Image of Dr Bo Zhou

Dr Bo Zhou

School of Computer Science and Mathematics

Faculty of Engineering and Technology

Email: B.Zhou@ljmu.ac.uk

Telephone: 0151 231 2122

Dr Bo Zhou is a Reader in Network Security at the School of Computer Science and Mathematics, Liverpool John Moores University. He has a long track record in Network Security, having worked in both academia and industry. Dr Zhou studied Telecommunications at Northeastern University in China and Queen Mary, University of London in the UK, before completing a PhD in Network Security at Liverpool John Moores University. Dr Zhou’s research interests include Network Security, Security Visulisation, Hardware Security, Intelligent Transportation Systems, and Machine Learning.

Languages

English
Chinese (Mandarin)
Russian

Degrees

2007, Liverpool John Moores University, Liverpool, United Kingdom, PhD - SUIDS: A Resource-Efficient Intrusion Detection System for Ubiquitous Computing Environments
2003, Queen Mary University of London, London, United Kingdom, MSc - Telecommunications
2002, Northeastern University, shenyang, China, BSc - Telecommunications

Certifications

Higher Education Academy, FHEA

Academic appointments

Reader in Network Security, School of Computer Science and Mathematics, Liverpool John Moores University, 2019 - present
Senior Lecturer, School of Computer Science and Mathematics, Liverpool John Moores University, 2013 - 2019

Journal article

Hu Y, Wu M, Yuan M, Wen Y, Ren P, Ye S, Liu F, Zhou B, Fang H, Wang R, Ji Z, Huang R. 2024. Accurate prediction of dielectric properties and bandgaps in materials with a machine learning approach Applied Physics Letters, 125 DOI Publisher Url Public Url

Cai L, Li W, Li H, Zhou B, He L, Guo W, Yang Z. 2024. Incorporation of energy-consumption optimization into multi-objective and robust port multi-equipment integrated scheduling Transportation Research Part C: Emerging Technologies, 166 :1 DOI Publisher Url Public Url

Cai L, Li W, Zhou B, Li H, Yang Z. 2023. Robust multi-equipment scheduling for U-shaped container terminals concerning double-cycling mode and uncertain operation time with cascade effects Transportation Research Part C: Emerging Technologies, 158 DOI Publisher Url Public Url

Al-Ani R, Shamsa TB, Zhou B, Shi Q. 2023. Privacy and Safety Improvement of VANET Data via a Safety-related Privacy Scheme International Journal of Information Security, DOI Publisher Url Public Url

Liu C, Ren P, Zhou B, Zhang JF, Fang H, Ji Z. 2021. Investigation on the implementation of stateful minority logic for future in-memory computing IEEE Access, 9 :168648-168655 DOI Author Url Publisher Url Public Url

Adewuyi AA, Cheng H, Shi Q, Cao J, Wang X, Zhou B. 2021. SC-TRUST: A Dynamic Model for Trustworthy Service Composition in the Internet of Things IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url

Mamvong JN, Goteng GL, Zhou B, Gao Y. 2020. Efficient Security Algorithm for Power Constrained IoT Devices IEEE Internet of Things Journal, 8 :5498-5509 DOI Author Url Publisher Url Public Url

Brown J, Zhang J, Zhou B, Mehedi M, Freitas P, Marsland J, Ji Z. 2020. Random‑telegraph‑noise‑enabled true random number generator for hardware security Scientific Reports, 10 DOI Author Url Publisher Url Public Url

Koh SS, Zhou B, Fang H, Yang P, Yang Z, Yang Q, Guan L, Ji Z. 2020. Real-time Deep Reinforcement Learning based Vehicle Routing and Navigation Applied Soft Computing Journal, 96 DOI Author Url Publisher Url Public Url

Su M, Zhou B, Fu A, Yu Y, Zhang G. 2020. PRTA: a Proxy Re-encryption based Trusted Authorization Scheme for Nodes on CloudIoT Information Sciences, 527 :533-547 DOI Author Url Publisher Url Public Url

Zhou B, Maines CL, Tang SOT, Shi Q, Yang P, Yang Q, Qi J. 2018. A 3D Security Modelling Platform for Social IoT Environments IEEE Transactions on Computational Social Systems, 5 :1174-1188 DOI Author Url Publisher Url Public Url

Qi J, Yang P, Hanneghan M, Tang SO, Zhou B. 2018. A Hybrid Hierarchical Framework for Gym Physical Activity Recognition and Measurement Using Wearable Sensors IEEE Internet of Things Journal, DOI Author Url Publisher Url Public Url

Yang Q, Jiang L, Hao W, Zhou B, Yang P, Lv Z. 2017. PMU Placement in Electric Transmission Networks for Reliable State Estimation against False Data Injection Attacks IEEE Internet of Things Journal, 4 :1978-1986 DOI Author Url Publisher Url Public Url

Brucker A, Zhou B, Malmignati F, Shi Q, Merabti M. 2017. Modelling, Validating, and Ranking of Secure Service Compositions Software: Practice and Experience, DOI Author Url Publisher Url Public Url

Zhou B, Zhang Q, Shi Q, Yang Q, Yang P, Yu Y. 2017. Measuring Web Service Security in the Era of Internet of Things Computers and Electrical Engineering, DOI Author Url Publisher Url Public Url

Song C, Sang J, Zhou B. 2016. A High Security Buyer-Seller Watermark Protocol based on Iris Biometric Recent Advances in Electrical & Electronic Engineering, 9 :124-131 DOI Publisher Url Public Url

Zhang Q, Xu Z, Zhou B. 2015. Group consensus measurement in MADM with multiple preference formats Journal of Decision Systems, 24 :146-158 DOI Publisher Url Public Url

Su M, Li F, Tang Z, Yu Y, Zhou B. 2014. An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application The Scientific World Journal, DOI Author Url Publisher Url Public Url

Asim M, Zhou B, Llewellyn-Jones D, Shi Q, Merabti M. 2014. Dynamic monitoring of composed services 9783319044477 :235-245 DOI Publisher Url

Zhou B, Drew O, Arabo A, Llewellyn-Jones D, Kifayat K, Merabti M, Shi Q, Craddock R, Waller A, Jones G. 2010. System-of-systems boundary check in a public event scenario 2010 5th International Conference on System of Systems Engineering, SoSE 2010, DOI Publisher Url

Zhou B, Shi Q, Merabti M. 2008. Balancing intrusion detection resources in ubiquitous computing networks COMPUTER COMMUNICATIONS, 31 :3643-3653 DOI Author Url Publisher Url

Conference publication

Liu C, Guo L, Qiao Z, Li J, Ren P, Ye S, Zhou B, Zhang J, Ji Z, Wang R, Huang R. 2022. Realization of NOR logic using Cu/ZnO/Pt CBRAM 6th IEEE Electron Devices Technology and Manufacturing Conference, EDTM, 2022 6th IEEE Electron Devices Technology & Manufacturing Conference (EDTM) :132-134 DOI Publisher Url Public Url

Qiao Z, Li J, Liu C, Guo L, Ren P, Ye S, Zhou B, Zhang J, Ji Z, Liu J, Wang R, Huang R. 2022. Realization of Logical NOT Based on Standard DRAM Cells for security-centric Compute-in-Memory applications 6th IEEE Electron Devices Technology and Manufacturing Conference, EDTM 2022, 6th IEEE Electron Devices Technology & Manufacturing Conference (EDTM) :333-335 DOI Publisher Url Public Url

Al-Ani R, Zhou B, Shi Q, Baker T, Abdlhamed M. 2020. Adjusted Location Privacy Scheme in VANET Safety Applications NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium, The Third International Workshop on Intelligent Transportation and Connected Vehicles Technologies (ITCVT 2020) DOI Author Url Publisher Url Public Url

Brown J, Gao R, Ji Z, Chen J, Wu J, Zhang JF, Zhou B, Shi Q, Crawford J, Zhang WD. 2018. A low-power and high-speed True Random Number Generator using generated RTN 2018 IEEE Symposium on VLSI Technology, 2018 Symposia on VLSI Technology and Circuits DOI Author Url Publisher Url Public Url

Truong NB, Um TW, Zhou B, Lee GM. 2018. Strengthening the Blockchain-based Internet of Value with Trust 2018 IEEE International Conference on Communications (ICC), IEEE International Conference on Communications (ICC) DOI Author Url Publisher Url Public Url

Al-ani R, Zhou B, Shi Q, Sagheer A. 2018. A Survey on Secure Safety Applications in VANET 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), The 16th IEEE Conference on Smart City DOI Author Url Publisher Url Public Url

Truong NB, Um TW, Zhou B, Lee GM. 2017. From Personal Experience to Global Reputation for Trust Evaluation in the Social Internet of Things GLOBECOM 2017 - 2017 IEEE Global Communications Conference, IEEE GLOBECOM 2017 DOI Author Url Publisher Url Public Url

Koh SS, Zhou B, Yang P, Yang Z. 2017. Study of Group Route Optimization for IoT enabled Urban Transportation Network 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), IEEE CPSCom/GreenCom/iThings/SmartData DOI Author Url Publisher Url Public Url

Koh SS, Zhou B, Yang P, Yang Z. 2017. A Survey on Urban Traffic Optimisation for Sustainable and Resilient Transportation Network Developments in eSystems Engineering (DeSE), 9th International Conference on Developments in eSystems Engineering (DeSE) DOI Author Url Publisher Url Public Url

Maines C, Zhou B, Tang SOT, Shi Q. 2016. Adding a Third Dimension to BPMN as a means of Representing Cyber Security Requirements 9th International Conference on Developments in e-Systems Engineering (DESE2016) DOI Author Url Publisher Url

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications DOI Publisher Url Public Url

Zhou B, Shi Q, Yang P. 2016. A Survey on Quantitative Evaluation of Web Service Security 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 15th IEEE Int Conf on Trust, Security and Privacy in Comp and Commun / 10th IEEE Int Conf on Big Data Science and Engineering / 14th IEEE Int Symposium on Parallel and Distributed Proc with Applicat (IEEE Trustcom/BigDataSE/ISPA) :715-721 DOI Author Url

Brumfitt H, Askwith RJ, Zhou B. 2015. Protecting Future Personal Computing: Challenging Traditional Network Security Models 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing :1772-1779 DOI Author Url Publisher Url Public Url

Maines C, Llewellyn-Jones D, Tang S, Zhou B. 2015. A Cyber Security Ontology for BPMN-Security Extensions 13th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC-2015) DOI Author Url Publisher Url

Brumfitt H, Askwith RJ, Zhou B. 2015. Lightweight Forensics Application: Lightweight Approach to Securing Mobile Devices 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), The 15th IEEE International Conference on Computer and Information Technology :795-800 DOI Author Url Publisher Url Public Url

Koh SS, Zhou B. 2015. BPMN Security Extensions for Healthcare Process 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on Pervasive Intelligence and Computing :2340-2345 DOI Author Url Publisher Url Public Url

Zhou B, Shi Q, Asim M, Zarzosa S. 2015. A Policy Specification Language for Composite Services The Fifth International Conference on Advanced Collaborative Networks, Systems and Applications Publisher Url Public Url

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The aniketos service composition framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework: Analysing and ranking of secure services Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8900 :121-135 DOI

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M. 2013. Prototype for Design-time Secure and Trustworthy Service Composition 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 10th IEEE Consumer Communications and Networking Conference (CCNC) :847-848 DOI Author Url Publisher Url

Asim M, Llewellyn-Jones D, Lempereur B, Zhou B, Shi Q, Merabti M. 2013. Event Driven Monitoring of Composite Services 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :550-557 DOI Author Url Publisher Url

Brucker AD, Malmignati F, Merabti M, Shi Q, Zhou B. 2013. A Framework for Secure Service Composition 2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), ASE/IEEE International Conference on Social Computing (SocialCom) :647-652 DOI Author Url Publisher Url

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. Secure Service Composition Adaptation Based on Simulated Annealing Proceedings of the Layered Assurance Workshop (LAW) 2012, Annual Computer Security Applications Conference - ACSAC 28, Layered Assurance Workshop :49-55

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A Compose Language-based Framework for Secure Service Composition ASE International Conference on Cyber Security (CyberSecurity 2012), Washington DC, USA, :14-16

Zhou B, Llewellyn-Jones D, Shi Q, Asim M, Merabti M, Lamb D. 2012. A compose language-based framework for secure service composition Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, :195-202 DOI Author Url Publisher Url

Zhou B, Shi Q, Merabti M. 2007. Towards energy-efficient intrusion detection in pervasive computing 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, IEEE International Conference on Communications (ICC 2007) :1417-1422 DOI Author Url Publisher Url

Zhou B, Shi Q, Merabti M. 2006. A Framework for Intrusion Detection in Heterogeneous Environments 2006 3RD IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 3rd IEEE Consumer Communications and Networking Conference :1244-1248 DOI Author Url Publisher Url

Zhou B, Shi Q, Merabti M. 2006. Intrusion detection in pervasive networks based on a chi-square statistic test 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 30th Annual International Computer Software and Applications Conference :203-+ DOI Author Url Publisher Url

Zhou B, Shi Q, Merabti M. 2006. Real-time intrusion detection in ubiquitous networks with a string-based approach Gavrilova M, Gervasi O, Kumar V, Tan CJK, Taniar D, Lagana A, Mun Y, Choo H. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, International Conference on Computational Science and Its Applications (ICCSA 2006) 3983 :352-359 DOI Author Url Publisher Url

Zhou B, Shi Q, Merabti M. 2005. A novel service-oriented and user-centric intrusion detection system for ubiquitous networks Hamza MH. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, IASTED International Conference on Communication, Network, and Information Security :76-81 Author Url

Zhou B, Llewellyn-Jones D, Lamb DJ, Asim M, Shi Q, Merabti M. A Heuristic Approach for Secure Service Composition Adaptation First International Workshop on Cyberpatterns DOI Publisher Url

Maines CL, Zhou B, Tang SOT, Shi Q. Towards a Framework for the Extension and Visualisation of Cyber Security Requirements in Modelling Language Developments in eSystems Engineering DOI Author Url Publisher Url Public Url

Koh SS, Zhou B, Yang P, Yang Z, Fang H, Feng J. Reinforcement Learning for Vehicle Route Optimization in SUMO 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), The 16th IEEE Conference on Smart City DOI Author Url Publisher Url Public Url

Cai L, Li W, Li H, Zhou B, Yang Z. Reliability-based approach for port integrated scheduling incorporating uncertain operation

Report

Raschella A, Mackay M, Zhou B. 2022. Traffic Modelling and Security Liverpool 5G Create, Final Report

Chapters

Zhou B, Maines CL, Tang SO, Shi Q. 2018. A Framework for the Visualisation of Cyber Security Requirements and its Application in BPMN Parkinson S, Crampton A, Hill R. Guide to Vulnerability Analysis for Computer Networks and Systems :339-366 Springer 978-3-319-92624-7 Publisher Url Public Url

Brucker A, Malmignati F, Merabti M, Shi Q, Zhou B. 2014. The Aniketos Service Composition Framework Brucker A, Dalpiaz F, Giorgini P, Meland P, Rios E. Secure and Trustworthy Service Composition 8900 :121-135 Springer International Publishing 978-3-319-13517-5 DOI Publisher Url

Zhou B, Llewellyn-Jones D, Lamb D, Asim M, Shi Q, Merabti M. 2014. A Heuristic Approach for Secure Service Composition Adaptation Cyberpatterns DOI

Thesis/Dissertation

Zhou B. SUIDS : a resource-efficient intrusion detection system for ubiquitous computing environments Public Url

Teaching qualification:

Fellow of Higher Education Academy (FHEA). 2016

Award:

Best Paper Award - System-of-Systems Boundary Check in a Public Event Scenario. 5th International Conference on Systems of Systems Engineering (SoSE 2010).. 2010

Research Grants Awarded:

Department for Culture, Media & Sport, Modelling Security Requirements for Businesses in 3D, Grant value (£): 50000.

Fellowships:

Early Career Researcher Fellowship, Liverpool John Moores University.

Top