2010 | ||
---|---|---|
26 | Bo Zhu, Lixu Gu, Xiaopeng Peng, Zhe Zhou: A Point-Based Simulation Framework for Minimally Invasive Surgery. ISMBS 2010: 130-138 | |
25 | Bo Zhu, Xuekun Fu: BoBlossom: modeling growing plants in games. SI3D 2010 | |
24 | Bo Zhu, Xianglin Yang: The influence of higher-order effects on the transmission performances of the ultra-short soliton pulses and its suppression method. Science in China Series F: Information Sciences 53(1): 182-190 (2010) | |
2009 | ||
23 | Zhiguo Wan, Kui Ren, Bo Zhu, Bart Preneel, Ming Gu: Anonymous user communication for privacy protection in wireless metropolitan mesh networks. ASIACCS 2009: 368-371 | |
22 | Yanjun Xiao, Bo Zhu, Yuming Guan, Yanchun Xiao: Research on Tension Control Strategy of Dry-Powder-Embedded Zinc-Air Battery Pole Manufacturing Line. IFITA (3) 2009: 555-558 | |
21 | Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu: Towards Secure and Practical MACs for Body Sensor Networks. INDOCRYPT 2009: 182-198 | |
20 | Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong: Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. ISA 2009: 200-209 | |
19 | Hongying Tang, Bo Zhu, Kui Ren: A New Approach to Malware Detection. ISA 2009: 229-238 | |
18 | Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan: Privacy-Aware Attribute-Based Encryption with User Accountability. ISC 2009: 347-362 | |
2008 | ||
17 | Luo Zhong, Jie Li, Li Yang, Bo Zhu, Huazhu Song: Ontology and Metadata for E-learning Based on Grid. CSSE (5) 2008: 917-920 | |
16 | Liang-liang Huang, Hong-zhi Wang, Bo Zhu: Adaptive Thresholds Algorithm of Image Denoising Based on Nonsubsampled Contourlet Transform. CSSE (6) 2008: 209-212 | |
15 | Zhi-Jie Yan, Bo Zhu, Yu Hu, Ren-Hua Wang: Minimum word classification error training of HMMS for automatic speech recognition. ICASSP 2008: 4521-4524 | |
14 | Bo Zhu, Kui Ren, Lingyu Wang: Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. ICDCS Workshops 2008: 358-363 | |
13 | Wei Li, Lingyu Wang, Bo Zhu, Lei Zhang: An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. SEC 2008: 189-203 | |
12 | Qian Wang, Kui Ren, Yanchao Zhang, Bo Zhu: Opportunistic Cooperation with Receiver-Based Ratio Combining Strategy. WASA 2008: 361-372 | |
11 | Saeed Sharifi Tehrani, Christophe Jégo, Bo Zhu, Warren J. Gross: Stochastic Decoding of Linear Block Codes With High-Density Parity-Check Matrices. IEEE Transactions on Signal Processing 56(11): 5733-5739 (2008) | |
2007 | ||
10 | Xuxin Xu, Lingyu Wang, Amr M. Youssef, Bo Zhu: Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. ACNS 2007: 177-193 | |
9 | Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267 | |
8 | Bo Zhu, Xianglin Yang: Fiber soliton-form 3R regenerator and its performance analysis. Science in China Series F: Information Sciences 50(2): 241-250 (2007) | |
2006 | ||
7 | Bo Zhu, Sanjeev Setia, Sushil Jajodia: Providing witness anonymity in peer-to-peer systems. ACM Conference on Computer and Communications Security 2006: 6-16 | |
6 | Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli: Building trust in peer-to-peer systems: a review. IJSN 1(1/2): 103-112 (2006) | |
2005 | ||
5 | Bo Zhu, Guilin Wang, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Providing efficient certification services against active attacks in ad hoc networks. IPCCC 2005: 285-292 | |
4 | Bo Zhu, Feng Bao, Robert H. Deng, Mohan S. Kankanhalli, Guilin Wang: Efficient and robust key management for large mobile ad hoc networks. Computer Networks 48(4): 657-682 (2005) | |
2004 | ||
3 | Bo Zhu, Tieyan Li, Huafei Zhu, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Trust Establishment in Large Scale Grid Settings. GCC 2004: 317-324 | |
2 | Bo Zhu, Zhiguo Wan, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: Anonymous Secure Routing in Mobile Ad-Hoc Networks. LCN 2004: 102-108 | |
2003 | ||
1 | Guilin Wang, Xiaoxi Han, Bo Zhu: On the Security of Two Threshold Signature Schemes with Traceable Signers. ACNS 2003: 111-122 |