Hongli Zhang

Affiliations:
  • Harbin Institute of Technology, Computer Science and Technology Department, China (PhD 1999)


According to our database1, Hongli Zhang authored at least 183 papers between 2003 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Toward Physical Layer Security and Efficiency for SAGIN: A WFRFT-Based Parallel Complex-Valued Spectrum Spreading Approach.
IEEE Trans. Intell. Transp. Syst., 2022

A progressive learning method on unknown protocol behaviors.
J. Netw. Comput. Appl., 2022

Graph clustering using triangle-aware measures in large networks.
Inf. Sci., 2022

2021
Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things.
Wirel. Commun. Mob. Comput., 2021

PSRide: Privacy-Preserving Shared Ride Matching for Online Ride Hailing Systems.
IEEE Trans. Dependable Secur. Comput., 2021

SPETS: Secure and Privacy-Preserving Energy Trading System in Microgrid.
Sensors, 2021

PGRide: Privacy-Preserving Group Ridesharing Matching in Online Ride Hailing Services.
IEEE Internet Things J., 2021

Overlapping community detection by constrained personalized PageRank.
Expert Syst. Appl., 2021

TenLa: an approach based on controllable tensor decomposition and optimized lasso regression for judgement prediction of legal cases.
Appl. Intell., 2021

Demonstrating Physical Layer Security Via Weighted Fractional Fourier Transform.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A Container-Oriented Virtual-Machine-Introspection-Based Security Monitor to Secure Containers in Cloud Computing.
Proceedings of the Artificial Intelligence and Security - 7th International Conference, 2021

2020
Hail the Closest Driver on Roads: Privacy-Preserving Ride Matching in Online Ride Hailing Services.
Secur. Commun. Networks, 2020

Uncovering overlapping community structure in static and dynamic networks.
Knowl. Based Syst., 2020

Physical-Layer Authentication for Internet of Things via WFRFT-Based Gaussian Tag Embedding.
IEEE Internet Things J., 2020

Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology.
Comput. Commun., 2020

Clustering of unknown protocol messages based on format comparison.
Comput. Networks, 2020

Fog-Based Attack Detection Framework for Internet of Things Using Deep Learning.
IEEE Access, 2020

TenRR: An Approach Based on Innovative Tensor Decomposition and Optimized Ridge Regression for Judgment Prediction of Legal Cases.
IEEE Access, 2020

A secure domain name resolution and management architecture based on blockchain.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Named entity recognition of legal judgment based on small-scale labeled data.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Learning Users' Intention of Legal Consultation through Pattern-Oriented Tensor Decomposition with Bi-LSTM.
Wirel. Commun. Mob. Comput., 2019

lpRide: Lightweight and Privacy-Preserving Ride Matching Over Road Networks in Online Ride Hailing Systems.
IEEE Trans. Veh. Technol., 2019

Measuring bandwidth and buffer occupancy to improve the QoE of HTTP adaptive streaming.
Signal Image Video Process., 2019

Imbalanced learning based on adaptive weighting and Gaussian function synthesizing with an application on Android malware detection.
Inf. Sci., 2019

DRAV: Detection and repair of data availability violations in Internet of Things.
Int. J. Distributed Sens. Networks, 2019

Vcash: A Novel Reputation Framework for Identifying Denial of Traffic Service in Internet of Connected Vehicles.
CoRR, 2019

SAVM: A practical secure external approach for automated in-VM management.
Concurr. Comput. Pract. Exp., 2019

Unsupervised field segmentation of unknown protocol messages.
Comput. Commun., 2019

A competitive model of popularity prediction using correlation matrix.
Clust. Comput., 2019

RnRTD: Intelligent Approach Based on the Relationship-Driven Neural Network and Restricted Tensor Decomposition for Multiple Accusation Judgment in Legal Cases.
Comput. Intell. Neurosci., 2019

Generative learning for imbalanced data using the Gaussian mixed model.
Appl. Soft Comput., 2019

MANN: A Multichannel Attentive Neural Network for Legal Judgment Prediction.
IEEE Access, 2019

I2P Anonymous Communication Network Measurement and Analysis.
Proceedings of the Smart Computing and Communication - 4th International Conference, 2019

Element-Aware Legal Judgment Prediction for Criminal Cases with Confusing Charges.
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019

Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

EDCleaner: Data Cleaning for Entity Information in Social Network.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

No Way to Evade: Detecting Multi-Path Routing Attacks for NIDS.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

RnnTd: An Approach Based on LSTM and Tensor Decomposition for Classification of Crimes in Legal Cases.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
An Efficient Security System for Mobile Data Monitoring.
Wirel. Commun. Mob. Comput., 2018

Towards Privacy Preserving Publishing of Set-Valued Data on Hybrid Cloud.
IEEE Trans. Cloud Comput., 2018

Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018

A Privacy Preserving Scheme for Nearest Neighbor Query.
Sensors, 2018

User-perceived quality aware adaptive streaming of 3D multi-view video plus depth over the internet.
Multim. Tools Appl., 2018

An effective copyright-protected content delivery scheme for P2P file sharing networks.
Int. J. Commun. Syst., 2018

A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018

Preserving Location Privacy in Mobile Edge Computing.
CoRR, 2018

Hermes: A Privacy-Preserving Approximate Search Framework for Big Data.
IEEE Access, 2018

Tearing Down the Face of Algorithmic Complexity Attacks for DPI Engines.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Security Mechanisms to Defend against New Attacks on Software-Defined Radio.
Proceedings of the 2018 International Conference on Computing, 2018

VAT: A Velocity-Aware Trajectory Privacy Preservation Scheme for IoT Searching.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records.
Proceedings of the IEEE Global Communications Conference, 2018

A Metadata-Based Representation Method of the Internet of Things.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Predicting the Popularity of Online Content Based on the Weak Ties Theory.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

A Location Privacy-Aware Method for kNN Query in Location Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Evaluation on Availability of Entity Information in Cyberspace.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

The social negative mood index for social networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

OFC: An Approach for Protecting Location Privacy from Location Provider in Location-Based Services.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
A fast feature weighting algorithm of data gravitation classification.
Inf. Sci., 2017

Succinct and practical greedy embedding for geometric routing.
Comput. Commun., 2017

An approximate search framework for big data.
Proceedings of the IEEE International Conference on Communications, 2017

A Survey on Data Cleaning Methods in Cyberspace.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Predicting the Popularity of News Based on Competitive Matrix.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
Cuckoo: flexible compute-intensive task offloading in mobile cloud computing.
Wirel. Commun. Mob. Comput., 2016

CAPR: context-aware participant recruitment mechanism in mobile crowdsourcing.
Wirel. Commun. Mob. Comput., 2016

Privacy-Aware Information Sharing in Location-Based Services: Attacks and Defense.
IEICE Trans. Inf. Syst., 2016

SNGR: Scalable Name-Based Geometric Routing for ICN.
IEICE Trans. Commun., 2016

A Keypoint-Based Region Duplication Forgery Detection Algorithm.
IEICE Trans. Inf. Syst., 2016

Multiple Mix-Zones Deployment for Continuous Location Privacy Protection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Detection of Copy-Scale-Move Forgery in Digital Images Using SFOP and MROGH.
Proceedings of the Social Computing, 2016

LPPS: Location privacy protection for smartphones.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Shrinking the Sentiment Analysis for Signed Network Construction.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

A Fast and High Quality Approach for Overlapping Community Detection through Minimizing Conductance.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Detection and Defense of SYN Flood Attacks Based on Dual Stack Network Firewall.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
Toward Vehicle-Assisted Cloud Computing for Smartphones.
IEEE Trans. Veh. Technol., 2015

An efficient parallel algorithm for exact multi-pattern matching.
Secur. Commun. Networks, 2015

Processing geo-dispersed big data in an advanced mapreduce framework.
IEEE Netw., 2015

Performance Difference Prediction in Cloud Services for SLA-Based Auditing.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

Cocktail: A New Tool for Audit by Performance Evaluation on Local Machine.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

An ICN-Oriented Name-Based Routing Scheme.
Proceedings of the Intelligent Computation in Big Data Era, 2015

An effective access control scheme for preventing permission leak in Android.
Proceedings of the International Conference on Computing, Networking and Communications, 2015

Audit meets game theory: Verifying reliable execution of SLA for compute-intensive program in cloud.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Continuous resource allocation in cloud computing.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

CLPP: Context-aware location privacy protection for location-based social network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Matrix-based parallel pattern matching method.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Effective task scheduling in proximate mobile device based communication systems.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Towards real-time route leak events detection.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A novel stochastic-encryption-based P2P Digital Rights Management scheme.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Geometric Routing on Flat Names for ICN.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
Designing robust routing protocols to protect base stations in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Verifying cloud service-level agreement by a third-party auditor.
Secur. Commun. Networks, 2014

A Privacy-aware Virtual Machine Migration Framework on Hybrid Clouds.
J. Networks, 2014

A new approach for imbalanced data classification based on data gravitation.
Inf. Sci., 2014

Quantifying AS-level routing policy changes.
Proceedings of the IEEE International Conference on Communications, 2014

Feature Evaluation for Early Stage Internet Traffic Identification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Privacy-preserving granular data retrieval indexes for outsourced cloud data.
Proceedings of the IEEE Global Communications Conference, 2014

Contention-based adaptive position update for intermittently connected VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

Modeling Leechers attack in BitTorrent.
Proceedings of the IEEE Global Communications Conference, 2014

A Novel Road Topology-aware Routing in VANETs.
Proceedings of the Web Technologies and Applications, 2014

The Improved AC High-Performance Pattern-Matching Algorithm for Intrusion Detection.
Proceedings of the Web Technologies and Applications, 2014

Kite: a mobility support scheme for NDN.
Proceedings of the 1st International Conference on Information-Centric Networking, 2014

2013
Preventing Piracy Content Propagation in Peer-to-Peer Networks.
IEEE J. Sel. Areas Commun., 2013

A Measurement Study on the Topologies of BitTorrent Networks.
IEEE J. Sel. Areas Commun., 2013

A bottom-up algorithm of vertical assembling concept lattices.
Int. J. Data Min. Bioinform., 2013

Data Spoofing Attacks by IPv6 Tunnels.
IEICE Trans. Commun., 2013

Prometheus: Privacy-aware data retrieval on hybrid cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

PPBD: A piracy preventing system for BT DHT networks.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Glaucus: Predicting Computing-Intensive Program's Performance for Cloud Customers.
Proceedings of the Intelligent Computing Theories - 9th International Conference, 2013

A performance prediction scheme for computation-intensive applications on cloud.
Proceedings of IEEE International Conference on Communications, 2013

Practical and privacy-assured data indexes for outsourced cloud data.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Protecting private cloud located within public cloud.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A Large Scale Code Resolution Service Network in the Internet of Things.
Sensors, 2012

Feature selection for optimizing traffic classification.
Comput. Commun., 2012

Encrypted Traffic Classification Based on an Improved Clustering Algorithm.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A PSO-Based Hierarchical Resource Scheduling Strategy on Cloud Computing.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Flexible Framework for Representations of Entities in the Internet of Things.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Reliable Query Scheme for Outsourced Data in Cloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Outsourcing Cloud Data Privacy-Preserving Based on Over-Encryption.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

An Efficient Parallel String Matching Algorithm Based on DFA.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Improving the QoS of Web Applications across Multiple Virtual Machines in Cloud Computing Environment.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

A Novel Cache Replacement Policy for ISP Merged CDN.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

Comparison and Analysis of Flow Features at the Packet Level for Traffic Classification.
Proceedings of the 2012 International Conference on Connected Vehicles and Expo, 2012

DDoS vulnerability of BitTorrent Peer Exchange extension: Analysis and defense.
Proceedings of IEEE International Conference on Communications, 2012

Base station location protection in wireless sensor networks: Attacks and defense.
Proceedings of IEEE International Conference on Communications, 2012

Verifying cloud Service Level Agreement.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Understanding the topologies of BitTorrent networks: A measurement view.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A measurement.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

Synthetic evaluation on the performance of network coordinate systems.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
A Framework to Quantify the Pitfalls of Using Traceroute in AS-Level Topology Measurement.
IEEE J. Sel. Areas Commun., 2011

Lightweight Source Anonymity in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Towards Efficient Anonymous Communications in Sensor Networks.
Proceedings of the Global Communications Conference, 2011

Reliable object rating framework for content sharing system.
Proceedings of the Third International Workshop on Cyberspace Safety and Security, 2011

2010
New data mining technique to enhance IDS alarms quality.
J. Comput. Virol., 2010

Exploiting Location-aware Mechanism for Distributed Web Crawling over DHTs.
J. Comput., 2010

A Measurement Study on BitTorrent System.
Int. J. Commun. Netw. Syst. Sci., 2010

Exploring Web Partition in DHT-Based Distributed Web Crawling.
IEICE Trans. Inf. Syst., 2010

Efficient Distributed Web Crawling Utilizing Internet Resources.
IEICE Trans. Inf. Syst., 2010

Quantifying the Pitfalls of Traceroute in AS Connectivity Inference.
Proceedings of the Passive and Active Measurement, 11th International Conference, 2010

Scale-Adaptable Recrawl Strategies for DHT-Based Distributed Web Crawling System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010

Traffic identification using flexible neural trees.
Proceedings of the 18th International Workshop on Quality of Service, 2010

A General Distributed Object Locating Architecture in the Internet of Things.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
IDS alerts correlation using grammar-based approach.
J. Comput. Virol., 2009

Intrusion detection alarms reduction using root cause analysis and clustering.
Comput. Commun., 2009

Optimal Network Security Strengthening Using Attack-Defense Game Model.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

A Steady Network Coordinate System for Network Distance Estimating.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

Measurement and Analysis of BitTorrent Availability.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

A Forwarding-Based Task Scheduling Algorithm for Distributed Web Crawling over DHTs.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
IDS alarms reduction using data mining.
Proceedings of the International Joint Conference on Neural Networks, 2008

Modeling network attacks for scenario construction.
Proceedings of the International Joint Conference on Neural Networks, 2008

Parallel Job Scheduling with Time-varying Constraints for Heterogeneous Multiple-Cluster Systems.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

On Destination Set in IP-Level Topology Measurement.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

Alertclu: A Realtime Alert Aggregation and Correlation System.
Proceedings of the International Conference on Cyberworlds 2008, 2008

2007
A Game Theoretic Method for Decision and Analysis of the Optimal Active Defense Strategy.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Scenario Discovery Using Abstracted Correlation Graph.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Defending against distributed denial-of-service attacks with an auction-based method.
Web Intell. Agent Syst., 2006

A Multiobjective Evolutionary Algorithm for Grid Job Scheduling of Multi-QoS Constraints.
J. Comput. Res. Dev., 2006

A parallel programming interface for out-of-core cluster applications.
Clust. Comput., 2006

Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments.
Sci. China Ser. F Inf. Sci., 2006

Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

User-Perceived Web QoS Measurement and Evaluation System.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
A Model for Estimating the Performance of Synchronous Parallel Network Simulation.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Load Balance Heuristics for Synchronous Iterative Applications on Heterogeneous Cluster Systems.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Distributed Architecture for Network Performance Measurement and Evaluation System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

On the Effectiveness of multi-similarity for early detection of worms.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Fast Detection of Worm Infection for Large-Scale Networks.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

Usage Behavior Profiling for Anomaly Detection using Vector Quantization.
Proceedings of the IASTED International Conference on Communication Systems and Applications, 2005

Topology-Based Macroscopical Response and Control Technology for Network Security Event.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Intrusion detection system for high-speed network.
Comput. Commun., 2004

Grid-Enabled Parallel Debugging Environment: A Portal Solution.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

The Practice of I/O Optimizations for Out-of-Core Computation.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Explaining BitTorrent Traffic Self-Similarity.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Multisite Resource Selection and Scheduling Algorithm on Computational Grid.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Anomaly Detection Using Fast SOFM.
Proceedings of the Grid and Cooperative Computing, 2004

Network Performance Measurement Methodologies in PGMS.
Proceedings of the Grid and Cooperative Computing, 2004

PGMS: A P2P-Based Grid Monitoring System.
Proceedings of the Grid and Cooperative Computing, 2004

Ad Hoc Debugging Environment for Grid Applications.
Proceedings of the Grid and Cooperative Computing, 2004

Measurement and Modeling of Large-Scale Peer-to-Peer Storage System.
Proceedings of the Grid and Cooperative Computing, 2004

Developing a user-level middleware for out-of-core computation on Grids.
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004

2003
Multisite Task Scheduling on Distributed Computing Grid.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...