


default search action
Shuaishuai Zhu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Xuguang Wu, Yiliang Han, Minqing Zhang, Shuaishuai Zhu, Su Cui, Yuanyuan Wang, Yixuan Peng:
Pseudorandom number generators based on neural networks: a review. J. King Saud Univ. Comput. Inf. Sci. 37(3) (2025) - 2023
- [j7]Su Cui
, Yiliang Han
, Yifei Duan, Yu Li, Shuaishuai Zhu, Chaoyue Song:
A Two-Stage Voting-Boosting Technique for Ensemble Learning in Social Network Sentiment Classification. Entropy 25(4): 555 (2023) - 2020
- [j6]Shuaishuai Zhu
, Xiao-Yang Lv, Xiaohua Feng, Jie Lin, Peng Jin
, Liang Gao:
Plenoptic Face Presentation Attack Detection. IEEE Access 8: 59007-59014 (2020) - [j5]Yiliang Han
, Yu Li, Zhe Li, Shuaishuai Zhu:
An Improved Method to Evaluate the Synchronization in Neural Key Exchange Protocol. Secur. Commun. Networks 2020: 8869688:1-8869688:10 (2020) - [c9]Shuaishuai Zhu, Yiliang Han, Xiaoyuan Yang, Xuguang Wu:
Efficient and Evolvable Key Reconciliation Mechanism in Multi-party Networks Based on Automatic Learning Structure. SPDE 2020: 91-99 - [c8]Shuaishuai Zhu, Yiliang Han:
Analysis Toward RLWE-Based Key Exchange Protocol Based on Automatic Learning Structure. SPDE 2020: 625-639
2010 – 2019
- 2019
- [p1]Shuaishuai Zhu, Xu An Wang
, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Dynamic public opinion evolvement modeling and supervision in social networks. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 239-262 - 2018
- [j4]Xuguang Wu, Minqing Zhang, Shuaishuai Zhu:
Certificateless multi-signcryption scheme in standard model. Int. J. Grid Util. Comput. 9(2): 120-127 (2018) - [j3]Shuaishuai Zhu, Yiliang Han:
Secure data outsourcing scheme in cloud computing with attribute-based encryption. Int. J. High Perform. Comput. Netw. 12(2): 128-136 (2018) - [c7]Yanjing Hu, Xu An Wang
, Haining Luo, Shuaishuai Zhu:
Mining and Utilizing Network Protocol's Stealth Attack Behaviors. 3PGCIC 2018: 212-222 - [c6]Xu An Wang, Shuaishuai Zhu, Arun Kumar Sangaiah
, Shuai Xue, Yunfei Cao:
More Secure Outsource Protocol for Matrix Multiplication in Cloud Computing. 3PGCIC 2018: 293-299 - 2017
- [c5]Xuguang Wu
, Yiliang Han, Minqing Zhang, Shuaishuai Zhu:
Parallel Long Messages Encryption Scheme Based on Certificateless Cryptosystem for Big Data. Inscrypt 2017: 211-222 - 2016
- [c4]Xuguang Wu, Minqing Zhang, Shuaishuai Zhu:
Certificateless Multi-signcryption Scheme in Standard Model. INCoS 2016: 475-479 - 2015
- [j2]Shuaishuai Zhu, Xiaoyuan Yang:
Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2): 91-97 (2015) - [c3]Shuaishuai Zhu, Yiliang Han, Yuechuan Wei:
Controlling Outsourcing Data in Cloud Computing with Attribute-Based Encryption. INCoS 2015: 257-261 - 2013
- [j1]Shuaishuai Zhu, Xiaoyuan Yang:
Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions. J. Comput. 8(12): 3238-3242 (2013) - [c2]Shuaishuai Zhu, Xiaoyuan Yang, Xuguang Wu
:
Secure Cloud File System with Attribute Based Encryption. INCoS 2013: 99-102 - [c1]Ping Wei, Shuaishuai Zhu:
An Improved Secure Unidirectional Proxy Re-encryption Scheme. INCoS 2013: 681-684
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-05 20:52 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint