Shuhui Zhang

Orcid: 0000-0001-5017-3207

Affiliations:
  • Qilu University of Technology, Jinan, China
  • Shandong Computer Science Center, National Supercomputer Center in Jinan, China
  • Shandong University, Jinan, China (PhD 2019)


According to our database1, Shuhui Zhang authored at least 28 papers between 2009 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Single-Layer Trainable Neural Network for Secure Inference.
IEEE Internet Things J., 2025

Distributed privacy-preserving keyword querying for integrated data in IoT networks via function secret sharing.
Inf. Fusion, 2025

Blockchain-based secure data sharing with overlapping clustering and searchable encryption.
Comput. Stand. Interfaces, 2025

DBC-MulBiLSTM: A DistilBERT-CNN Feature Fusion Framework enhanced by multi-head self-attention and BiLSTM for smart contract vulnerability detection.
Comput. Electr. Eng., 2025

Cross-Chain Identity Authentication Protocol based on Group Signature and Zero-Knowledge Proof.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

A Lightweight Identity Privacy Protection Scheme For Electric Vehicles Based On Consortium Blockchain.
Proceedings of the 28th International Conference on Computer Supported Cooperative Work in Design, 2025

2024
A reputation-based dynamic reorganization scheme for blockchain network sharding.
Connect. Sci., December, 2024

A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates.
Symmetry, 2024

Relay network-based cross-chain data interaction protocol with integrity audit.
Comput. Electr. Eng., 2024

2023
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth.
Connect. Sci., December, 2023

A Malware Detection Approach Based on Deep Learning and Memory Forensics.
Symmetry, February, 2023

Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT.
IEEE Internet Things J., 2023

We Want AI to Help Us - An Explorative Study Regarding How AI Could Assist Operators in the Main Control Room of Nuclear Power Plants.
Proceedings of the Artificial Intelligence in HCI, 2023

Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
A Cross Data Center Access Control Model by Constructing GAS on Blockchain.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

2020
Dismantling and Vertex Cover of Network Through Message Passing.
IEEE Trans. Circuits Syst., 2020

2019
Virtual Machine Memory Forensics Method for XenServer Platform.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2018
Secure Virtualization Environment Based on Advanced Memory Introspection.
Secur. Commun. Networks, 2018

The Design of a Cloud Forensics Middleware System Base on Memory Analysis.
Proceedings of the Tenth International Conference on Soft Computing and Pattern Recognition, 2018

2017
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework.
IEEE Trans. Inf. Forensics Secur., 2017

Research on Linux Kernel Version Diversity for Precise Memory Analysis.
Proceedings of the Data Science, 2017

2016
An adaptive approach for Linux memory analysis based on kernel code reconstruction.
EURASIP J. Inf. Secur., 2016

2014
A KVM Virtual Machine Memory Forensics Method Based on VMCS.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Forensic analysis of social networking application on iOS devices.
Proceedings of the Sixth International Conference on Machine Vision, 2013

2010
Live Memory Acquisition through FireWire.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

Network Connections Information Extraction of 64-Bit Windows 7 Memory Images.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
Windows Memory Analysis Based on KPCR.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...