Heng Zhang

Orcid: 0000-0002-4201-3892

Affiliations:
  • Jiangsu Ocean University, School of Science, Jiangsu, China
  • Huaihai Institute of Technology, Lianyungang, China
  • Zhejiang University, College of Control Science and Engineering, Hangzhou, China (PhD 2015)


According to our database1, Heng Zhang authored at least 71 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Promoting or Hindering: Stealthy Black-Box Attacks Against DRL-Based Traffic Signal Control.
IEEE Internet Things J., February, 2024

Modeling and Detection Scheme for Zero-Dynamics Attack on Wind Power System.
IEEE Trans. Smart Grid, January, 2024

Privacy-Preserving Collaborative Learning: A Scheme Providing Heterogeneous Protection.
IEEE Internet Things J., January, 2024

2023
Distributed Multiple Attacks Detection via Consensus AA-GMPHD Filter.
IEEE Trans. Syst. Man Cybern. Syst., December, 2023

Achieving Physical Layer Security Against Location Unknown Eavesdroppers via Friendly Jammer.
IEEE CAA J. Autom. Sinica, October, 2023

Resilient Distributed Classification Learning Against Label Flipping Attack: An ADMM-Based Approach.
IEEE Internet Things J., September, 2023

Backdoor attacks against deep reinforcement learning based traffic signal control systems.
Peer Peer Netw. Appl., January, 2023

Fixed-Time Consensus for Multiple Mechanical Systems With Input Dead-Zone and Quantization Under Directed Graphs.
IEEE Trans. Netw. Sci. Eng., 2023

A Labeled RFS-Based Framework for Multiple Integrity Attackers Detection and Identification in Cyber-Physical Systems.
IEEE Internet Things J., 2023

Leveraging UAV-RIS Reflects to Improve the Security Performance of Wireless Network Systems.
IEEE Netw. Lett., 2023

An Intrusion Detection Method Based on Hash Function for Industrial Cloud Data.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
Joint Reflectance Field Estimation and Sparse Representation for Face Image Illumination Preprocessing and Recognition.
Neural Process. Lett., 2022

Energy-efficient DoS attack against remote state estimation.
Internet Technol. Lett., 2022

Optimal Jamming Strategy Against Two-State Switched System.
IEEE Commun. Lett., 2022

Subspace cross representation measure for robust face recognition with few samples.
Comput. Electr. Eng., 2022

Model-free predictive control of nonlinear systems under False Data Injection attacks.
Comput. Electr. Eng., 2022

Deep retinex decomposition network for underwater image enhancement.
Comput. Electr. Eng., 2022

Security analysis and defense strategy of distributed filtering under false data injection attacks.
Autom., 2022

Transmission scheduling for privacy-optimal encryption against eavesdropping attacks on remote state estimation.
Autom., 2022

USV Control With Adaptive Compensation Under False Data Injection Attacks.
Proceedings of the IEEE INFOCOM 2022, 2022

Optimal Jamming Strategy Against Periodically Switched Linear Discrete-Time System.
Proceedings of the 13th Asian Control Conference, 2022

Stealthy Attack Detection for Privacy-preserving Real-time Pricing in Smart Grids.
Proceedings of the 13th Asian Control Conference, 2022

2021
Optimal Schedule of Secure Transmissions for Remote State Estimation Against Eavesdropping.
IEEE Trans. Ind. Informatics, 2021

Securing wireless relaying communication for dual unmanned aerial vehicles with unknown eavesdropper.
Inf. Sci., 2021

Singular vector sparse reconstruction for image compression.
Comput. Electr. Eng., 2021

Effectiveness Analysis of UAV Offensive Strategy with Unknown Adverse Trajectory.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Hiding Iris Biological Features with Encryption.
Proceedings of the 2021 International Conference on Security, 2021

Improving Security Performance of Dual UAVs System with Unknown Eavesdropper Location: Poster Abstract.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

Iris Protection with Verisimilar Feature Structure.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

2020
Optimal Attack Strategy Against Wireless Networked Control Systems With Proactive Channel Hopping.
IEEE Trans. Ind. Informatics, 2020

Bilateral Privacy-Preserving Utility Maximization Protocol in Database-Driven Cognitive Radio Networks.
IEEE Trans. Dependable Secur. Comput., 2020

Multiple Attacks Detection in Cyber-Physical Systems Using Random Finite Set Theory.
IEEE Trans. Cybern., 2020

Optimizing Attack Schedules Based on Energy Dispatch Over Two-Hop Relay Networks.
IEEE Trans. Autom. Control., 2020

Polynomial regressors based data-driven control for autonomous underwater vehicles.
Peer-to-Peer Netw. Appl., 2020

Subspace transform induced robust similarity measure for facial images.
Frontiers Inf. Technol. Electron. Eng., 2020

An encoding mechanism for secrecy of remote state estimation.
Autom., 2020

Poster Abstract: Iterative Trajectory Optimization for Dual-UAV Secure Communications.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

Waveform Design For Track-Before-Detect-Based Cognitive Radars.
Proceedings of the 11th IEEE Sensor Array and Multichannel Signal Processing Workshop, 2020

2019
Distributed Load Sharing Under False Data Injection Attack in an Inverter-Based Microgrid.
IEEE Trans. Ind. Electron., 2019

Guest editorial: Networked cyber-physical systems: Optimization theory and applications.
Peer-to-Peer Netw. Appl., 2019

Set-valued Kalman filtering: Event triggered communication with quantized measurements.
Peer-to-Peer Netw. Appl., 2019

Advanced control theory and applications for next-generation engineered systems.
Eur. J. Control, 2019

Optimizing Time-series Prediction on China's Green Trade Economy.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019

Iris biometric feature hidden based on chaotic encryption.
Proceedings of the Conference on Research in Adaptive and Convergent Systems, 2019

Trajectory Tracking for Autonomous Underwater Vehicle Based on Model-Free Predictive Control.
Proceedings of the 20th IEEE International Conference on High Performance Switching and Routing, 2019

Analysis on Attack Schedules in Wireless Networked Control Systems based on Channel Hopping.
Proceedings of the 12th Asian Control Conference, 2019

Optimization-Based Unknown Input Observer for Road Profile Estimation with Experimental Validation on a Suspension Station.
Proceedings of the 2019 American Control Conference, 2019

2018
A Novel Data Fusion Algorithm to Combat False Data Injection Attacks in Networked Radar Systems.
IEEE Trans. Signal Inf. Process. over Networks, 2018

Sensor transmission power control in remote state estimation over a fading communication channel.
Trans. Inst. Meas. Control, 2018

DoS Attack Energy Management Against Remote State Estimation.
IEEE Trans. Control. Netw. Syst., 2018

Denial-of-Service Power Dispatch Against Linear Quadratic Control via a Fading Channel.
IEEE Trans. Autom. Control., 2018

Robust Transmission Power Management for Remote State Estimation With Wireless Energy Harvesting.
IEEE Internet Things J., 2018

Optimum transmission policy for remote state estimation with opportunistic energy harvesting.
Comput. Networks, 2018

Automatic Detection of Minimal Repeated Pattern in Printing Fabric Images.
Proceedings of the 16th ACM Conference on Embedded Networked Sensor Systems, SenSys 2018, 2018

Biological Features De-identification in Iris Images.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

2017
Guest editorial: Distributed control and optimization of wireless networks.
Peer-to-Peer Netw. Appl., 2017

Analysis of event-driven warning message propagation in Vehicular Ad Hoc Networks.
Ad Hoc Networks, 2017

Filtering for networked switched systems with multiple redundant channels: An application to the boost-buck converter.
Proceedings of the 13th IEEE International Conference on Control & Automation, 2017

Optimal sensor power control via a correlated block fading channel.
Proceedings of the 11th Asian Control Conference, 2017

Optimal jamming power allocation against remote state estimation.
Proceedings of the 2017 American Control Conference, 2017

2016
Optimal DoS Attack Scheduling in Wireless Networked Control System.
IEEE Trans. Control. Syst. Technol., 2016

A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop.
Sensors, 2016

Secured measurement fusion scheme against deceptive ECM attack in radar network.
Secur. Commun. Networks, 2016

Privacy and performance trade-off in cyber-physical systems.
IEEE Netw., 2016

2015
Optimal Denial-of-Service Attack Scheduling With Energy Constraint.
IEEE Trans. Autom. Control., 2015

Optimal Jamming Attack Scheduling in Networked Sensing and Control Systems.
Int. J. Distributed Sens. Networks, 2015

Performance of Target Tracking in Radar Network System Under Deception Attack.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

Achieving Bilateral Utility Maximization and Location Privacy Preservation in Database-Driven Cognitive Radio Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

2014
Detecting Faulty Nodes with Data Errors for Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2014

Optimal Denial-of-Service attack scheduling against linear quadratic Gaussian control.
Proceedings of the American Control Conference, 2014

2013
Optimal DoS attack policy against remote state estimation.
Proceedings of the 52nd IEEE Conference on Decision and Control, 2013


  Loading...