Zhaohong Wang

Orcid: 0009-0005-8001-4481

According to our database1, Zhaohong Wang authored at least 13 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Graph Learning From Signals With Smoothness Superimposed by Regressors.
IEEE Signal Process. Lett., 2023

Anomaly Detection of Small Time Series Data Based on Improved Generative Adversarial Networks.
Proceedings of the 2023 International Conference on Advances in Artificial Intelligence and Applications, 2023

2022
Novel Explicit Model Predictive Control Strategy For Boost Converters Based on State-space Averaging Method.
Proceedings of the IECON 2022, 2022

2021
Denoising Signals on the Graph for Distributed Systems by Secure Outsourced Computation.
Proceedings of the 7th IEEE World Forum on Internet of Things, 2021

Privacy-Protected Denoising for Signals on Graphs from Distributed Systems.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2021

Peer-to-Peer Assisted Off-Grid Message Dissemination in the Failure of Communication Infrastructures.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Secure Route-Obfuscation Mechanism with Information-Theoretic Security for Internet of Things.
Sensors, 2020

Control strategy for networked control systems with time delay and packet dropout using linear matrix inequalities.
EURASIP J. Wirel. Commun. Netw., 2020

2018
Teaching with Video Assistance in Embedded Real-Time Operating System.
Proceedings of the IEEE Frontiers in Education Conference, 2018

2017
Information-Theoretic Secure Multi-Party Computation With Collusion Deterrence.
IEEE Trans. Inf. Forensics Secur., 2017

2016
On privacy preference in collusion-deterrence games for secure multi-party computation.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2014
Efficient multi-party computation with collusion-deterred secret sharing.
Proceedings of the IEEE International Conference on Acoustics, 2014

2011
Information entropy method for project portfolio selection.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011


  Loading...