Guoyin Zhang

Orcid: 0009-0000-6503-4592

According to our database1, Guoyin Zhang authored at least 48 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Offline/online attribute-based searchable encryption scheme from ideal lattices for IoT.
Frontiers Comput. Sci., June, 2024

2023
SGDAT: An optimization method for binary neural networks.
Neurocomputing, October, 2023

Adversarial Defense Method Based on Latent Representation Guidance for Remote Sensing Image Scene Classification.
Entropy, September, 2023

Underwater image enhancement using a mixed generative adversarial network.
IET Image Process., March, 2023

FedInf: Social influence prediction with federated learning.
Neurocomputing, 2023

Trajectory Data Publication Based on Differential Privacy.
Int. J. Inf. Secur. Priv., 2023

Gradient-free adversarial attack algorithm based on differential evolution.
Int. J. Bio Inspired Comput., 2023

Research on Optimization Method of Visual Odometer Based on Point Line Feature Fusion.
Proceedings of the 7th International Conference on High Performance Compilation, 2023

Dynamic Feature Point Elimination Algorithm Based on YOLOv5 and Optical Flow Method.
Proceedings of the 7th International Conference on High Performance Compilation, 2023

2022
Seafloor Classification Combining Shipboard Low-Frequency and AUV High-Frequency Acoustic Data: A Case Study of Duanqiao Hydrothermal Field, Southwest Indian Ridge.
IEEE Trans. Geosci. Remote. Sens., 2022

Adversarial transformation network with adaptive perturbations for generating adversarial examples.
Int. J. Bio Inspired Comput., 2022

Quantum-Resistant Password-Based Threshold Single-Sign-On Authentication with Updatable Server Private Key.
IACR Cryptol. ePrint Arch., 2022

2021
A Data Aggregation Privacy Protection Algorithm Based on Fat Tree in Wireless Sensor Networks.
Secur. Commun. Networks, 2021

2020
Achieving Message-Encapsulated Leveled FHE for IoT Privacy Protection.
Mob. Inf. Syst., 2020

Ship Motion Attitude Prediction Based on an Adaptive Dynamic Particle Swarm Optimization Algorithm and Bidirectional LSTM Neural Network.
IEEE Access, 2020

Privacy-Preserving Unsupervised Domain Adaptation in Federated Setting.
IEEE Access, 2020

2019
A heuristic method-based parallel cooperative spectrum sensing in heterogeneous network.
J. Supercomput., 2019

An intelligent method of cancer prediction based on mobile cloud computing.
Clust. Comput., 2019

Spectrum sensing defending against PUE attack based on fractal dimension.
Clust. Comput., 2019

Cross-layer parallel cooperative spectrum sensing for heterogeneous channels based on iterative KM algorithm.
Clust. Comput., 2019

2018
Task scheduling algorithm based on fireworks algorithm.
EURASIP J. Wirel. Commun. Netw., 2018

Research on hybrid information recognition algorithm and quality of golf swing.
Comput. Electr. Eng., 2018

Application of WINDLX Simulator in Teaching Practice to Solve the Structural and Control Related in the Pipeline.
Proceedings of the e-Learning, e-Education, and Online Training, 2018

2017
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT.
Secur. Commun. Networks, 2017

Research on tridiagonal matrix solver design based on a combination of processors.
Comput. Electr. Eng., 2017

A Novel Fragile Watermarking Scheme for 2D Vector Map Authentication.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

2016
一种基于组合事件行为触发的Android恶意行为检测方法 (Android Malicious Behavior Detection Method Based on Composite-event Trigged Behaviors).
计算机科学, 2016

Image Segmentation: A Novel Cluster Ensemble Algorithm.
Proceedings of the Social Computing, 2016

2015
基于SVM的主题爬虫技术研究 (Research on Focused Crawling Technology Based on SVM).
计算机科学, 2015

2013
Rapid FPGA-based Delay Estimation for the Hardware/Software Partitioning.
J. Networks, 2013

An Improved FPGAs-Based Loop Pipeline Scheduling Algorithm for Reconfigurable Compiler.
Proceedings of the Advanced Parallel Processing Technologies, 2013

2012
The Application of Genetic Algorithm to Intrusion Detection in MP2P Network.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

2011
A power control algorithm based on non-cooperative game for wireless sensor networks.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

An energy efficient cross-layer MAC for wireless sensor networks.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Low cost token maintains ring-like P2P network.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Research of Mechanism to System Scheduling Flexibility Based on Embedded Real-Time System.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

The state of the art in content-based image retrieval in P2P networks.
Proceedings of the Second International Conference on Internet Multimedia Computing and Service, 2010

2009
Scheduling and Data Redistribution Strategies on Tree Platforms.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009

Uncorrelated Discriminant Locality Aware Embedding for Face Recognition.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
ID-based deniable ring authentication with constant-size signature.
Frontiers Comput. Sci. China, 2008

2007
A Novel Method to Authenticate Transitively Closed Undirected Graph.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

DECP: A Distributed Election Clustering Protocol for Heterogeneous Wireless Sensor Networks.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Study and Comparison of the RTHAL-Based and ADEOS-Based RTAI Real-time Solutions for Linux.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

Cryptanalysis on Generalization of Threshold Signature and Authenticated Encryption for Group Communications.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Pareto-Q Learning Algorithm for Cooperative Agents in General-Sum Games.
Proceedings of the Multi-Agent Systems and Applications IV, 2005

2004
Research on defending DDoS attack - an expert system approach.
Proceedings of the IEEE International Conference on Systems, 2004

Research and experiments of network attack defence system.
Proceedings of the IEEE International Conference on Systems, 2004

2003
A Multi-agent Based Architecture for Network Attack Resistant System.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...