Zhendong Wang

Orcid: 0000-0002-7082-2478

Affiliations:
  • Jiangxi University of Science and Technology, Ganzhou, China


According to our database1, Zhendong Wang authored at least 26 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Application of dual-channel high-order graph neural network for intrusion detection with semisupervised learning.
Clust. Comput., October, 2025

A Novel Lightweight IoT Intrusion Detection Model Based on Self-Knowledge Distillation.
IEEE Internet Things J., June, 2025

A deep residual SConv1D-attention intrusion detection model for industrial Internet of Things.
Clust. Comput., April, 2025

Enhancing Android malware detection via knowledge distillation on homogenized function call graphs.
Knowl. Based Syst., 2025

Multi-population dynamic grey wolf optimizer based on dimension learning and Laplace Mutation for global optimization.
Expert Syst. Appl., 2025

ICMH-CHR: An intra-cluster multi-hop based cluster head rotation protocol for wireless sensor networks.
Ad Hoc Networks, 2025

DTKD-IDS: A dual-teacher knowledge distillation intrusion detection model for the industrial internet of things.
Ad Hoc Networks, 2025

Energy efficient clustering and routing for wireless sensor networks by applying a spider wasp optimizer.
Ad Hoc Networks, 2025

2024
Multi-strategy enhanced Grey Wolf Optimizer for global optimization and real world problems.
Clust. Comput., November, 2024

Reinforcement learning marine predators algorithm for global optimization.
Clust. Comput., October, 2024

A hierarchical hybrid intrusion detection model for industrial internet of things.
Peer Peer Netw. Appl., September, 2024

UCRTD: An Unequally Clustered Routing Protocol Based on Multihop Threshold Distance for Wireless Sensor Networks.
IEEE Internet Things J., September, 2024

A lightweight IoT intrusion detection model based on improved BERT-of-Theseus.
Expert Syst. Appl., March, 2024

Multi-strategy enhanced grey wolf algorithm for obstacle-aware WSNs coverage optimization.
Ad Hoc Networks, January, 2024

FAGnet: Family-aware-based android malware analysis using graph neural network.
Knowl. Based Syst., 2024

2023
Intrusion detection of manifold regularized broad learning system based on LU decomposition.
J. Supercomput., December, 2023

CRLM: A cooperative model based on reinforcement learning and metaheuristic algorithms of routing protocols in wireless sensor networks.
Comput. Networks, November, 2023

A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization.
PeerJ Comput. Sci., 2023

Application of Deep Neural Network with Frequency Domain Filtering in the Field of Intrusion Detection.
Int. J. Intell. Syst., 2023

2022
A lightweight approach for network intrusion detection in industrial cyber-physical systems based on knowledge distillation and deep metric learning.
Expert Syst. Appl., 2022

2021
Deep logarithmic neural network for Internet intrusion detection.
Soft Comput., 2021

Intrusion detection methods based on integrated deep learning model.
Comput. Secur., 2021

Deep Belief Network Integrating Improved Kernel-Based Extreme Learning Machine for Network Intrusion Detection.
IEEE Access, 2021

2020
Wireless Sensor Network Deployment of 3D Surface Based on Enhanced Grey Wolf Optimizer.
IEEE Access, 2020

Swarm Intelligence Application to UAV Aided IoT Data Acquisition Deployment Optimization.
IEEE Access, 2020

2019
Wireless Sensor Network Deployment Optimization Based on Two Flower Pollination Algorithms.
IEEE Access, 2019


  Loading...