Chuan Zhao,Ph.D.

blog
Provincial Key Laboratory for Network based Intelligent Computing
School of Information Science and Engineering, University of Jinan

Office:             Room 806, 12 th Building, 336 Nan Xin Zhuang West
                               Road, Jinan, Shandong, P.R.China, 250022
Telephone:                            (+86) 531-8276-7529
Mobile:                                   (+86) 151-6888-5036
Email:                                    Email
Lab:                             loci - The Lab of Cyber Intelligence



Biography

    Chuan Zhao received his Ph.D. degree in Computer Science and Technology from Shandong University, P.R. China, in 2016. He is currently a Lecturer at School of Information Science and Engineering, University of Jinan, P.R. China. Dr. Zhao has published more than 10 peer reviewed papers in high-level international journals and conference proceedings such as Mobile Information Systems, Security and Communication Networks, and TrustCom, etc.


Research

    My research interests include information security and cryptography, currently focusing on secure computation, mobile security, privacy-preserving machine learning and genomic data processing.


Publications

  1. Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu. "Cut-and-Choose Bilateral Oblivious Transfer". Published in Journal of Software. 2017, 28(2): 352-360. (in Chinese)
  2. Shanshan Wang, Qibei Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti. "TextDroid: Semantics-based Detection of Mobile Malware Using Network Flows". Accepted by INFOCOM17 WKSHPS MobiSec 2017. 2017.
  3. Chuan Zhao, Han Jiang, Qiuliang Xu, Yilei Wang, Xiaochao Wei, Shujie Cui. "Fast Two-Output Secure Computation with Optimal Error Probability". Published in Chinese Journal of Electronics. 2016. (online)
  4. Xiaochao Wei, Chuan Zhao, Han Jiang, Qiuliang Xu, Hao Wang. "Practical Server-Aided k-out-of-n Oblivious Transfer Protocol". Published in 11th International Conference on Green, Pervasive and Cloud Computing. 2016: 261-277.
  5. Xiaochao Wei, Han Jiang, Chuan Zhao. "An Efficient 1-out-of-n Oblivious Transfer Protocol with Full Simulation". Published in Journal of Computer Research and Development. 2016, 53 (11): 2475-2481. (in Chinese)
  6. Xiaochao Wei, Han Jiang, Chuan Zhao, Minghao Zhao, Qiuliang Xu. "Fast Cut-and-Choose Bilateral Oblivious Transfer for Malicious Adversaries". Published in 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2016: 418-425.
  7. Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Chuan Zhao, Minghao Zhao. "Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption in Cloud Computing". Published in Soft Computing. 2016. (online)
  8. Chuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao. "Cut-and-Choose Bilateral Oblivious Transfer and Its Application". Published in 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. 2015: 384-391.
  9. Chuan Zhao, Han Jiang, Qiuliang Xu, Xiaochao Wei, Hao Wang. "Several Oblivious Transfer Variants in Cut-and-Choose Scenario". Published in International Journal of Information Security and Privacy. 2015, 9(2): 1-12.
  10. Yilei Wang, Chuan Zhao, Qiuliang Xu, Zhihua Zheng, Zhenhua Chen, Zhe Liu. "Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks". Published in Mobile Information Systems. 2015: 637458:1-637458:8.
  11. Yilei Wang, Duncan S. Wong, Chuan Zhao, Qiuliang Xu. "Fair Two-Party Computation with Rational Parties Holding Private Types". Published in Security and Communication Networks. 2014, 8(2): 284-297.
  12. Hao Wang, Chuan Zhao, Qiuliang Xu, Yilei Wang. "Identity-Based Authenticate Key Exchange Protocol from Lattice". Published in 9th International Conference on Computational Intelligence and Security. 2013: 564-568.
  13. Guiying Li, Mengbo Hou, Chuan Zhao, Qiuliang Xu. "A Two-Party Certificateless Authenticated Key Agreement Protocol with Provable Security". Published in 9th International Conference on Computational Intelligence and Security. 2013: 559-563.


Membership

  • Member, IEEE, IEEE Computer Society, USA
  • Member, CCF, P.R.China
line

University of Jinan