部分科研论文:
1. Dehua Zhou, Bowei Wu, Ke Wang, Qifen Yang, Yuhui Deng, Siu-Ming Yiu. Intervention-Driven Correlation Reduction: A Data Generation Approach for Achieving Counterfactually Fair Predictors. 41th IEEE International Conference on Data Engineering(ICDE 2025), pp. 2066-2079, Hong Kong, China, May 19-23, 2025.(CCF-A会议,数据库领域三大顶级会议)
2. Dehua Zhou, Ziyu Song, Zicong Chen, Xianting Huang, Congming Ji, Saru Kumari, Chien-Ming Chen, Sachin Kumar. Advancing explainability of adversarial trained Convolutional Neural Networks for robust engineering applications. Engineering Applications Of Artificial Intelligence, 140: 109681, 2025. (中科院2区TOP期刊)
3. Peng Li, Junzuo Lai, Dehua Zhou, Lianguan Huang, Meng Sun, Wei Wu, Ye Yang. Linkable and traceable anonymous authentication with fine-grained access control. Frontiers of Computer Science, 19(2): 192801, 2025.(CCF-B类期刊)
4. Na Wang, Dehua Zhou*, Yuchien Huang, Caiwen Liu. A traceable and revocable attribute-based encryption scheme with escrow-free in cloud storage. Journal of Systems Architecture, 165: 103426, 2025.(CCF-B类期刊)
5. Peng Li, Haobin Ma, Junzuo Lai, Dehua Zhou, Lianguan Huang, Yuan Li, Ruijia Zang, Junbin Fang. BlockPPA: Blockchain-Assisted Privacy-Preserving Authentication for Cross-Domain Electric Vehicle Charging. IEEE Transactions on Vehicular Technology, 74(2), pp. 3212-3224, 2025.(中科院2区TOP期刊)
6. Yanlin He, Dehua Zhou*, Qiaohong Zhang, Ziqi Tan. VSAFL: Verifiable and Secure Aggregation with (Poly) Logarithmic Overhead in Federated Learning. IEEE Internet of Things Journal, 11(23), pp.38552-38568, 2024.(中科院1区TOP期刊,物联网领域顶刊)
7. Peng Li, Dehua Zhou*, Haobin Ma, Junzuo Lai. Flexible and Secure Access Control for EHR Sharing based on Blockchain, Journal of Systems Architecture, 146: 103033, 2024. (CCF-B类期刊)
8. Peng Li, Junzuo Lai, Dehua Zhou, Ye Yang, Wei Wu, Junbin Fang. Multi-authority anonymous authentication with public accountability for incentive-based applications. Computer. Networks, 231: 109828, 2023.(CCF-B类期刊)
9. Congge Xie, Jian Weng, Dehua Zhou. Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Information Sciences. 594, pp. 249-263, 2022. (中科院1区TOP期刊)
10. Qingqing Gan, Xiaoming Wang, Daxin Huang, Jianwei Li, Dehua Zhou, Chao Wang. Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing. IEEE Transactions on Services Computing, 15(6), pp. 3566-3576, 2022. (CCF-A类期刊)
11. Yongbiao Li, Dehua Zhou*, Yanling Li, Jian Weng, Meng Sun, Ye Yang, Ming Li. Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles. IEEE Transactions on Vehicular Technology, 71(12), pp. 12530-12542, 2022. (中科院2区TOP)
12. Junbin Fang, Dominique Unruh, Dehua Zhou. How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment? 33rd International Symposium on Algorithms and Computation (ISAAC 2022), pp. 26:1–26:12, December 19-21, 2022. (CCF-C类会议)
13. Xiaolei Wang, Sencun Zhu, Dehua Zhou*, Yuexiang Yang. Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. 33rd Annual Computer Security Applications Conference(ACSAC 2017), pp. 350-361, Orlando, FL, USA, 2017. (CCF-B类会议,网络与信息安全领域会议)
14. Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Kefei Chen. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Science in China Series F: Information Sciences, 57(7), pp. 1-5, 2014. (中科院1区TOP期刊)
15. Dehua Zhou, Kefei Chen, Shengli Liu, Dong Zheng. Identity-Based Conditional Proxy Re-Encryption. Chinese Journal of Electronics, 22(1), pp. 61-66, 2013.
