Honglong Chen

Orcid: 0000-0003-0739-6338

According to our database1, Honglong Chen authored at least 113 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Double Polling-Based Tag Information Collection for Sensor-Augmented RFID Systems.
IEEE Trans. Mob. Comput., May, 2024

Multitask Data Collection With Limited Budget in Edge-Assisted Mobile Crowdsensing.
IEEE Internet Things J., May, 2024

EDSP-Edge: Efficient Dynamic Edge Service Entity Placement for Mobile Virtual Reality Systems.
IEEE Trans. Wirel. Commun., April, 2024

Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems.
IEEE Trans. Ind. Informatics, April, 2024

Enhanced Coalescence Backdoor Attack Against DNN Based on Pixel Gradient.
Neural Process. Lett., April, 2024

A Reassessment on Applying Protocol Interference Model Under Rayleigh Fading: From Perspective of Link Scheduling.
IEEE/ACM Trans. Netw., February, 2024

Efficiently Identifying Unknown COTS RFID Tags for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2024

NOMA-Enabled Multiuser Offloading in Multicell Edge Computing Networks: A Coalition Game Based Approach.
IEEE Trans. Netw. Sci. Eng., 2024

AdvST: Generating Unrestricted Adversarial Images via Style Transfer.
IEEE Trans. Multim., 2024

Multiscale Residual Convolution Neural Network for Seismic Data Denoising.
IEEE Geosci. Remote. Sens. Lett., 2024

A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Learning Distinct Relationship in Package Recommendation With Graph Attention Networks.
IEEE Trans. Comput. Soc. Syst., December, 2023

Towards time-constrained task allocation in semi-opportunistic mobile crowdsensing.
Ad Hoc Networks, November, 2023

Generation-based parallel particle swarm optimization for adversarial text attacks.
Inf. Sci., October, 2023

Probabilistic Coverage Constraint Task Assignment with Privacy Protection in Vehicular Crowdsensing.
Sensors, September, 2023

Channel State Information Based Indoor Fingerprinting Localization.
Sensors, July, 2023

Utility-Based Heterogeneous User Recruitment of Multitask in Mobile Crowdsensing.
IEEE Internet Things J., June, 2023

Shared Dictionary Learning Via Coupled Adaptations for Cross-Domain Classification.
Neural Process. Lett., April, 2023

ARPCNN: Auxiliary Review-Based Personalized Attentional CNN for Trustworthy Recommendation.
IEEE Trans. Ind. Informatics, 2023

MSCET: A Multi-Scenario Offloading Schedule for Biomedical Data Processing and Analysis in Cloud-Edge-Terminal Collaborative Vehicular Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives.
CoRR, 2023

Balancing Privacy Protection and Interpretability in Federated Learning.
CoRR, 2023

BFSearch: Bloom filter based tag searching for large-scale RFID systems.
Ad Hoc Networks, 2023

DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
Proceedings of the IEEE INFOCOM 2023, 2023

Annealing Genetic-based Preposition Substitution for Text Rubbish Example Generation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

A Heuristic-based Dynamic Scheduling and Routing Method for Industrial TSN Networks.
Proceedings of the 10th IEEE International Conference on Cyber Security and Cloud Computing, 2023

Interpretable Drawing Psychoanalysis via House-Tree-Person Test.
Proceedings of the AI 2023: Advances in Artificial Intelligence, 2023

2022
Edge data based trailer inception probabilistic matrix factorization for context-aware movie recommendation.
World Wide Web, 2022

Semi-Direct Monocular Visual-Inertial Odometry Using Point and Line Features for IoV.
ACM Trans. Internet Techn., 2022

Fast and Reliable Missing Tag Detection for Multiple-Group RFID Systems.
IEEE Trans. Ind. Informatics, 2022

OPAT: Optimized Allocation of Time-Dependent Tasks for Mobile Crowdsensing.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: Special Section on Distributed Intelligence Over Internet of Things.
IEEE Trans. Ind. Informatics, 2022

DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2022

VRConvMF: Visual Recurrent Convolutional Matrix Factorization for Movie Recommendation.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Familiarity-Based Collaborative Team Recognition in Academic Social Networks.
IEEE Trans. Comput. Soc. Syst., 2022

Urban Region Profiling With Spatio-Temporal Graph Neural Networks.
IEEE Trans. Comput. Soc. Syst., 2022

MAFI: GNN-Based Multiple Aggregators and Feature Interactions Network for Fraud Detection Over Heterogeneous Graph.
IEEE Trans. Big Data, 2022

DOT: Decentralized Offloading of Tasks in OFDMA-Based Heterogeneous Computing Networks.
IEEE Internet Things J., 2022

Securing wireless communications from the perspective of physical layer: A survey.
Internet Things, 2022

Multi-view learning for hyperspectral image classification: An overview.
Neurocomputing, 2022

Incorporating multi-interest into recommendation with graph convolution networks.
Int. J. Intell. Syst., 2022

SAN: Attention-based social aggregation neural networks for recommendation system.
Int. J. Intell. Syst., 2022

Adversarial RAW: Image-Scaling Attack Against Imaging Pipeline.
CoRR, 2022

Familiarity-based Collaborative Team Recognition in Academic Social Networks.
CoRR, 2022

Route recommendation based on temporal-spatial metric.
Comput. Electr. Eng., 2022

The 4<sup>th</sup> International Workshop on Artificial Intelligence Applications in Internet of Things (AI<sup>2</sup>OT 2022): Preface.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

Compact Unknown Tag Identification for Large-Scale RFID Systems.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

On Reliability of Pipeline Monitoring Sensor Networks.
Proceedings of the 16th International Conference on Ubiquitous Information Management and Communication, 2022

EMAS: Efficient Meta Architecture Search for Few-Shot Learning.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

2021
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2021

Saliency-Guided Remote Sensing Image Super-Resolution.
Remote. Sens., 2021

From edge data to recommendation: A double attention-based deformable convolutional network.
Peer-to-Peer Netw. Appl., 2021

Worm computing: A blockchain-based resource sharing and cybersecurity framework.
J. Netw. Comput. Appl., 2021

Trust-aware generative adversarial network with recurrent neural network for recommender systems.
Int. J. Intell. Syst., 2021

Methods of improving Secrecy Transmission Capacity in wireless random networks.
Ad Hoc Networks, 2021

Heterogeneous Graph Learning for Explainable Recommendation over Academic Networks.
Proceedings of the WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence, Hybrid Event / Melbourne, VIC, Australia, December 14 - 17, 2021, 2021

2020
Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference.
IEEE Trans. Wirel. Commun., 2020

Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems.
IEEE Trans. Wirel. Commun., 2020

SACT: A New Model of Covert Communication Based on SDN.
Sensors, 2020

EUMD: Efficient slot utilization based missing tag detection with unknown tags.
J. Netw. Comput. Appl., 2020

PAN: Pipeline assisted neural networks model for data-to-text generation in social internet of things.
Inf. Sci., 2020

PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks.
Ad Hoc Networks, 2020

TagRec: Trust-Aware Generative Adversarial Network with Recurrent Neural Network for Recommender Systems.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Double Attention-based Deformable Convolutional Network for Recommendation.
Proceedings of the 9th IEEE/CIC International Conference on Communications in China, 2020

2019
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019

RMTS: A robust clock synchronization scheme for wireless sensor networks.
J. Netw. Comput. Appl., 2019

Mimicry honeypot: an evolutionary decoy system.
Int. J. High Perform. Comput. Netw., 2019

A social-based watchdog system to detect selfish nodes in opportunistic mobile networks.
Future Gener. Comput. Syst., 2019

When Mobile Crowdsensing Meets Privacy.
IEEE Commun. Mag., 2019

Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing.
IEEE Commun. Mag., 2019

Dynamic Distributed Honeypot Based on Blockchain.
IEEE Access, 2019

Deformable Convolutional Matrix Factorization for Document Context-Aware Recommendation in Social Networks.
IEEE Access, 2019

2018
MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems.
IEEE Trans. Veh. Technol., 2018

On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks.
IEEE Trans. Emerg. Top. Comput., 2018

CRPD: a novel clustering routing protocol for dynamic wireless sensor networks.
Pers. Ubiquitous Comput., 2018

Narrowband Internet of Things Systems With Opportunistic D2D Communication.
IEEE Internet Things J., 2018

Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems.
IEEE Internet Things J., 2018

A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks.
Comput. Networks, 2018

A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks.
Comput. J., 2018

Segmented Bloom Filter Based Missing Tag Detection for Large-Scale RFID Systems With Unknown Tags.
IEEE Access, 2018

On Using Sampling Bloom Filter for Unknown Tag Identification in Large-Scale RFID Systems.
IEEE Access, 2018

Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

2017
Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems.
IEEE Trans. Veh. Technol., 2017

Efficient 3-dimensional localization for RFID systems using jumping probe.
Pervasive Mob. Comput., 2017

SINR based shortest link scheduling with oblivious power control in wireless networks.
J. Netw. Comput. Appl., 2017

Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags.
IEEE Internet Things J., 2017

Achieving location error tolerant barrier coverage for wireless sensor networks.
Comput. Networks, 2017

Cost-effective barrier coverage formation in heterogeneous wireless sensor networks.
Ad Hoc Networks, 2017

2016
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Veh. Technol., 2016

Parameter Characteristics of Gauss-Markov Mobility Model in Mobile Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2016

Contact expectation based routing for delay tolerant networks.
Ad Hoc Networks, 2016

2015
On providing wormhole-attack-resistant localization using conflicting sets.
Wirel. Commun. Mob. Comput., 2015

Securing DV-Hop localization against wormhole attacks in wireless sensor networks.
Pervasive Mob. Comput., 2015

On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks.
Pervasive Mob. Comput., 2015

2014
Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

GAR: Group aware cooperative routing protocol for resource-constraint opportunistic networks.
Comput. Commun., 2014

Fault tolerant barrier coverage for wireless sensor networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks.
J. Zhejiang Univ. Sci. C, 2013

A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Making Nodes Cooperative: A Secure Incentive Mechanism for Message Forwarding in DTNs.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Nonlinear Process Fault Diagnosis Using Kernel ICA and Improved FDA.
Proceedings of the 11th IFAC International Workshop on Adaptation and Learning in Control and Signal Processing, 2013

2012
Group aware cooperative routing for opportunistic networks under resource constraints.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
HierTrack: an energy efficient target tracking system for wireless sensor networks.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

On Using Contact Expectation for Routing in Delay Tolerant Networks.
Proceedings of the International Conference on Parallel Processing, 2011

2010
A Novel Secure Localization Approach in Wireless Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

A Secure Localization Approach against Wormhole Attacks Using Distance Consistency.
EURASIP J. Wirel. Commun. Netw., 2010

Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Secure localization against wormhole attacks using conflicting sets.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

From nowhere to somewhere: Protecting end-to-end location privacy in wireless sensor networks.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

2009
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs.
Proceedings of the Wireless Algorithms, 2009

Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009


  Loading...