Shuaishuai Zhu

Orcid: 0000-0003-1573-3808

According to our database1, Shuaishuai Zhu authored at least 16 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Two-Stage Voting-Boosting Technique for Ensemble Learning in Social Network Sentiment Classification.
Entropy, April, 2023

2020
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol.
Secur. Commun. Networks, 2020

Plenoptic Face Presentation Attack Detection.
IEEE Access, 2020

Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure.
Proceedings of the Security and Privacy in Digital Economy, 2020

Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure.
Proceedings of the Security and Privacy in Digital Economy, 2020

2019
Dynamic public opinion evolvement modeling and supervision in social networks.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Secure data outsourcing scheme in cloud computing with attribute-based encryption.
Int. J. High Perform. Comput. Netw., 2018

Certificateless multi-signcryption scheme in standard model.
Int. J. Grid Util. Comput., 2018

More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing.
Proceedings of the Advances on P2P, 2018

Mining and Utilizing Network Protocol's Stealth Attack Behaviors.
Proceedings of the Advances on P2P, 2018

2017
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data.
Proceedings of the Information Security and Cryptology - 13th International Conference, 2017

2015
Protecting data in cloud environment with attribute-based encryption.
Int. J. Grid Util. Comput., 2015

Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption.
Proceedings of the 2015 International Conference on Intelligent Networking and Collaborative Systems, 2015

2013
Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions.
J. Comput., 2013

Secure Cloud File System with Attribute Based Encryption.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

An Improved Secure Unidirectional Proxy Re-encryption Scheme.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013


  Loading...