


default search action
Chuan Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j39]Md Sabuj Khan, Hengjian Li
, Chuan Zhao:
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism. Comput. Secur. 142: 103863 (2024) - [j38]Linpei Li
, Wanqing Guan
, Chuan Zhao, Yu Su, Jiahao Huo
:
Trajectory Planning, Phase Shift Design, and IoT Devices Association in Flying-RIS-Assisted Mobile Edge Computing. IEEE Internet Things J. 11(1): 147-157 (2024) - [j37]Chao Ren
, Zongrui He, Yin Long, Chuan Zhao, Lei Sun
, Kexin Xu
:
Multimodal Virtual Semantic Communication for Tiny-Machine-Learning-Based UAV Task Execution. IEEE Internet Things J. 11(19): 30864-30874 (2024) - [j36]Saihua Cai
, Yingwei Zhao, Yikai Hu, Junzhe Wu, Jiaxu Wu, Guofeng Zhang, Chuan Zhao, Rexford Nii Ayitey Sosu
:
CD-BTMSE: A Concept Drift detection model based on Bidirectional Temporal Convolutional Network and Multi-Stacking Ensemble learning. Knowl. Based Syst. 294: 111681 (2024) - [j35]Mohammed Shujaa Aldeen
, Chuan Zhao
, Zhenxiang Chen
, Liming Fang
, Zhe Liu
:
Privacy-Preserving Collaborative Learning for Genome Analysis via Secure XGBoost. IEEE Trans. Dependable Secur. Comput. 21(6): 5755-5765 (2024) - [c61]Amina El Garne, Yunan Wei, Yucheng Lin, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen:
Secure and Robust Privacy-Preserving Federated Learning For Heterogeneous Resource. ICICS (1) 2024: 251-270 - 2023
- [j34]Mengcheng Wang
, Chuan Zhao, Alan Barr, Hao Fan
, Suihuai Yu, Jay M. Kapellusch, Carisa Harris-Adamson:
Hand Posture and Force Estimation Using Surface Electromyography and an Artificial Neural Network. Hum. Factors 65(3): 382-402 (2023) - [j33]Donghang Yu
, Haitao Guo
, Chuan Zhao
, Xiangyun Liu, Qing Xu
, Yuzhun Lin
, Lei Ding
:
An Anchor-Free and Angle-Free Detector for Oriented Object Detection Using Bounding Box Projection. IEEE Trans. Geosci. Remote. Sens. 61: 1-17 (2023) - [c60]Feifan Hao, Shan Jing, Chuan Zhao:
Link load balancing scheme for elephant flow in SDN data center. ISPA/BDCloud/SocialCom/SustainCom 2023: 1026-1033 - [c59]Chenghan Wang, Shanshan Wang, Chuan Zhao, Xueyang Cao, Shuhao Yan, Yadi Han, Limei Huang, Zhenxiang Chen:
The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning. BIBM 2023: 4159-4166 - [c58]Daokuan Bai, Shanshan Wang, Wenyue Wang, Hua Wang, Chuan Zhao, Peng Yuan, Zhenxiang Chen:
Overcoming Noisy Labels in Federated Learning Through Local Self-Guiding. CCGrid 2023: 367-376 - [c57]Hao Wu, Shengnan Zhao, Chuan Zhao, Shan Jing:
A General Federated Learning Scheme with Blockchain on Non-IID Data. Inscrypt (1) 2023: 126-140 - [c56]Wenxiu Zhang
, Shan Jing
, Chuan Zhao
:
A Survey of SDN Data Plane Attacks and Defense Strategies. CNCIT 2023: 59-65 - [c55]Chenghan Wang, Shanshan Wang, Chuan Zhao, Wenyue Wang, Bin Hu, Youmian Wang, Lin Wang, Zhenxiang Chen:
Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry. COMPSAC 2023: 396-405 - [c54]Wenxiu Zhang, Shan Jing, Chuan Zhao:
Anti-DDoS Attacks Strategy of SDN Data Plane with Data Augmentation Based on P4. HPCC/DSS/SmartCity/DependSys 2023: 348-354 - [c53]Chuan Zhao
, Shaoming Pan
, Wenwu Wang
:
Improved Canny Edge Detection Algorithm for Noisy Images. ICAICE 2023: 84-89 - [c52]Shan Jing
, Chuan Zhao
, Lei Guo
, Yang Tian
:
Application of case-based PBL teaching method in the teaching of Network and Service Engineering. ICBDE 2023: 33-40 - [c51]Peng Yuan, Shanshan Wang, Chuan Zhao, Wenyue Wang, Daokuan Bai, Lizhi Peng, Zhenxiang Chen:
Adversarial Attack with Genetic Algorithm against IoT Malware Detectors. ICC 2023: 1413-1418 - [c50]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti
:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c49]Lei Guo, Shan Jing, Liang Wei, Chuan Zhao:
Crossfire Attack Defense Method Based on Virtual Topology. MSN 2023: 341-350 - [c48]Jun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu, Liming Fang:
Practical Single-Round Secure Wildcard Pattern Matching. SEC 2023: 87-101 - [d1]Chuan Zhao:
Current control process for adaptive and dexterous underactuated fingers. IEEE DataPort, 2023 - 2022
- [j32]Kunning Tang
, Quentin Meyer
, Robin White, Ryan T. Armstrong
, Peyman Mostaghimi
, Ying Da Wang
, Shiyang Liu, Chuan Zhao
, Klaus Regenauer-Lieb
, Patrick Kin Man Tung
:
Deep learning for full-feature X-ray microcomputed tomography segmentation of proton electron membrane fuel cells. Comput. Chem. Eng. 161: 107768 (2022) - [j31]Chuan Zhao, Xin Li, Zezhi Shao, Hongji Yang, Fei Wang:
Multi-featured spatial-temporal and dynamic multi-graph convolutional network for metro passenger flow prediction. Connect. Sci. 34(1): 1252-1272 (2022) - [j30]Haixin Jia
, Mohammed Shujaa Aldeen, Chuan Zhao
, Shan Jing, Zhenxiang Chen:
Flexible privacy-preserving machine learning: When searchable encryption meets homomorphic encryption. Int. J. Intell. Syst. 37(11): 9173-9191 (2022) - [j29]Shengnan Zhao
, Qi Zhao, Chuan Zhao, Han Jiang, Qiuliang Xu:
Privacy-enhancing machine learning framework with private aggregation of teacher ensembles. Int. J. Intell. Syst. 37(11): 9904-9920 (2022) - [j28]Chuan Zhao, Luyao Li, Haoxiong Yang, Mingke He:
Dynamic interactive control of inventory in a dual-channel supply chain under stochastic demand: Modelling and empirical studies. J. Oper. Res. Soc. 73(11): 2412-2430 (2022) - [j27]Xin Lu, Hongli Zhao
, Yanyan Huang, Shuangmei Liu, Zelong Ma, Yunzhong Jiang, Wei Zhang, Chuan Zhao
:
Generating Daily Soil Moisture at 16 m Spatial Resolution Using a Spatiotemporal Fusion Model and Modified Perpendicular Drought Index. Sensors 22(14): 5366 (2022) - [j26]Chuan Zhao
, Koichi Oka
, Feng Sun
, Akinori Harada, Junjie Jin
, Ming Zhang
:
Design of Zero-Power Control Strategy With Resisting Tilt of Hybrid Magnetic Levitation System. IEEE Trans. Ind. Electron. 69(11): 11394-11402 (2022) - [c47]Nasimul Hasan, Zhenxiang Chen, Chuan Zhao, Yuhui Zhu, Cong Liu:
IoT Botnet Detection framework from Network Behavior based on Extreme Learning Machine. INFOCOM Workshops 2022: 1-6 - [c46]Wenyue Wang, Shanshan Wang, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen:
SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT. ISPA/BDCloud/SocialCom/SustainCom 2022: 774-781 - [c45]Lei Guo, Shan Jing, Chuan Zhao:
Overview of DDoS Attack Research Under SDN. ML4CS (2) 2022: 39-53 - [c44]Chuan Zhao, Huilei Cao:
Risk Evaluation of the Destination Port Logistics based on Self-Organizing Map Computing. QRS Companion 2022: 746-751 - [c43]Chuan Zhao, Menghua Liu, Hui Li, Zhihong Jiang, Shenyao Feng, Tao Zheng, Long Li, Bainan Zhang:
Underactuated Three-finger Dexterous Hand in High Altitude and Extreme Environments. RCAR 2022: 562-567 - [i3]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - [i2]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [j25]Anli Yan, Zhenxiang Chen, Haibo Zhang
, Lizhi Peng, Qiben Yan, Muhammad Umair Hassan, Chuan Zhao, Bo Yang:
Effective detection of mobile malware behavior based on explainable deep neural network. Neurocomputing 453: 482-492 (2021) - [j24]Chuan Zhao, Yan Song, Min Zuo, Hongji Yang:
Performance Analysis for Green Food in Dual-Channel Supply Chain Considering Fairness Concern. Int. J. Perform. Eng. 17(1): 155-166 (2021) - [j23]Chuan Zhao, Luyao Li, Hongji Yang
:
Multiscenario Analyses Between Front and Back End Investment in Software Reliability: An Evolutionary Game Perspective. IEEE Trans. Reliab. 70(4): 1381-1396 (2021) - [c42]Qian Zhang, Shan Jing, Chuan Zhao, Bo Zhang, Zhenxiang Chen:
Efficient Federated Learning Framework Based on Multi-Key Homomorphic Encryption. 3PGCIC 2021: 88-105 - [c41]Hui Guan, Guorong Cai, Chuan Zhao:
An Automatic Approach to Extracting Requirement Dependencies based on Semantic Web. DSA 2021: 414-420 - [c40]Mohammed Shujaa Aldeen, Chuan Zhao:
Rare Variants Analysis in Genetic Association Studies with Privacy Protection via Hybrid System. ICICS (2) 2021: 174-191 - [c39]Cong Liu, Anli Yan, Zhenxiang Chen, Haibo Zhang
, Qiben Yan, Lizhi Peng, Chuan Zhao:
IEdroid: Detecting Malicious Android Network Behavior Using Incremental Ensemble of Ensembles. ICPADS 2021: 788-795 - [c38]Feng Sun, Jiacun Liu, Junjie Jin, Fangchao Xu, Qiang Li, Haining Zhao
, Ling Tong, Ming Zhang, Chuan Zhao, Xiaoyou Zhang:
Active Disturbance Rejection Control Algorithm of Permanent Magnetic Suspension System **Research supported by ABC Foundation. ISR 2021: 52-54 - [c37]Xiaoyou Zhang, Feng Sen, Feng Sun, Chuan Zhao, Haining Zhao
, Fangchao Xu, Qiang Li, Junjie Jin, Hui Guo, Ming Zhang:
Energy-saving Control Method of Permanent Magnetic Suspension System. ISR 2021: 60-65 - [c36]Junjie Lv
, Linyu Li, Qiuchen Wu, Chuan Zhao:
Modeling and Simulation of Social E-commerce User Behavior based on Social E-commerce Simulator. QRS Companion 2021: 833-840 - [c35]Gang Zhang, Hao Li, Zhenxiang Chen, Lizhi Peng, Yuhui Zhu, Chuan Zhao:
AndroCreme: Unseen Android Malware Detection Based on Inductive Conformal Learning. TrustCom 2021: 651-658 - 2020
- [j22]Qi Zhao, Chuan Zhao, Shujie Cui, Shan Jing, Zhenxiang Chen:
PrivateDL PrivateDL : Privacy-preserving collaborative deep learning against leakage from gradient sharing. Int. J. Intell. Syst. 35(8): 1262-1279 (2020) - [j21]Chuan Zhao
, Shengnan Zhao
, Bo Zhang
, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Oblivious DFA evaluation on joint input and its applications. Inf. Sci. 528: 168-180 (2020) - [j20]Chuan Zhao
, Haitao Guo, Jun Lu
, Donghang Yu
, Daoji Li
, Xiaowei Chen
:
ALS Point Cloud Classification With Small Training Data Set Based on Transfer Learning. IEEE Geosci. Remote. Sens. Lett. 17(8): 1406-1410 (2020) - [j19]Donghang Yu
, Qing Xu, Haitao Guo, Chuan Zhao, Yuzhun Lin, Daoji Li
:
An Efficient and Lightweight Convolutional Neural Network for Remote Sensing Image Scene Classification. Sensors 20(7): 1999 (2020) - [j18]Donghang Yu
, Haitao Guo
, Qing Xu
, Jun Lu
, Chuan Zhao
, Yuzhun Lin:
Hierarchical Attention and Bilinear Fusion for Remote Sensing Image Scene Classification. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 13: 6372-6383 (2020) - [c34]Sheraz Ali, Muhammad Maaz Irfan, Abubakar Bomai, Chuan Zhao:
Towards Privacy-Preserving Deep Learning: Opportunities and Challenges. DSAA 2020: 673-682 - [c33]Abubakar Bomai, Mohammed Shujaa Aldeen, Chuan Zhao:
Privacy-Preserving GWAS Computation on Outsourced Data Encrypted under Multiple Keys Through Hybrid System. DSAA 2020: 683-691 - [c32]Xinyu Chen, Mingzhe Liu
, Jun Ren, Chuan Zhao:
An Overview of Crowd Counting on Traditional and CNN-based Approaches. ICRAI 2020: 126-133 - [c31]Anli Yan, Zhenxiang Chen, Riccardo Spolaor, Shuaishuai Tan, Chuan Zhao, Lizhi Peng, Bo Yang:
Network-based Malware Detection with a Two-tier Architecture for Online Incremental Update. IWQoS 2020: 1-10 - [c30]Qi Zhao, Bo Zhang, Anli Yan, Shan Jing, Chuan Zhao:
Towards Privacy-Preserving Aggregated Prediction from SPDZ. ML4CS (1) 2020: 262-271 - [c29]Chuan Zhao, Yan Song, Min Zuo:
Pricing Decision and Greenness Analysis of Green Food in Dual-Channel Supply Chain with Fairness Concern. QRS Companion 2020: 563-570
2010 – 2019
- 2019
- [j17]Jiashuang Fan, Suihuai Yu, Jianjie Chu, Dengkai Chen, Mingjiu Yu, Tong Wu, Jian Chen, Fangmin Cheng, Chuan Zhao:
Research on multi-objective decision-making under cloud platform based on quality function deployment and uncertain linguistic variables. Adv. Eng. Informatics 42 (2019) - [j16]Jian Qiu, Heng-Jian Li, Chuan Zhao:
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. Comput. Secur. 82: 1-14 (2019) - [j15]Chuan Zhao
, Shengnan Zhao
, Minghao Zhao, Zhenxiang Chen, Chong-Zhi Gao, Hongwei Li, Yu-an Tan
:
Secure Multi-Party Computation: Theory, practice and applications. Inf. Sci. 476: 357-372 (2019) - [j14]Minghao Zhao, Chengyu Hu, Xiangfu Song, Chuan Zhao:
Towards dependable and trustworthy outsourced computing: A comprehensive survey and tutorial. J. Netw. Comput. Appl. 131: 55-65 (2019) - [j13]Samantha Matthews
, Chuan Zhao, Hao Zeng, Frank V. Bright:
Effects of Acetone Vapor on the Exciton Band Photoluminescence Emission from Single- and Few-Layer WS2 on Template-Stripped Gold. Sensors 19(8): 1913 (2019) - [c28]Chuan Zhao, Shengnan Zhao, Bo Zhang
, Shan Jing, Zhenxiang Chen, Minghao Zhao:
Towards Secure Computation of Similar Patient Query on Genomic Data Under Multiple Keys. CSS (2) 2019: 275-284 - [c27]Hao Li, Zhenxiang Chen, Riccardo Spolaor, Qiben Yan
, Chuan Zhao, Bo Yang:
DART: Detecting Unseen Malware Variants using Adaptation Regularization Transfer Learning. ICC 2019: 1-6 - [c26]Yuzhun Lin, Chuan Zhao, Daoji Li, Junfeng Xu, Baoming Zhang:
Exploring Model Transfer Potential for Airborne LiDAR Point Cloud Classification. MedPRAI 2019: 39-51 - [c25]Yuzhun Lin, Daoji Li
, Chuan Zhao, Junfeng Xu, Baoming Zhang:
Haralick Feature Guided Network for the Improvement of Generalization in Landcover Classification. MedPRAI 2019: 52-64 - [c24]Ying Pang, Zhenxiang Chen, Lizhi Peng, Kun Ma
, Chuan Zhao, Ke Ji:
A Signature-Based Assistant Random Oversampling Method for Malware Detection. TrustCom/BigDataSE 2019: 256-263 - 2018
- [j12]Chuan Zhao
, Shengnan Zhao
, Bo Zhang
, Zhongtian Jia, Zhenxiang Chen, Mauro Conti
:
Secure Comparison Under Ideal/Real Simulation Paradigm. IEEE Access 6: 31236-31248 (2018) - [j11]Bo Zhang
, Tianqing Zhu, Chengyu Hu
, Chuan Zhao
:
Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments. IEEE Access 6: 73885-73894 (2018) - [j10]Chuan Zhao
, Zhipeng Feng, Xiukun Wei, Yong Qin:
Sparse classification based on dictionary learning for planet bearing fault identification. Expert Syst. Appl. 108: 233-245 (2018) - [j9]Ying Zhao, Chuan Zhao, Bi Huang, Fei Dai:
BPMN 2.0过程模型的语义和分析 (Semantics and Analysis of BPMN 2.0 Process Models). 计算机科学 45(11A): 558-563 (2018) - [j8]Bo Zhang
, Zhongtian Jia, Chuan Zhao:
An Efficient Certificateless Generalized Signcryption Scheme. Secur. Commun. Networks 2018: 3578942:1-3578942:11 (2018) - [j7]Shanshan Wang, Qiben Yan
, Zhenxiang Chen
, Bo Yang
, Chuan Zhao, Mauro Conti
:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [c23]Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - [c22]Yuzhun Lin, Baoming Zhang, Junfeng Xu, Jian Li, Chuan Zhao, Donghang Yu
:
Hierarchical Building Extraction from High-resolution Remote Sensing Imagery Based on Multi-feature and Multi-scale Method. ICMIP 2018: 17-23 - [c21]Qi He, Zhenxiang Chen, Ke Ji, Lin Wang, Kun Ma
, Chuan Zhao, Yuliang Shi:
Cluster Center Initialization and Outlier Detection Based on Distance and Density for the K-Means Algorithm. ISDA (1) 2018: 530-539 - [c20]Qi He, Zhenxiang Chen, Anli Yan, Lizhi Peng, Chuan Zhao, Yuliang Shi:
TrafficPSSF: A Fast and An Effective Malware Detection Under Online and Offline. SPAC 2018: 14-19 - [c19]Anli Yan, Zhenxiang Chen, Lin Wang, Lizhi Peng, Muhammad Umair Hassan
, Chuan Zhao:
Neural Network Rule Extraction for Real Time Traffic Behavior Identification. SPAC 2018: 146-151 - 2017
- [j6]Xiaowei Chen
, Baoming Zhang, Minyi Cen, Haitao Guo, Tonggang Zhang
, Chuan Zhao:
SRTM DEM-Aided Mapping Satellite-1 Image Geopositioning Without Ground Control Points. IEEE Geosci. Remote. Sens. Lett. 14(11): 2137-2141 (2017) - [j5]Hao Wang
, Debiao He, Jian Shen
, Zhihua Zheng, Chuan Zhao, Minghao Zhao:
Verifiable outsourced ciphertext-policy attribute-based encryption in cloud computing. Soft Comput. 21(24): 7325-7335 (2017) - [c18]Ying Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li:
Finding Android Malware Trace from Highly Imbalanced Network Traffic. CSE/EUC (1) 2017: 588-595 - [c17]Shanshan Wang, Zhenxiang Chen, Xiaomei Li, Lin Wang, Ke Ji, Chuan Zhao:
Android Malware Clustering Analysis on Network-Level Behavior. ICIC (1) 2017: 796-807 - [c16]Shanshan Wang, Qiben Yan
, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti
:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - [c15]Chuan Zhao
:
Education Intelligence Should Be the Breakthrough in Intelligence Science. KMO 2017: 424-434 - 2016
- [c14]Xiaowei Chen, Haitao Guo, Chuan Zhao, Baoming Zhang, Yuzhun Lin:
Hierarchical Image Matching Method Based on Free-Form Linear Features. CCPR (2) 2016: 202-217 - [c13]Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang:
Practical Server-Aided k-out-of-n Oblivious Transfer Protocol. GPC 2016: 261-277 - [c12]Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu:
Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries. Trustcom/BigDataSE/ISPA 2016: 418-425 - 2015
- [j4]Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang:
Several Oblivious Transfer Variants in Cut-and-Choose Scenario. Int. J. Inf. Secur. Priv. 9(2): 1-12 (2015) - [j3]Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu:
Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks. Mob. Inf. Syst. 2015: 637458:1-637458:8 (2015) - [j2]Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu:
Fair two-party computation with rational parties holding private types. Secur. Commun. Networks 8(2): 284-297 (2015) - [c11]Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application. TrustCom/BigDataSE/ISPA (1) 2015: 384-391 - 2014
- [i1]Han Jiang, Xiaochao Wei, Chuan Zhao, Qiuliang Xu:
Cut-and-Choose Bilateral Oblivious Transfer and Its Application in Secure Two-party Computation. IACR Cryptol. ePrint Arch. 2014: 768 (2014) - 2013
- [c10]Guiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu:
A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security. CIS 2013: 559-563 - [c9]Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang:
Identity-Based Authenticate Key Exchange Protocol from Lattice. CIS 2013: 564-568 - [c8]Mengmeng Zhang, Chuan Zhao, Jizheng Xu, Huihui Bai:
A fast depth-map wedgelet partitioning scheme for intra prediction in 3D video coding. ISCAS 2013: 2852-2855 - 2012
- [j1]Nicola Bellotto, Ben Benfold, Hanno Harland, Hans-Hellmut Nagel, Nicola Pirlo, Ian Reid, Eric Sommerlade, Chuan Zhao:
Cognitive visual tracking and camera control. Comput. Vis. Image Underst. 116(3): 457-471 (2012) - [c7]Mengmeng Zhang, Chuan Zhao, Jizheng Xu:
An adaptive fast intra mode decision in HEVC. ICIP 2012: 221-224 - 2010
- [c6]Ian Reid
, Chuan Zhao:
Mean-Shift Visual Tracking with NP-Windows Density Estimates. BMVC 2010: 1-10 - [c5]Chuan Zhao, Krishnamoorthy Sivakumar:
An Effective Entity Resolution Method. DMIN 2010: 10-16
2000 – 2009
- 2009
- [c4]Chuan Zhao, Krishnamoorthy Sivakumar:
A Graph-based Similarity Metric and Validity Indices for Clustering Non-numeric and Unstructured Data. DMIN 2009: 531-537 - 2008
- [c3]Chuan Zhao, Andrew Knight, Ian D. Reid:
Target tracking using mean-shift and affine structure. ICPR 2008: 1-5 - 2007
- [c2]Chuan Zhao, Roger T. Alexander:
Testing AspectJ programs using fault-based testing. WTAOP@AOSD 2007: 13-16 - [c1]Chuan Zhao, Roger T. Alexander:
Testing aspect-oriented programs as object-oriented programs. WTAOP@AOSD 2007: 23-27
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint