Zhenhu Ning

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
A Many-Objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem.
IEEE Trans. Mob. Comput., February, 2024

Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization.
IEEE Trans. Computers, January, 2024

2023
An intelligent trusted edge data production method for distributed Internet of things.
Neural Comput. Appl., October, 2023

A two-stage federated optimization algorithm for privacy computing in Internet of Things.
Future Gener. Comput. Syst., August, 2023

An improved particle swarm optimization algorithm for P300 Neural network recognizer.
Proceedings of the 2023 13th International Conference on Communication and Network Security, 2023

2022
A method of core concept extraction based on semantic-weight ranking.
Concurr. Comput. Pract. Exp., 2022

A decentralized and reliable trust measurement for edge computing enabled Internet of Things.
Concurr. Comput. Pract. Exp., 2022

An identity privacy scheme for blockchain-based on edge computing.
Concurr. Comput. Pract. Exp., 2022

A dual-system trusted computing node construction method based on ARM multi-core CPU architecture.
Concurr. Comput. Pract. Exp., 2022

Trusted connection architecture of electric IoT.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Character-level domain name generation algorithm based on ED-GAN.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Consensus Algorithm Based on Subject Credit.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Fast identification method of malicious code based on extreme learning machine.
Proceedings of the ICSCA 2022: 11th International Conference on Software and Computer Applications, Melaka, Malaysia, February 24, 2022

Embedded Real-time System Trusted Protection Technology for Supply Chain Scenarios.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

Identity-based Linkable Blind Ring Signature Scheme on Lattice.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

A trusted construction mechanism for sever based on trusted hard disk.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

2021
A Many-Objective Multistage Optimization-Based Fuzzy Decision-Making Model for Coal Production Prediction.
IEEE Trans. Fuzzy Syst., 2021

Compressed sensing using generative models based on fisher information.
Int. J. Mach. Learn. Cybern., 2021

Adaptive Algorithm in Image Reconstruction Based on Information Geometry.
KSII Trans. Internet Inf. Syst., 2021

Trusted data collection for Internet of Things.
Concurr. Comput. Pract. Exp., 2021

Efficient Verification of N-GHZ State in Quantum Wireless Network Communication.
Proceedings of the ICDSP 2021: 5th International Conference on Digital Signal Processing, 2021

Compressed Sensing Spare Reconstruction Optimization based on the NNIA.
Proceedings of the ICBDC 2021: 6th International Conference on Big Data and Computing, Shenzhen, China, May 22, 2021

A Multi-objective Optimization Algorithm for Wireless Sensor Network Energy Balance Problem in Internet of Things.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2021

An Effective Data Balancing Strategy Based on Swarm Intelligence Algorithm for Malicious Code Detection and Classification.
Proceedings of the Bio-Inspired Computing: Theories and Applications, 2021

2020
A Heterogeneous IoT Node Authentication Scheme Based on Hybrid Blockchain and Trust Value.
KSII Trans. Internet Inf. Syst., 2020

Embedding prior knowledge about measurement matrix into neural networks for compressed sensing.
Int. J. Wirel. Mob. Comput., 2020

Research on CLPKC-IDPKC cross-domain identity authentication for IoT environment.
Comput. Commun., 2020

2019
Information geometry enhanced fuzzy deep belief networks for sentiment classification.
Int. J. Mach. Learn. Cybern., 2019

Anti-conspiracy attack threshold signature model and protocol.
Int. J. Wirel. Mob. Comput., 2019

Neural Networks for Compressed Sensing Based on Information Geometry.
Circuits Syst. Signal Process., 2019

Research on the trusted protection technology of internet of things.
Clust. Comput., 2019

Improved Neural Networks Based on Mutual Information via Information Geometry.
Algorithms, 2019

TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.
IEEE Access, 2019

2018
Research on parallelisation of collaborative filtering recommendation algorithm based on Spark.
Int. J. Wirel. Mob. Comput., 2018

A novel image encryption method based on hyperchaotic system and pixel information association.
Int. J. Wirel. Mob. Comput., 2018

Sentiment Classification Based on Information Geometry and Deep Belief Networks.
IEEE Access, 2018

Detection of Malicious Domain Names Based on Hidden Markov Model.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Effective Clone Detection Model Based on Compressed Sensing in Clustered WSNs.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

An Efficient Malicious Code Detection System Based on Convolutional Neural Networks.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

2017
Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy.
KSII Trans. Internet Inf. Syst., 2017

Hierarchy Merkle tree wireless sensor network architecture.
Int. J. Wirel. Mob. Comput., 2017

Trusted connection architecture of Internet of Things oriented to perception layer.
Int. J. Wirel. Mob. Comput., 2017

A Novel Anti-Obfuscation Model for Detecting Malicious Code.
Int. J. Open Source Softw. Process., 2017

2014
Property-Based Anonymous Attestation in Trusted Cloud Computing.
J. Electr. Comput. Eng., 2014

Nonlinear boundary stabilization of the wave equations with variable coefficients and time dependent delay.
Appl. Math. Comput., 2014


  Loading...