Dr. Shuai Zhou
Assistant Professor Master Supervisor
Email:shuaizhou@cityu.edu.mo
Tel:(853)8590 2310 2310
Office address: Room T406, Tai Fung Building, City University of Macau (Taipa)
Educational qualifications
2024 Doctor of Philosophy in Computer Science and Technology, University of Technology Sydney, Sydney, Australia
2019 Master of Cyberspace Security, University of Chinese Academy of Sciences, Beijing, China
2016 Bachelor of Information and Computing Science, North China Electric Power University, Hebei, China
Incumbent
Assistant Professor, Faculty of Data Science, City University of Macau
Research direction
AI privacy protection, Digital copyright, Model security
Research and publishing
Refereed Articles
Zhou, S., Liu, C., Ye, D., Zhu, T., Zhou, W., & Yu, P. S. (2022). Adversarial attacks and defenses in deep learning: From a perspective of cybersecurity. ACM Computing Surveys , 55(8), 1-39. (IF=16.6).
Zhou, S., Zhu, T., Ye, D., Zhou, W., & Zhao, W. (2024). Inversion-guided Defense: Detecting Model Stealing Attacks by Output Inverting. IEEE Transactions on Information Forensics and Security. (IF=6.8, CCF-A).
Zhou, S., Zhu, T., Ye, D., Yu, X., & Zhou, W. (2023). Boosting model inversion attacks with adversarial examples. IEEE Transactions on Dependable and Secure Computing. vol. 21, no . 3, pp. 1451-1468. (IF=7.3, CCF-A).
Zhu, T., Ye, D., Zhou, S., Liu, B., & Zhou, W. (2022). Label-only model inversion attacks: Attack with the least information. IEEE Transactions on Information Forensics and Security, 18, 991-1005. (IF=6.8, CCF-A).
Zhou, S., Xue, H., Zhang, D., Wang, K., Lu, X., Li, B., & He, J. (2019). Preprocess-then-NTT technique and its applications to Kyber and NewHope. In Information Security and Cryptology: 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, (pp. 117-137). (CCF-C).
Chen, X., Zhou, S., Guan, B., Yang, K., Fao, H., Wang, H., & Wang, Y. (2021, December). Fed-eini: An efficient and interpretable inference framework for decision tree ensembles in vertical federated learning. In 2021 IEEE international conference on big data (big data) (pp. 1242-1248). IEEE. (CCF-C).
Liu, Q., Lu, X., Luo, F., Zhou, S., He, J., & Wang, K. (2020). SecureBP from homomorphic encryption. Security and Communication Networks, 2020(1), 5328059 .(CCF-C).