Follow
Junwei ZHOU
Title
Cited by
Cited by
Year
An efficient file hierarchy attribute-based encryption scheme in cloud computing
S Wang, J Zhou, JK Liu, J Yu, J Chen, W Xie
IEEE Transactions on Information Forensics and Security 11 (6), 1265-1277, 2016
3052016
Word embeddings and convolutional neural network for arabic sentiment classification
A Dahou, S Xiong, J Zhou, MH Haddoud, P Duan
Proceedings of coling 2016, the 26th international conference on …, 2016
2002016
Arabic sentiment classification using convolutional neural network and differential evolution algorithm
A Dahou, M Abd Elaziz, J Zhou, S Xiong
Computational intelligence and neuroscience 2019, 2019
922019
A modified chaos-based joint compression and encryption scheme
J Chen, J Zhou, KW Wong
IEEE Transactions on Circuits and Systems II: Express Briefs, 1-5, 2011
712011
A block chaotic image encryption scheme based on self-adaptive modelling
G Ye, J Zhou
Applied Soft Computing 22, 351-357, 2014
492014
Using deep learning to solve computer security challenges: a survey
YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou
Cybersecurity 3, 1-32, 2020
452020
Novel meaningful image encryption based on block compressive sensing
C Pan, G Ye, X Huang, J Zhou
Security and Communication Networks 2019, 1-12, 2019
392019
Geographic segmented opportunistic routing in cognitive radio ad hoc networks using network coding
X Tang, J Zhou, S Xiong, J Wang, K Zhou
IEEE Access 6, 62766-62783, 2018
382018
Chaos-based joint compression and encryption algorithm for generating variable length ciphertext
OY Lui, KW Wong, J Chen, J Zhou
Applied Soft Computing 12 (1), 125-132, 2012
312012
Face template protection using deep LDPC codes learning
L Chen, G Zhao, J Zhou, ATS Ho, LM Cheng
IET Biometrics 8 (3), 190-197, 2019
252019
Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation
J Zhou, H Duan, K Liang, Q Yan, F Chen, FR Yu, J Wu, J Chen
The Computer Journal 60 (8), 1210-1222, 2017
242017
Performance evaluation of a submerged tidal energy device with a single mooring line
B Guo, D Wang, J Zhou, W Shi, X Zhou
Ocean Engineering 196, 106791, 2020
232020
Multi-channel embedding convolutional neural network model for arabic sentiment classification
A Dahou, S Xiong, J Zhou, MA Elaziz
ACM Transactions on Asian and Low-Resource Language Information Processing …, 2019
222019
How to share secret efficiently over networks
L Harn, CF Hsu, Z Xia, J Zhou
Security and Communication Networks 2017, 2017
222017
Deepsyslog: Deep anomaly detection on syslog using sentence embedding and metadata
J Zhou, Y Qian, Q Zou, P Liu, J Xiang
IEEE Transactions on Information Forensics and Security 17, 3051-3061, 2022
192022
Load balancing opportunistic routing for cognitive radio ad hoc networks
W Duan, X Tang, J Zhou, J Wang, G Zhou
Wireless Communications and Mobile Computing 2018, 1-16, 2018
192018
Face anti-spoofing based on dynamic color texture analysis using local directional number pattern
J Zhou, K Shu, P Liu, J Xiang, S Xiong
2020 25th International Conference on Pattern Recognition (ICPR), 4221-4228, 2021
172021
Impacts of various types of El Niño–Southern Oscillation (ENSO) and ENSO Modoki on the rainy season over the Huaihe River basin
Q Cao, Z Hao, J Zhou, W Wang, F Yuan, W Zhu, C Yu
International Journal of Climatology 39 (5), 2811-2824, 2019
172019
Distributed video coding using interval overlapped arithmetic coding
J Zhou, Y Fu, Y Yang, ATS Ho
Signal Processing: Image Communication 76, 118-124, 2019
152019
Abnormal driving behavior detection for bus based on the Bayesian classifier
X Wu, J Zhou, J An, Y Yang
2018 Tenth International Conference on Advanced Computational Intelligence …, 2018
152018
The system can't perform the operation now. Try again later.
Articles 1–20