Hongyi Zhu

Orcid: 0000-0001-6794-0230

According to our database1, Hongyi Zhu authored at least 41 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Practical Design of RIS With Subsurfaces Using Codebook-Based Configuration Method.
IEEE Wirel. Commun. Lett., April, 2024

Exquisitor at the Video Browser Showdown 2024: Relevance Feedback Meets Conversational Search.
Proceedings of the MultiMedia Modeling - 30th International Conference, 2024

Two-sided Long Tails on Blockchain-Based Crowdsourcing Platforms.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Introduction to the Minitrack on Cybersecurity in the Age of Artificial Intelligence, AI for Cybersecurity, and Cybersecurity for AI.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Suggesting Alternatives for Potentially Insecure Artificial Intelligence Repositories: An Unsupervised Graph Embedding Approach.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
A Compact Dual-Band Omnidirectional Circularly Polarized Filtering Antenna for UAV Communications.
IEEE Trans. Veh. Technol., December, 2023

Additive Feature Attribution Explainable Methods to Craft Adversarial Attacks for Text Classification and Text Regression.
IEEE Trans. Knowl. Data Eng., December, 2023

Deep Learning for Information Systems Research.
J. Manag. Inf. Syst., 2023

User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories.
Proceedings of the 2023 Cyber Security Experimentation and Test Workshop, 2023

Visualizing Multimodal Time Series at Scale.
Proceedings of the Advances in Visual Computing - 18th International Symposium, 2023

Towards Privacy-Preserving Depression Detection: Experiments on Passive Sensor Signal Data.
Proceedings of the IEEE International Conference on Digital Health, 2023

Video-based estimation of pain indicators in dogs.
Proceedings of the 11th International Conference on Affective Computing and Intelligent Interaction, 2023

2022
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations.
Proceedings of the CSET 2022: Cyber Security Experimentation and Test Workshop, 2022

Identifying Patterns of Vulnerability Incidence in Foundational Machine Learning Repositories on GitHub: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Data Mining Workshops, 2022

2021
Highly efficient schemes for time-fractional Allen-Cahn equation using extended SAV approach.
Numer. Algorithms, 2021

A Deep Learning Approach for Recognizing Activity of Daily Living (ADL) for Senior Care: Exploiting Interaction Dependency and Temporal Patterns.
MIS Q., 2021

Exploring the Evolution of Exploit-Sharing Hackers: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2021

2020
Proactively Identifying Emerging Hacker Threats from the Dark Web: A Diachronic Graph Embedding Framework (D-GEF).
ACM Trans. Priv. Secur., 2020

Optimization of Two-Way Network Coded HARQ With Overhead.
IEEE Trans. Commun., 2020

Human Identification for Activities of Daily Living: A Deep Transfer Learning Approach.
J. Manag. Inf. Syst., 2020

Deep Learning for Information Systems Research.
CoRR, 2020

Smart Vulnerability Assessment for Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Identifying Vulnerable GitHub Repositories and Users in Scientific Cyberinfrastructure: An Unsupervised Graph Embedding Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Labeling Hacker Exploits for Proactive Cyber Threat Intelligence: A Deep Transfer Learning Approach.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

Will Cooperation Help Content Creators Grow? Empirical Evidence from Twitch.tv.
Proceedings of the 41st International Conference on Information Systems, 2020

2019
Emoticon Analysis for Chinese Social Media and E-commerce: The AZEmo System.
ACM Trans. Manag. Inf. Syst., 2019

A Fast High Order Method for the Time-Fractional Diffusion Equation.
SIAM J. Numer. Anal., 2019

Highly efficient and accurate schemes for time fractional Allen-Cahn equation by using extended SAV approach.
CoRR, 2019

Well-posedness for modified higher-order anisotropic Cahn-Hilliard equations.
Asymptot. Anal., 2019

Fear Appeals and Information Security Behaviors: An Empirical Study on Mechanical Turk.
AIS Trans. Replication Res., 2019

An Efficient Network-Coded ARQ Scheme for Two-Way Wireless Communication With Full-Duplex Relaying.
IEEE Access, 2019

2018
Research on the technological architectural design of geological hazard monitoring and rescue-after-disaster system based on cloud computing and Internet of things.
Int. J. Syst. Assur. Eng. Manag., 2018

A sequence-to-sequence model-based deep learning approach for recognizing activity of daily living for senior care.
J. Biomed. Informatics, 2018

Throughput Analysis of Two-Way NCed-HARQ With Reverse-Link Assistance and Estimated Channel State Information.
IEEE Commun. Lett., 2018

Identifying SCADA Systems and Their Vulnerabilities on the Internet of Things: A Text-Mining Approach.
IEEE Intell. Syst., 2018

2017
On practical network coded ARQ for two-way wireless communication.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

SilverLink: Developing an International Smart and Connected Home Monitoring System for Senior Care.
Proceedings of the Smart Health - International Conference, 2016

An efficient network coding scheme for two-way communication with ARQ feedback.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
SilverLink: Smart Home Health Monitoring for Senior Care.
Proceedings of the Smart Health - International Conference, 2015

2014
Emoticon Analysis for Chinese Health and Fitness Topics.
Proceedings of the Smart Health - International Conference, 2014


  Loading...