Shaohong Zhong

According to our database1, Shaohong Zhong authored at least 13 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
D-Cubed: Latent Diffusion Trajectory Optimisation for Dexterous Deformable Manipulation.
CoRR, 2024

2023
Natural Language Processing for systems engineering: Automatic generation of Systems Modelling Language diagrams.
Knowl. Based Syst., 2023

2022
Reaching Through Latent Space: From Joint Statistics to Path Planning in Manipulation.
IEEE Robotics Autom. Lett., 2022

Touching a NeRF: Leveraging Neural Radiance Fields for Tactile Sensory Data Generation.
Proceedings of the Conference on Robot Learning, 2022

2018
Performance analysis of energy-harvesting-aware multi-relay networks in Nakagami-m fading.
EURASIP J. Wirel. Commun. Netw., 2018

Outage probability of power splitting SWIPT two-way relay networks in Nakagami-m fading.
EURASIP J. Wirel. Commun. Netw., 2018

2017
The effects of moving speed on handover performances with measurement data.
Proceedings of the 15th International Conference on ITS Telecommunications, 2017

Optimal Beamforming and Power Splitting Design for SWIPT under Non-Linear Energy Harvesting Model.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2010
An effective spam filtering technique based on active feedback and Maximum entropy.
Proceedings of the Seventh International Conference on Fuzzy Systems and Knowledge Discovery, 2010

A novel non-degenerate 2D graphical representation and numerical characterization of DNA sequences.
Proceedings of the Fifth International Conference on Bio-Inspired Computing: Theories and Applications, 2010

2009
Browser-Side Countermeasures for Deceptive Phishing Attack.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Steganalysis of Information Hidden in Webpage Based on Higher-order Statistics.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

An Algorithm of Webpage Information Hiding Based on Attributes Permutation.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008


  Loading...