Follow
Chuan Zhao (赵川)
Chuan Zhao (赵川)
Quan Cheng Laboratory
Verified email at ujn.edu.cn
Title
Cited by
Cited by
Year
Secure multi-party computation: theory, practice and applications
C Zhao, S Zhao, M Zhao, Z Chen, CZ Gao, H Li, Y Tan
Information Sciences 476, 357-372, 2019
3372019
Detecting android malware leveraging text semantics of network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
IEEE Transactions on Information Forensics and Security 13 (5), 1096-1109, 2017
1452017
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing
H Wang, D He, J Shen, Z Zheng, C Zhao, M Zhao
Soft Computing 21, 7325-7335, 2017
552017
: Privacy‐preserving collaborative deep learning against leakage from gradient sharing
Q Zhao, C Zhao, S Cui, S Jing, Z Chen
International Journal of Intelligent Systems 35 (8), 1262-1279, 2020
402020
An efficient certificateless generalized signcryption scheme
B Zhang, Z Jia, C Zhao
Security and Communication Networks 2018, 2018
292018
Effective detection of mobile malware behavior based on explainable deep neural network
A Yan, Z Chen, H Zhang, L Peng, Q Yan, MU Hassan, C Zhao, B Yang
Neurocomputing 453, 482-492, 2021
272021
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication
J Qiu, H Li, C Zhao
Computers & Security 82, 1-14, 2019
242019
TextDroid: Semantics-based detection of mobile malware using network flows
S Wang, Q Yan, Z Chen, B Yang, C Zhao, M Conti
2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2017
232017
A signature-based assistant random oversampling method for malware detection
Y Pang, Z Chen, L Peng, K Ma, C Zhao, K Ji
2019 18th IEEE International conference on trust, security and privacy in …, 2019
212019
Cryptanalysis of a lightweight certificateless signature scheme for IIOT environments
B Zhang, T Zhu, C Hu, C Zhao
IEEE Access 6, 73885-73894, 2018
212018
Dart: Detecting unseen malware variants using adaptation regularization transfer learning
H Li, Z Chen, R Spolaor, Q Yan, C Zhao, B Yang
ICC 2019-2019 IEEE International Conference on Communications (ICC), 1-6, 2019
162019
Iot botnet detection framework from network behavior based on extreme learning machine
N Hasan, Z Chen, C Zhao, Y Zhu, C Liu
IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops …, 2022
152022
Finding Android malware trace from highly imbalanced network traffic
Y Pang, Z Chen, X Li, S Wang, C Zhao, L Wang, K Ji, Z Li
2017 IEEE International Conference on Computational Science and Engineering …, 2017
152017
Design of a robot for inspecting the multishape pipeline systems
T Zheng, X Wang, H Li, C Zhao, Z Jiang, Q Huang, M Ceccarelli
IEEE/ASME Transactions on Mechatronics 27 (6), 4608-4618, 2022
122022
Cut-and-choose bilateral oblivious transfer and its application
C Zhao, H Jiang, X Wei, Q Xu, M Zhao
2015 IEEE Trustcom/BigDataSE/ISPA 1, 384-391, 2015
122015
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial
M Zhao, C Hu, X Song, C Zhao
Journal of Network and Computer Applications 131, 55-65, 2019
112019
Fair secure computation with reputation assumptions in the mobile social networks
Y Wang, C Zhao, Q Xu, Z Zheng, Z Chen, Z Liu
Mobile Information Systems 2015, 2015
112015
Fast cut-and-choose bilateral oblivious transfer for malicious adversaries
X Wei, H Jiang, C Zhao, M Zhao, Q Xu
2016 IEEE Trustcom/BigDataSE/ISPA, 418-425, 2016
92016
Fair two‐party computation with rational parties holding private types
Y Wang, DS Wong, C Zhao, Q Xu
Security and Communication Networks 8 (2), 284-297, 2015
92015
Privacy-preserving GWAS computation on outsourced data encrypted under multiple keys through hybrid system
A Bomai, MS Aldeen, C Zhao
2020 IEEE 7th International Conference on Data Science and Advanced …, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20