default search action
Fucai Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j59]Qiang Wang, Ying Wang, Fucai Zhou, Jian Xu, Changsheng Zhang:
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR. Comput. Stand. Interfaces 91: 103899 (2025) - 2024
- [j58]Zongye Zhang, Fucai Zhou, Yan Wang:
Multi-user privacy-preserving image search in distributed cloud computing. Comput. Electr. Eng. 118: 109434 (2024) - [j57]Jintong Sun, Fucai Zhou, Qiang Wang, Zi Jiao, Yun Zhang:
Efficient private information retrievals for IoT data based on bucket tree. Comput. Electr. Eng. 119: 109546 (2024) - [j56]Fucai Zhou, Zongye Zhang, Ruiwei Hou:
Privacy-Preserving Image Retrieval with Multi-Modal Query. Comput. J. 67(5): 1979-1992 (2024) - [j55]Fucai Zhou, Qiyu Wu, Pengfei Wu, Jian Xu, Da Feng:
Privacy-preserving and verifiable data aggregation for Internet of Vehicles. Comput. Commun. 218: 198-208 (2024) - [j54]Chen Wang, Jian Xu, Haoran Li, Fucai Zhou, Qiang Wang:
Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems. Comput. Commun. 220: 65-80 (2024) - [j53]Zongye Zhang, Fucai Zhou, Ruiwei Hou:
Privacy-preserving geo-tagged image search in edge-cloud computing for IoT. J. Inf. Secur. Appl. 84: 103808 (2024) - [c27]Zi Jiao, Fucai Zhou, Qiang Wang, Jintong Sun:
Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration. DSPP (1) 2024: 3-20 - 2023
- [j52]Qiyu Wu, Fucai Zhou, Jian Xu, Da Feng:
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT. Comput. Networks 237: 110079 (2023) - [j51]Jintong Sun, Fucai Zhou, Qiang Wang, Zi Jiao, Yun Zhang:
Flexible revocation and verifiability for outsourced Private Set Intersection computation. J. Inf. Secur. Appl. 73: 103438 (2023) - [j50]Long Yin, Jian Xu, Chen Wang, Qiang Wang, Fucai Zhou:
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system. J. Syst. Archit. 143: 102957 (2023) - [j49]Tiemin Ma, Xue Wang, Fucai Zhou, Shuang Wang:
Research on diversity and accuracy of the recommendation system based on multi-objective optimization. Neural Comput. Appl. 35(7): 5155-5163 (2023) - [c26]Yuxi Li, Fucai Zhou, Zifeng Xu, Dong Ji:
SecCDS: Secure Crowdsensing Data Sharing Scheme Supporting Aggregate Query. Inscrypt (1) 2023: 343-359 - [c25]Zexin Wang, Qiang Wang, Zi Jiao, Zhifan Huang, Changsheng Zhang, Fucai Zhou, Che Bian:
E2VQ: Enabling Expressive, Efficient, and Verifiable Queries over Blockchain Databases. ICDM (Workshops) 2023: 682-690 - [c24]Ying Wang, Qiang Wang, Zhifan Huang, Fucai Zhou, Changsheng Zhang, Che Bian:
Privacy-Preserving Fair Outsourcing Polynomial Computation Without FHE and FPR. MobiSec 2023: 78-93 - [c23]Yuxi Li, Fucai Zhou, Jingjing Chen, Dong Ji:
Crowdsensed Data-oriented Distributed and Secure Spatial Query Scheme. TrustCom 2023: 912-919 - 2022
- [j48]Jian Gao, Fucai Zhou:
An Encrypted Cloud Email Searching and Filtering Scheme Based on Hidden Policy Ciphertext-Policy Attribute-Based Encryption With Keyword Search. IEEE Access 10: 8184-8193 (2022) - [j47]Fucai Zhou, Shiyue Qin, Ruitao Hou, Zongye Zhang:
Privacy-preserving image retrieval in a distributed environment. Int. J. Intell. Syst. 37(10): 7478-7501 (2022) - [j46]Yi Liu, Changsheng Zhang, Wenjing Wu, Bin Zhang, Fucai Zhou:
MiniYOLO: A lightweight object detection algorithm that realizes the trade-off between model size and detection accuracy. Int. J. Intell. Syst. 37(12): 12135-12151 (2022) - [j45]Qiyu Wu, Fucai Zhou, Jian Xu, Qiang Wang, Da Feng:
Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT. J. Inf. Secur. Appl. 69: 103270 (2022) - [j44]Zi Jiao, Fucai Zhou, Qiang Wang, Jintong Sun:
RPVC: A Revocable Publicly Verifiable Computation Solution for Edge Computing. Sensors 22(11): 4012 (2022) - [j43]Da Feng, Fucai Zhou, Qiang Wang, Qiyu Wu, Bao Li:
Efficient Aggregate Queries on Location Data with Confidentiality. Sensors 22(13): 4908 (2022) - [j42]Qiang Wang, Fucai Zhou, Jian Xu, Su Peng:
Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets. IEEE Trans. Cloud Comput. 10(2): 1201-1214 (2022) - [j41]Qiang Wang, Fucai Zhou, Boyang Zhou, Jian Xu, Chunyu Chen, Qi Wang:
Privacy-Preserving Publicly Verifiable Databases. IEEE Trans. Dependable Secur. Comput. 19(3): 1639-1654 (2022) - [c22]Da Feng, Fucai Zhou, Debiao He, Mengna Guo, Qiyu Wu:
Secure Distributed Outsourcing of Large-scale Linear Systems. ICDCS 2022: 1110-1121 - [c21]Zi Jiao, Fucai Zhou, Qiang Wang, Jintong Sun, Jiahui Lu:
VSES-MB: Verifiable Searchable Encryption Scheme in Metaverse by Blockchain. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2452-2459 - 2021
- [j40]Qiang Wang, Fucai Zhou, Jian Xu, Zifeng Xu:
Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener. Comput. Syst. 115: 553-567 (2021) - [j39]Shiyue Qin, Zhenhua Tan, Bin Zhang, Fucai Zhou:
Distributed secret sharing scheme based on the high-dimensional rotation paraboloid. J. Inf. Secur. Appl. 58: 102797 (2021) - [j38]Jian Xu, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou:
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem. Mob. Networks Appl. 26(4): 1475-1492 (2021) - [j37]Shiyue Qin, Zhenhua Tan, Fucai Zhou, Jian Xu, Zongye Zhang:
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks. Secur. Commun. Networks 2021: 6629726:1-6629726:14 (2021) - [j36]Yuxi Li, Fucai Zhou, Yue Ge, Zifeng Xu:
Privacy-Enhancing k-Nearest Neighbors Search over Mobile Social Networks. Sensors 21(12): 3994 (2021) - [c20]Tiemin Ma, Rui Chen, Fucai Zhou, Shuang Wang, Xue Wang:
Social Event Recommendation Based on Social Relationship and Attention Mechanism. ICMAI 2021: 72-77 - 2020
- [j35]Shiyue Qin, Fucai Zhou, Zongye Zhang, Zifeng Xu:
Privacy-Preserving Substring Search on Multi-Source Encrypted Gene Data. IEEE Access 8: 50472-50484 (2020) - [j34]Zongye Zhang, Fucai Zhou, Shiyue Qin, Qiang Jia, Zifeng Xu:
Privacy-Preserving Image Retrieval and Sharing in Social Multimedia Applications. IEEE Access 8: 66828-66838 (2020) - [j33]Yuxi Li, Fucai Zhou, Zifeng Xu, Yue Ge:
An Efficient Two-Server Ranked Dynamic Searchable Encryption Scheme. IEEE Access 8: 86328-86344 (2020) - [j32]Qiang Wang, Fucai Zhou, Jian Xu, Zifeng Xu:
A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications. Comput. J. 63(4): 633-647 (2020) - [j31]Zifeng Xu, Fucai Zhou, Jin Li, Yuxi Li, Qiang Wang:
Graph encryption for all-path queries. Concurr. Comput. Pract. Exp. 32(16) (2020) - [j30]Jian Xu, Laiwen Wei, Wei Wu, Andi Wang, Yu Zhang, Fucai Zhou:
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. Future Gener. Comput. Syst. 108: 1287-1296 (2020) - [j29]Jian Xu, Heng Liu, Dexin Wu, Fucai Zhou, Chong-zhi Gao, Linzhi Jiang:
Generating universal adversarial perturbation with ResNet. Inf. Sci. 537: 302-312 (2020) - [j28]Fucai Zhou, Qiang Wang, Jian Xu, Su Peng, Zifeng Xu:
Chameleon accumulator and its applications. J. Inf. Secur. Appl. 50 (2020) - [j27]Chen Wang, Andi Wang, Jian Xu, Qiang Wang, Fucai Zhou:
Outsourced privacy-preserving decision tree classification service over encrypted data. J. Inf. Secur. Appl. 53: 102517 (2020) - [j26]Jian Xu, Andi Wang, Jun Wu, Chen Wang, Ruijin Wang, Fucai Zhou:
SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing. IEEE Trans. Comput. Soc. Syst. 7(1): 261-274 (2020) - [j25]Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu:
Privacy-Preserving Graph Operations for Mobile Authentication. Wirel. Commun. Mob. Comput. 2020: 8859213:1-8859213:13 (2020) - [c19]Shiyue Qin, Zhenhua Tan, Bin Zhang, Fucai Zhou:
Evolutionary-Based Image Encryption with DNA Coding and Chaotic Systems. WISA 2020: 592-604 - [c18]Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu:
Privacy-Preserving Graph Operations for Social Network Analysis. SocialSec 2020: 303-317 - [c17]Yuxi Li, Fucai Zhou, Zifeng Xu:
PPFQ: Privacy-Preserving Friends Query over Online Social Networks. TrustCom 2020: 1348-1353
2010 – 2019
- 2019
- [j24]Qiyu Wu, Fucai Zhou, Jian Xu, Da Feng, Bao Li:
Lightweight Privacy-Preserving Equality Query in Edge Computing. IEEE Access 7: 182588-182599 (2019) - [j23]Qiang Wang, Fucai Zhou, Su Peng, Jian Xu:
Publicly verifiable function secret sharing. Int. J. Comput. Sci. Eng. 20(4): 526-535 (2019) - [j22]Zifeng Xu, Fucai Zhou, Yuxi Li, Jian Xu, Qiang Wang:
Privacy-Preserving Subgraph Matching Protocol for Two Parties. Int. J. Found. Comput. Sci. 30(4): 571-588 (2019) - [j21]Qiyu Wu, Fucai Zhou, Jian Xu, Qiang Wang:
Secure data stream outsourcing with publicly verifiable integrity in cloud storage. J. Inf. Secur. Appl. 49 (2019) - [j20]Su Peng, Fucai Zhou, Jin Li, Qiang Wang, Zifeng Xu:
Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas. J. Netw. Comput. Appl. 134: 72-88 (2019) - [c16]Yuxi Li, Fucai Zhou, Zifeng Xu:
PAFR: Privacy-Aware Friends Retrieval over Online Social Networks. SciSec 2019: 323-338 - 2018
- [j19]Yuxi Li, Fucai Zhou, Yuhai Qin, Muqing Lin, Zifeng Xu:
Integrity-verifiable conjunctive keyword searchable encryption in cloud storage. Int. J. Inf. Sec. 17(5): 549-568 (2018) - [j18]Jian Xu, Laiwen Wei, Yu Zhang, Andi Wang, Fucai Zhou, Chong-zhi Gao:
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107: 113-124 (2018) - [j17]Qiang Wang, Fucai Zhou, Tiemin Ma, Zifeng Xu:
Faster fog-aided private set intersectionwith integrity preserving. Frontiers Inf. Technol. Electron. Eng. 19(12): 1558-1568 (2018) - [c15]Qiang Wang, Fucai Zhou, Su Peng, Zifeng Xu:
Verifiable Outsourced Computation with Full Delegation. ICA3PP (4) 2018: 270-287 - [c14]Huiyan Jiang, Zhongkuan Li, Siqi Li, Fucai Zhou:
An Effective Multi-classification Method for NHL Pathological Images. SMC 2018: 763-768 - 2017
- [j16]Qiang Wang, Fucai Zhou, Chunyu Chen, Pengkai Xuan, Qiyu Wu:
Secure Collaborative Publicly Verifiable Computation. IEEE Access 5: 2479-2488 (2017) - [j15]Jian Xu, Fuxiang Li, Ke Chen, Fucai Zhou, Junho Choi, Juhyun Shin:
Dynamic Chameleon Authentication Tree for Verifiable Data Streaming in 5G Networks. IEEE Access 5: 26448-26459 (2017) - [j14]Su Peng, Fucai Zhou, Qiang Wang, Zifeng Xu, Jian Xu:
Identity-Based Public Multi-Replica Provable Data Possession. IEEE Access 5: 26990-27001 (2017) - [j13]Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu:
Identity-Based Batch Provable Data Possession with Detailed Analyses. Int. J. Found. Comput. Sci. 28(6): 743-760 (2017) - [j12]Xiaohan Yue, Fucai Zhou, Xibo Wang, Rui Li:
Enhanced security model and efficient construction for direct anonymous attestation. Int. J. Internet Protoc. Technol. 10(1): 36-50 (2017) - [j11]Jian Xu, Si-Jia Zhao, Fucai Zhou:
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services. J. Inf. Sci. Eng. 33(4): 965-978 (2017) - [c13]Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu, Su Peng:
Private Graph Intersection Protocol. ACISP (2) 2017: 235-248 - [c12]Meng Bi, Andi Wang, Jian Xu, Fucai Zhou:
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer. CSE/EUC (1) 2017: 596-599 - [c11]Huaxun Deng, Linfeng Zhao, Ning Luo, Yuan Liu, Guibing Guo, Xingwei Wang, Zhenhua Tan, Shuang Wang, Fucai Zhou:
Semi-Supervised Learning Based Fake Review Detection. ISPA/IUCC 2017: 1278-1280 - [c10]Zifeng Xu, Fucai Zhou, Yuxi Li, Jian Xu, Qiang Wang:
Private Subgraph Matching Protocol. ProvSec 2017: 455-470 - 2016
- [j10]Fuxiang Li, Fucai Zhou, Heqing Yuan, Zifeng Xu, Qiang Wang:
Bilinear-map accumulator-based verifiable intersection operations on encrypted data in cloud. Concurr. Comput. Pract. Exp. 28(11): 3238-3253 (2016) - [j9]Fucai Zhou, Yuxi Li, Qingshi Zhou, Jingwei Miao, Jian Xu:
The electronic cash system based on non-interactive zero-knowledge proofs. Int. J. Comput. Math. 93(2): 239-257 (2016) - [j8]Meng Bi, Jian Xu, Mo Wang, Fucai Zhou:
Anomaly detection model of user behavior based on principal component analysis. J. Ambient Intell. Humaniz. Comput. 7(4): 547-554 (2016) - [j7]Jian Xu, Fucai Zhou, Zhihao Jiang, Rui Xue:
Dynamic proofs of retrievability with square-root oblivious RAM. J. Ambient Intell. Humaniz. Comput. 7(5): 611-621 (2016) - [j6]Jian Xu, Mingjie Li, Fucai Zhou, Rui Xue:
基于用户鼠标行为的身份认证方法 (Identity Authentication Method Based on User's Mouse Behavior). 计算机科学 43(2): 148-154 (2016) - [j5]Su Peng, Fucai Zhou, Jian Xu, Zifeng Xu:
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage". IEEE Trans. Serv. Comput. 9(6): 996-998 (2016) - [c9]Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu:
Identity-Based Batch Provable Data Possession. ProvSec 2016: 112-129 - [c8]Fucai Zhou, Yuxi Li, Alex X. Liu, Muqing Lin, Zifeng Xu:
Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing. ProvSec 2016: 153-172 - 2015
- [j4]Shuang Wang, Lina Wu, Fucai Zhou, Cuicui Zheng, Haibo Wang:
Group Pattern Mining on Moving Objects' Uncertain Trajectories. Int. J. Comput. Commun. Control 10(3): 428-440 (2015) - [j3]Fucai Zhou, Muqing Lin, Yang Zhou, Yuxi Li:
Efficient Anonymous Broadcast Encryption with Adaptive Security. KSII Trans. Internet Inf. Syst. 9(11): 4680-4700 (2015) - 2014
- [c7]Jian Xu, Ze Cao, Qiong Xiao, Fucai Zhou:
An Improved Authenticated Skip List for Relational Query Authentication. BWCCA 2014: 229-232 - 2013
- [j2]Jian Xu, Yuxi Li, Jingwei Miao, Fucai Zhou:
The Electronic Cash Protocol Based on Dynamic Group Signature. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 65-79 (2013) - [c6]Xiao-han Yue, Fucai Zhou:
A Novel Direct Anonymous Attestation Scheme Using Secure Two-Party Computation. ICoC 2013: 218-235 - 2012
- [c5]Xiao-han Yue, Fucai Zhou:
An Efficient Property-Based Attestation Scheme with Flexible Revocation Mechanisms. IPDPS Workshops 2012: 1223-1230
2000 – 2009
- 2008
- [j1]Fucai Zhou, Jun Zhang, Jian Xu:
Research on anonymous signatures and group signatures. Comput. Commun. 31(17): 4199-4205 (2008) - [c4]Fucai Zhou, Jian Xu, Long Lin, Haifang Xu:
Multicast Key Management Scheme Based on TOFT. HPCC 2008: 1030-1035 - [c3]Jian Xu, Fucai Zhou, Xinyang Li, Muzhou Yang:
Hierarchical Data Processing Model and Complete Tree Key Management Mechanism. ICYCS 2008: 1606-1612 - [c2]Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang:
Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. NPC Workshops 2008: 82-87 - 2006
- [c1]Fucai Zhou, Ping Sun, Jinying Wang:
Researches on Properties of Generalized Normalization Coefficient in NML Distribution. ICICIC (3) 2006: 38-41
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint