Hongqi Zhang

Orcid: 0000-0003-4367-0808

According to our database1, Hongqi Zhang authored at least 56 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A survey: When moving target defense meets game theory.
Comput. Sci. Rev., May, 2023

Attribute-guided attention and dependency learning for improving person re-identification based on data analysis technology.
Enterp. Inf. Syst., March, 2023

WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process.
IEEE Trans. Dependable Secur. Comput., 2023

Photonic-wireless Communication and Sensing in the Terahertz Band.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023

Quantum Noise Secured Terahertz Communications.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2023

2022
Adaptive Weighted Optimization Framework for Multiobjective Long-Term Planning of Concentrate Ingredients in Copper Industry.
IEEE Trans. Instrum. Meas., 2022

A hybrid granular-evolutionary computing method for cooperative scheduling optimization on integrated energy system in steel industry.
Swarm Evol. Comput., 2022

Multiobjective Optimal Dispatching of Smart Grid Based on PSO and SVM.
Mob. Inf. Syst., 2022

A Global-Local Spectral Weight Network Based on Attention for Hyperspectral Band Selection.
IEEE Geosci. Remote. Sens. Lett., 2022

Improvement in Sensing Accuracy of an OFDM-Based W-Band System.
J. Commun. Inf. Networks, 2022

Multi-stage dynamic optimization method for long-term planning of the concentrate ingredient in copper industry.
Inf. Sci., 2022

ED-Dehaze Net: Encoder and Decoder Dehaze Network.
Int. J. Interact. Multim. Artif. Intell., 2022

Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack.
Digit. Commun. Networks, 2022

FSAFlow: Lightweight and Fast Dynamic Path Tracking and Control for Privacy Protection on Android Using Hybrid Analysis with State-Reduction Strategy.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

THz continuous-wave imaging system based on a photomixing receiver.
Proceedings of the 2022 27th OptoElectronics and Communications Conference (OECC) and 2022 International Conference on Photonics in Switching and Computing (PSC), 2022

Object Detection Networks and Mixed Reality for Cable Harnesses Identification in Assembly Environment.
Proceedings of the Intelligent Computing Methodologies - 18th International Conference, 2022

Analysis of the Absorption Attenuation and Phase Shift of Terahertz Wireless Propagation.
Proceedings of the 22nd IEEE International Conference on Communication Technology, 2022

2021
Constrained-Target Band Selection With Subspace Partition for Hyperspectral Target Detection.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2021

A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification.
Secur. Commun. Networks, 2021

An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector.
Secur. Commun. Networks, 2021

Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model.
Comput. Secur., 2021

Band Selection for Specific Target Detection of Hyperspectral Imagery.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2021

2020
GDM: A General Distributed Method for Cross-Domain Service Function Chain Embedding.
IEEE Trans. Netw. Serv. Manag., 2020

Optimal Decision Making Approach for Cyber Security Defense Using Evolutionary Game.
IEEE Trans. Netw. Serv. Manag., 2020

Optimal Timing Selection Approach to Moving Target Defense: A FlipIt Attack-Defense Game Model.
Secur. Commun. Networks, 2020

Network dynamic defense system based on holographic transformation.
Int. J. Distributed Sens. Networks, 2020

Accuracy and reliability of computer-assisted semi-automated morphological analysis of intracranial aneurysms: an experimental study with digital phantoms and clinical aneurysm cases.
Int. J. Comput. Assist. Radiol. Surg., 2020

2019
Optimal strategy selection approach to moving target defense based on Markov robust game.
Comput. Secur., 2019

2018
Moving Target Defense Techniques: A Survey.
Secur. Commun. Networks, 2018

Security Metric Methods for Network Multistep Attacks Using AMC and Big Data Correlation Analysis.
Secur. Commun. Networks, 2018

An Elevation-Based Stratification Model for Simulating Land Use Change.
Remote. Sens., 2018

Analysis of Spatiotemporal Dynamics of the Chinese Vegetation Net Primary Productivity from the 1960s to the 2000s.
Remote. Sens., 2018

Security risk situation quantification method based on threat prediction for multimedia communication network.
Multim. Tools Appl., 2018

A model for integrated spatial land use characteristics linking to surface nutrient concentration.
Int. J. Digit. Earth, 2018

Incomplete information Markov game theoretic approach to strategy generation for moving target defense.
Comput. Commun., 2018

A Method for Adaptive Resource Adjustment of Dynamic Service Function Chain.
IEEE Access, 2018

Optimal Network Defense Strategy Selection Based on Incomplete Information Evolutionary Game.
IEEE Access, 2018

2017
A New Approach for Delivering Customized Security Everywhere: Security Service Chain.
Secur. Commun. Networks, 2017

Quantitative Method for Network Security Situation Based on Attack Prediction.
Secur. Commun. Networks, 2017

A Defense Mechanism of Random Routing Mutation in SDN.
IEICE Trans. Inf. Syst., 2017

Network moving target defense technique based on collaborative mutation.
Comput. Secur., 2017

Optimal Strategy Selection for Moving Target Defense Based on Markov Game.
IEEE Access, 2017

Quantitative Security Assessment Method based on Entropy for Moving Target Defense.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
基于超图的Cyber空间故障传播研究方法 (Method for Cyberspace Failure Spreading and Diffusion Based on Hypergraph).
计算机科学, 2016

Multilayer collaborative traceback technique based on net-flow fingerprint.
Int. J. Embed. Syst., 2016

Self-Adaptive End-Point Mutation Technique Based on Adversary Strategy Awareness.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Thwart eavesdropping attacks on network communication based on moving target defense.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
基于本体的网络安全态势要素知识库模型研究 (Research on Network Security Situational Elements Knowledge Base Model Based on Ontology).
计算机科学, 2015

MR-Verifier: Verifying Open Flow Network Properties Based on MapReduce.
Proceedings of the 2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2015

Network Watermarking Model Based on Optimization Theory.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

2014
Construction and Verification of the Trusted Cloud Service.
Proceedings of the CLOSER 2014, 2014

2009
VoIP Implementation and Experiments on a Mobile Wireless AdHoc Network.
Proceedings of the Ad Hoc Networks, First International Conference, 2009

2008
Layered Secure Access Research for Space Network.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

Adaptive Rate Control for VoIP in Wireless Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

An Identity-Based Authentication Model for Multi-domain in Grid Environment.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...