Shihong Zou

Orcid: 0000-0001-9730-2918

According to our database1, Shihong Zou authored at least 48 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Blockchain Dynamic Sharding Scheme Based on Hidden Markov Model in Collaborative IoT.
IEEE Internet Things J., August, 2023

A multi-task SCCA method for brain imaging genetics and its application in neurodegenerative diseases.
Comput. Methods Programs Biomed., April, 2023

2022
A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT.
IEEE Syst. J., 2022

CrowdLBM: A lightweight blockchain-based model for mobile crowdsensing in the Internet of Things.
Pervasive Mob. Comput., 2022

CrowdHB: A Decentralized Location Privacy-Preserving Crowdsensing System Based on a Hybrid Blockchain Network.
IEEE Internet Things J., 2022

Segment Detection Algorithm: CAN bus intrusion detection based on Bit Constraint.
Proceedings of the 23rd IEEE International Symposium on a World of Wireless, 2022

2021
An Implicit Identity Authentication Method Based on Deep Connected Attention CNN for Wild Environment.
Proceedings of the ICCBN 2021: 9th International Conference on Communications and Broadband Networking, Shanghai, China, 25 February, 2021, 2021

Apply Formal Methods in Certifying the SyberX High-Assurance Kernel.
Proceedings of the Formal Methods - 24th International Symposium, 2021

Improved Multi-task SCCA for Brain Imaging Genetics via Joint Consideration of the Diagnosis, Parameter Decomposition and Network Constraints.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2020
CrowdBLPS: A Blockchain-Based Location-Privacy-Preserving Mobile Crowdsensing System.
IEEE Trans. Ind. Informatics, 2020

A System-call Behavior Language System for Malware Detection Using A Sensitivity-based LSTM Model.
Proceedings of the CSSE 2020: 3rd International Conference on Computer Science and Software Engineering, 2020

2019
Reportcoin: A Novel Blockchain-Based Incentive Anonymous Reporting System.
IEEE Access, 2019

2018
Understanding In-App Ads and Detecting Hidden Attacks through the Mobile App-Web Interface.
IEEE Trans. Mob. Comput., 2018

2017
A Survey on Secure Wireless Body Area Networks.
Secur. Commun. Networks, 2017

2016
A delay-centric parallel multi-path routing protocol for cognitive radio ad hoc networks.
Wirel. Commun. Mob. Comput., 2016

Enabling Green Wireless Networking With Device-to-Device Links: A Joint Optimization Approach.
IEEE Trans. Wirel. Commun., 2016

Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
An effective behavior-based Android malware detection system.
Secur. Commun. Networks, 2015

2014
Spreading evidence models for trust propagation and aggregation in peer-to-peer networks.
Concurr. Comput. Pract. Exp., 2014

VirtualKnotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter.
Comput. Networks, 2014

Provider mobility management based on domain proxies in content centric networks.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

Relax, but Do Not Sleep: A new perspective on Green Wireless Networking.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Joint mode selection, channel allocation and power assignment for green device-to-device communications.
Proceedings of the IEEE International Conference on Communications, 2014

2013
A Novel Stream Video Integrity Method.
J. Comput., 2013

Traffic assignment algorithm for multi-path routing in Cognitive Radio Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Fast, scalable detection of "Piggybacked" mobile applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
RiskRanker: scalable and accurate zero-day android malware detection.
Proceedings of the 10th International Conference on Mobile Systems, 2012

2009
A Novel Location Management Scheme for Wireless Mesh Networks.
Int. J. Distributed Sens. Networks, 2009

A Low-Cost and Accurate Indoor Localization Algorithm Using Label Propagation Based Semi-supervised Learning.
Proceedings of the MSN 2009, 2009

2008
Active probing based Internet service fault management in uncertain and noisy environment.
Sci. China Ser. F Inf. Sci., 2008

A cross-layer adaptive transmission scheme combined with SR-ARQ over correlated fading channels.
Comput. Electr. Eng., 2008

Video streaming with network coding and opportunistic relay in wireless mesh networks.
Proceedings of the LCN 2008, 2008

A New Trust Framework Based on Reputation for Unstructured P2P Networks.
Proceedings of the 2008 IEEE International Performance, 2008

2006
A Relay-Aided Media Access (RAMA) Protocol in Multirate Wireless Networks.
IEEE Trans. Veh. Technol., 2006

Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment.
Comput. Commun., 2006

An Enhanced Energy Saving Scheme in Mobile Broadband Wireless Access Systems.
Proceedings of the Wireless Algorithms, 2006

A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks.
Proceedings of the Formal Aspects in Security and Trust, Fourth International Workshop, 2006

A Reciprocal Capacity Based Adaptive Topology Protocol for P2P Networks.
Proceedings of the Information Networking, 2006

Fault management for Internet Services: Modeling and Algorithms.
Proceedings of IEEE International Conference on Communications, 2006

An Enhanced Energy Saving Mechanism in IEEE 802.16e.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A Group Based Reputation System for P2P Networks.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
Adaptive Power Saving Mechanisms for DCF in IEEE 802.11.
Mob. Networks Appl., 2005

Multi-rate aware topology control in multi-hop ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

MDFM: Multi-domain Fault Management for Internet Services.
Proceedings of the Management of Multimedia Networks and Services, 2005

A Service Discovery Protocol with Maximal Area Disjoint Paths for Mobile Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 4th International Conference, 2005

2004
A new approach for path capacity measurement in Internet.
J. High Speed Networks, 2004

A fuzzy-based algorithm to remove clock skew and reset from one-way delay measurement [Internet end-to-end performance measurement].
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
An enhanced buffer forwarding control scheme in smooth handover to improve TCP performance.
Proceedings of the IEEE 14th International Symposium on Personal, 2003


  Loading...