Dr Bo Zhou
School of Computer Science and Mathematics
Faculty of Engineering and Technology
Email: B.Zhou@ljmu.ac.uk
Telephone: 0151 231 2122
Dr Bo Zhou is a Reader in Network Security at the School of Computer Science and Mathematics, Liverpool John Moores University. He has a long track record in Network Security, having worked in both academia and industry. Dr Zhou studied Telecommunications at Northeastern University in China and Queen Mary, University of London in the UK, before completing a PhD in Network Security at Liverpool John Moores University. Dr Zhou’s research interests include Network Security, Security Visulisation, Hardware Security, Intelligent Transportation Systems, and Machine Learning.
Languages
English
Chinese (Mandarin)
Russian
Degrees
2007, Liverpool John Moores University, Liverpool, United Kingdom, PhD - SUIDS: A Resource-Efficient Intrusion Detection System for Ubiquitous Computing Environments
2003, Queen Mary University of London, London, United Kingdom, MSc - Telecommunications
2002, Northeastern University, shenyang, China, BSc - Telecommunications
Certifications
Higher Education Academy, FHEA
Academic appointments
Reader in Network Security, School of Computer Science and Mathematics, Liverpool John Moores University, 2019 - present
Senior Lecturer, School of Computer Science and Mathematics, Liverpool John Moores University, 2013 - 2019
Journal article
Hu Y, Wu M, Yuan M, Wen Y, Ren P, Ye S, Liu F, Zhou B, Fang H, Wang R, Ji Z, Huang R. 2024. Accurate prediction of dielectric properties and bandgaps in materials with a machine learning approach Applied Physics Letters, 125 DOI Publisher Url Public Url
Cai L, Li W, Li H, Zhou B, He L, Guo W, Yang Z. 2024. Incorporation of energy-consumption optimization into multi-objective and robust port multi-equipment integrated scheduling Transportation Research Part C: Emerging Technologies, 166 :1 DOI Publisher Url Public Url
Cai L, Li W, Zhou B, Li H, Yang Z. 2023. Robust multi-equipment scheduling for U-shaped container terminals concerning double-cycling mode and uncertain operation time with cascade effects Transportation Research Part C: Emerging Technologies, 158 DOI Publisher Url Public Url
Al-Ani R, Shamsa TB, Zhou B, Shi Q. 2023. Privacy and Safety Improvement of VANET Data via a Safety-related Privacy Scheme International Journal of Information Security, DOI Publisher Url Public Url
Liu C, Ren P, Zhou B, Zhang JF, Fang H, Ji Z. 2021. Investigation on the implementation of stateful minority logic for future in-memory computing IEEE Access, 9 :168648-168655 DOI Author Url Publisher Url Public Url
Adewuyi AA, Cheng H, Shi Q, Cao J, Wang X, Zhou B. 2021. SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url
Mamvong JN, Goteng GL, Zhou B, Gao Y. 2020. Efficient Security Algorithm for Power Constrained IoT Devices IEEE Internet of Things Journal, 8 :5498-5509 DOI Author Url Publisher Url Public Url
Brown J, Zhang J, Zhou B, Mehedi M, Freitas P, Marsland J, Ji Z. 2020. Random‑telegraph‑noise‑enabled true random number generator for hardware security Scientific Reports, 10 DOI Author Url Publisher Url Public Url
Koh SS, Zhou B, Fang H, Yang P, Yang Z, Yang Q, Guan L, Ji Z. 2020. Real-time Deep Reinforcement Learning based Vehicle Routing and Navigation Applied Soft Computing Journal, 96 DOI Author Url Publisher Url Public Url
Su M, Zhou B, Fu A, Yu Y, Zhang G. 2020. PRTA: a Proxy Re-encryption based Trusted Authorization Scheme for Nodes on CloudIoT Information Sciences, 527 :533-547 DOI Author Url Publisher Url Public Url
Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. 2018. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems, 5 :1174-1188 DOI Author Url Publisher Url Public Url
Qi J, Yang P, Hanneghan M, Tang SO, Zhou B. 2018. A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url
Yang Q, Jiang L, Hao W, Zhou B, Yang P, Lv Z. 2017. PMU Placement in Electric Transmission Networks for Reliable State Estimation against False Data Injection Attacks IEEE Internet of Things Journal, 4 :1978-1986 DOI Author Url Publisher Url Public Url
Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience, DOI Author Url Publisher Url Public Url
Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring Web Service Security in the Era of Internet of Things Computers and Electrical Engineering, DOI Author Url Publisher Url Public Url
Song C, Sang J, Zhou B. 2016. A High Security Buyer-Seller Watermark Protocol based on Iris Biometric Recent Advances in Electrical & Electronic Engineering, 9 :124-131 DOI Publisher Url Public Url
Zhang Q, Xu Z, Zhou B. 2015. Group consensus measurement in MADM with multiple preference formats Journal of Decision Systems, 24 :146-158 DOI Publisher Url Public Url
Su M, Li F, Tang Z, Yu Y, Zhou B. 2014. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application The Scientific World Journal, DOI Author Url Publisher Url Public Url
Asim M, Zhou B, Llewellyn-Jones D, Shi Q, Merabti M. 2014. Dynamic monitoring of composed services 9783319044477 :235-245 DOI Publisher Url
Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, DOI Publisher Url
Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 DOI Author Url Publisher Url
Conference publication
Liu C, Guo L, Qiao Z, Li J, Ren P, Ye S, Zhou B, Zhang J, Ji Z, Wang R, Huang R. 2022. Realization of NOR logic using Cu/ZnO/Pt CBRAM 6th IEEE Electron Devices Technology and Manufacturing Conference, EDTM, 2022 6th IEEE Electron Devices Technology & Manufacturing Conference (EDTM) :132-134 DOI Publisher Url Public Url
Qiao Z, Li J, Liu C, Guo L, Ren P, Ye S, Zhou B, Zhang J, Ji Z, Liu J, Wang R, Huang R. 2022. Realization of Logical NOT Based on Standard DRAM Cells for security-centric Compute-in-Memory applications 6th IEEE Electron Devices Technology and Manufacturing Conference, EDTM 2022, 6th IEEE Electron Devices Technology & Manufacturing Conference (EDTM) :333-335 DOI Publisher Url Public Url
Al-Ani R, Zhou B, Shi Q, Baker T, Abdlhamed M. 2020. Adjusted Location Privacy Scheme in VANET Safety Applications NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, The Third International Workshop on Intelligent Transportation and Connected Vehicles Technologies (ITCVT 2020) DOI Author Url Publisher Url Public Url
Brown J, Gao R, Ji Z, Chen J, Wu J, Zhang JF, Zhou B, Shi Q, Crawford J, Zhang WD. 2018. A low-power and high-speed True Random Number Generator using generated RTN 2018 IEEE Symposium on VLSI Technology, 2018 Symposia on VLSI Technology and Circuits DOI Author Url Publisher Url Public Url
Truong NB, Um TW, Zhou B, Lee GM. 2018. Strengthening the Blockchain-based Internet of Value with Trust 2018 IEEE International Conference on Communications (ICC), IEEE International Conference on Communications (ICC) DOI Author Url Publisher Url Public Url
Al-ani R, Zhou B, Shi Q, Sagheer A. 2018. A Survey on Secure Safety Applications in VANET 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), The 16th IEEE Conference on Smart City DOI Author Url Publisher Url Public Url
Truong NB, Um TW, Zhou B, Lee GM. 2017. From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things GLOBECOM 2017 - 2017 IEEE Global Communications Conference, IEEE GLOBECOM 2017 DOI Author Url Publisher Url Public Url
Koh SS, Zhou B, Yang P, Yang Z. 2017. Study of Group Route Optimization for IoT enabled Urban Transportation Network 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE CPSCom/GreenCom/iThings/SmartData DOI Author Url Publisher Url Public Url
Koh SS, Zhou B, Yang P, Yang Z. 2017. A Survey on Urban Traffic Optimisation for Sustainable and Resilient Transportation Network Developments in eSystems Engineering (DeSE), 9th International Conference on Developments in eSystems Engineering (DeSE) DOI Author Url Publisher Url Public Url
Maines C, Zhou B, Tang SOT, Shi Q. 2016. Adding a Third Dimension to BPMN as a means of Representing Cyber Security Requirements 9th International Conference on Developments in e-Systems Engineering (DESE2016) DOI Author Url Publisher Url
Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications DOI Publisher Url Public Url
Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) :715-721 DOI Author Url
Brumfitt H, Askwith RJ, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing :1772-1779 DOI Author Url Publisher Url Public Url
Maines C, Llewellyn-Jones D, Tang S, Zhou B. 2015. A Cyber Security Ontology for BPMN-Security Extensions 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) DOI Author Url Publisher Url
Brumfitt H, Askwith RJ, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), The 15th IEEE International Conference on Computer and Information Technology :795-800 DOI Author Url Publisher Url Public Url
Koh SS, Zhou B. 2015. BPMN Security Extensions for Healthcare Process 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on Pervasive Intelligence and Computing :2340-2345 DOI Author Url Publisher Url Public Url
Zhou B, Shi Q, Asim M, Zarzosa S. 2015. A Policy Specification Language for Composite Services The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications Publisher Url Public Url
Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The aniketos service composition framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135
Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135 DOI
Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 DOI Author Url Publisher Url
Asim M, Llewellyn-Jones D, Lempereur B, Zhou B, Shi Q, Merabti M. 2013. Event Driven Monitoring of Composite Services 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :550-557 DOI Author Url Publisher Url
Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2013. A Framework for Secure Service Composition 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :647-652 DOI Author Url Publisher Url
Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. Secure Service Composition Adaptation Based on Simulated Annealing Proceedings of the Layered Assurance Workshop (LAW) 2012, Annual Computer Security Applications Conference - ACSAC 28, Layered Assurance Workshop :49-55
Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A Compose Language-based Framework for Secure Service Composition ASE International Conference on Cyber Security (CyberSecurity 2012), Washington DC, USA, :14-16
Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A compose language-based framework for secure service composition Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, :195-202 DOI Author Url Publisher Url
Zhou B, Shi Q, Merabti M. 2007. Towards energy-efficient intrusion detection in pervasive computing 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, IEEE International Conference on Communications (ICC 2007) :1417-1422 DOI Author Url Publisher Url
Zhou B, Shi Q, Merabti M. 2006. A Framework for Intrusion Detection in Heterogeneous Environments 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 3rd IEEE Consumer Communications and Networking Conference :1244-1248 DOI Author Url Publisher Url
Zhou B, Shi Q, Merabti M. 2006. Intrusion detection in pervasive networks based on a chi-square statistic test 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 30th Annual International Computer Software and Applications Conference :203-+ DOI Author Url Publisher Url
Zhou B, Shi Q, Merabti M. 2006. Real-time intrusion detection in ubiquitous networks with a string-based approach Gavrilova M, Gervasi O, Kumar V, Tan CJK, Taniar D, Lagana A, Mun Y, Choo H. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, International Conference on Computational Science and Its Applications (ICCSA 2006) 3983 :352-359 DOI Author Url Publisher Url
Zhou B, Shi Q, Merabti M. 2005. A novel service-oriented and user-centric intrusion detection system for ubiquitous networks Hamza MH. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, IASTED International Conference on Communication, Network, and Information Security :76-81 Author Url
Zhou B, Llewellyn-Jones D, Lamb DJ, Asim M, Shi Q, Merabti M. A Heuristic Approach for Secure Service Composition Adaptation First International Workshop on Cyberpatterns DOI Publisher Url
Maines CL, Zhou B, Tang SOT, Shi Q. Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language Developments in eSystems Engineering DOI Author Url Publisher Url Public Url
Koh SS, Zhou B, Yang P, Yang Z, Fang H, Feng J. Reinforcement Learning for Vehicle Route Optimization in SUMO 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), The 16th IEEE Conference on Smart City DOI Author Url Publisher Url Public Url
Cai L, Li W, Li H, Zhou B, Yang Z. Reliability-based approach for port integrated scheduling incorporating uncertain operation
Report
Raschella A, Mackay M, Zhou B. 2022. Traffic Modelling and Security Liverpool 5G Create, Final Report
Chapters
Zhou B, Maines CL, Tang SO, Shi Q. 2018. A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN Parkinson S, Crampton A, Hill R. Guide to Vulnerability Analysis for Computer Networks and Systems :339-366 Springer 978-3-319-92624-7 Publisher Url Public Url
Brucker A, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework Brucker A, Dalpiaz F, Giorgini P, Meland P, Rios E. Secure and Trustworthy Service Composition 8900 :121-135 Springer International Publishing 978-3-319-13517-5 DOI Publisher Url
Zhou B, Llewellyn-Jones D, Lamb D, Asim M, Shi Q, Merabti M. 2014. A Heuristic Approach for Secure Service Composition Adaptation Cyberpatterns DOI
Thesis/Dissertation
Zhou B. SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments Public Url
Teaching qualification:
Fellow of Higher Education Academy (FHEA). 2016
Award:
Best Paper Award - System-of-Systems Boundary Check in a Public Event Scenario. 5th International Conference on Systems of Systems Engineering (SoSE 2010).. 2010
Research Grants Awarded:
Department for Culture, Media & Sport, Modelling Security Requirements for Businesses in 3D, Grant value (£): 50000.
Fellowships:
Early Career Researcher Fellowship, Liverpool John Moores University.