Hongbin Zhang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2024
Dynamic Assortment Selection Under Inventory and Limited Switches Constraints.
IEEE Trans. Knowl. Data Eng., March, 2024

2023
Variable Step Size Methods of the Hybrid Affine Projection Adaptive Filtering Algorithm under Symmetrical Non-Gaussian Noise.
Symmetry, 2023

Quantitative evaluation of common cause failures in high safety-significant safety-related digital instrumentation and control systems in nuclear power plants.
Reliab. Eng. Syst. Saf., 2023

ECMER: Edge-Cloud Collaborative Personalized Multimodal Emotion Recognition Framework in the Internet of Vehicles.
IEEE Netw., 2023

A surrogate model for data-driven magnetic stray field calculations.
CoRR, 2023

A BERT-based Unsupervised Grammatical Error Correction Framework.
CoRR, 2023

AMME-YOLOv7: Improved YOLOv7 Based on Attention Mechanism and Multiscale Expansion for Electric Vehicle Driver and Passenger Helmet Wearing Detection.
Proceedings of the IEEE International Conference on Smart Internet of Things, 2023

Power Efficient Coherent Detection for Short-Reach System.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023

A Study on a Reduced Indicator System for the Network Security Situational Assessment Model.
Proceedings of the International Conference on Networking and Network Applications, 2023

Large-Scale Network Adaptive Situation Awareness Method in Spatio-Temporal Dimension.
IAIC (3), 2023

2022
A novel MAS-GAN-based data synthesis method for object surface defect detection.
Neurocomputing, 2022

Stability and controller design of switched systems with sequence-based average dwell time.
Int. J. Control, 2022

Systems-theoretic Hazard Analysis of Digital Human-System Interface Relevant to Reactor Trip.
CoRR, 2022

MNL-Bandits under Inventory and Limited Switches Constraints.
CoRR, 2022

Just-in-time single-batch-processing machine scheduling.
Comput. Oper. Res., 2022

Network Security Situation Assessment Method Based on Absorbing Markov Chain.
Proceedings of the International Conference on Networking and Network Applications, 2022

Trust Evaluation Model of Social Internet of Things Based on Multi-relationships.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
Pelvic Floor Ultrasound under Particle Swarm Intelligent Optimization Algorithm in Preoperative and Postoperative Evaluation of Female Stress Urinary Incontinence.
Sci. Program., 2021

Observer-based non-fragile H∞-consensus control for multi-agent systems under deception attacks.
Int. J. Syst. Sci., 2021

Network security situation prediction based on feature separation and dual attention mechanism.
EURASIP J. Wirel. Commun. Netw., 2021

An Integrated Risk Assessment Process of Safety-Related Digital I&C Systems in Nuclear Power Plants.
CoRR, 2021

Hybrid approach for a single-batch-processing machine scheduling problem with a just-in-time objective and consideration of non-identical due dates of jobs.
Comput. Oper. Res., 2021

Discovery of potentially biased agonists of mu-opioid receptor (MOR) through molecular docking, pharmacophore modeling, and MD simulation.
Comput. Biol. Chem., 2021

Research on the Classification of Benign and Malignant Parotid Tumors Based on Transfer Learning and a Convolutional Neural Network.
IEEE Access, 2021

Dispatching and Path Planning of Automated Guided Vehicles based on Petri Nets and Deep Reinforcement Learning.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

Colored Knowledge Petri Nets and Logical Inference.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

2020
A trust and attribute-based access control framework in internet of things.
Int. J. Embed. Syst., 2020

A study of situation awareness-based resource management scheme in cloud environment.
Int. J. Commun. Networks Distributed Syst., 2020

Deep Learning Interfacial Momentum Closures in Coarse-Mesh CFD Two-Phase Flow Simulation Using Validation Data.
CoRR, 2020

A Redundancy-Guided Approach for the Hazard Analysis of Digital Instrumentation and Control Systems in Advanced Nuclear Power Plants.
CoRR, 2020

Using Deep Learning to Explore Local Physical Similarity for Global-scale Bridging in Thermal-hydraulic Simulation.
CoRR, 2020

Identification of Novel TRPC5 Inhibitors by Pharmacophore-Based and Structure-Based Approaches.
Comput. Biol. Chem., 2020

Multi-robot Path Planning Using Petri Nets.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2020

Dual-Plane Switch Architecture for Time-Triggered Ethernet.
Proceedings of the GLSVLSI '20: Great Lakes Symposium on VLSI 2020, 2020

2019
Network attack prediction method based on threat intelligence for IoT.
Multim. Tools Appl., 2019

Computationally Efficient CFD Prediction of Bubbly Flow using Physics-Guided Deep Learning.
CoRR, 2019

Decentralized ${H_{\infty}}$ Filtering for Large-Scaled System Based on T-S Fuzzy Model With the Integrated Event-Triggered Strategy.
IEEE Access, 2019

SIRM: Shift Insensitive Racetrack Main Memory.
Proceedings of the Network and Parallel Computing, 2019

2018
Switched and Iterated Square-Root Gauss-Hermite Filter for Passive Target Tracking.
Circuits Syst. Signal Process., 2018

Detecting Inconsistency and Incompleteness in Access Control Policies.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Network Attack Prediction Method Based on Threat Intelligence.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Research on Big Data Fusion Method of Smart Grid in the Environment of Internet of Things.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Performance analysis on structure of racetrack memory.
Proceedings of the 23rd Asia and South Pacific Design Automation Conference, 2018

2017
Access Control Based Resource Allocation in Cloud Computing Environment.
Int. J. Netw. Secur., 2017

Saving Energy on Processor Micro-Architecture Level for Big Data Stream Mobile Computing.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Trust and Attribute-Based Dynamic Access Control Model for Internet of Things.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

A Multi-Level Security Access Control Framework for Cross-Domain Networks.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
Multidimensional coded modulation for undersea fiber optical transmission: Legacy, modern and future.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2016

Pin Tumbler Lock: A shift based encryption mechanism for racetrack memory.
Proceedings of the 21st Asia and South Pacific Design Automation Conference, 2016

An OS-level Data Distribution Method in DRAM-PCM Hybrid Memory.
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016

2015
An efficient unstructured MUSCL scheme for solving the 2D shallow water equations.
Environ. Model. Softw., 2015

2014
Multislope MUSCL method applied to solve shallow water equations.
Comput. Math. Appl., 2014

2013
Stability analysis of discrete-time fuzzy positive systems with time delays.
J. Intell. Fuzzy Syst., 2013

2012
High Capacity Data Hiding for Halftone Image Authentication.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Prediction of freeway traffic incident delay based on simulation.
Proceedings of the 15th International IEEE Conference on Intelligent Transportation Systems, 2012

Copy-move forgery detection in digital images based on local dimension estimation.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Based on Vague Sets of Strawberry Varieties Resistance Comparison.
Proceedings of the Computer and Computing Technologies in Agriculture V, 2011

Spatial Information Sharing Technology Based on Grid.
Proceedings of the Computer and Computing Technologies in Agriculture V, 2011

2010
The aggregation method of induction motors with distribution network.
Proceedings of the 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering, 2010

Validation of MODIS FAPAR products in Hulunber grassland of China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2010

Study on Spatial Scale Transformation Method of MODIS NDVI and NOAA NDVI in Inner Mongolia Grassland.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Analysis on Dynamic Characteristics of Landscape Patterns in Hailer and around Areas.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Current Situation and Prospect of Grassland Management Decision Support Systems in China.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Exposing Digital Image Forgeries by Using Canonical Correlation Analysis.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

High Capacity Data Hiding for Binary Image Authentication.
Proceedings of the 20th International Conference on Pattern Recognition, 2010

Identifying color image origin using curvelet transform.
Proceedings of the International Conference on Image Processing, 2010

JPEG Steganalysis Using Estimated Image and Markov Model.
Proceedings of the Advanced Intelligent Computing Theories and Applications, 2010

2009
Insight to the express transport network.
Comput. Phys. Commun., 2009

Optimal Double-Kernel Combination for Classification.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

Digital camera identification based on curvelet transform.
Proceedings of the IEEE International Conference on Acoustics, 2009

Automatic Inspection of Print Quality of Glycemia Detection Biochips.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009

An Active Defense Model and Framework of Insider Threats Detection and Sense.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Using the Selected Candidate Vectors to Determine Kernel Parameters.
Proceedings of the Sixth International Conference on Computer Graphics, 2009

2008
Digital camera identification based on canonical correlation analysis.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

An unsupervised approach to determination of main subject regions in images with low depth of field.
Proceedings of the International Workshop on Multimedia Signal Processing, 2008

Grid Load Balancing Scheduling Algorithm Based on Statistics Thinking.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Digital Right Management Model Based on Cryptography and Digital Watermarking.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Digital image watermarking capacity and detection error rate.
Pattern Recognit. Lett., 2007

Image Texture Energy-Entropy-Based Blind Steganalysis.
Proceedings of the IEEE Workshop on Signal Processing Systems, 2007

Multi-Agent Belief Merger and Interaction Based On BDI.
Proceedings of the Workshop on Intelligent Information Technology Application, 2007

Steganalysis for JPEG Images Based on Statistical Features of Stego and Cover Images.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 2007

2006
Data Hiding in MPEG Compressed Audio Using Wet Paper Codes.
Proceedings of the 18th International Conference on Pattern Recognition (ICPR 2006), 2006

A New Data Hiding Method in Binary Images.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Applications of a neural network to watermarking capacity of digital image.
Neurocomputing, 2005

LMI-based robust stability analysis of neural networks with time-varying delay.
Neurocomputing, 2005

Digital Image Watermarking Capacity Analysis.
Int. J. Inf. Acquis., 2005

Registering multiple range images based on distance metric of surface-to-surface.
Sci. China Ser. F Inf. Sci., 2005

Watermarking Capacity Analysis Based on Neural Network.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005

Statistical audio watermarking algorithm based on perceptual analysis.
Proceedings of the Fifth ACM Workshop on Digital Rights Management, 2005

2004
Digital Watermarking Capacity and Reliability.
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology (CEC 2004), 2004

Image Watermarking Capacity Analysis using Neural Network.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004

Image Watermarking Capacity Analysis Using Hopfield Neural Network.
Proceedings of the Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30, 2004

Perceptual Criterion Based Fragile Audio Watermarking Using Adaptive Wavelet Packets.
Proceedings of the 17th International Conference on Pattern Recognition, 2004

Wavelet domain watermarking capacity analysis.
Proceedings of the 2004 12th European Signal Processing Conference, 2004

2002
Optimal reference subset selection for nearest neighbor classification by tabu search.
Pattern Recognit., 2002

Feature selection using tabu search method.
Pattern Recognit., 2002

2001
Optimal polygonal approximation of digital planar curves using meta heuristics.
Pattern Recognit., 2001

Optimal Selection of Reference Set for the Nearest Neighbor Classification by Tabu Search.
J. Comput. Sci. Technol., 2001

Nonlinear discriminant analysis.
Proceedings of the Medical Imaging 2001: Image Processing, 2001

Feature extraction method based on the ideal observer.
Proceedings of the Medical Imaging 2001: Image Processing, 2001


  Loading...