Dehua Zhou

Orcid: 0000-0003-4256-4528

According to our database1, Dehua Zhou authored at least 21 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Flexible and secure access control for EHR sharing based on blockchain.
J. Syst. Archit., January, 2024

2023
Multi-authority anonymous authentication with public accountability for incentive-based applications.
Comput. Networks, July, 2023

How Can We Achieve Query Keyword Frequency Analysis in Privacy-Preserving Situations?
Future Internet, June, 2023

EVOAC-HP: An Efficient and Verifiable Outsourced Access Control Scheme with Hidden Policy.
Sensors, 2023

2022
Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles.
IEEE Trans. Veh. Technol., 2022

Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing.
IEEE Trans. Serv. Comput., 2022

Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance.
Inf. Sci., 2022

How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
Proceedings of the 33rd International Symposium on Algorithms and Computation, 2022

SecureAstraea: A Self-balancing Privacy-preserving Federated Learning Framework.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

HEND-FL: Accurate Federated Learning Using Homomorphic Encryption and a New Distributed Protocol.
Proceedings of the IEEE Intl. Conf. on Dependable, 2022

2020
How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?
IACR Cryptol. ePrint Arch., 2020

Privacy Prediction of Lightweight Convolutional Neural Network.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Privacy Preserving Computations over Healthcare Data.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

2018
Secure outsourced calculations with homomorphic encryption.
CoRR, 2018

A Privacy-Preserving Classifier in Statistic Pattern Recognition.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

1.8V -0.18-μm CMOS Temperature Sensor with Frequency Output.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

2017
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Quick draw of the original handwriting base on quadratic Bezier curve.
Int. J. Wavelets Multiresolution Inf. Process., 2016

2014
Unforgeability of an improved certificateless signature scheme in the standard model.
IET Inf. Secur., 2014

Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext.
Sci. China Inf. Sci., 2014

2005
An Efficient Image Compression Scheme for Air Tickets Storage.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005


  Loading...