default search action
Bo Zhao 0023
Person information
- affiliation: Wuhan University, School of Cyber Science and Engineering, Wuhan, China
Other persons with the same name
- Bo Zhao — disambiguation page
- Bo Zhao 0001 — Pinterest, San Francisco, CA, USA (and 2 more)
- Bo Zhao 0002 — University of Texas at Austin, TX, USA (and 2 more)
- Bo Zhao 0003 — Zhejiang University, Hangzhou, China (and 2 more)
- Bo Zhao 0004 — Cardiff University, School of Computer Science and Informatics, UK
- Bo Zhao 0005 — Jilin University, College of Computer Science and Technology, Changchun, China
- Bo Zhao 0006 — Shenzhen University, College of Information Engineering, China (and 1 more)
- Bo Zhao 0007 — University of Pittsburgh, Electrical and Computer Engineering Department, PA, USA
- Bo Zhao 0008 — Harbin Engineering University, College of Automation, China
- Bo Zhao 0009 — AT&T Labs, Bedminster, NJ, USA (and 1 more)
- Bo Zhao 0010 — State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou, China (and 1 more)
- Bo Zhao 0011 — Yunnan Normal University, School of Information Science and Technology, Kunming, China
- Bo Zhao 0012 — Harbin Institute of Technology, Center of Ultra-Precision Optoelectronic Instrument Engineering, China
- Bo Zhao 0013 — State Grid Zhejiang Electric Power Research Institute, Hangzhou, China (and 1 more)
- Bo Zhao 0014 — Tianjin University, School of Civil Engineering, MOE Key Laboratory of Coast Civil Structure Safety, China
- Bo Zhao 0015 — Beijing Normal University, School of Systems Science, China (and 2 more)
- Bo Zhao 0017 — University of Klagenfurt, Institute of Statistics, Klagenfurt, Austria
- Bo Zhao 0018 — Institute for Infocomm Research, Singapore (and 1 more)
- Bo Zhao 0019 — Aalto University, Finland (and 4 more)
- Bo Zhao 0020 — Stanford University, Department of Electrical Engineering, Stanford, CA, USA
- Bo Zhao 0021 — Oregon State University, College of Earth, Ocean, and Atmospheric Sciences, Corvallis, OR, USA
- Bo Zhao 0022 — Northwestern Polytechnical University, School of Cybersecurity, Xi'an, China (and 2 more)
- Bo Zhao 0024 — Essen University, Germany
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j20]Lingzi Zhu, Bo Zhao, Weidong Li, Yixuan Wang, Yang An:
TICPS: A trustworthy collaborative intrusion detection framework for industrial cyber-physical systems. Ad Hoc Networks 160: 103517 (2024) - [j19]Hui Liu, Bo Zhao, Jiabao Guo, Kehuan Zhang, Peng Liu:
A lightweight unsupervised adversarial detector based on autoencoder and isolation forest. Pattern Recognit. 147: 110127 (2024) - 2023
- [j18]Weidong Li, Bo Zhao, Yang An, Chenhan Shangguan, Minzi Ji, Anqi Yuan:
Supervised contrastive learning for robust text adversarial training. Neural Comput. Appl. 35(10): 7357-7368 (2023) - 2022
- [j17]Hui Liu, Bo Zhao, Minzhi Ji, Yuefeng Peng, Jiabao Guo, Peng Liu:
Feature-filter: Detecting adversarial examples by filtering out recessive features. Appl. Soft Comput. 124: 109027 (2022) - [j16]Hui Liu, Bo Zhao, Minzhi Ji, Mengchen Li, Peng Liu:
GreedyFool: Multi-factor imperceptibility and its application to designing a black-box adversarial attack. Inf. Sci. 613: 717-730 (2022) - [j15]Juan Wang, Shirong Hao, Hongxin Hu, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - 2021
- [j14]Juan Wang, Bo Zhao:
Intelligent system for interactive online education based on cloud big data analytics. J. Intell. Fuzzy Syst. 40(2): 2839-2849 (2021) - 2020
- [j13]Bo Zhao, Xiang Li, Jiayue Li, Jianwen Zou, Yifan Liu:
An Area-Context-Based Credibility Detection for Big Data in IoT. Mob. Inf. Syst. 2020: 5068731:1-5068731:12 (2020) - [j12]Zhihong Chen, Bo Zhao, Hai Lin, Lin Chen:
Etoram: A More Efficient ORAM for Secure Computation. IEEE Open J. Comput. Soc. 1: 285-294 (2020) - [j11]Hui Liu, Bo Zhao, Jianwen Zou, Linquan Huang, Yifan Liu:
A Lightweight Image Encryption Algorithm Based on Message Passing and Chaotic Map. Secur. Commun. Networks 2020: 7151836:1-7151836:12 (2020) - 2019
- [j10]Bo Zhao, Zhihong Chen, Hai Lin:
Cycle ORAM: A Practical Protection for Access Pattern in Untrusted Storage. IEEE Access 7: 26684-26695 (2019) - [j9]Hui Liu, Bo Zhao, Linquan Huang:
A Remote-Sensing Image Encryption Scheme Using DNA Bases Probability and Two-Dimensional Logistic Map. IEEE Access 7: 65450-65459 (2019) - [j8]Hui Liu, Bo Zhao, Linquan Huang:
Quantum Image Encryption Scheme Using Arnold Transform and S-box Scrambling. Entropy 21(4): 343 (2019) - [j7]Zhihong Chen, Hai Lin, Lusheng Wang, Bo Zhao:
Interference-free Clustering Protocol for Large-Scale and Dense Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 13(3): 1238-1259 (2019) - [j6]Hui Liu, Bo Zhao, Linquan Huang:
A novel quantum image encryption algorithm based on crossover operation and mutation operation. Multim. Tools Appl. 78(14): 20465-20483 (2019) - [j5]Juan Wang, Ru Wen, Jiangqi Li, Fei Yan, Bo Zhao, Fajiang Yu:
Detecting and Mitigating Target Link-Flooding Attacks Using SDN. IEEE Trans. Dependable Secur. Comput. 16(6): 944-956 (2019) - 2018
- [j4]Bo Zhao, Peiru Fan, Mingtao Ni:
Mchain: A Blockchain-Based VM Measurements Secure Storage Approach in IaaS Cloud With Enhanced Integrity and Controllability. IEEE Access 6: 43758-43769 (2018) - 2017
- [j3]Yuan Shi, Huanguo Zhang, Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, Bo Zhao:
CHAOS: An SDN-Based Moving Target Defense System. Secur. Commun. Networks 2017: 3659167:1-3659167:11 (2017) - 2016
- [j2]Fajiang Yu, Huanguo Zhang, Bo Zhao, Juan Wang, Liqiang Zhang, Fei Yan, Zhenlin Chen:
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario. Secur. Commun. Networks 9(15): 2802-2815 (2016) - 2010
- [j1]Changxiang Shen, Huanguo Zhang, Huaimin Wang, Ji Wang, Bo Zhao, Fei Yan, Fajiang Yu, Liqiang Zhang, Mingdi Xu:
Research on trusted computing and its development. Sci. China Inf. Sci. 53(3): 405-433 (2010)
Conference and Workshop Papers
- 2024
- [c9]Jiabao Guo, Huan Liu, Yizhi Luo, Xueli Hu, Hang Zou, Yuan Zhang, Hui Liu, Bo Zhao:
Style-conditional Prompt Token Learning for Generalizable Face Anti-spoofing. ACM Multimedia 2024: 994-1003 - 2023
- [c8]Qiang Li, Jianxin Zhang, Nan Zhou, Liang Ming, Bo Zhao, Yuejin Du, Li Zhong, Jia Li:
Intelligent Smishing Detection System for Massive Users. CCIS 2023: 199-206 - [c7]Yixuan Wang, Bo Zhao, Weidong Li, Lingzi Zhu:
An Ontology-Centric Approach for Network Security Situation Awareness. COMPSAC 2023: 777-787 - [c6]Yixuan Wang, Bo Zhao, Zhonghao Sun, Zhihui Huo, Xueying Li, Yabiao Wu, Jiao Li:
A Novel Network Topology Sensing Method for Network Security Situation Awareness. ICA3PP (4) 2023: 82-101 - 2020
- [c5]Peiru Fan, Chonghua Wang, Jun Li, Bo Zhao, Zhaoxu Ji:
StateConsisIV: A Privacy-preserving Integrity Verification Method for Cloud Components Based on a Novel State Consistency Feature. DSC 2020: 120-126 - 2019
- [c4]Yifan Liu, Bo Zhao, Xiaofei Li, Shuo Wang, Bin Zhang, Zhenpeng Liu:
A Trust Chain Assessment Method Based on Blockchain for SDN Network Nodes. SmartIoT 2019: 240-245 - 2014
- [c3]Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu:
POSTER: An E2E Trusted Cloud Infrastructure. CCS 2014: 1517-1519 - 2006
- [c2]Yang An, Bo Zhao:
Integration of Distributed Geographical Information Based on Mediation and GML. CSCWD 2006: 1053-1058 - 2004
- [c1]Yang An, Bo Zhao, Fuling Bian:
Geo Web Services Based on Semantic. ER (Workshops) 2004: 139-157
Informal and Other Publications
- 2022
- [i4]Hui Liu, Bo Zhao, Yuefeng Peng, Weidong Li, Peng Liu:
Towards Understanding and Harnessing the Effect of Image Transformation in Adversarial Detection. CoRR abs/2201.01080 (2022) - [i3]Hui Liu, Bo Zhao, Kehuan Zhang, Peng Liu:
Nowhere to Hide: A Lightweight Unsupervised Detector against Adversarial Examples. CoRR abs/2210.08579 (2022) - 2021
- [i2]Hui Liu, Bo Zhao, Yuefeng Peng, Jiabao Guo, Peng Liu:
Feature-Filter: Detecting Adversarial Examples through Filtering off Recessive Features. CoRR abs/2107.09502 (2021) - 2020
- [i1]Hui Liu, Bo Zhao, Jiabao Guo, Yang An, Peng Liu:
GreedyFool: An Imperceptible Black-box Adversarial Example Attack against Neural Networks. CoRR abs/2010.06855 (2020)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-02 19:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint