
Chuan Zhao
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j22]Qi Zhao, Chuan Zhao, Shujie Cui, Shan Jing, Zhenxiang Chen:
PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing. Int. J. Intell. Syst. 35(8): 1262-1279 (2020) - [j21]Chuan Zhao
, Shengnan Zhao
, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Oblivious DFA evaluation on joint input and its applications. Inf. Sci. 528: 168-180 (2020) - [j20]Chuan Zhao
, Haitao Guo, Jun Lu, Donghang Yu
, Daoji Li
, Xiaowei Chen
:
ALS Point Cloud Classification With Small Training Data Set Based on Transfer Learning. IEEE Geosci. Remote. Sens. Lett. 17(8): 1406-1410 (2020) - [j19]Donghang Yu
, Qing Xu, Haitao Guo, Chuan Zhao, Yuzhun Lin, Daoji Li
:
An Efficient and Lightweight Convolutional Neural Network for Remote Sensing Image Scene Classification. Sensors 20(7): 1999 (2020) - [j18]Donghang Yu
, Haitao Guo, Qing Xu, Jun Lu, Chuan Zhao
, Yuzhun Lin:
Hierarchical Attention and Bilinear Fusion for Remote Sensing Image Scene Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 6372-6383 (2020) - [c33]Sheraz Ali, Muhammad Maaz Irfan, Abubakar Bomai, Chuan Zhao:
Towards Privacy-Preserving Deep Learning: Opportunities and Challenges. DSAA 2020: 673-682 - [c32]Abubakar Bomai, Mohammed Shujaa Aldeen, Chuan Zhao:
Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System. DSAA 2020: 683-691 - [c31]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10 - [c30]Qi Zhao, Bo Zhang, Anli Yan, Shan Jing, Chuan Zhao:
Towards Privacy-Preserving Aggregated Prediction from SPDZ. ML4CS (1) 2020: 262-271 - [c29]Chuan Zhao, Yan Song, Min Zuo:
Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness Concern. QRS Companion 2020: 563-570
2010 – 2019
- 2019
- [j17]Jiashuang Fan, Suihuai Yu, Jianjie Chu, Dengkai Chen, Mingjiu Yu, Tong Wu, Jian Chen, Fangmin Cheng, Chuan Zhao:
Research on multi-objective decision-making under cloud platform based on quality function deployment and uncertain linguistic variables. Adv. Eng. Informatics 42 (2019) - [j16]Jian Qiu, Heng-Jian Li, Chuan Zhao:
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. Comput. Secur. 82: 1-14 (2019) - [j15]Chuan Zhao
, Shengnan Zhao
, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan
:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j14]Minghao Zhao, Chengyu Hu, Xiangfu Song, Chuan Zhao:
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial. J. Netw. Comput. Appl. 131: 55-65 (2019) - [j13]Samantha Matthews
, Chuan Zhao, Hao Zeng, Frank V. Bright:
Effects of Acetone Vapor on the Exciton Band Photoluminescence Emission from Single- and Few-Layer WS2 on Template-Stripped Gold. Sensors 19(8): 1913 (2019) - [c28]Chuan Zhao, Shengnan Zhao, Bo Zhang, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. CSS (2) 2019: 275-284 - [c27]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan
, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c26]Yuzhun Lin, Chuan Zhao, Daoji Li, Junfeng Xu, Baoming Zhang:
Exploring Model Transfer Potential for Airborne LiDAR Point Cloud Classification. MedPRAI 2019: 39-51 - [c25]Yuzhun Lin, Daoji Li
, Chuan Zhao, Junfeng Xu, Baoming Zhang:
Haralick Feature Guided Network for the Improvement of Generalization in Landcover Classification. MedPRAI 2019: 52-64 - [c24]Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma
, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. TrustCom/BigDataSE 2019: 256-263 - 2018
- [j12]Chuan Zhao
, Shengnan Zhao
, Bo Zhang, Zhongtian Jia, Zhenxiang Chen, Mauro Conti:
Secure Comparison Under Ideal/Real Simulation Paradigm. IEEE Access 6: 31236-31248 (2018) - [j11]Bo Zhang
, Tianqing Zhu, Chengyu Hu
, Chuan Zhao
:
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments. IEEE Access 6: 73885-73894 (2018) - [j10]Chuan Zhao, Zhipeng Feng, Xiukun Wei, Yong Qin:
Sparse classification based on dictionary learning for planet bearing fault identification. Expert Syst. Appl. 108: 233-245 (2018) - [j9]Ying Zhao, Chuan Zhao, Bi Huang, Fei Dai:
BPMN 2.0过程模型的语义和分析 (Semantics and Analysis of BPMN 2.0 Process Models). 计算机科学 45(11A): 558-563 (2018) - [j8]Bo Zhang
, Zhongtian Jia, Chuan Zhao:
An Efficient Certificateless Generalized Signcryption Scheme. Secur. Commun. Networks 2018: 3578942:1-3578942:11 (2018) - [j7]Shanshan Wang, Qiben Yan
, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [c23]Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - [c22]Yuzhun Lin, Baoming Zhang, Junfeng Xu, Jian Li, Chuan Zhao, Donghang Yu:
Hierarchical Building Extraction from High-resolution Remote Sensing Imagery Based on Multi-feature and Multi-scale Method. ICMIP 2018: 17-23 - [c21]Qi He, Zhenxiang Chen, Ke Ji, Lin Wang, Kun Ma
, Chuan Zhao, Yuliang Shi:
Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm. ISDA (1) 2018: 530-539 - [c20]Qi He, Zhenxiang Chen, Anli Yan, Lizhi Peng, Chuan Zhao, Yuliang Shi:
TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline. SPAC 2018: 14-19 - [c19]Anli Yan, Zhenxiang Chen, Lin Wang, Lizhi Peng, Muhammad Umair Hassan
, Chuan Zhao:
Neural Network Rule Extraction for Real Time Traffic Behavior Identification. SPAC 2018: 146-151 - 2017
- [j6]Xiaowei Chen
, Baoming Zhang, Minyi Cen, Haitao Guo, Tonggang Zhang
, Chuan Zhao:
SRTM DEM-Aided Mapping Satellite-1 Image Geopositioning Without Ground Control Points. IEEE Geosci. Remote. Sens. Lett. 14(11): 2137-2141 (2017) - [j5]Hao Wang
, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao:
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21(24): 7325-7335 (2017) - [c18]Ying Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li:
Finding Android Malware Trace from Highly Imbalanced Network Traffic. CSE/EUC (1) 2017: 588-595 - [c17]Shanshan Wang, Zhenxiang Chen, Xiaomei Li, Lin Wang, Ke Ji, Chuan Zhao:
Android Malware Clustering Analysis on Network-Level Behavior. ICIC (1) 2017: 796-807 - [c16]Shanshan Wang, Qiben Yan
, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - [c15]Chuan Zhao:
Education Intelligence Should Be the Breakthrough in Intelligence Science. KMO 2017: 424-434 - 2016
- [c14]Xiaowei Chen, Haitao Guo, Chuan Zhao, Baoming Zhang, Yuzhun Lin:
Hierarchical Image Matching Method Based on Free-Form Linear Features. CCPR (2) 2016: 202-217 - [c13]Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang:
Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. GPC 2016: 261-277 - [c12]Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. Trustcom/BigDataSE/ISPA 2016: 418-425 - 2015
- [j4]Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang:
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. Int. J. Inf. Secur. Priv. 9(2): 1-12 (2015) - [j3]Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu:
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks. Mob. Inf. Syst. 2015: 637458:1-637458:8 (2015) - [j2]Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. Secur. Commun. Networks 8(2): 284-297 (2015) - [c11]Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application. TrustCom/BigDataSE/ISPA (1) 2015: 384-391 - 2014
- [i1]Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation. IACR Cryptol. ePrint Arch. 2014: 768 (2014) - 2013
- [c10]Guiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu:
A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security. CIS 2013: 559-563 - [c9]Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang:
Identity-Based Authenticate Key Exchange Protocol from Lattice. CIS 2013: 564-568 - [c8]Mengmeng Zhang, Chuan Zhao, Jizheng Xu, Huihui Bai:
A fast depth-map wedgelet partitioning scheme for intra prediction in 3D video coding. ISCAS 2013: 2852-2855 - 2012
- [j1]Nicola Bellotto, Ben Benfold, Hanno Harland, Hans-Hellmut Nagel, Nicola Pirlo, Ian Reid, Eric Sommerlade, Chuan Zhao:
Cognitive visual tracking and camera control. Comput. Vis. Image Underst. 116(3): 457-471 (2012) - [c7]Mengmeng Zhang, Chuan Zhao, Jizheng Xu:
An adaptive fast intra mode decision in HEVC. ICIP 2012: 221-224 - 2010
- [c6]Ian Reid
, Chuan Zhao:
Mean-Shift Visual Tracking with NP-Windows Density Estimates. BMVC 2010: 1-10 - [c5]Chuan Zhao, Krishnamoorthy Sivakumar:
An Effective Entity Resolution Method. DMIN 2010: 10-16
2000 – 2009
- 2009
- [c4]Chuan Zhao, Krishnamoorthy Sivakumar:
A Graph-based Similarity Metric and Validity Indices for Clustering Non-numeric and Unstructured Data. DMIN 2009: 531-537 - 2008
- [c3]Chuan Zhao, Andrew Knight, Ian D. Reid:
Target tracking using mean-shift and affine structure. ICPR 2008: 1-5 - 2007
- [c2]Chuan Zhao, Roger T. Alexander:
Testing AspectJ programs using fault-based testing. WTAOP@AOSD 2007: 13-16 - [c1]Chuan Zhao, Roger T. Alexander:
Testing aspect-oriented programs as object-oriented programs. WTAOP@AOSD 2007: 23-27
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-01-27 23:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint