abida Sharif, Tanzila Saba, Muhammad Azam Zia, Ashar Javed, Sudipta Roy, Mamta Mittal:
Expansion of Cluster Head Stability Using Fuzzy in Cognitive Radio CR-VANET. IEEE Access 7: 173185-173195 (2019) - [j14]Ashir Javeed, Shijie Zhou, Yongjian Liao, Iqbal Qasim, Adeeb Noor, Redhwan Nour:
An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection. IEEE Access 7: 180235-180243 (2019) - [j13]Wen Huang, Shijie Zhou, Yongjian Liao, Ming Zhuo:
Optimizing Query Times for Multiple Users Scenario of Differential Privacy. IEEE Access 7: 183292-183299 (2019) - [j12]Wen Huang, Shijie Zhou, Yongjian Liao, Hongjie Chen:
An Efficient Differential Privacy Logistic Classification Mechanism. IEEE Internet Things J. 6(6): 10620-10626 (2019) - [c24]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics. ICNCC 2019: 75-78 - 2018
- [j11]Yongjian Liao, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [j10]Yongjian Liao, Yichuan He, Fagen Li, Shijie Zhou:
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces 56: 101-106 (2018) - [j9]Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou:
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 18(1): 176 (2018) - 2017
- [c23]Qihe Liu, Shijie Zhou, Xianqiong Cheng, Hongrong Cheng, Huabo Zhang:
Gas Sensor Drift Compensation by an Optimal Linear Transformation. BigCom 2017: 193-199 - [c22]Shijie Zhou, Qihe Liu, Jin Xu, Yaqi He:
An Anti-collision Algorithm Based on Task Scheduling Model in RFID System. BigCom 2017: 284-290 - 2016
- [j8]Yanghong Zhou, Shijie Zhou, Jiaqing Luo:
Explore city dynamics from the communication network between base stations. Int. J. Embed. Syst. 8(1): 87-92 (2016) - [c21]Tengyuan Cai, Hongrong Cheng, Jiaqing Luo, Shijie Zhou:
An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation. ER 2016: 248-259 - 2015
- [j7]Zhu Song, Shijie Zhou, Jiaqing Luo, Weiwei Deng:
The B+-tree-based method for nearest neighbour queries in traffic simulation systems. Int. J. High Perform. Comput. Netw. 8(2): 110-123 (2015) - [j6]Shijie Zhou:
A Survey on Fast-flux Attacks. Inf. Secur. J. A Glob. Perspect. 24(4-6): 79-97 (2015) - [c20]Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. CSCloud 2015: 317-322 - [c19]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - [c18]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Bin Guo:
The Design and Implementation of A Cost-effective RFID Indoor Localization System. CSAR@SenSys 2015: 1-6 - 2014
- [j5]Shijie Zhou, Jiaqing Luo:
A general approach for the intensive RFID reader deployment. Int. J. Ad Hoc Ubiquitous Comput. 16(3): 206-215 (2014) - [c17]Yuping Zhao, Shijie Zhou, Jiaqing Luo, Zhu Song:
The adjacent Vehicles Query Algorithm of Microscopic Traffic Simulation. PACIS 2014: 179 - [c16]Mantun Chen, Shijie Zhou, Jiaqing Luo, Zhu Song:
An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System. PACIS 2014: 184 - 2013
- [j4]Jiaqing Luo, Bin Xiao, Shijie Zhou:
A bottom-up model for heterogeneous BitTorrent systems. J. Parallel Distributed Comput. 73(8): 1116-1126 (2013) - [j3]Jiaqing Luo, Bin Xiao, Kai Bu, Shijie Zhou:
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol. IEEE Trans. Parallel Distributed Syst. 24(12): 2526-2537 (2013) - [c15]Shijie Zhou, Yun Liu, Jiaqing Luo:
A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space. MSN 2013: 115-120 - [c14]Lijun Sun, Shijie Zhou, Jiaqing Luo, Yuehan Zhang, Mengjie Zhang, Weiwei Deng:
ARNS: Adaptive RFID Network Scheduling for Device-Free Tracking. MSN 2013: 248-253 - 2012
- [c13]Leyuan Liu, Weiqiang Kong, Shijie Zhou, Zhiguang Qin, Akira Fukuda:
Formal Verification of Communicating HSTM Designs. CIT 2012: 383-390 - 2011
- [j2]Sheng Yu, Shijie Zhou, Leyuan Liu, Rui Yang, Jiaqing Luo:
Detecting Malware Variants by Byte Frequency. J. Networks 6(4): 638-645 (2011) - 2010
- [c12]Jiaqing Luo, Bin Xiao, Zirong Yang, Shijie Zhou:
A clone of social networks to decentralized bootstrapping P2P networks. IWQoS 2010: 1-2
2000 – 2009
- 2009
- [c11]Jiaqing Luo, Bin Xiao, Guobin Liu, Qingjun Xiao, Shijie Zhou:
Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks. IPDPS 2009: 1-8 - [c10]Chengyu Fan, Shijie Zhou, Fagen Li:
An Identity-Based Restricted Deniable Authentication Protocol. ISPA 2009: 474-478 - [c9]Lan Luo, Zhiguang Qin, Shijie Zhou:
A Comment to the Intelligent Functions of Different Weight Ciphers. WKDD 2009: 531-534 - 2008
- [j1]Fagen Li, Shijie Zhou, Rong Sun:
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(7): 1820-1823 (2008) - [c8]Chengyu Fan, Shijie Zhou, Fagen Li:
Deniable Proxy-Anonymous Signatures. ICYCS 2008: 2131-2136 - [c7]Lan Luo, Zhiguang Qin, Shijie Zhou, Shaoquan Jiang, Juan Wang:
A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode. IIH-MSP 2008: 64-67 - 2007
- [c6]Chunjiang Wu, Shijie Zhou, Linna Wei, Jiaqing Luo, Yanli Wang, Xiaoqian Yang:
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems. ICA3PP 2007: 391-402 - 2006
- [c5]Shijie Zhou, Zhiguang Qin, Xiaomei Zhao, Xucheng Luo:
Interconnected Peer-to-Peer Network: A Community Based Scheme. AICT/ICIW 2006: 108 - [c4]Jiaqing Luo, Shijie Zhou, Chunjiang Wu:
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks. IAT Workshops 2006: 467-470 - 2004
- [c3]Feng Zhang, Zhiguang Qin, Shijie Zhou:
Policy-Tree Based Proactive Defense Model for Network Security. GCC Workshops 2004: 437-449 - 2003
- [c2]Shijie Zhou, Zhiguang Qin, Jinde Liu:
Distributing the Keys into P2P Network. GCC (1) 2003: 460-463 - [c1]Shijie Zhou, Zhiguang Qin, Feng Zhang, Xianfeng Zhang, Wei Chen, Jinde Liu:
Colored Petri Net Based Attack Modeling. RSFDGrC 2003: 715-718
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-08 02:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint