


default search action
Zian Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Zian Zhao, Hong Zhou, Xinnan Yi:
Multi-objective lot-streaming scheduling in cloud manufacturing system with variable sublots and intermingling setting considering service time availability. Comput. Ind. Eng. 210: 111483 (2025) - [j7]Zian Zhao
, Hong Zhou
, Weibo Zheng
:
Collaborative optimization for scheduling manufacturing tasks and transport vehicles considering manufacturer's time availability in cloud manufacturing. Int. J. Comput. Integr. Manuf. 38(6): 818-843 (2025) - [j6]Luchang Lei
, Yongqing Zhu
, Xinhang Zou, Zhou Zhang, Zian Zhao, Yifan He
, Gangfeng Du
, Zhenyu Guan
, Huazhong Yang
, Yongpan Liu
, Song Bian
, Hongyang Jia
:
Enabling Energy-Efficient Homomorphic Encryption Evaluation via eDRAM-Based In-Situ Computing in an Edge Processor. IEEE J. Solid State Circuits 60(7): 2405-2419 (2025) - [j5]Zian Zhao
, Hong Zhou
, Xi Vincent Wang
, Xia Hua:
Enhancing reconfiguration of cloud manufacturing service composition under unexpected changes in service time availability by flexible splitting and intermingling strategies. Robotics Comput. Integr. Manuf. 95: 103044 (2025) - [c9]Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu:
CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction. SP 2025: 2395-2413 - 2024
- [j4]Jinfu Chen
, Zian Zhao, Saihua Cai
, Xiao Chen
, Bilal Ahmad
, Luo Song, Kun Wang:
DCM-GIFT: An Android malware dynamic classification method based on gray-scale image and feature-selection tree. Inf. Softw. Technol. 176: 107560 (2024) - [j3]Zhenyu Guan
, Ran Mao
, Qianyun Zhang
, Zhou Zhang, Zian Zhao
, Song Bian:
AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(7): 1971-1983 (2024) - [c8]Zhou Zhang
, Song Bian
, Zian Zhao
, Ran Mao
, Haoyi Zhou
, Jiafeng Hua
, Yier Jin
, Zhenyu Guan
:
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. CCS 2024: 4613-4627 - [c7]Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. NDSS 2024 - [i6]Zhou Zhang, Song Bian, Zian Zhao, Ran Mao, Haoyi Zhou, Jiafeng Hua, Yier Jin, Zhenyu Guan:
ArcEDB: An Arbitrary-Precision Encrypted Database via (Amortized) Modular Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 1064 (2024) - [i5]Zhenyu Guan, Ran Mao, Qianyun Zhang, Zhou Zhang, Zian Zhao, Song Bian:
AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation. IACR Cryptol. ePrint Arch. 2024: 1250 (2024) - [i4]Song Bian, Zian Zhao, Ruiyu Shen, Zhou Zhang, Ran Mao, Dawei Li, Yizhong Liu, Masaki Waga, Kohei Suenaga, Zhenyu Guan, Jiafeng Hua, Yier Jin, Jianwei Liu:
CHLOE: Loop Transformation over Fully Homomorphic Encryption via Multi-Level Vectorization and Control-Path Reduction. IACR Cryptol. ePrint Arch. 2024: 1991 (2024) - 2023
- [j2]Jie Nie
, Zian Zhao
, Lei Huang
, Weizhi Nie
, Zhiqiang Wei:
Cross-Domain Recommendation Via User-Clustering and Multidimensional Information Fusion. IEEE Trans. Multim. 25: 868-880 (2023) - [c6]Song Bian
, Zhou Zhang
, Haowen Pan
, Ran Mao
, Zian Zhao
, Yier Jin
, Zhenyu Guan
:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. CCS 2023: 2930-2944 - [i3]Song Bian, Zian Zhao, Zhou Zhang, Ran Mao, Kohei Suenaga, Yier Jin, Zhenyu Guan, Jianwei Liu:
HEIR: A Unified Representation for Cross-Scheme Compilation of Fully Homomorphic Computation. IACR Cryptol. ePrint Arch. 2023: 1445 (2023) - [i2]Song Bian, Zhou Zhang, Haowen Pan, Ran Mao, Zian Zhao, Yier Jin, Zhenyu Guan:
HE3DB: An Efficient and Elastic Encrypted Database Via Arithmetic-And-Logic Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2023: 1446 (2023) - 2022
- [c5]Zijie Zuo, Jie Nie, Zian Zhao, Huaxin Xie, Xiangqian Ding, Shusong Yu, Lei Huang, Yuxuan Yue, Xin Wang:
RPITN: Review Based Preference Invariance Transfer Network for Cross-Domain Recommendation. ICME 2022: 1-6 - [c4]Jinfu Chen, Zian Zhao, Xiao Chen, Saihua Cai, Shang Yin, Luo Song:
A novel classification approach for Android malware based on feature fusion and natural language processing. Internetware 2022: 28-36 - 2021
- [j1]Zian Zhao, Jie Nie
, Chenglong Wang, Lei Huang:
Sliced Wasserstein based Canonical Correlation Analysis for Cross-Domain Recommendation. Pattern Recognit. Lett. 150: 33-39 (2021) - 2020
- [c3]Xingyu Fu, Weijia Shi, Xiaodong Yu, Zian Zhao, Dan Roth:
Design Challenges in Low-resource Cross-lingual Entity Linking. EMNLP (1) 2020: 6418-6432 - [c2]Haibo Chen, Dalin Zhang, Jinfu Chen, Wei Lin, Dengzhou Shi, Zian Zhao:
An Automatic Vulnerability Classification System for IoT Softwares. TrustCom 2020: 1525-1529 - [i1]Xingyu Fu, Weijia Shi, Zian Zhao, Xiaodong Yu, Dan Roth:
Design Challenges for Low-resource Cross-lingual Entity Linking. CoRR abs/2005.00692 (2020)
2010 – 2019
- 2018
- [c1]Zian Zhao, Michael A. Madaio, Florian Pecune, Yoichi Matsuyama, Justine Cassell:
Socially-Conditioned Task Reasoning for a Virtual Tutoring Agent. AAMAS 2018: 2265-2267
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-09-26 23:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint