Yuan Zhou

Affiliations:
  • Network Emergency Response Technical Team/Coordination Center, China


According to our database1, Yuan Zhou authored at least 42 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An Incremental Malware Classification Approach Based on Few-Shot Learning.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Incremental Learning for Mobile Encrypted Traffic Classification.
Proceedings of the ICC 2021, 2021

Inspector: A Semantics-Driven Approach to Automatic Protocol Reverse Engineering.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

Mobile Encrypted Traffic Classification Based on Message Type Inference.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Khaos: An Adversarial Neural Network DGA With High Anti-Detection Ability.
IEEE Trans. Inf. Forensics Secur., 2020

FProbe: Detecting Stealthy DGA-based Botnets by Group Activities Analysis.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

2019
Rethinking Encrypted Traffic Classification: A Multi-Attribute Associated Fingerprint Approach.
Proceedings of the 27th IEEE International Conference on Network Protocols, 2019

2017
基于Wine的Windows安全机制模拟及沙箱系统实现 (Windows Security Mechanisms Simulation and Sandbox System Implementation Based on Wine).
计算机科学, 2017

2016
Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Signcryption KEM/tag-KEM, revisited.
Secur. Commun. Networks, 2015

2014
Generating signatures with optimal overhead: practical paddings for signature schemes.
Secur. Commun. Networks, 2014

Notes on a group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2014

POSTER: Using Chinese Characters for Authentication-Algorithmic Framework and Empirical Results.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

POSTER: Arranging the Layout of Alphanumeric Buttons-the Role of Passwords.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Direct Construction of Signcryption Tag-KEM from Standard Assumptions in the Standard Model.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

Constructing Practical Signcryption KEM from Standard Assumptions without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Practical round-optimal blind signatures without random oracles or non-interactive zero-knowledge proofs.
Secur. Commun. Networks, 2012

Anonymous password-based key exchange with low resources consumption and better user-friendliness.
Secur. Commun. Networks, 2012

Pitfalls in identity based encryption using an elliptic curve combined public key.
Appl. Math. Lett., 2012

2011
Toward an Accurate Snapshot of DHT Networks.
IEEE Commun. Lett., 2011

Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT.
Comput. Commun., 2011

Non-interactive CDH-Based Multisignature Scheme in the Plain Public Key Model with Tighter Security.
Proceedings of the Information Security, 14th International Conference, 2011

Efficient CDH-Based Verifiably Encrypted Signatures with Optimal Bandwidth in the Standard Model.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 10th International Conference, 2011

2010
Information content security on the Internet: the control model and its evaluation.
Sci. China Inf. Sci., 2010

Fully-Secure and Practical Sanitizable Signatures.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Quantifying Information Leakage for Fully Probabilistic Systems.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Bilinear-pairings Based Designated-verifier Threshold Proxy Signature Scheme.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Efficient public key encryption with smallest ciphertext expansion from factoring.
Des. Codes Cryptogr., 2008

2007
Efficient ID-Based Multi-Decrypter Encryption with Short Ciphertexts.
J. Comput. Sci. Technol., 2007

How to construct secure proxy cryptosystem.
Inf. Sci., 2007

2006
Identity Based Key Insulated Signature.
Proceedings of the Information Security Practice and Experience, 2006

Efficient ID-based Broadcast Threshold Decryption in Ad Hoc Network.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2005
Provably secure proxy-protected signature schemes based on factoring.
Appl. Math. Comput., 2005

Proxy blind multi-signature scheme without a secure channel.
Appl. Math. Comput., 2005

Threshold undeniable signature scheme based on conic.
Appl. Math. Comput., 2005

An Efficient Proxy-Protected Signature Scheme Based on Factoring.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Encryption Based on Reversible Second-Order Cellular Automata.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

Constructing Secure Proxy Cryptosystem.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

Secure Delegation-by-Warrant ID-Based Proxy Signcryption Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Constructing Secure Warrant-Based Proxy Signcryption Schemes.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
An efficient digital signature using self-certified public keys.
Proceedings of the 3rd International Conference on Information Security, 2004


  Loading...