Follow
Junwei ZHOU
Title
Cited by
Cited by
Year
An efficient file hierarchy attribute-based encryption scheme in cloud computing
S Wang, J Zhou, JK Liu, J Yu, J Chen, W Xie
IEEE Transactions on Information Forensics and Security 11 (6), 1265-1277, 2016
3092016
Word embeddings and convolutional neural network for arabic sentiment classification
A Dahou, S Xiong, J Zhou, MH Haddoud, P Duan
Proceedings of coling 2016, the 26th international conference on …, 2016
2112016
Arabic sentiment classification using convolutional neural network and differential evolution algorithm
A Dahou, MA Elaziz, J Zhou, S Xiong
Computational intelligence and neuroscience 2019 (1), 2537689, 2019
1032019
A modified chaos-based joint compression and encryption scheme
J Chen, J Zhou, KW Wong
IEEE Transactions on Circuits and Systems II: Express Briefs, 1-5, 2011
732011
Using deep learning to solve computer security challenges: a survey
YH Choi, P Liu, Z Shang, H Wang, Z Wang, L Zhang, J Zhou, Q Zou
Cybersecurity 3, 1-32, 2020
512020
A block chaotic image encryption scheme based on self-adaptive modelling
G Ye, J Zhou
Applied Soft Computing 22, 351-357, 2014
502014
Novel meaningful image encryption based on block compressive sensing
C Pan, G Ye, X Huang, J Zhou
Security and Communication Networks 2019 (1), 6572105, 2019
402019
Geographic segmented opportunistic routing in cognitive radio ad hoc networks using network coding
X Tang, J Zhou, S Xiong, J Wang, K Zhou
IEEE Access 6, 62766-62783, 2018
372018
Chaos-based joint compression and encryption algorithm for generating variable length ciphertext
OY Lui, KW Wong, J Chen, J Zhou
Applied Soft Computing 12 (1), 125-132, 2012
312012
Face template protection using deep LDPC codes learning
L Chen, G Zhao, J Zhou, ATS Ho, LM Cheng
IET Biometrics 8 (3), 190-197, 2019
282019
Multi-channel embedding convolutional neural network model for arabic sentiment classification
A Dahou, S Xiong, J Zhou, MA Elaziz
ACM Transactions on Asian and Low-Resource Language Information Processing …, 2019
272019
Deepsyslog: Deep anomaly detection on syslog using sentence embedding and metadata
J Zhou, Y Qian, Q Zou, P Liu, J Xiang
IEEE Transactions on Information Forensics and Security 17, 3051-3061, 2022
262022
Securing outsourced data in the multi-authority cloud with fine-grained access control and efficient attribute revocation
J Zhou, H Duan, K Liang, Q Yan, F Chen, FR Yu, J Wu, J Chen
The Computer Journal 60 (8), 1210-1222, 2017
242017
How to share secret efficiently over networks
L Harn, CF Hsu, Z Xia, J Zhou
Security and Communication Networks 2017 (1), 5437403, 2017
242017
Performance evaluation of a submerged tidal energy device with a single mooring line
B Guo, D Wang, J Zhou, W Shi, X Zhou
Ocean Engineering 196, 106791, 2020
232020
Load balancing opportunistic routing for cognitive radio ad hoc networks
W Duan, X Tang, J Zhou, J Wang, G Zhou
Wireless Communications and Mobile Computing 2018 (1), 9412782, 2018
182018
Impacts of various types of El Niño–Southern Oscillation (ENSO) and ENSO Modoki on the rainy season over the Huaihe River basin
Q Cao, Z Hao, J Zhou, W Wang, F Yuan, W Zhu, C Yu
International Journal of Climatology 39 (5), 2811-2824, 2019
172019
Abnormal driving behavior detection for bus based on the Bayesian classifier
X Wu, J Zhou, J An, Y Yang
2018 Tenth International Conference on Advanced Computational Intelligence …, 2018
172018
Effects of blade tip foil thickening on tip vortexes in ducted propeller
L Mei, J Zhou
3rd International Conference on Material, Mechanical and Manufacturing …, 2015
172015
Face anti-spoofing based on dynamic color texture analysis using local directional number pattern
J Zhou, K Shu, P Liu, J Xiang, S Xiong
2020 25th International Conference on Pattern Recognition (ICPR), 4221-4228, 2021
162021
The system can't perform the operation now. Try again later.
Articles 1–20