Kai Zhou
Titel
Geciteerd door
Geciteerd door
Jaar
ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
K Zhou, MH Afifi, J Ren
IEEE Transactions on Information Forensics and Security 12 (11), 2518-2531, 2017
302017
PassBio: Privacy-preserving user-centric biometric authentication
K Zhou, J Ren
IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018
192018
CDMA system design and capacity analysis under disguised jamming
T Song, K Zhou, T Li
IEEE Transactions on Information Forensics and Security 11 (11), 2487-2498, 2016
192016
Attacking similarity-based link prediction in social networks
K Zhou, TP Michalak, M Waniek, T Rahwan, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
14*2019
How to hide one’s relationships from link prediction algorithms
M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan
Scientific reports 9 (1), 1-10, 2019
6*2019
P-mod: Secure privilege-based multilevel organizational data-sharing in cloud computing
E Zaghloul, K Zhou, J Ren
IEEE Transactions on Big Data, 2019
62019
Secure fine-grained access control of mobile user data through untrusted cloud
K Zhou, J Ren
2016 25th International Conference on Computer Communication and Networks …, 2016
62016
LinSOS: Secure outsourcing of linear computations based on affine mapping
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
62016
Adversarial Robustness of Similarity-Based Link Prediction
K Zhou, TP Michalak, Y Vorobeychik
ICDM, 2019
52019
Privacy characterization and quantification in data publishing
MH Afifi, K Zhou, J Ren
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1756-1769, 2018
52018
CASO: Cost-aware secure outsourcing of general computational problems
K Zhou, J Ren
IEEE Transactions on Services Computing, 2018
52018
Secure outsourcing of scalar multiplication on elliptic curves
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
52016
Robust CDMA receiver design under disguised jamming
K Zhou, T Song, J Ren, T Li
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
22016
Security and efficiency trade-offs for cloud computing and storage
J Li, K Zhou, J Ren
2015 Resilience Week (RWS), 1-6, 2015
22015
Computing Equilibria in Binary Networked Public Goods Games.
S Yu, K Zhou, PJ Brantingham, Y Vorobeychik
AAAI, 2310-2317, 2020
12020
Robust Collective Classification against Structural Attacks
K Zhou, Y Vorobeychik
Conference on Uncertainty in Artificial Intelligence, 250-259, 2020
2020
Security and Privacy Enhancement for Outsourced Biometric Identification
K Zhou, J Ren, T Li
2018 IEEE Global Communications Conference (GLOBECOM), 1-5, 2018
2018
Trade-Offs Among Data Security, Usability and Complexity in Mobile Cloud Computing
K Zhou
Michigan State University, 2018
2018
Cost-aware secure outsourcing
J Ren, K Zhou
US Patent App. 15/624,408, 2017
2017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–19