


default search action
Bo Zhou 0001
Person information
- unicode name: 主页
- affiliation: Liverpool John Moores University, UK
Other persons with the same name
- Bo Zhou — disambiguation page
- Bo Zhou 0002 — University of California, Riverside, CA, USA
- Bo Zhou 0003 — University of California, Irvine, CA, USA
- Bo Zhou 0004
— Beijing Institute of Technology, School of Inf. and Electron., Beijing, China
- Bo Zhou 0005
— German Research Center for Artificial Intelligence, DFKI, Kaiserslautern, Germany
- Bo Zhou 0006
— Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China (and 1 more)
- Bo Zhou 0007
— South China Normal University, School of Mathematical Sciences, Guangzhou, China
- Bo Zhou 0008 — Tsinghua University, Institute of Microelectronics, Beijing, China
- Bo Zhou 0009
— Yale University, School of Engineering and Applied Science, New Haven, CT, USA (and 2 more)
- Bo Zhou 0010 — Zhejiang University, College of Computer Science, Hangzhou, China
- Bo Zhou 0011
— Queen Mary University of London, School of Engineering and Materials Science, London, UK
- Bo Zhou 0012
— Nanjing University of Aeronautics and Astronautics, Nanjing, Jiangsu, China (and 2 more)
- Bo Zhou 0013
(aka: Bo "Bobby" Zhou) — University of Maryland, College Park, MD, USA (and 1 more)
- Bo Zhou 0014
— Nanjing University of Aeronautics and Astronautics, College of Automation Engineering, Jiangsu Key Laboratory of New Energy Generation and Power Conversion, Nanjing, China
- Bo Zhou 0015 — Qualcomm, San Diego, CA, USA (and 2 more)
- Bo Zhou 0016 — Waseda University, Graduate School of Information, Production and System, Fukuoka, Japan
- Bo Zhou 0017
— Southeast University, School of Automation, Key Laboratory of Measurement and Control of Complex Systems of Engineering, Nanjing, China
- Bo Zhou 0018 — Altera Corporation, San Jose, CA, USA (and 2 more)
- Bo Zhou 0019 — PLA University of Science and Technology, Institute of Command Automation, Nanjing, China
- Bo Zhou 0020
— Chinese PLA General Hospital, Department of Neurology, National Clinical Research Center for Geriatric Diseases, Beijing, China
- Bo Zhou 0021
— Chongqing Jiaotong University, College of Mathematics and Statistics, Chongqing, China (and 2 more)
- Bo Zhou 0022
— Zhejiang University of Technology, Institute of Cyberspace Security, College of Information Engineering, Hangzhou, China (and 1 more)
- Bo Zhou 0023
— Peking University, Institute of Remote Sensing and Geographic Information System, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Ruqayah Al-Ani
, Thar Baker
, Bo Zhou, Qi Shi
:
Privacy and safety improvement of VANET data via a safety-related privacy scheme. Int. J. Inf. Sec. 22(4): 763-783 (2023) - 2022
- [j12]Anuoluwapo A. Adewuyi
, Hui Cheng
, Qi Shi
, Jiannong Cao
, Xingwei Wang
, Bo Zhou
:
SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things. IEEE Internet Things J. 9(5): 3298-3312 (2022) - 2021
- [j11]Chunyang Liu
, Pengpeng Ren, Bo Zhou
, Jianfu Zhang
, Hui Fang
, Zhigang Ji
:
Investigation on the Implementation of Stateful Minority Logic for Future In-Memory Computing. IEEE Access 9: 168648-168655 (2021) - [j10]Joseph N. Mamvong
, Gokop Goteng, Bo Zhou
, Yue Gao
:
Efficient Security Algorithm for Power-Constrained IoT Devices. IEEE Internet Things J. 8(7): 5498-5509 (2021) - 2020
- [j9]Koh Song Sang, Bo Zhou, Hui Fang
, Po Yang
, Zaili Yang
, Qiang Yang
, Lin Guan, Zhigang Ji:
Real-time deep reinforcement learning based vehicle navigation. Appl. Soft Comput. 96: 106694 (2020) - [j8]Mang Su
, Bo Zhou, Anmin Fu
, Yan Yu, Gongxuan Zhang:
PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT. Inf. Sci. 527: 533-547 (2020) - [c23]Ruqayah Al-Ani, Bo Zhou, Qi Shi, Thar Baker
, Mohamed Abdlhamed:
Adjusted Location Privacy Scheme for VANET Safety Applications. NOMS 2020: 1-4
2010 – 2019
- 2019
- [j7]Jun Qi
, Po Yang
, Martin Hanneghan
, Stephen Tang, Bo Zhou
:
A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors. IEEE Internet Things J. 6(2): 1384-1393 (2019) - 2018
- [j6]Bo Zhou, Quan Zhang, Qi Shi
, Qiang Yang, Po Yang
, Yinyan Yu:
Measuring web service security in the era of Internet of Things. Comput. Electr. Eng. 66: 305-315 (2018) - [j5]Bo Zhou
, Curtis L. Maines, Stephen Tang, Qi Shi
, Po Yang
, Qiang Yang
, Jun Qi:
A 3-D Security Modeling Platform for Social IoT Environments. IEEE Trans. Comput. Soc. Syst. 5(4): 1174-1188 (2018) - [c22]Koh Song Sang, Bo Zhou, Po Yang, Zaili Yang
, Hui Fang
, Jianxin Feng:
Reinforcement Learning for Vehicle Route Optimization in SUMO. HPCC/SmartCity/DSS 2018: 1468-1473 - [c21]Ruqayah Al-Ani, Bo Zhou, Qi Shi, Ali M. Sagheer
:
A Survey on Secure Safety Applications in VANET. HPCC/SmartCity/DSS 2018: 1485-1490 - [c20]Nguyen Binh Truong, Tai-Won Um, Bo Zhou, Gyu Myoung Lee:
Strengthening the Blockchain-Based Internet of Value with Trust. ICC 2018: 1-7 - [p5]Bo Zhou, Curtis L. Maines, Stephen Tang, Qi Shi:
A Framework for the Visualisation of Cyber Security Requirements and Its Application in BPMN. Guide to Vulnerability Analysis for Computer Networks and Systems 2018: 339-366 - 2017
- [j4]Qiang Yang
, Le Jiang, Weijie Hao, Bo Zhou
, Po Yang, Zhihan Lv
:
PMU Placement in Electric Transmission Networks for Reliable State Estimation Against False Data Injection Attacks. IEEE Internet Things J. 4(6): 1978-1986 (2017) - [j3]Achim D. Brucker
, Bo Zhou, Francesco Malmignati, Qi Shi
, Madjid Merabti:
Modelling, validating, and ranking of secure service compositions. Softw. Pract. Exp. 47(12): 1923-1943 (2017) - [c19]Curtis L. Maines, Bo Zhou, Stephen Tang, Qi Shi:
Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Languages. DeSE 2017: 71-76 - [c18]Nguyen Binh Truong, Tai-Won Um, Bo Zhou, Gyu Myoung Lee:
From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things. GLOBECOM 2017: 1-7 - [c17]Koh Song Sang, Bo Zhou, Po Yang, Zaili Yang
:
Study of Group Route Optimization for IoT Enabled Urban Transportation Network. iThings/GreenCom/CPSCom/SmartData 2017: 888-893 - 2016
- [c16]Curtis L. Maines, Bo Zhou, Stephen Tang, Qi Shi:
Adding a Third Dimension to BPMN as a Means of Representing Cyber Security Requirements. DeSE 2016: 105-110 - [c15]Koh Song Sang, Bo Zhou, Po Yang, Zaili Yang
:
A Survey on Urban Traffic Optimisation for Sustainable and Resilient Transportation Network. DeSE 2016: 233-238 - [c14]Bo Zhou, Qi Shi
, Po Yang:
A Survey on Quantitative Evaluation of Web Service Security. Trustcom/BigDataSE/ISPA 2016: 715-721 - 2015
- [j2]Quan Zhang, Zhe Xu, Bo Zhou:
Group consensus measurement in MADM with multiple preference formats. J. Decis. Syst. 24(2): 146-158 (2015) - [c13]Helen Angela Brumfitt, Bob Askwith, Bo Zhou:
Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices. CIT/IUCC/DASC/PICom 2015: 795-800 - [c12]Curtis L. Maines, David Llewellyn-Jones, Stephen Tang, Bo Zhou:
A Cyber Security Ontology for BPMN-Security Extensions. CIT/IUCC/DASC/PICom 2015: 1756-1763 - [c11]Helen Angela Brumfitt, Bob Askwith, Bo Zhou:
Protecting Future Personal Computing: Challenging Traditional Network Security Models. CIT/IUCC/DASC/PICom 2015: 1772-1779 - [c10]Koh Song Sang, Bo Zhou:
BPMN Security Extensions for Healthcare Process. CIT/IUCC/DASC/PICom 2015: 2340-2345 - 2014
- [p4]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim
, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p3]Muhammad Asim
, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - [p2]Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
The Aniketos Service Composition Framework - Analysing and Ranking of Secure Services. Secure and Trustworthy Service Composition 2014: 121-135 - 2013
- [c9]Bo Zhou, David Llewellyn-Jones, Qi Shi
, Muhammad Asim
, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c8]Muhammad Asim
, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - [c7]Achim D. Brucker
, Francesco Malmignati, Madjid Merabti, Qi Shi, Bo Zhou:
A Framework for Secure Service Composition. SocialCom 2013: 647-652 - 2012
- [c6]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim
, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - 2010
- [c5]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat
, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [p1]Bo Zhou, Qi Shi
, Madjid Merabti:
A Novel Intrusion Detection System for Smart Space. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 307-333
2000 – 2009
- 2008
- [j1]Bo Zhou, Qi Shi
, Madjid Merabti:
Balancing intrusion detection resources in ubiquitous computing networks. Comput. Commun. 31(15): 3643-3653 (2008) - 2007
- [b1]Bo Zhou:
SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments. Liverpool John Moores University, UK, 2007 - [c4]Bo Zhou, Qi Shi, Madjid Merabti:
Towards Energy-Efficient Intrusion Detection in Pervasive Computing. ICC 2007: 1417-1422 - 2006
- [c3]Bo Zhou, Qi Shi, Madjid Merabti:
A framework for intrusion detection in heterogeneous environments. CCNC 2006: 1244-1248 - [c2]Bo Zhou, Qi Shi, Madjid Merabti:
Intrusion Detection in Pervasive Networks Based on a Chi-Square Statistic Test. COMPSAC (2) 2006: 203-208 - [c1]Bo Zhou, Qi Shi, Madjid Merabti:
Real-Time Intrusion Detection in Ubiquitous Networks with a String-Based Approach. ICCSA (4) 2006: 352-359
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-27 01:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint