Login / Signup
Lu Zhou
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 49
Top Topics
Efficiently Computable
Access Control
Lightweight
Authentication Scheme
Top Venues
Future Gener. Comput. Syst.
CoRR
IEEE Trans. Inf. Forensics Secur.
IACR Cryptol. ePrint Arch.
</>
Publications
</>
Junhao Huang
,
Haosong Zhao
,
Jipeng Zhang
,
Wangchen Dai
,
Lu Zhou
,
Ray C. C. Cheung
,
Çetin Kaya Koç
,
Donglong Chen
Yet Another Improvement of Plantard Arithmetic for Faster Kyber on Low-End 32-bit IoT Devices.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Zhusen Liu
,
Luyao Wang
,
Haiyong Bao
,
Zhenfu Cao
,
Lu Zhou
,
Zhe Liu
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks.
IEEE Trans. Ind. Informatics
20 (5) (2024)
Hao Wang
,
Chunpeng Ge
,
Lu Zhou
,
Zhe Liu
,
Dongwan Lan
,
Xiaozhen Lu
,
Danni Jiang
A Publicly Verifiable Outsourcing Matrix Computation Scheme Based on Smart Contracts.
IEEE Trans. Cloud Comput.
12 (1) (2024)
Zhusen Liu
,
Weizheng Wang
,
Yutong Ye
,
Nan Min
,
Zhenfu Cao
,
Lu Zhou
,
Zhe Liu
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Qiannan Wang
,
Changchun Yin
,
Liming Fang
,
Lu Zhou
,
Zhe Liui
,
Run Wang
,
Chenhao Lin
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR
(2024)
Zhaoyang Han
,
Yaoqi Yang
,
Weizheng Wang
,
Lu Zhou
,
Thippa Reddy Gadekallu
,
Mamoun Alazab
,
Prosanta Gope
,
Chunhua Su
RSSI Map-Based Trajectory Design for UGV Against Malicious Radio Source: A Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst.
24 (4) (2023)
Zhicheng Li
,
Piji Li
,
Xuan Sheng
,
Changchun Yin
,
Lu Zhou
IMTM: Invisible Multi-trigger Multimodal Backdoor Attack.
NLPCC (2)
(2023)
Junhao Huang
,
Haosong Zhao
,
Jipeng Zhang
,
Wangchen Dai
,
Lu Zhou
,
Ray C. C. Cheung
,
Çetin Kaya Koç
,
Donglong Chen
Yet another Improvement of Plantard Arithmetic for Faster Kyber on Low-end 32-bit IoT Devices.
CoRR
(2023)
Weibin Wu
,
Jun Wang
,
Yangpan Zhang
,
Zhe Liu
,
Lu Zhou
,
Xiaodong Lin
VPiP: Values Packing in Paillier for Communication Efficient Oblivious Linear Computations.
IEEE Trans. Inf. Forensics Secur.
18 (2023)
Shiyu Shen
,
Hao Yang
,
Wangchen Dai
,
Lu Zhou
,
Zhe Liu
,
Yunlei Zhao
Leveraging GPU in Homomorphic Encryption: Framework Design and Analysis of BFV Variants.
IACR Cryptol. ePrint Arch.
2023 (2023)
Hao Yang
,
Shiyu Shen
,
Siyang Jiang
,
Lu Zhou
,
Wangchen Dai
,
Yunlei Zhao
XNET: A Real-Time Unified Secure Inference Framework Using Homomorphic Encryption.
IACR Cryptol. ePrint Arch.
2023 (2023)
Zhicheng Li
,
Yundi Shi
,
Xuan Sheng
,
Changchun Yin
,
Lu Zhou
,
Piji Li
Vulnerability Analysis of Continuous Prompts for Pre-trained Language Models.
ICANN (9)
(2023)
Xinhang Wan
,
Xinwang Liu
,
Jiyuan Liu
,
Siwei Wang
,
Yi Wen
,
Weixuan Liang
,
En Zhu
,
Zhe Liu
,
Lu Zhou
Auto-weighted Multi-view Clustering for Large-scale Data.
CoRR
(2023)
Xinhang Wan
,
Xinwang Liu
,
Jiyuan Liu
,
Siwei Wang
,
Yi Wen
,
Weixuan Liang
,
En Zhu
,
Zhe Liu
,
Lu Zhou
Auto-Weighted Multi-View Clustering for Large-Scale Data.
AAAI
(2023)
Luping Rao
,
Chuan Ma
,
Ming Ding
,
Yuwen Qian
,
Lu Zhou
,
Zhe Liu
Sparse Federated Training of Object Detection in the Internet of Vehicles.
ICC
(2023)
Pei Zhang
,
Siwei Wang
,
Liang Li
,
Changwang Zhang
,
Xinwang Liu
,
En Zhu
,
Zhe Liu
,
Lu Zhou
,
Lei Luo
Let the Data Choose: Flexible and Diverse Anchor Graph Fusion for Scalable Multi-View Clustering.
AAAI
(2023)
Zikang Jin
,
Changchun Yin
,
Piji Li
,
Lu Zhou
,
Liming Fang
,
Xiangmao Chang
,
Zhe Liu
Multi-Layer Feature Division Transferable Adversarial Attack.
ICASSP
(2023)
Luping Rao
,
Chuan Ma
,
Ming Ding
,
Yuwen Qian
,
Lu Zhou
,
Zhe Liu
Sparse Federated Training of Object Detection in the Internet of Vehicles.
CoRR
(2023)
Zhaoyang Han
,
Lu Zhou
,
Chunpeng Ge
,
Juan Li
,
Zhe Liu
Robust privacy-preserving federated learning framework for IoT devices.
Int. J. Intell. Syst.
37 (11) (2022)
Xiaofei Wu
,
Hao Wang
,
Chunpeng Ge
,
Lu Zhou
,
Qiong Huang
,
Lanju Kong
,
Lizhen Cui
,
Zhe Liu
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts.
ACISP
(2022)
Xiangmao Chang
,
Jun Zhan
,
Guoliang Xing
,
Jun Huang
,
Bing Chen
,
Lu Zhou
Measurement-Based Optimization of Cell Selection in NB-IoT Networks.
ACM Trans. Sens. Networks
18 (4) (2022)
Zhaoyang Han
,
Yaoqi Yang
,
Weizheng Wang
,
Lu Zhou
,
Tu N. Nguyen
,
Chunhua Su
Age Efficient Optimization in UAV-Aided VEC Network: A Game Theory Viewpoint.
IEEE Trans. Intell. Transp. Syst.
23 (12) (2022)
Yi Yang
,
Debiao He
,
Huaqun Wang
,
Lu Zhou
An efficient blockchain-based batch verification scheme for vehicular ad hoc networks.
Trans. Emerg. Telecommun. Technol.
33 (5) (2022)
Zhixin Zhao
,
Lu Zhou
,
Chunhua Su
Systematic Research on Technology and Challenges of Lightning Network.
DSC
(2021)
Chunpeng Ge
,
Lu Zhou
,
Gerhard P. Hancke
,
Chunhua Su
A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J.
8 (16) (2021)
Zhixin Zhao
,
Chunpeng Ge
,
Lu Zhou
,
Huaqun Wang
Fully Discover the Balance of Lightning Network Payment Channels.
WASA (1)
(2021)
Liming Fang
,
Xinyu Yun
,
Changchun Yin
,
Weiping Ding
,
Lu Zhou
,
Zhe Liu
,
Chunhua Su
ANCS: Automatic NXDomain Classification System Based on Incremental Fuzzy Rough Sets Machine Learning.
IEEE Trans. Fuzzy Syst.
29 (4) (2021)
Lu Zhou
,
Chunpeng Ge
,
Simin Hu
,
Chunhua Su
Energy-Efficient and Privacy-Preserving Data Aggregation Algorithm for Wireless Sensor Networks.
IEEE Internet Things J.
7 (5) (2020)
Guangkai Ma
,
Chunpeng Ge
,
Lu Zhou
Achieving reliable timestamp in the bitcoin platform.
Peer-to-Peer Netw. Appl.
13 (6) (2020)
Lu Zhou
,
Chunhua Su
,
Wayne Chiu
,
Kuo-Hui Yeh
You Think, Therefore You Are: Transparent Authentication System with Brainwave-Oriented Bio-Features for IoT Networks.
IEEE Trans. Emerg. Top. Comput.
8 (2) (2020)
Hanyi Zhang
,
Liming Fang
,
Keyu Jiang
,
Weiting Zhang
,
Minghui Li
,
Lu Zhou
Secure Door on Cloud: A Secure Data Transmission Scheme to Protect Kafka's Data.
ICPADS
(2020)
Liming Fang
,
Changchun Yin
,
Lu Zhou
,
Yang Li
,
Chunhua Su
,
Jinyue Xia
A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
Inf. Sci.
507 (2020)
Lu Zhou
,
Chunpeng Ge
,
Chunhua Su
A privacy preserving two-factor authentication protocol for the Bitcoin SPV nodes.
Sci. China Inf. Sci.
63 (3) (2020)
Johann Großschädl
,
Zhe Liu
,
Zhi Hu
,
Chunhua Su
,
Lu Zhou
Fast ECDH Key Exchange Using Twisted Edwards Curves with an Efficiently Computable Endomorphism.
SIoT
(2019)
Lu Zhou
,
Chunhua Su
,
Zhen Li
,
Zhe Liu
,
Gerhard P. Hancke
Automatic fine-grained access control in SCADA by machine learning.
Future Gener. Comput. Syst.
93 (2019)
Lu Zhou
,
Jiageng Chen
,
Yidan Zhang
,
Chunhua Su
,
Marino Anthony James
Security analysis and new models on the intelligent symmetric key encryption.
Comput. Secur.
80 (2019)
Liming Fang
,
Minghui Li
,
Lu Zhou
,
Hanyi Zhang
,
Chunpeng Ge
A Fine-Grained User-Divided Privacy-Preserving Access Control Protocol in Smart Watch.
Sensors
19 (9) (2019)
Chunpeng Ge
,
Lu Zhou
,
Jinyue Xia
,
Pawel Szalachowski
,
Chunhua Su
A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
SocialSec
(2019)
Lu Zhou
,
Xiong Li
,
Kuo-Hui Yeh
,
Chunhua Su
,
Wayne Chiu
Lightweight IoT-based authentication scheme in cloud computing circumstance.
Future Gener. Comput. Syst.
91 (2019)
Lu Zhou
,
Chunhua Su
,
Kuo-Hui Yeh
A Lightweight Cryptographic Protocol with Certificateless Signature for the Internet of Things.
ACM Trans. Embed. Comput. Syst.
18 (3) (2019)
Lu Zhou
,
Chunhua Su
,
Zhi Hu
,
Sokjoon Lee
,
Hwajeong Seo
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst.
18 (3) (2019)
Chunpeng Ge
,
Lu Zhou
,
Jinyue Xia
,
Pawel Szalachowski
,
Chunhua Su
A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing.
IEEE Access
7 (2019)
Lu Zhou
,
Xin Sun
,
Chunhua Su
,
Zhe Liu
,
Kim-Kwang Raymond Choo
Game theoretic security of quantum bit commitment.
Inf. Sci.
479 (2019)
Lu Zhou
,
Kuo-Hui Yeh
,
Gerhard P. Hancke
,
Zhe Liu
,
Chunhua Su
Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag.
35 (5) (2018)
Lu Zhou
,
Chunhua Su
,
Yamin Wen
,
Weijie Li
,
Zheng Gong
Towards practical white-box lightweight block cipher implementations for IoTs.
Future Gener. Comput. Syst.
86 (2018)
Lu Zhou
,
Youwen Zhu
,
Kim-Kwang Raymond Choo
Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst.
81 (2018)
Kuo-Hui Yeh
,
Chunhua Su
,
Wayne Chiu
,
Lu Zhou
I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics.
IEEE Commun. Mag.
56 (2) (2018)
Lu Zhou
,
Quanlong Wang
,
Xin Sun
,
Piotr Kulicki
,
Arcangelo Castiglione
Quantum technique for access control in cloud computing II: Encryption and key distribution.
J. Netw. Comput. Appl.
103 (2018)
Lu Zhou
,
Chunhua Su
,
Xin Sun
,
Xishun Zhao
,
Kim-Kwang Raymond Choo
Stag hunt and trust emergence in social networks.
Future Gener. Comput. Syst.
88 (2018)