周德华

发布者:2023-11-17发布者:149

部分科研论文:

1. Dehua ZhouBowei WuKe WangQifen YangYuhui DengSiu-Ming Yiu. Intervention-Driven Correlation Reduction: A Data Generation Approach for Achieving Counterfactually Fair Predictors. 41th IEEE International Conference on Data Engineering(ICDE 2025), pp. 2066-2079, Hong Kong, China, May 19-23, 2025.(CCF-A会议,数据库领域三大顶级会议)

2. Dehua Zhou, Ziyu Song, Zicong Chen,  Xianting Huang, Congming Ji,  Saru Kumari,  Chien-Ming Chen,  Sachin Kumar.Advancing explainability of adversarial trained Convolutional Neural Networks for robust engineering applications. Engineering Applications Of Artificial Intelligence, (中科院2TOP期刊

3. Peng LiJunzuo Lai, Dehua Zhou, Lianguan HuangMeng SunWei WuYe Yang. Linkable and traceable anonymous authentication with fine-grained access control. Frontiers of Computer Science, 19(2)1928012025.CCF-B类期刊)

4. Na Wang, Dehua Zhou*, Yuchien Huang, Caiwen Liu. A traceable and revocable attribute-based encryption scheme with escrow-free in cloud storage. Journal of Systems Architecture, 165: 103426, 2025.CCF-B类期刊)

5. Peng LiHaobin MaJunzuo LaiDehua ZhouLianguan HuangYuan LiRuijia ZangJunbin Fang. BlockPPA: Blockchain-Assisted Privacy-Preserving Authentication for Cross-Domain Electric Vehicle Charging. IEEE Transactions on Vehicular Technology74(2), pp. 3212-3224, 2025.(中科院2TOP期刊

6. Yanlin He, Dehua Zhou*, Qiaohong Zhang, Ziqi Tan. VSAFL: Verifiable and Secure Aggregation with (Poly) Logarithmic Overhead in Federated Learning. IEEE Internet of Things Journal, 11(23), pp.38552-38568, 2024.中科院1TOP期刊,物联网领域顶刊)

7. Peng LiDehua Zhou*,  Haobin MaJunzuo LaiFlexible and Secure Access Control for EHR Sharing based on Blockchain, Journal of Systems Architecture146: 103033, 2024. CCF-B类期刊)

8. Peng Li, Junzuo Lai, Dehua ZhouYe YangWei WuJunbin Fang. Multi-authority anonymous authentication with public accountability for incentive-based applications. Computer. Networks, 231: 109828, 2023.(CCF-B类期刊)

9. Congge XieJian WengDehua Zhou. Revocable identity-based fully homomorphic signature scheme with signing key exposure resistance. Information Sciences. 594, pp. 249-263, 2022.  

10. Qingqing GanXiaoming WangDaxin HuangJianwei LiDehua ZhouChao Wang. Towards Multi-Client Forward Private Searchable Symmetric Encryption in Cloud Computing. IEEE Transactions on Services Computing15(6), pp. 3566-3576, 2022. CCF-A类期刊)

11. Yongbiao Li, Dehua Zhou*, Yanling Li, Jian Weng, Meng Sun, Ye Yang, Ming Li. Privacy-Preserving and Real-Time Detection of Vehicular Congestion Using Multilayer Perceptron Approach for Internet of Vehicles. IEEE Transactions on Vehicular Technology, 71(12), pp. 12530-12542, 2022.  (中科院2TOP

12. Junbin Fang, Dominique Unruh, Dehua Zhou. How to Base Security on the Perfect/Statistical Binding Property of Quantum Bit Commitment?  33rd International Symposium on Algorithms and Computation (ISAAC 2022), pp. 26:1–26:12,  December 19-21, 2022. CCF-C类会议)

13. Xiaolei WangSencun ZhuDehua Zhou*Yuexiang Yang. Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. 33rd Annual Computer Security Applications Conference(ACSAC 2017), pp. 350-361, Orlando, FL, USA, 2017. CCF-B类会议,网络与信息安全领域会议

14. Dehua Zhou, Jian Weng, Chaowen Guan, Robert H. Deng, Kefei Chen. Cryptanalysis of a signcryption scheme with fast online signing and short signcryptext. Science in China Series F: Information Sciences, 57(7), pp. 1-5, 2014. (中科院1区TOP期刊)

15. Dehua Zhou, Kefei Chen, Shengli Liu, Dong Zheng. Identity-Based Conditional Proxy Re-Encryption. Chinese Journal of Electronics, 22(1), pp. 61-66, 2013.