Qihui Zhou
Orcid: 0000-0002-8927-3325
According to our database1,
Qihui Zhou
authored at least 15 papers
between 2013 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Proceedings of the 28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming, 2023
The malicious resource consumption detection in permissioned blockchain based on traffic analysis.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
LogBlock: An Anomaly Detection Method on Permissioned Blockchain based on Log-Block Sequence.
Proceedings of the IEEE Smartworld, 2022
Proceedings of the SC22: International Conference for High Performance Computing, 2022
HGL: Accelerating Heterogeneous GNN Training with Holistic Representation and Optimization.
Proceedings of the SC22: International Conference for High Performance Computing, 2022
An atomic member addition mechanism for permissioned blockchain based on autonomous rollback.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
A highly reliable cross-domain identity authentication protocol based on blockchain in edge computing environment.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022
2021
Potential Risk Detection System of Hyperledger Fabric Smart Contract based on Static Analysis.
Proceedings of the IEEE Symposium on Computers and Communications, 2021
2019
A Frequency Selective Rasorber With Three Transmission Bands and Three Absorption Bands.
IEEE Access, 2019
2018
Cybersecur., 2018
2017
A Miniaturized Absorptive/Transmissive Radome with Switchable Passband and Wide Absorbing Band.
IEICE Trans. Commun., 2017
IM-Visor: A Pre-IME Guard to Prevent IME Apps from Stealing Sensitive Keystrokes Using TrustZone.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
2013
ChainDroid: Safe and Flexible Access to Protected Android Resources Based on Call Chain.
Proceedings of the 12th IEEE International Conference on Trust, 2013