Zhidong Shen

Orcid: 0000-0002-4880-381X

According to our database1, Zhidong Shen authored at least 24 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Stealthy dynamic backdoor attack against neural networks for image classification.
Appl. Soft Comput., December, 2024

Meta-IDS: Meta-Learning-Based Smart Intrusion Detection System for Internet of Medical Things (IoMT) Network.
IEEE Internet Things J., July, 2024

TMG-GAN: Generative Adversarial Networks-Based Imbalanced Learning for Network Intrusion Detection.
IEEE Trans. Inf. Forensics Secur., 2024

Multiloss Adversarial Attacks for Multimodal Remote Sensing Image Classification.
IEEE Trans. Geosci. Remote. Sens., 2024

OCIE: Augmenting model interpretability via Deconfounded Explanation-Guided Learning.
Knowl. Based Syst., 2024

FDNet: Imperceptible backdoor attacks via frequency domain steganography and negative sampling.
Neurocomputing, 2024

Leveraging saliency priors and explanations for enhanced consistent interpretability.
Expert Syst. Appl., 2024

2023
IFL-GAN: Improved Federated Learning Generative Adversarial Network With Maximum Mean Discrepancy Model Aggregation.
IEEE Trans. Neural Networks Learn. Syst., December, 2023

RVGAN-TL: A generative adversarial networks and transfer learning-based hybrid approach for imbalanced data classification.
Inf. Sci., June, 2023

News Recommendation Based on User Topic and Entity Preferences in Historical Behavior.
Inf., February, 2023

RGAN-EL: A GAN and ensemble learning-based hybrid approach for imbalanced data classification.
Inf. Process. Manag., 2023

RRN: A differential private approach to preserve privacy in image classification.
IET Image Process., 2023

A Data-Free Substitute Model Training Method for Textual Adversarial Attacks.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

2021
Analysis of Application Examples of Differential Privacy in Deep Learning.
Comput. Intell. Neurosci., 2021

2020
A Survey of Automatic Software Vulnerability Detection, Program Repair, and Defect Prediction Techniques.
Secur. Commun. Networks, 2020

An Approach Based on Customized Robust Cloaked Region for Geographic Location Information Privacy Protection.
Mob. Inf. Syst., 2020

2019
A Bayesian Classification Intrusion Detection Method Based on the Fusion of PCA and LDA.
Secur. Commun. Networks, 2019

A Survey of Research on Runtime Rerandomization Under Memory Disclosure.
IEEE Access, 2019

Food Item Recognition and Intake Measurement Techniques.
Proceedings of the 2019 11th International Conference on Machine Learning and Computing, 2019

2017
A data integrity verification scheme in mobile cloud computing.
J. Netw. Comput. Appl., 2017

2013
A cloud based dual-root trust model for secure mobile online transactions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A security protocol with minimum interference for UWB and WiFi networks.
Proceedings of the 20th IEEE Symposium on Communications and Vehicular Technology in the Benelux, 2013

2009
Research of Mobile Agent Technology for GIS Grid.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009

A Security Technology for Mobile Agent System Improved by Trusted Computing Platform.
Proceedings of the 9th International Conference on Hybrid Intelligent Systems (HIS 2009), 2009


  Loading...