Shijie Zhou

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024

Generalized Invariance Principles for Stochastic Dynamical Systems and Their Applications.
IEEE Trans. Autom. Control., January, 2024

Enhancing Tracking Robustness with Auxiliary Adversarial Defense Networks.
CoRR, 2024

Discriminative Adversarial Unlearning.
CoRR, 2024

2023
Research on Positioning Accuracy of Mobile Robot in Indoor Environment Based on Improved RTABMAP Algorithm.
Sensors, December, 2023

A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023

A new hierarchical temporal memory based on recurrent learning unit.
J. Exp. Theor. Artif. Intell., July, 2023

Privacy-preserving distributed deep learning via LWE-based Certificateless Additively Homomorphic Encryption (CAHE).
J. Inf. Secur. Appl., May, 2023

Local Cluster-Aware Attention for Non-Euclidean Structure Data.
Symmetry, March, 2023

Ultra-High-Speed Accelerator Architecture for Convolutional Neural Network Based on Processing-in-Memory Using Resistive Random Access Memory.
Sensors, March, 2023

Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023

A Topological Sensitive Node Importance Evaluation Method in Aerospace Information Networks.
Sensors, 2023

Mobile Payment Protocol with Deniably Authenticated Property.
Sensors, 2023

Feature 3DGS: Supercharging 3D Gaussian Splatting to Enable Distilled Feature Fields.
CoRR, 2023

On Learning Mechanical Laws of Motion From Video Using Neural Networks.
IEEE Access, 2023

Edge-Prior Contrastive Transformer for Optic Cup and Optic Disc Segmentation.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Optimization of a Network Topology Generation Algorithm Based on Spatial Information Network.
Proceedings of the Data Science, 2023

Preprocessing-based Adversarial Defense for Object Detection via Feature Filtration.
Proceedings of the 7th International Conference on Algorithms, Computing and Systems, 2023

Optimization of Arrhythmia-based ECG-lead Selection for Computer-interpreted Heart Rhythm Classification.
Proceedings of the 45th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2023

ALTO: Alternating Latent Topologies for Implicit 3D Reconstruction.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Stochastically Adaptive Control and Synchronization: From Globally One-Sided Lipschitzian to Only Locally Lipschitzian Systems.
SIAM J. Appl. Dyn. Syst., 2022

Time-dependent kinematic reliability analysis of gear mechanism based on sequential decoupling strategy and saddle-point approximation.
Reliab. Eng. Syst. Saf., 2022

A High-Utility Differentially Private Mechanism for Space Information Networks.
Remote. Sens., 2022

A novel forget-update module for few-shot domain generalization.
Pattern Recognit., 2022

A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022

Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022

SliceBlock: Context-Aware Authentication Handover and Secure Network Slicing Using DAG-Blockchain in Edge-Assisted SDN/NFV-6G Environment.
IEEE Internet Things J., 2022

Adversarial attack and defense technologies in natural language processing: A survey.
Neurocomputing, 2022

Link Prediction on Heterophilic Graphs via Disentangled Representation Learning.
CoRR, 2022

An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022

Generalized invariance principles for discrete-time stochastic dynamical systems.
Autom., 2022

Label-Wise Graph Convolutional Network for Heterophilic Graphs.
Proceedings of the Learning on Graphs Conference, 2022

Authentication Scheme Based on Non-Interactive Zero-Knowledge Proof for Mobile Health.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Smart Health Records Sharing Scheme based on Partially Policy-Hidden CP-ABE with Leakage Resilience.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Build User Experience Evaluation System - - Selection and Integration of Indicators of Automotive Products.
Proceedings of the Human-Computer Interaction. Theoretical Approaches and Design Methods, 2022

The Expression of Multi-sensory User Experience on Interactive Packaging Design-Emotional Design of Children's Food.
Proceedings of the HCI International 2022 - Late Breaking Posters, 2022

TCAM-Resnet: A convolutional neural network for screening DR and AMD based on OCT images.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021

Learning Syllables Using Conv-LSTM Model for Swahili Word Representation and Part-of-speech Tagging.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2021

Privacy preservation in Distributed Deep Learning: A survey on Distributed Deep Learning, privacy preservation techniques used and interesting research directions.
J. Inf. Secur. Appl., 2021

Learning word representation by jointly using neighbor and syntactic contexts.
Neurocomputing, 2021

A decentralized strongly secure attribute-based encryption and authentication scheme for distributed Internet of Mobile Things.
Comput. Networks, 2021

GGCAD: A Novel Method of Adversarial Detection by Guided Grad-CAM.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Spark Performance Optimization Analysis with Multi-Layer Parameter using Shuffling and Scheduling in Different Data Caching Options.
Proceedings of the 16th International Conference on Intelligent Systems and Knowledge Engineering, 2021

Topic-Aware Dialogue Generation with Two-Hop Based Graph Attention.
Proceedings of the IEEE International Conference on Acoustics, 2021

An LWE-Based Multi-Key Privacy-Preserving Distributed Deep Learning.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Sector Error-Oriented Durability-Aware Fast Repair in Erasure-Coded Cloud Storage Systems.
Proceedings of the Data Mining and Big Data - 6th International Conference, 2021

A privacy-preserving revocable framework in the deep-learning-as-a-service platform system based on non software as a service.
Proceedings of the IEEE Intl Conf on Dependable, 2021

Improving the Number of Queries Supported by Differentially Private Mechanisms.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

A Method for Short-term Traffic Flow Prediction and Control on Urban Road.
Proceedings of the 7th International Conference on Big Data Computing and Communications, 2021

2020
Locality-constrained group lasso coding for microvessel image classification.
Pattern Recognit. Lett., 2020

IBEET-RSA: Identity-Based Encryption with Equality Test over RSA for Wireless Body Area Networks.
Mob. Networks Appl., 2020

Heart Risk Failure Prediction Using a Novel Feature Selection Method for Feature Refinement and Neural Network for Classification.
Mob. Inf. Syst., 2020

A dual channel class hierarchy based recurrent language modeling.
Neurocomputing, 2020

the Connection between Cryptography and Differential Privacy: a Survey.
CoRR, 2020

Multi-layered intrusion detection and prevention in the SDN/NFV enabled cloud of 5G networks using AI-based defense mechanisms.
Comput. Networks, 2020

A hybrid machine learning approach to localizing the origin of ventricular tachycardia using 12-lead electrocardiograms.
Comput. Biol. Medicine, 2020

Unknown Attack Detection Based on Zero-Shot Learning.
IEEE Access, 2020

Erasure Coding-Oriented Data Update for Cloud Storage: A Survey.
IEEE Access, 2020

Dynamic Path Planning Based on Improved Ant Colony Algorithm in Traffic Congestion.
IEEE Access, 2020

Identity-Based Signature With Server-Aided Verification Scheme for 5G Mobile Systems.
IEEE Access, 2020

The Asynchronous Training Algorithm Based on Sampling and Mean Fusion for Distributed RNN.
IEEE Access, 2020

Improving Laplace Mechanism of Differential Privacy by Personalized Sampling.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Spark Performance Optimization Analysis In Memory Management with Deploy Mode In Standalone Cluster Computing.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Bloc-Sec: Blockchain-Based Lightweight Security Architecture for 5G/B5G Enabled SDN/NFV Cloud of IoT.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Privacy-Preservation in Distributed Deep Neural Networks via Encryption of Selected Gradients.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Dynamic Multi-level Attention Models for Dialogue Response Generation.
Proceedings of the Distributed Computing and Artificial Intelligence, 2020

2019
Localization of Activation Origin on Patient-Specific Endocardial Surface by the Equivalent Double Layer (EDL) Source Model With Sparse Bayesian Learning.
IEEE Trans. Biomed. Eng., 2019

Localization of Activation Origin on Patient-Specific Epicardial Surface by Empirical Bayesian Method.
IEEE Trans. Biomed. Eng., 2019

An Inverse Approach of Damage Identification Using Lamb Wave Tomography.
Sensors, 2019

Data Transmission Using IoT in Vehicular Ad-Hoc Networks in Smart City Congestion.
Mob. Networks Appl., 2019

An Efficient Differential Privacy Logistic Classification Mechanism.
IEEE Internet Things J., 2019

A Part-Based Deep Neural Network Cascade Model for Human Parsing.
IEEE Access, 2019

Expansion of Cluster Head Stability Using Fuzzy in Cognitive Radio CR-VANET.
IEEE Access, 2019

Insecurity of an IBEET Scheme and an ABEET Scheme.
IEEE Access, 2019

An Intelligent Learning System Based on Random Search Algorithm and Optimized Random Forest Model for Improved Heart Disease Detection.
IEEE Access, 2019

Optimizing Query Times for Multiple Users Scenario of Differential Privacy.
IEEE Access, 2019

An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection.
IEEE Access, 2019

Identity-Based Auditing for Shared Cloud Data With Efficient and Secure Sensitive Information Hiding.
IEEE Access, 2019

Spark Performance Optimization Analysis in Memory Tuning On GC Overhead for Big Data Analytics.
Proceedings of the 8th International Conference on Networks, Communication and Computing, 2019

A Novel Distributed Duration-Aware LSTM for Large Scale Sequential Data Analysis.
Proceedings of the Big Data - 7th CCF Conference, 2019

2018
Interaction of Lamb Wave Modes with Weak Material Nonlinearity: Generation of Symmetric Zero-Frequency Mode.
Sensors, 2018

Analysis of an ABE Scheme with Verifiable Outsourced Decryption.
Sensors, 2018

Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement.
Comput. Stand. Interfaces, 2018

Insecurity of A Key-Policy Attribute Based Encryption Scheme With Equality Test.
IEEE Access, 2018

An algorithm for imaging isochrones of ventricular activation on patient-specific epicardial surface.
Proceedings of the Computing in Cardiology, 2018

2017
Robust Control for the Relay ICPT System Under External Disturbance and Parametric Uncertainty.
IEEE Trans. Control. Syst. Technol., 2017

DAG Reduction: Fast Answering Reachability Queries.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

An Anti-collision Algorithm Based on Task Scheduling Model in RFID System.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

Gas Sensor Drift Compensation by an Optimal Linear Transformation.
Proceedings of the 3rd International Conference on Big Data Computing and Communications, 2017

2016
Multi-Paralleled LCC Reactive Power Compensation Networks and Their Tuning Method for Electric Vehicle Dynamic Wireless Charging.
IEEE Trans. Ind. Electron., 2016

Modeling RFID readers deployment in three-dimensional space.
Int. J. RF Technol. Res. Appl., 2016

Explore city dynamics from the communication network between base stations.
Int. J. Embed. Syst., 2016

An Efficient and Simple Graph Model for Scientific Article Cold Start Recommendation.
Proceedings of the Conceptual Modeling - 35th International Conference, 2016

2015
基于重叠社团划分的大规模道路网络双层路由算法 (Double Layers Routing Algorithm on Large Road Networks Based on Overlapping Communities Detecting).
计算机科学, 2015

A Survey on Fast-flux Attacks.
Inf. Secur. J. A Glob. Perspect., 2015

The B<sup>+</sup>-tree-based method for nearest neighbour queries in traffic simulation systems.
Int. J. High Perform. Comput. Netw., 2015

The Design and Implementation of A Cost-effective RFID Indoor Localization System.
Proceedings of the 1st Workshop on Context Sensing and Activity Recognition, 2015

A Range-Free Localization of Passive RFID Tags Using Mobile Readers.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

A Lightweight Detection of the RFID Unauthorized Reading Using RF Scanners.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
An Image Fusion Method Based on NSCT and Dual-channel PCNN Model.
J. Networks, 2014

A general approach for the intensive RFID reader deployment.
Int. J. Ad Hoc Ubiquitous Comput., 2014

The adjacent Vehicles Query Algorithm of Microscopic Traffic Simulation.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Research on Dynamic Load Balancing Technology Based on Simulation Terminal Pool.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

An Algorithm to Optimize the Configuration of terminals in Distributed Traffic Microscopic Simulation System.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

2013
Understanding and Improving Piece-Related Algorithms in the BitTorrent Protocol.
IEEE Trans. Parallel Distributed Syst., 2013

A bottom-up model for heterogeneous BitTorrent systems.
J. Parallel Distributed Comput., 2013

A Cube Based Model for RFID Coverage Problem in Three-Dimensional Space.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

ARNS: Adaptive RFID Network Scheduling for Device-Free Tracking.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

2012
A novel linear switch reluctance generator system.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

Formal Verification of Communicating HSTM Designs.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Detecting Malware Variants by Byte Frequency.
J. Networks, 2011

Interpretation of coarse-graining of Lempel-Ziv complexity measure in ECG signal analysis.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Time-domain ECG signal analysis based on smart-phone.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

2010
A lightweight anti-desynchronization RFID authentication protocol.
Inf. Syst. Frontiers, 2010

Fast-flux attack network identification based on agent lifespan.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A clone of social networks to decentralized bootstrapping P2P networks.
Proceedings of the 18th International Workshop on Quality of Service, 2010

2009
A Comment to the Intelligent Functions of Different Weight Ciphers.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

An Identity-Based Restricted Deniable Authentication Protocol.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Modeling and analysis of self-stopping BTWorms using dynamic hit list in P2P networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

2008
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A New Algorithm for Network Diameter.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Deniable Proxy-Anonymous Signatures.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Design and Analysis for RFID Authentication Protocol.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2007

2006
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks.
Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2006

Interconnected Peer-to-Peer Network: A Community Based Scheme.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

2004
Policy-Tree Based Proactive Defense Model for Network Security.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Colored Petri Net Based Attack Modeling.
Proceedings of the Rough Sets, 2003

Distributing the Keys into P2P Network.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...