default search action
Shijie Zhou 0002
Person information
- affiliation (PhD 2004): University of Electronic Science and Technology of China, UESTC, School of Information and Software Engineering, Chengdu, Sichuan, China
Other persons with the same name
- Shijie Zhou (aka: Zhou Shijie) — disambiguation page
- Shijie Zhou 0001 — Microsoft Corporation, Redmond, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j30]Nabeil Eltayieb, Rashad Elhabob, Abdeldime M. S. Abdelgader, Yongjian Liao, Fagen Li, Shijie Zhou:
Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing. Future Gener. Comput. Syst. 162: 107478 (2025) - [j29]Wen Huang, Zhishuo Zhang, Weixin Zhao, Jian Peng, Wenzheng Xu, Yongjian Liao, Shijie Zhou, Ziming Wang:
Auditing privacy budget of differentially private neural network models. Neurocomputing 614: 128756 (2025) - 2024
- [j28]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Isaac Amankona Obiri, Eric Kuada, Ebenezer Kwaku Danso, Acheampong Edward Mensah:
Enhanced multi-key privacy-preserving distributed deep learning protocol with application to diabetic retinopathy diagnosis. Concurr. Comput. Pract. Exp. 36(25) (2024) - [j27]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Eric Kuada, Ebenezer Kwaku Danso:
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT. Internet Things 26: 101183 (2024) - [j26]Zhishuo Zhang, Wen Huang, Ying Huang, Yongjian Liao, Zhun Zhang, Shijie Zhou:
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT. IEEE Internet Things J. 11(9): 15616-15632 (2024) - [j25]Zhishuo Zhang, Ying Huang, Wen Huang, Wenbo Pan, Yongjian Liao, Shijie Zhou:
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System. IEEE Internet Things J. 11(18): 30187-30203 (2024) - [j24]Nabeil Eltayieb, Rashad Elhabob, Yongjian Liao, Fagen Li, Shijie Zhou:
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application. J. Inf. Secur. Appl. 83: 103763 (2024) - [j23]Zhishuo Zhang, Ying Huang, Wen Huang, Yongjian Liao, Shijie Zhou:
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS. IEEE Trans. Intell. Transp. Syst. 25(7): 7861-7877 (2024) - 2023
- [j22]Wen Huang, Ming Zhuo, Tianqing Zhu, Shijie Zhou, Yongjian Liao:
Differential privacy: Review of improving utility through cryptography-based technologies. Concurr. Comput. Pract. Exp. 35(5) (2023) - [j21]Zhishuo Zhang, Wen Huang, Lin Yang, Yongjian Liao, Shijie Zhou:
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC. IEEE Internet Things J. 10(18): 16531-16547 (2023) - [j20]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Yingjie Dong:
Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE). J. Inf. Secur. Appl. 74: 103462 (2023) - [j19]Yunzhuo Liu, Wen Huang, Ming Zhuo, Shijie Zhou, Mengshi Li:
Mobile Payment Protocol with Deniably Authenticated Property. Sensors 23(8): 3927 (2023) - 2022
- [j18]Zhishuo Zhang, Wen Huang, Songying Cai, Lin Yang, Yongjian Liao, Shijie Zhou:
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing. Comput. Commun. 196: 9-22 (2022) - [j17]Shilin Qiu, Qihe Liu, Shijie Zhou, Wen Huang:
Adversarial attack and defense technologies in natural language processing: A survey. Neurocomputing 492: 278-307 (2022) - [j16]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms. IEEE Internet Things J. 9(1): 80-91 (2022) - [j15]Zhishuo Zhang, Wen Huang, Shijie Zhou, Yongjian Liao:
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing. J. Syst. Archit. 129: 102589 (2022) - [j14]Ming Zhuo, Wen Huang, Leyuan Liu, Shijie Zhou, Zhiwen Tian:
A High-Utility Differentially Private Mechanism for Space Information Networks. Remote. Sens. 14(22): 5844 (2022) - [c12]Acheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience. HPCC/DSS/SmartCity/DependSys 2022: 1408-1415 - [c11]Acheampong Edward Mensah, Shijie Zhou, Yongjian Liao, Emmanuel Antwi-Boasiako, Isaac Amankona Obiri:
Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health. HPCC/DSS/SmartCity/DependSys 2022: 1690-1696 - 2021
- [j13]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu, Yuyu Wang, Kwabena Owusu-Agyemang:
Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions. J. Inf. Secur. Appl. 61: 102949 (2021) - [j12]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries. IEEE Trans. Inf. Forensics Secur. 16: 3123-3137 (2021) - [c10]Wen Huang, Shijie Zhou, Yongjian Liao:
Improving the Number of Queries Supported by Differentially Private Mechanisms. BigDataSE 2021: 65-71 - [c9]Ganglin Zhang, Yongjian Liao, Shijie Zhou:
A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service. DASC/PiCom/CBDCom/CyberSciTech 2021: 1-9 - [c8]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Ebenezer Kwaku Danso:
An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning. HPCC/DSS/SmartCity/DependSys 2021: 533-542 - 2020
- [j11]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou:
Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems. IEEE Access 8: 51810-51820 (2020) - [j10]Mohammed Ramadan, Yongjian Liao, Fagen Li, Shijie Zhou, Hisham Abdalla:
IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks. Mob. Networks Appl. 25(1): 223-233 (2020) - [c7]Emmanuel Antwi-Boasiako, Shijie Zhou, Yongjian Liao, Qihe Liu:
Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients. HPCC/DSS/SmartCity 2020: 816-823 - [c6]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing. ICDE 2020: 2049-2053 - [c5]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao, Chunjiang Wu, Shilin Qiu:
Improving Laplace Mechanism of Differential Privacy by Personalized Sampling. TrustCom 2020: 623-630 - [i2]Wen Huang, Shijie Zhou, Yongjian Liao:
Unexpected Information Leakage of Differential Privacy Due to Linear Property of Queries. CoRR abs/2010.08958 (2020) - [i1]Wen Huang, Shijie Zhou, Tianqing Zhu, Yongjian Liao:
the Connection between Cryptography and Differential Privacy: a Survey. CoRR abs/2011.00976 (2020)
2010 – 2019
- 2019
- [j9]Yongjian Liao, Hongjie Chen, Wen Huang, Mohammed Ramadan, Hongtao Pan, Shijie Zhou:
Insecurity of an IBEET Scheme and an ABEET Scheme. IEEE Access 7: 25087-25094 (2019) - [j8]Wen Huang, Yongjian Liao, Shijie Zhou, Hongjie Chen:
An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection. IEEE Access 7: 43453-43461 (2019) - [j7]Yu Fan, Yongjian Liao, Fagen Li, Shijie Zhou, Ganglin Zhang:
Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding. IEEE Access 7: 114246-114260 (2019) - [j6]Ashir Javeed, Shijie Zhou, Yongjian Liao, Iqbal Qasim, Adeeb Noor, Redhwan Nour:
An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection. IEEE Access 7: 180235-180243 (2019) - [j5]Wen Huang, Shijie Zhou, Yongjian Liao, Ming Zhuo:
Optimizing Query Times for Multiple Users Scenario of Differential Privacy. IEEE Access 7: 183292-183299 (2019) - [j4]Wen Huang, Shijie Zhou, Yongjian Liao, Hongjie Chen:
An Efficient Differential Privacy Logistic Classification Mechanism. IEEE Internet Things J. 6(6): 10620-10626 (2019) - [c4]Deleli Mesay Adinew, Shijie Zhou, Yongjian Liao:
Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics. ICNCC 2019: 75-78 - 2018
- [j3]Yongjian Liao, Hongjie Chen, Fagen Li, Shaoquan Jiang, Shijie Zhou, Mohammed Ramadan:
Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test. IEEE Access 6: 10189-10196 (2018) - [j2]Yongjian Liao, Yichuan He, Fagen Li, Shijie Zhou:
Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput. Stand. Interfaces 56: 101-106 (2018) - [j1]Yongjian Liao, Yichuan He, Fagen Li, Shaoquan Jiang, Shijie Zhou:
Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 18(1): 176 (2018) - 2015
- [c3]Wenqing Zhang, Shijie Zhou, Jiaqing Luo, Hongrong Cheng, Yongjian Liao:
A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners. CSCloud 2015: 317-322 - [c2]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Kai Bu:
A Range-Free Localization of Passive RFID Tags Using Mobile Readers. MASS 2015: 445-446 - [c1]Jiaqing Luo, Shijie Zhou, Hongrong Cheng, Yongjian Liao, Bin Guo:
The Design and Implementation of A Cost-effective RFID Indoor Localization System. CSAR@SenSys 2015: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint