Zhaoquan Gu

Orcid: 0000-0001-7546-852X

According to our database1, Zhaoquan Gu authored at least 158 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
STBCIoT: Securing the Transmission of Biometric Images in Customer IoT.
IEEE Internet Things J., May, 2024

A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection.
IEEE Trans. Netw. Serv. Manag., April, 2024

Labels Are Culprits: Defending Gradient Attack on Privacy.
IEEE Internet Things J., February, 2024

MF2POSE: Multi-task Feature Fusion Pseudo-Siamese Network for intrusion detection using Category-distance Promotion Loss.
Knowl. Based Syst., January, 2024

Adversarial perturbation denoising utilizing common characteristics in deep feature space.
Appl. Intell., 2024

2023
Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range.
IEEE Syst. J., December, 2023

TSEE: a novel knowledge embedding framework for cyberspace security.
World Wide Web (WWW), November, 2023

Masking and purifying inputs for blocking textual adversarial attacks.
Inf. Sci., November, 2023

An interpretability security framework for intelligent decision support systems based on saliency map.
Int. J. Inf. Sec., October, 2023

Persistent graph stream summarization for real-time graph analytics.
World Wide Web (WWW), September, 2023

Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine, September, 2023

Robust image clustering via context-aware contrastive graph learning.
Pattern Recognit., June, 2023

Cybersecurity knowledge graph enabled attack chain detection for cyber-physical systems.
Comput. Electr. Eng., May, 2023

Efficient distributed broadcasting algorithms for cognitive radio networks-enabled smart agriculture.
Comput. Electr. Eng., May, 2023

E2EGI: End-to-End Gradient Inversion in Federated Learning.
IEEE J. Biomed. Health Informatics, February, 2023

Rust-Style Patch: A Physical and Naturalistic Camouflage Attacks on Object Detector for Remote Sensing Images.
Remote. Sens., February, 2023

IR-Capsule: Two-Stream Network for Face Forgery Detection.
Cogn. Comput., January, 2023

MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption.
Knowl. Based Syst., 2023

Artificial intelligence enabled cyber security defense for smart cities: A novel attack detection framework based on the MDATA model.
Knowl. Based Syst., 2023

Rethinking Perturbation Directions for Imperceptible Adversarial Attacks on Point Clouds.
IEEE Internet Things J., 2023

F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023

Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Enhancing Adversarial Robustness via Anomaly-aware Adversarial Training.
Proceedings of the Knowledge Science, Engineering and Management, 2023

When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph Embeddings.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Secure parallel Outsourcing Scheme for Large-scale Matrix Multiplication on Distributed Cloud Servers.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Knowledge Graph Embedding via Adaptive Negative Subsampling.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Research on the Prospect of Knowledge Graph Completion Based on the Federated Setting.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Fusing Security Alerts Improves Cyber-Security: An Alert Normalization Framework for Heterogeneous Devices.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Toward the Secure Transmission of Large-Scale Images in Autonomous Driving.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Towards Scale-Aware Self-Supervised Multi-Frame Depth Estimation with IMU Motion Dynamics.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

MDATA Model Based Cyber Security Knowledge Representation and Application.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

OIDMD: A Novel Open-Set Intrusion Detection Method Based on Mahalanobis Distance.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Universal Adversarial Perturbation From Dominant Feature For Speaker Recognition.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

DAoB: A Transferable Adversarial Attack via Boundary Information for Speaker Recognition Systems.
Proceedings of the Workshop on Deepfake Audio Detection and Analysis co-located with 32th International Joint Conference on Artificial Intelligence (IJCAI 2023), 2023

TSKE: Two-Stream Knowledge Embedding for Cyberspace Security.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

Deep Manifold Attack on Point Clouds via Parameter Plane Stretching.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
A Lightweight Privacy-Preserving System for the Security of Remote Sensing Images on IoT.
Remote. Sens., December, 2022

Epidemic Risk Assessment by a Novel Communication Station Based Method.
IEEE Trans. Netw. Sci. Eng., 2022

EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
ACM Trans. Priv. Secur., 2022

IEPSBP: A Cost-Efficient Image Encryption Algorithm Based on Parallel Chaotic System for Green IoT.
IEEE Trans. Green Commun. Netw., 2022

Applying artificial bee colony algorithm to the multidepot vehicle routing problem.
Softw. Pract. Exp., 2022

STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022

One model packs thousands of items with Recurrent Conditional Query Learning.
Knowl. Based Syst., 2022

GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
Int. J. Pattern Recognit. Artif. Intell., 2022

Leveraging transferability and improved beam search in textual adversarial attacks.
Neurocomputing, 2022

Adversarial Attacks on ASR Systems: An Overview.
CoRR, 2022

Hessian-Free Second-Order Adversarial Examples for Adversarial Learning.
CoRR, 2022

Visually imperceptible adversarial patch attacks.
Comput. Secur., 2022

Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022

NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems.
Proceedings of the Interspeech 2022, 2022

Robust Network Architecture Search via Feature Distortion Restraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

Filter Pruning via Feature Discrimination in Deep Neural Networks.
Proceedings of the Computer Vision - ECCV 2022, 2022

Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Adversarial Example Attacks against ASR Systems: An Overview.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

NMI-FGSM-Tri: An Efficient and Targeted Method for Generating Adversarial Examples for Speaker Recognition.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Multi-step Attack Detection Framework for the Power System Network.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

An Asterisk-shaped Patch Attack for Object Detection.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A General Construction Method of Cyber Security Knowledge Graph.
Proceedings of the 9th International Conference on Behavioural and Social Computing, 2022

Improving Robustness of Language Models from a Geometry-aware Perspective.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
Spatiotemporal Data Cleaning and Knowledge Fusion.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Knowledge Extraction: Automatic Classification of Matching Rules.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A Distributed Framework for APT Attack Analysis.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Entity Alignment: Optimization by Seed Selection.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

The Framework of the MDATA Computing Model.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Introduction to the MDATA Model.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

A High-Quality Authenticatable Visual Secret Sharing Scheme Using SGX.
Wirel. Commun. Mob. Comput., 2021

An Aerial-Computing-Assisted Architecture for Large-Scale Sensor Networks.
IEEE Wirel. Commun., 2021

Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng., 2021

On Heterogeneous Sensing Capability for Distributed Rendezvous in Cognitive Radio Networks.
IEEE Trans. Mob. Comput., 2021

Which is the fairest allocation in the max-min fairness-based coalitional game?
Theor. Comput. Sci., 2021

Editorial: Intelligence and Safety for Humanoid Robots: Design, Control, and Applications.
Frontiers Neurorobotics, 2021

TREATED: Towards Universal Defense against Textual Adversarial Attacks.
CoRR, 2021

Towards Speeding up Adversarial Training in Latent Spaces.
CoRR, 2021

Enhanced YOLO v3 Tiny Network for Real-Time Ship Detection From Visual Image.
IEEE Access, 2021

DVul-WLG: Graph Embedding Network Based on Code Similarity for Cross-Architecture Firmware Vulnerability Detection.
Proceedings of the Information Security - 24th International Conference, 2021

Word-Level Textual Adversarial Attack in the Embedding Space.
Proceedings of the International Joint Conference on Neural Networks, 2021

CODEs: Chamfer Out-of-Distribution Examples against Overconfidence Issue.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Attack-words Guided Sentence Generation for Textual Adversarial Attack.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Adversarial Attacks on Vehicle Re-Identification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Generate Adversarial Examples Combined with Image Entropy Distribution.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Review of Entity Alignment based on Graph Convolutional Neural Network.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Audio Steganography with Speech Recognition System.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Universal Targeted Attack Method against Image Classification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey of DeepFakes Generation and Detection.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Survey on Translating Embedding based Entity Alignment in Knowledge Graphs.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Efficient Rendezvous for Heterogeneous Interference in Cognitive Radio Networks.
IEEE Trans. Wirel. Commun., 2020

A Low-Latency and Energy-Efficient Neighbor Discovery Algorithm for Wireless Sensor Networks.
Sensors, 2020

An image encryption scheme based on precision limited chaotic system.
Multim. Tools Appl., 2020

Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
CoRR, 2020

TEAM: We Need More Powerful Adversarial Examples for DNNs.
CoRR, 2020

Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks.
Comput. Secur., 2020

A Robust Image Encryption Algorithm Based on a 32-bit Chaotic System.
IEEE Access, 2020

Restricted Region Based Iterative Gradient Method for Non-Targeted Attack.
IEEE Access, 2020

Can the Max-Min Fair Allocation Be Trustful in a Centralized Resource System?
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Knowledge Fusion and Spatiotemporal Data Cleaning: A Review.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Adversarial Examples for Chinese Text Classification.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Automatic Classification of Matching Rules in Pattern Matching.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

A Unified Information Diffusion Model for Social Networks.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Seeds Optimization for Entity Alignment in Knowledge Graph Embedding.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

An Improved Algorithm for Bert.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Convolutional Neural Network based Timbre Classification.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

Resume Extraction and Validation from Public Information.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Novel Malware Detection Framework Based on Weighted Heterograph.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

An APT Group Knowledge Model based on MDATA.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
A Fine-Grained Video Encryption Service Based on the Cloud-Fog-Local Architecture for Public and Private Videos.
Sensors, 2019

A Practical Neighbor Discovery Framework for Wireless Sensor Networks.
Sensors, 2019

Decision Propagation Networks for Image Classification.
CoRR, 2019

Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019

Resonance p-Laplacian Problem in Edge Device Control of IoT.
IEEE Access, 2019

Minimum Control Cost of Weighted Linear Dynamic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Can the Max-Min Fairness-Based Coalitional Mechanism in Competitive Networks be Trustful?
Proceedings of the 15th International Wireless Communications & Mobile Computing Conference, 2019

A General Framework for Adjustable Neighbor Discovery in Wireless Sensor Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Weighted-Ring Similarity Measurement for Community Detection in Social Network.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

A Simple but Effective Way to Improve the Performance of RNN-Based Encoder in Neural Machine Translation Task.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Chinese Text Classification Based on Neural Networks and Word2vec.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Rebalancing the Car-Sharing System: A Reinforcement Learning Method.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

Review of the Electric Vehicle Charging Station Location Problem.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

Cooperation via Codes in Restricted Hat Guessing Games.
Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, 2019

2018
WCS: Weighted Component Stitching for Sparse Network Localization.
IEEE/ACM Trans. Netw., 2018

Automatic Non-Taxonomic Relation Extraction from Big Data in Smart City.
IEEE Access, 2018

Panacea: A low-latency, energy-efficient neighbor discovery protocol for wireless sensor networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

How Local Information Improves Rendezvous in Cognitive Radio Networks.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

Where to Rendezvous?: Preferring Quiet Channels in Cognitive Radio Networks.
Proceedings of the 21st ACM International Conference on Modeling, 2018

Alano: An Efficient Neighbor Discovery Algorithm in an Energy-Restricted Large-Scale Network.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Achieving Real-Time Quality of Service with Software Defined Networking.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Achieving Real-Time Quality of Service in Software Defined Networks.
Proceedings of the IECON 2018, 2018

Robust Component-Based Network Localization with Noisy Range Measurements.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Approximation Algorithms for Controller Placement Problems in Software Defined Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

How to Control Target Nodes in Dynamic Networks.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Coordinating Disagreement and Satisfaction in Group Formation for Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Modeling Implicit Communities in Recommender Systems.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

How Does Fairness Matter in Group Recommendation.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Fairness-Aware Group Recommendation with Pareto-Efficiency.
Proceedings of the Eleventh ACM Conference on Recommender Systems, 2017

Rendezvous with Utilities in Cognitive Radio Networks.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Speeding up 3D Printing Using Multi-Head Slicing Algorithms.
Proceedings of the 5th International Conference on Enterprise Systems, 2017

Boosting Moving Average Reversion Strategy for Online Portfolio Selection: A Meta-learning Approach.
Proceedings of the Database Systems for Advanced Applications, 2017

Disparity-Aware Group Formation for Recommendation.
Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems, 2017

Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

Exploring Efficient Strategies for Minesweeper.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

Rendezvous in Distributed Systems - Theory, Algorithms and Applications
Springer, ISBN: 978-981-10-3679-8, 2017

2016
WarpMap: Accurate and Efficient Indoor Location by Dynamic Warping in Sequence-Type Radio-Map.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

IntenCT: Efficient Multi-Target Counting and Tracking by Binary Proximity Sensors.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

Dynamic rendezvous algorithms for cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Communication and Block Game in Cognitive Radio Networks.
Proceedings of the 18th ACM International Conference on Modeling, 2015

Improved rendezvous algorithms for heterogeneous cognitive radio networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Minimum control latency of dynamic networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Multi-Radio Channel Detecting Jamming Attack Against Enhanced Jump-Stay Based Rendezvous in Cognitive Radio Networks.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

2014
Oblivious Rendezvous in Cognitive Radio Networks.
Proceedings of the Structural Information and Communication Complexity, 2014

Local sequence based rendezvous algorithms for Cognitive Radio Networks.
Proceedings of the Eleventh Annual IEEE International Conference on Sensing, 2014

Deterministic distributed rendezvous algorithms for multi-radio cognitive radio networks.
Proceedings of the 17th ACM International Conference on Modeling, 2014

Fully distributed algorithms for blind rendezvous in cognitive radio networks.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

2013
Improved minimum latency aggregation scheduling in wireless sensor networks under the SINR model.
Int. J. Sens. Networks, 2013

Nearly optimal asynchronous blind rendezvous algorithm for Cognitive Radio Networks.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013

Reducing information gathering latency through Mobile Aerial Sensor Network.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2012
Path-loss fluctuations towards robust scheduling algorithms in the SINR model.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012


  Loading...