Fang Zuo

Orcid: 0000-0001-5673-8870

According to our database1, Fang Zuo authored at least 24 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Privacy-Preserving Localization by Integrating Random Noise With Blockchain in Internet of Things.
IEEE Trans. Netw. Serv. Manag., April, 2024

Subspace clustering based on a multichannel attention mechanism.
Int. J. Mach. Learn. Cybern., April, 2024

An efficient manta ray foraging optimization algorithm with individual information interaction and fractional derivative mutation for solving complex function extremum and engineering design problems.
Appl. Soft Comput., January, 2024

2023
Towards accurate and privacy-preserving localization using anchor quality assessment in Internet of Things.
Future Gener. Comput. Syst., November, 2023

TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion.
Frontiers Inf. Technol. Electron. Eng., August, 2023

Federated Inverse Reinforcement Learning for Smart ICUs With Differential Privacy.
IEEE Internet Things J., 2023

Design and Analysis of Secure Localization Against Vulnerability-Induced Attack for Internet of Things.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

A Vulnerability Threat Assessment Model Based on Bayesian Networks.
Proceedings of the Advances in Artificial Intelligence, Big Data and Algorithms - Proceedings of the 3rd International Conference on Artificial Intelligence, Big Data and Algorithms (CAIBDA 2023), 2023

2022
Resilient Participant Selection Under Vulnerability Induced Colluding Attacks for Crowdsourcing.
IEEE Trans. Veh. Technol., 2022

Automatic Construction of Large-Scale IoT Datasets with Multi-strategy Fusion.
Proceedings of the Wireless Sensor Networks - 16th China Conference, 2022

A Graph Neural Network Based Model for IoT Binary Components Similarity Detection.
Proceedings of the Wireless Sensor Networks - 16th China Conference, 2022

An Improved Monte Carlo Denoising Algorithm Based on Kernel-Predicting Convolutional Network.
Proceedings of the Web Information Systems and Applications, 2022

Highway Accident Localization Based on Virtual Fence for Intelligent Transportation Systems.
Proceedings of the Web Information Systems and Applications, 2022

Efficient Differential Privacy Federated Learning Mechanism for Intelligent Selection of Optimal Privacy Protection Levels.
Proceedings of the Web Information Systems and Applications, 2022

2021
Study on outliers in the big stellar spectral dataset of the fifth data release (DR5) of the Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST).
Astron. Comput., 2021

Fabric Defect Target Detection Algorithm Based on YOLOv4 Improvement.
Proceedings of the Web Information Systems and Applications, 2021

Mixed Multi-channel Graph Convolution Network on Complex Relation Graph.
Proceedings of the Web Information Systems and Applications, 2021

Efficient Privacy Preserving Single Anchor Localization Using Noise-Adding Mechanism for Internet of Things.
Proceedings of the Web Information Systems and Applications, 2021

2020
RPCC: A Replica Placement Method to Alleviate the Replica Consistency under Dynamic Cloud.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

2014
An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers.
J. Networks, 2014

A group strategy-proof incentive approach for eliminating selfish behaviors in peer-to-peer file allocation.
Int. J. Commun. Syst., 2014

2013
An Auction Based Distribute Mechanism for P2P Adaptive Bandwidth Allocation.
IEICE Trans. Inf. Syst., 2013

2012
Selfish allocation avoidance for P2P file application: A game theoretic approach.
Proceedings of the 18th IEEE International Conference on Networks, 2012

A Game Theoretic Schema for Overcoming Selfish Allocation in P2P File Application.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012


  Loading...