| 2008 |
| 9 | EE | Chengyu Fan,
Shijie Zhou,
Fagen Li:
Deniable Proxy-Anonymous Signatures.
ICYCS 2008: 2131-2136 |
| 8 | EE | Rui Yang,
Shijie Zhou,
Chengyu Fan:
A New Algorithm for Network Diameter.
ICYCS 2008: 247-252 |
| 7 | EE | Fagen Li,
Shijie Zhou,
Rong Sun:
Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme.
IEICE Transactions 91-A(7): 1820-1823 (2008) |
| 2007 |
| 6 | EE | Chunjiang Wu,
Shijie Zhou,
Linna Wei,
Jiaqing Luo,
Yanli Wang,
Xiaoqian Yang:
A New k-Graph Partition Algorithm for Distributed P2P Simulation Systems.
ICA3PP 2007: 391-402 |
| 2006 |
| 5 | EE | Shijie Zhou,
Zhiguang Qin,
Xiaomei Zhao,
Xucheng Luo:
Interconnected Peer-to-Peer Network: A Community Based Scheme.
AICT/ICIW 2006: 108 |
| 4 | EE | Jiaqing Luo,
Shijie Zhou,
Chunjiang Wu:
An Experimental Study of the Active Recommendation Mechanism Based Distributed Approximate Indexing in Unstructured P2P Networks.
IAT Workshops 2006: 467-470 |
| 2004 |
| 3 | EE | Feng Zhang,
Zhiguang Qin,
Shijie Zhou:
Policy-Tree Based Proactive Defense Model for Network Security.
GCC Workshops 2004: 437-449 |
| 2003 |
| 2 | EE | Shijie Zhou,
Zhiguang Qin,
Jinde Liu:
Distributing the Keys into P2P Network.
GCC (1) 2003: 460-463 |
| 1 | EE | Shijie Zhou,
Zhiguang Qin,
Feng Zhang,
Xianfeng Zhang,
Wei Chen,
Jinde Liu:
Colored Petri Net Based Attack Modeling.
RSFDGrC 2003: 715-718 |