Follow
Chuan Zhao (赵川)
Chuan Zhao (赵川)
Quan Cheng Laboratory
Verified email at ujn.edu.cn
Title
Cited by
Cited by
Year
Secure multi-party computation: theory, practice and applications
C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
3192019
Detecting android malware leveraging text semantics of network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
1402017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
H Wang, D He, J Shen, Z Zheng, C Zhao, M Zhao
Soft Computing 21, 7325-7335, 2017
542017
: Privacy‐preserving collaborative deep learning against leakage from gradient sharing
Q Zhao, C Zhao, S Cui, S Jing, Z Chen
International Journal of Intelligent Systems 35 (8), 1262-1279, 2020
382020
Cognitive visual tracking and camera control
N Bellotto, B Benfold, H Harland, HH Nagel, N Pirlo, I Reid, ...
Computer Vision and Image Understanding 116 (3), 457-471, 2012
342012
An efficient certificateless generalized signcryption scheme
B Zhang, Z Jia, C Zhao
Security and Communication Networks 2018, 2018
292018
Target tracking using mean-shift and affine structure
C Zhao, A Knight, I Reid
2008 19th International Conference on Pattern Recognition, 1-5, 2008
272008
Effective detection of mobile malware behavior based on explainable deep neural network
A Yan, Z Chen, H Zhang, L Peng, Q Yan, MU Hassan, C Zhao, B Yang
Neurocomputing 453, 482-492, 2021
252021
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication
J Qiu, H Li, C Zhao
Computers & Security 82, 1-14, 2019
242019
TextDroid: Semantics-based detection of mobile malware using network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2017
222017
Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments
B Zhang, T Zhu, C Hu, C Zhao
IEEE Access 6, 73885-73894, 2018
212018
A signature-based assistant random oversampling method for malware detection
Y Pang, Z Chen, L Peng, K Ma, C Zhao, K Ji
2019 18th IEEE International conference on trust, security and privacy in …, 2019
202019
Dart: Detecting unseen malware variants using adaptation regularization transfer learning
H Li, Z Chen, R Spolaor, Q Yan, C Zhao, B Yang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
162019
Iot botnet detection framework from network behavior based on extreme learning machine
N Hasan, Z Chen, C Zhao, Y Zhu, C Liu
IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops …, 2022
152022
Finding Android malware trace from highly imbalanced network traffic
Y Pang, Z Chen, X Li, S Wang, C Zhao, L Wang, K Ji, Z Li
2017 IEEE International Conference on Computational Science and Engineering …, 2017
152017
Cut-and-choose bilateral oblivious transfer and its application
C Zhao, H Jiang, X Wei, Q Xu, M Zhao
2015 IEEE Trustcom/BigDataSE/ISPA 1, 384-391, 2015
122015
Design of a robot for inspecting the multishape pipeline systems
T Zheng, X Wang, H Li, C Zhao, Z Jiang, Q Huang, M Ceccarelli
IEEE/ASME Transactions on Mechatronics 27 (6), 4608-4618, 2022
112022
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
M Zhao, C Hu, X Song, C Zhao
Journal of Network and Computer Applications 131, 55-65, 2019
112019
Fair secure computation with reputation assumptions in the mobile social networks
Y Wang, C Zhao, Q Xu, Z Zheng, Z Chen, Z Liu
Mobile Information Systems 2015, 2015
112015
Fast cut-and-choose bilateral oblivious transfer for malicious adversaries
X Wei, H Jiang, C Zhao, M Zhao, Q Xu
2016 IEEE Trustcom/BigDataSE/ISPA, 418-425, 2016
92016
The system can't perform the operation now. Try again later.
Articles 1–20