


default search action
Shuhui Zhang 0001
Person information
- affiliation: Qilu University of Technology, Jinan, China
- affiliation: Shandong Computer Science Center, National Supercomputer Center in Jinan, China
- affiliation (PhD 2019): Shandong University, Jinan, China
Other persons with the same name
- Shuhui Zhang (aka: Shu-hui Zhang) — disambiguation page
- Shuhui Zhang 0002 (aka: Shu-hui Zhang 0002) — Beijing Normal University, College of Resources Science and Technology, China
- Shuhui Zhang 0003
— Dalian University of Technology, Faculty of Electronic Information and Electrical Engineering, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j14]Shujiang Xu
, Haochen He, Miodrag J. Mihaljevic
, Shuhui Zhang, Wei Shao, Qizheng Wang:
DBC-MulBiLSTM: A DistilBERT-CNN Feature Fusion Framework enhanced by multi-head self-attention and BiLSTM for smart contract vulnerability detection. Comput. Electr. Eng. 123: 110096 (2025) - [j13]Shujiang Xu
, Shishi Dong, Lianhai Wang, Miodrag J. Mihaljevié, Shuhui Zhang, Wei Shao, Qizheng Wang:
Blockchain-based secure data sharing with overlapping clustering and searchable encryption. Comput. Stand. Interfaces 93: 103979 (2025) - [j12]Wei Shao
, Lianhai Wang, Chunfu Jia, Qizheng Wang, Jinpeng Wang, Shujiang Xu, Shuhui Zhang
, Mingyue Li:
Distributed privacy-preserving keyword querying for integrated data in IoT networks via function secret sharing. Inf. Fusion 123: 103298 (2025) - [j11]Qizheng Wang
, Lianhai Wang
, Shujiang Xu
, Shuhui Zhang
, Wei Shao, Miodrag J. Mihaljevic:
Single-Layer Trainable Neural Network for Secure Inference. IEEE Internet Things J. 12(3): 2968-2978 (2025) - [c14]Shuhui Zhang, Ting Gao, Lianhai Wang, Shujiang Xu, Wei Shao, Qizheng Wang:
A Lightweight Identity Privacy Protection Scheme For Electric Vehicles Based On Consortium Blockchain. CSCWD 2025: 1480-1487 - [c13]Shujiang Xu, Duanzhen Li, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qizheng Wang:
Cross-Chain Identity Authentication Protocol based on Group Signature and Zero-Knowledge Proof. CSCWD 2025: 2065-2070 - 2024
- [j10]Shujiang Xu
, Lulu Zhang
, Lianhai Wang, Miodrag J. Mihaljevic
, Shuhui Zhang
, Wei Shao, Qizheng Wang:
Relay network-based cross-chain data interaction protocol with integrity audit. Comput. Electr. Eng. 117: 109262 (2024) - [j9]Shuhui Zhang, Hanwen Tian, Lianhai Wang, Shujiang Xu, Wei Shao:
A reputation-based dynamic reorganization scheme for blockchain network sharding. Connect. Sci. 36(1) (2024) - [j8]Lianhai Wang
, Xiaoqian Liu, Wei Shao, Chenxi Guan, Qihao Huang, Shujiang Xu, Shuhui Zhang
:
A Blockchain-Based Privacy-Preserving Healthcare Data Sharing Scheme for Incremental Updates. Symmetry 16(1): 89 (2024) - 2023
- [j7]Shujiang Xu
, Jinrong Zhong
, Lianhai Wang, Debiao He, Shuhui Zhang, Wei Shao:
A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth. Connect. Sci. 35(1) (2023) - [j6]Wei Shao
, Jinpeng Wang
, Lianhai Wang
, Chunfu Jia
, Shujiang Xu
, Shuhui Zhang
:
Auditable Blockchain Rewriting in Permissioned Setting With Mandatory Revocability for IoT. IEEE Internet Things J. 10(24): 21322-21336 (2023) - [j5]Shuhui Zhang
, Changdong Hu, Lianhai Wang, Miodrag J. Mihaljevic
, Shujiang Xu, Tian Lan:
A Malware Detection Approach Based on Deep Learning and Memory Forensics. Symmetry 15(3): 758 (2023) - [c12]Shujiang Xu, Fansheng Wang, Lianhai Wang, Miodrag J. Mihaljevic, Shuhui Zhang, Wei Shao, Qihao Huang:
Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE. ISPA/BDCloud/SocialCom/SustainCom 2023: 447-455 - [c11]Ruochen Wang, Fei Song, Jun Ma, Shuhui Zhang:
We Want AI to Help Us - An Explorative Study Regarding How AI Could Assist Operators in the Main Control Room of Nuclear Power Plants. HCI (41) 2023: 298-310 - 2022
- [c10]Shujiang Xu
, Chaoyang Zhang, Lianhai Wang, Shuhui Zhang, Wei Shao:
A Cross Data Center Access Control Model by Constructing GAS on Blockchain. ICPADS 2022: 312-321 - 2021
- [c9]Kunlun Fu, Lianhai Wang, Wei Shao, Wei Wang, Shuhui Zhang, Shujiang Xu, Shanshan Hu:
Supervisory Scheme for Blockchain Privacy Protection Technique Based on Group Signature. ICEA 2021: 223-228 - 2020
- [j4]Dawei Zhao
, Shumian Yang, Xiaohui Han, Shuhui Zhang
, Zhen Wang
:
Dismantling and Vertex Cover of Network Through Message Passing. IEEE Trans. Circuits Syst. 67-II(11): 2732-2736 (2020)
2010 – 2019
- 2019
- [c8]Shuhui Zhang, Lianhai Wang, Lijuan Xu, Shujiang Xu, Xiaohui Han, Shumian Yang:
Virtual Machine Memory Forensics Method for XenServer Platform. NaNA 2019: 302-308 - 2018
- [j3]Shuhui Zhang
, Xiangxu Meng
, Lianhai Wang, Lijuan Xu, Xiaohui Han:
Secure Virtualization Environment Based on Advanced Memory Introspection. Secur. Commun. Networks 2018: 9410278:1-9410278:16 (2018) - [c7]Shumian Yang, Lianhai Wang, Dawei Zhao, Guangqi Liu, Shuhui Zhang:
The Design of a Cloud Forensics Middleware System Base on Memory Analysis. SoCPaR 2018: 258-267 - 2017
- [j2]Xiaohui Han
, Lianhai Wang, Chaoran Cui, Jun Ma, Shuhui Zhang:
Linking Multiple Online Identities in Criminal Investigations: A Spectral Co-Clustering Framework. IEEE Trans. Inf. Forensics Secur. 12(9): 2242-2255 (2017) - [c6]Shuhui Zhang, Xiangxu Meng, Lianhai Wang, Guangqi Liu:
Research on Linux Kernel Version Diversity for Precise Memory Analysis. ICPCSEE (1) 2017: 373-385 - 2016
- [j1]Shuhui Zhang, Xiangxu Meng, Lianhai Wang:
An adaptive approach for Linux memory analysis based on kernel code reconstruction. EURASIP J. Inf. Secur. 2016: 14 (2016) - 2014
- [c5]Shuhui Zhang, Lianhai Wang, Xiaohui Han:
A KVM Virtual Machine Memory Forensics Method Based on VMCS. CIS 2014: 657-661 - 2013
- [c4]Shuhui Zhang, Lianhai Wang:
Forensic analysis of social networking application on iOS devices. ICMV 2013: 906715 - 2010
- [c3]Lianhai Wang, Lijuan Xu, Shuhui Zhang:
Network Connections Information Extraction of 64-Bit Windows 7 Memory Images. e-Forensics 2010: 90-98 - [c2]Lei Zhang, Lianhai Wang, Ruichao Zhang, Shuhui Zhang, Yang Zhou:
Live Memory Acquisition through FireWire. e-Forensics 2010: 159-167
2000 – 2009
- 2009
- [c1]Ruichao Zhang, Lianhai Wang, Shuhui Zhang:
Windows Memory Analysis Based on KPCR. IAS 2009: 677-680
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-13 19:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint