Kai Zhou
TitelGeciteerd doorJaar
ExpSOS: secure and verifiable outsourcing of exponentiation operations for mobile cloud computing
K Zhou, MH Afifi, J Ren
IEEE Transactions on Information Forensics and Security 12 (11), 2518-2531, 2017
242017
CDMA system design and capacity analysis under disguised jamming
T Song, K Zhou, T Li
IEEE Transactions on Information Forensics and Security 11 (11), 2487-2498, 2016
152016
Passbio: Privacy-preserving user-centric biometric authentication
K Zhou, J Ren
IEEE Transactions on Information Forensics and Security 13 (12), 3050-3063, 2018
92018
Attacking similarity-based link prediction in social networks
K Zhou, TP Michalak, M Waniek, T Rahwan, Y Vorobeychik
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
62019
Secure fine-grained access control of mobile user data through untrusted cloud
K Zhou, J Ren
2016 25th International Conference on Computer Communication and Networks …, 2016
62016
LinSOS: Secure outsourcing of linear computations based on affine mapping
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
52016
P-mod: Secure privilege-based multilevel organizational data-sharing in cloud computing
E Zaghloul, K Zhou, J Ren
IEEE Transactions on Big Data, 2019
42019
Privacy characterization and quantification in data publishing
MH Afifi, K Zhou, J Ren
IEEE Transactions on Knowledge and Data Engineering 30 (9), 1756-1769, 2018
42018
CASO: Cost-aware secure outsourcing of general computational problems
K Zhou, J Ren
IEEE Transactions on Services Computing, 2018
42018
Secure outsourcing of scalar multiplication on elliptic curves
K Zhou, J Ren
2016 IEEE International Conference on Communications (ICC), 1-5, 2016
42016
How to Hide one’s Relationships from Link prediction Algorithms
M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan
Scientific reports 9 (1), 1-10, 2019
32019
Adversarial Robustness of Similarity-Based Link Prediction
K Zhou, TP Michalak, Y Vorobeychik
ICDM, 2019
22019
Robust CDMA receiver design under disguised jamming
K Zhou, T Song, J Ren, T Li
2016 IEEE International Conference on Acoustics, Speech and Signal …, 2016
22016
Security and efficiency trade-offs for cloud computing and storage
J Li, K Zhou, J Ren
2015 Resilience Week (RWS), 1-6, 2015
22015
Adversarial Link Prediction in Social Networks
K Zhou, TP Michalak, T Rahwan, M Waniek, Y Vorobeychik
CoRR, 2018
12018
Computing Equilibria in Binary Networked Public Goods Games
S Yu, K Zhou, PJ Brantingham, Y Vorobeychik
arXiv preprint arXiv:1911.05788, 2019
2019
Research Interest
K Zhou
Industrial & Engineering Chemistry Research 58, 5195-5201, 2019
2019
Attacking Similarity-Based Link Prediction in Social Networks
T Rahwan, M Waniek, TP Michalak, Y Vorobeychik, K Zhou
Proceedings of the 18th International Conference on Autonomous Agents and …, 2019
2019
Security and Privacy Enhancement for Outsourced Biometric Identification
K Zhou, J Ren, T Li
2018 IEEE Global Communications Conference (GLOBECOM), 1-5, 2018
2018
Attack Tolerance of Link Prediction Algorithms: How to Hide Your Relations in a Social Network
M Waniek, K Zhou, Y Vorobeychik, E Moro, TP Michalak, T Rahwan
arXiv preprint arXiv:1809.00152, 2018
2018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20