default search action
Conghua Zhou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Eric Appiah Mantey, Conghua Zhou, Joseph Henry Anajemba, John Kingsley Arthur, Yasir Hamid, Atif Chowhan, Otuu Obinna Ogbonnia:
Federated Learning Approach for Secured Medical Recommendation in Internet of Medical Things Using Homomorphic Encryption. IEEE J. Biomed. Health Informatics 28(6): 3329-3340 (2024) - 2023
- [j16]Eric Appiah Mantey, Conghua Zhou, Joseph Henry Anajemba, Yasir Hamid, John Kingsley Arthur:
Blockchain-Enabled Technique for Privacy- Preserved Medical Recommender System. IEEE Access 11: 40944-40953 (2023) - 2022
- [j15]Ronky Francis Doh, Conghua Zhou, John Kingsley Arthur, Isaac Tawiah, Benjamin Doh:
A Systematic Review of Deep Knowledge Graph-Based Recommender Systems, with Focus on Explainable Embeddings. Data 7(7): 94 (2022) - [j14]John Kingsley Arthur, Conghua Zhou, Jeremiah Osei-Kwakye, Eric Appiah Mantey, Yaru Chen:
A heterogeneous couplings and persuasive user/item information model for Next Basket recommendation. Eng. Appl. Artif. Intell. 114: 105132 (2022) - [j13]Zhifeng Liu, Xianzhan Zhong, Conghua Zhou:
Personalized Relationships-Based Knowledge Graph for Recommender Systems with Dual-View Items. Symmetry 14(11): 2386 (2022) - [c10]Haoran Sun, Xiaolong Zhu, Conghua Zhou:
Deep Reinforcement Learning for Video Summarization with Semantic Reward. QRS Companion 2022: 754-755 - 2021
- [j12]Yaru Chen, Xiaohong Gu, Conghua Zhou, Xiaolong Zhu, Yi Jiang, John Kingsley Arthur, Eric Appiah Mantey, Ernest Domanaanmwi Ganaa:
A Novel Hierarchical Deep Matrix Completion Method. IEEE Access 9: 7908-7920 (2021)
2010 – 2019
- 2019
- [j11]Qing-Hua Ling, Yuqing Song, Fei Han, Conghua Zhou, Hu Lu:
An improved learning algorithm for random neural networks based on particle swarm optimization and input-to-output sensitivity. Cogn. Syst. Res. 53: 51-60 (2019) - 2018
- [j10]Haijuan Ji, Conghua Zhou, Zhifeng Liu:
一种基于始末距离的时间序列符号聚合近似表示方法 (Symbolic Aggregate Approximation Method of Time Series Based on Beginning and End Distance). 计算机科学 45(6): 216-221 (2018) - 2017
- [j9]Zhifeng Liu, Kai Chen, Lei Li, Conghua Zhou:
一种多种攻击并发下的WSN生存性评估模型 (Survivability Evaluation Model for Wireless Sensor Network under Multiple Attacks). 计算机科学 44(8): 129-133 (2017) - 2016
- [j8]Patricia Ghann, Shiguang Ju, Conghua Zhou:
Testing access control policy through Change Rule and Swap Rule Algorithm (CRSR). J. Inf. Secur. Appl. 30: 81-93 (2016) - [j7]Jie Lu, Xiangmei Song, Mou Han, Conghua Zhou:
车载网中可抵制合谋攻击的批量认证方案 (Batch Verification Scheme Defensing Collusive Attack in VANET). 计算机科学 43(6): 135-140 (2016) - 2015
- [c9]Conghua Zhou, Yong Wang, Meiling Cao, Jianqi Shi, Yang Liu:
Formal Analysis of MAC in IEEE 802.11p with Probabilistic Model Checking. TASE 2015: 55-62 - 2013
- [j6]Shunrong Jiang, Jiapeng Zhang, Jingjun Miao, Conghua Zhou:
A Privacy-Preserving Reauthentication Scheme for Mobile Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j5]Conghua Zhou, Zhifeng Liu, Hailing Wu, Song Chen, Shiguang Ju:
Symbolic algorithmic verification of intransitive generalized noninterference. Sci. China Inf. Sci. 55(7): 1650-1665 (2012) - [j4]Conghua Zhou, Bo Sun:
Abstraction In Model Checking Real-Time Temporal Logic of Knowledge. J. Comput. 7(2): 362-370 (2012) - 2011
- [j3]Conghua Zhou, Bo Sun, Zhifeng Liu:
Abstraction for model checking multi-agent systems. Frontiers Comput. Sci. China 5(1): 14-25 (2011) - [j2]Conghua Zhou, Meiling Cao, Meng Ye, Zhihao Qian:
SAT-based Algorithmic Verification of Noninterference. J. Comput. 6(11): 2310-2320 (2011) - 2010
- [c8]Conghua Zhou, Bo Sun, Zhifeng Liu:
Abstraction for Model Checking the Probabilistic Temporal Logic of Knowledge. AICI (1) 2010: 209-221 - [c7]Xiangmei Song, Shiguang Ju, Changda Wang, Conghua Zhou:
Information Flow Graph: An Approach to Identifying Covert Storage Channels. INTRUST 2010: 87-97
2000 – 2009
- 2009
- [c6]Conghua Zhou, Li Chen, Shiguang Ju, Zhifeng Liu:
State Space Reduction for Verifying Noninterference. SSIRI 2009: 132-138 - 2007
- [j1]Zhi-Hong Tao, Conghua Zhou, Zhong Chen, Lifu Wang:
Bounded Model Checking of CTL. J. Comput. Sci. Technol. 22(1): 39-43 (2007) - [c5]Conghua Zhou:
A compositional symbolic verification framework for concurrent software. Infoscale 2007: 79 - [c4]Conghua Zhou, Shiguang Ju:
SAT-based Bounded Model Checking for SE-LTL. SNPD (3) 2007: 582-587 - [c3]Conghua Zhou, Zhenyu Chen, Zhihong Tao:
QBF-Based Symbolic Model Checking for Knowledge and Time. TAMC 2007: 386-397 - 2006
- [c2]Conghua Zhou, Decheng Ding:
Improved SAT Based Bounded Model Checking. TAMC 2006: 611-620 - 2005
- [c1]Zhenyu Chen, Conghua Zhou, Decheng Ding:
Automatic abstraction refinement for Petri nets verification. HLDVT 2005: 168-174
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint