Zhen Hong

Orcid: 0000-0001-9956-3732

According to our database1, Zhen Hong authored at least 57 papers between 1992 and 2024.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Detect Insider Attacks in Industrial Cyber-physical Systems Using Multi-physical Features-based Fingerprinting.
ACM Trans. Sens. Networks, March, 2024

Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.
IEEE Trans. Consumer Electron., February, 2024

BisSiam: Bispectrum Siamese Network Based Contrastive Learning for UAV Anomaly Detection.
IEEE Trans. Knowl. Data Eng., December, 2023

The Importance of Expert Knowledge for Automatic Modulation Open Set Recognition.
IEEE Trans. Pattern Anal. Mach. Intell., November, 2023

Triple Collocation of Ground-, Satellite- and Land Surface Model-Based Surface Soil Moisture Products in Oklahoma Part II: New Multi-Sensor Soil Moisture (MSSM) Product.
Remote. Sens., July, 2023

A Traceability Localization Method of Acoustic Attack Source for MEMS Gyroscope.
IEEE Embed. Syst. Lett., March, 2023

Toward Cooperative 3D Object Reconstruction with Multi-agent.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

Neural Mode Estimation.
Proceedings of the IEEE International Conference on Acoustics, 2023

Boosting Signal Modulation Few-Shot Learning with Pre-Transformation.
Proceedings of the IEEE International Conference on Acoustics, 2023

ESP Spoofing: Covert Acoustic Attack on MEMS Gyroscopes in Vehicles.
IEEE Trans. Inf. Forensics Secur., 2022

EfficientTDNN: Efficient Architecture Search for Speaker Recognition.
IEEE ACM Trans. Audio Speech Lang. Process., 2022

Triple Collocation of Ground-, Satellite- and Land Surface Model-Based Surface Soil Moisture Products in Oklahoma - Part I: Individual Product Assessment.
Remote. Sens., 2022

A wearable-based posture recognition system with AI-assisted approach for healthcare IoT.
Future Gener. Comput. Syst., 2022

Modelling of the Slope Solute Loss Based on Fuzzy Neural Network Model.
Comput. Syst. Sci. Eng., 2022

Combining machine learning with radiomics features in predicting outcomes after mechanical thrombectomy in patients with acute ischemic stroke.
Comput. Methods Programs Biomed., 2022

Distributed Fusion Tracking Estimation Under Range-Only Measurement.
IEEE Access, 2022

$R$-Print: A System Residuals-Based Fingerprinting for Attack Detection in Industrial Cyber-Physical Systems.
IEEE Trans. Ind. Electron., 2021

Meta-WF: Meta-Learning-Based Few-Shot Wireless Impersonation Detection for Wi-Fi Networks.
IEEE Commun. Lett., 2021

EfficientTDNN: Efficient Architecture Search for Speaker Recognition in the Wild.
CoRR, 2021

FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique.
Comput. Secur., 2021

An Improved LDA-Based ELM Classification for Intrusion Detection Algorithm in IoT Application.
Sensors, 2020

Cross-Examination of Similarity, Difference and Deficiency of Gauge, Radar and Satellite Precipitation Measuring Uncertainties for Extreme Events Using Conventional Metrics and Multiplicative Triple Collocation.
Remote. Sens., 2020

Can Remote Sensing Technologies Capture the Extreme Precipitation Event and Its Cascading Hydrological Response? A Case Study of Hurricane Harvey Using EF5 Modeling Framework.
Remote. Sens., 2020

Machine Learning-based Intrusion Detection for IoT Devices in Smart Home.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

Distributed Nonlinear Fusion UKF.
Proceedings of the 16th IEEE International Conference on Control & Automation, 2020

A secure routing protocol with regional partitioned clustering and Beta trust management in smart home.
Wirel. Networks, 2019

Method of large acceleration change for in-flight alignment of projectiles based on double-vector observations.
Trans. Inst. Meas. Control, 2019

Attacker Location Evaluation-Based Fake Source Scheduling for Source Location Privacy in Cyber-Physical Systems.
IEEE Trans. Inf. Forensics Secur., 2019

Quality-guided image classification toward information management applications.
J. Vis. Commun. Image Represent., 2019

An Energy-Efficient Topology Control Algorithm for Earth Building Monitoring Using Heterogeneous Wireless Sensor Networks.
IEEE Access, 2019

SDVisor: Secure Debug Enclave with Hypervisor.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

A Topology Control with Energy Balance in Underwater Wireless Sensor Networks for IoT-Based Application.
Sensors, 2018

China's 1 km Merged Gauge, Radar and Satellite Experimental Precipitation Dataset.
Remote. Sens., 2018

Procurement risk management under uncertainty: a review.
Ind. Manag. Data Syst., 2018

Fusion estimation in clustering sensor networks under stochastic deception attacks.
Int. J. Syst. Sci., 2018

Decentralized Applications: The Blockchain-Empowered Software System.
IEEE Access, 2018

Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

A tree-based topology construction algorithm with probability distribution and competition in the same layer for wireless sensor network.
Peer-to-Peer Netw. Appl., 2017

Blockchain-Empowered Fair Computational Resource Sharing System in the D2D Network.
Future Internet, 2017

Information Privacy of Cyber Transportation System: Opportunities and Challenges.
Proceedings of the 6th Annual Conference on Research in Information Technology, 2017

Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services.
Proceedings of the 2017 International Conference on Identification, 2017

Connectivity-Aware Task Outsourcing and Scheduling in D2D Networks.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

无线传感器网络(k, m)-容错连通支配集的分布式构建 (Distributed Construction for (k, m)-Fault Tolerant Connected Dominating Set in Wireless Sensor Network).
计算机科学, 2016

Energy-Efficient and Power-Optimal Topology Control with Potential Game for Heterogeneous Wireless Sensor Networks.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Quality-of-Experience Optimization for a Cloud Gaming System With Ad Hoc Cloudlet Assistance.
IEEE Trans. Circuits Syst. Video Technol., 2015

无线传感器网络中一种改进的能效数据收集协议 (Improved Energy Efficient Data Gathering Protocol in Wireless Sensor Network).
计算机科学, 2015

Data Uploading and Exchange Algorithm for Mobile Sensor Networks in the City Traffic Environment.
Int. J. Distributed Sens. Networks, 2015

A Privacy and Price-Aware Inter-Cloud System.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

Proactive and reactive purchasing planning under dependent demand, price, and yield risks.
OR Spectr., 2014

Adaptive Control based Particle Swarm Optimization and Chebyshev Neural Network for Chaotic Systems.
J. Comput., 2014

Energy-Efficient Weighted Observation Fusion Kalman Filtering with Randomly Delayed Measurements.
Circuits Syst. Signal Process., 2014

Reputation-based multiplayer fairness for ad-hoc cloudlet-assisted cloud gaming system.
Proceedings of the International Conference on Smart Computing, 2014

A decision support system for procurement risk management in the presence of spot market.
Decis. Support Syst., 2013

A risk assessment framework for logistics outsourcing.
Ind. Manag. Data Syst., 2012

The theatrical calculating formulas of BFT type flexible driving with multichannel engaging.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Design of Building Monitoring Systems Based on Wireless Sensor Networks.
Wirel. Sens. Netw., 2010

Target Tracking from Binocular Image Sequence Using the Autoregressive Moving Average Model.
Proceedings of IAPR Workshop on Machine Vision Applications, 1992